WorldWideScience

Sample records for defense message system

  1. Readiness of the Defense Message System to Replace the Automatic Digital Network

    National Research Council Canada - National Science Library

    1998-01-01

    .... The Defense Information Systems Agency began developing the Defense Message System (DMS) in 1988 to replace messaging functions provided by AUTODIN and electronic mail systems. Audit Objectives...

  2. The Defense Messaging System (DMS) in the Navy Regional Enterprise Messaging System (NREMS) environment evidence that size does matter in DoD business process engineering

    OpenAIRE

    Ramsey, Avonna S.

    2007-01-01

    Since the migration of DOD messaging to the DMS has been mandated, implementation has been less than ideal and otherwise unsuccessful. DMS users have reported dissatisfaction with the systems maintenance and security support burdens in the current client-server model. NREMS introduces a networked environment capable of push technology and centralized database and security management which should significantly reduce the DMS shortfalls that have made the system lack appeal to the end user. As ...

  3. Message framing and defensive processing: a cultural examination.

    Science.gov (United States)

    Ko, Deborah M; Kim, Heejung S

    2010-01-01

    Past research has shown that health messages on safer sexual practices that focus on relational consequences are more persuasive than messages that focus on personal consequences. However, we theorize that it is defensiveness against personal risk framing that threatens the self among people from more individualistic cultures. Two studies tested this idea. Study 1 showed that European Americans were less persuaded by personal framing than by relational framing but that this pattern was not found for Asian Americans, who are more collectivistic. Study 2 showed that these defensive patterns were eliminated among European American participants when a person's self-image was affirmed. These results suggest defensive processes as the mechanism behind the differences in message framing effectiveness and motivate a closer look at cultural patterns.

  4. A Modular Instant Messaging System

    OpenAIRE

    Mohamad Raad; Zouhair Bazzal; Majd Ghareeb; Hanan Farhat; Semar Bahmad

    2017-01-01

    Instant Messaging (IM) Android applications are a trend nowadays. These applications are categorized according to their features: usability, flexibility, privacy and security. However, IM applications tend to be inflexible in terms of functionality offered. The “Dble-U” system was developed as a solution to this inflexibility, with a focus on privacy as an example use case. “Dble-U” is a configurable modular system consisting of an Android chatting application, a privacy controller applicatio...

  5. MessageSpace: a messaging system for health research

    Science.gov (United States)

    Escobar, Rodrigo D.; Akopian, David; Parra-Medina, Deborah; Esparza, Laura

    2013-03-01

    Mobile Health (mHealth) has emerged as a promising direction for delivery of healthcare services via mobile communication devices such as cell phones. Examples include texting-based interventions for chronic disease monitoring, diabetes management, control of hypertension, smoking cessation, monitoring medication adherence, appointment keeping and medical test result delivery; as well as improving patient-provider communication, health information communication, data collection and access to health records. While existing messaging systems very well support bulk messaging and some polling applications, they are not designed for data collection and processing of health research oriented studies. For that reason known studies based on text-messaging campaigns have been constrained in participant numbers. In order to empower healthcare promotion and education research, this paper presents a system dedicated for healthcare research. It is designed for convenient communication with various study groups, feedback collection and automated processing.

  6. Distributed parallel messaging for multiprocessor systems

    Science.gov (United States)

    Chen, Dong; Heidelberger, Philip; Salapura, Valentina; Senger, Robert M; Steinmacher-Burrow, Burhard; Sugawara, Yutaka

    2013-06-04

    A method and apparatus for distributed parallel messaging in a parallel computing system. The apparatus includes, at each node of a multiprocessor network, multiple injection messaging engine units and reception messaging engine units, each implementing a DMA engine and each supporting both multiple packet injection into and multiple reception from a network, in parallel. The reception side of the messaging unit (MU) includes a switch interface enabling writing of data of a packet received from the network to the memory system. The transmission side of the messaging unit, includes switch interface for reading from the memory system when injecting packets into the network.

  7. CMLOG: A common message logging system

    International Nuclear Information System (INIS)

    Chen, J.; Akers, W.; Bickley, M.; Wu, D.; Watson, W. III

    1997-01-01

    The Common Message Logging (CMLOG) system is an object-oriented and distributed system that not only allows applications and systems to log data (messages) of any type into a centralized database but also lets applications view incoming messages in real-time or retrieve stored data from the database according to selection rules. It consists of a concurrent Unix server that handles incoming logging or searching messages, a Motif browser that can view incoming messages in real-time or display stored data in the database, a client daemon that buffers and sends logging messages to the server, and libraries that can be used by applications to send data to or retrieve data from the database via the server. This paper presents the design and implementation of the CMLOG system meanwhile it will also address the issue of integration of CMLOG into existing control systems. CMLOG into existing control systems

  8. The Message Reporting System of the ATLAS DAQ System

    CERN Document Server

    Caprini, M; Kolos, S; 10th ICATPP Conference on Astroparticle, Particle, Space Physics, Detectors and Medical Physics Applications

    2008-01-01

    The Message Reporting System (MRS) in the ATLAS data acquisition system (DAQ) is one package of the Online Software which acts as a glue of various elements of DAQ, High Level Trigger (HLT) and Detector Control System (DCS). The aim of the MRS is to provide a facility which allows all software components in ATLAS to report messages to other components of the distributed DAQ system. The processes requiring a MRS are on one hand applications that report error conditions or information and on the other hand message processors that receive reported messages. A message reporting application can inject one or more messages into the MRS at any time. An application wishing to receive messages can subscribe to a message group according to defined criteria. The application receives messages that fulfill the subscription criteria when they are reported to MRS. The receiver message processing can consist of anything from simply logging the messages in a file/terminal to performing message analysis. The inter-process comm...

  9. Instant Apache Camel messaging system

    CERN Document Server

    Sharapov, Evgeniy

    2013-01-01

    Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A beginner's guide to Apache Camel that walks you through basic operations like installation and setup right through to developing simple applications.This book is a good starting point for Java developers who have to work on an application dealing with various systems and interfaces but who haven't yet started using Enterprise System Buses or Java Business Integration frameworks.

  10. Using Publish-Subscribe Messaging for System Status and Automation

    Science.gov (United States)

    Smith, Danford S.

    2015-01-01

    The NASA Goddard Mission Services Evolution Center (GMSEC) system is a message-based plug-and-play open system architecture used in many of NASA mission operations centers. This presentation will focus on the use of GMSEC standard messages to report and analyze the status of a system and enable the automation of the system's components. In GMSEC systems, each component reports its status using a keep-alive message and also publishes status and activities as log messages. In addition, the components can accept functional directive messages from the GMSEC message bus. Over the past several years, development teams have found ways to utilize these messages to create innovative display pages and increasingly sophisticated approaches to automation. This presentation will show the flexibility and value of the message-based approach to system awareness and automation.

  11. The prototype message broadcast system for the Superconducting Super Collider

    International Nuclear Information System (INIS)

    Low, K.; Skegg, R.

    1990-11-01

    A prototype unified message broadcast system to handle the site-wide distribution of all control system messages for the Superconducting Super Collider is presented. The messages are assembled in the control room area and encapsulated for transmission via a general fiber-optic link system to devices distributed throughout 70 miles of tunnels. An embedded timing signal is used by the distribution system to ensure that messages arrive at all devices simultaneously. Devices receive messages using a special receiver sub-system. A simple version of this system is to be used in the Accelerator Systems String Test (ASST) at the SSC site in 1991. 3 refs., 6 figs., 1 tab

  12. The prototype message broadcast system for the superconducting super collider

    International Nuclear Information System (INIS)

    Low, K.; Skegg, R.

    1991-01-01

    This paper presents a prototype unified message broadcast system to handle the site-wide distribution of all control system messages for the Superconducting Super Collider. The messages are assembled in the control room area and encapsulated for transmission via a general fiber-optic link system to devices distributed throughout 70 miles of tunnels. An embedded timing signal is used by the distribution system to ensure that messages arrive at all devices simultaneously. Devices receive messages using a special receiver sub-system

  13. System of message for gamma-radiation monitor

    International Nuclear Information System (INIS)

    Bolic, M.D.; Koturovic, A.M.

    2001-01-01

    Paper describes a system of voice messages for gamma-radiation monitor based on PC. The systems reproduces recorded messages that is simpler than the process of their synthesis. Message choice is based on combination of recorded digital results and/or received reference messages or warnings. The system of generation of voice messages applies the Windows based software. The total memory array required to create independent voice system is maximum 1.7 mbyte. The monitor may be used for continuous monitoring of radioactivity level with 5-8 s period of message repetition. Another option of the system operation is based on monitor application for the environment monitoring. Period of messages in this case is equal to 5-30 min [ru

  14. Computer network defense system

    Science.gov (United States)

    Urias, Vincent; Stout, William M. S.; Loverro, Caleb

    2017-08-22

    A method and apparatus for protecting virtual machines. A computer system creates a copy of a group of the virtual machines in an operating network in a deception network to form a group of cloned virtual machines in the deception network when the group of the virtual machines is accessed by an adversary. The computer system creates an emulation of components from the operating network in the deception network. The components are accessible by the group of the cloned virtual machines as if the group of the cloned virtual machines was in the operating network. The computer system moves network connections for the group of the virtual machines in the operating network used by the adversary from the group of the virtual machines in the operating network to the group of the cloned virtual machines, enabling protecting the group of the virtual machines from actions performed by the adversary.

  15. The Message Logging System for NOνA Experiment

    International Nuclear Information System (INIS)

    Lu Qiming; Kowalkowski, J B; Biery, K A

    2011-01-01

    The message logging system provides the infrastructure for all of the distributed processes in the data acquisition (DAQ) to report status messages of various severities in a consistent manner to a central location, as well as providing the tools for displaying and archiving the messages. The message logging system has been developed over a decade, and has been run successfully on CDF and CMS experiments. The most recent work to the message logging system is to build it as a stand-alone package with the name MessageFacility which works for any generic framework or applications, with NOνA as the first driving user. System designs and architectures, as well as the efforts of making it a generic library will be discussed. We also present new features that have been added.

  16. Alert Messaging in the CMS Distributed Workflow System

    International Nuclear Information System (INIS)

    Maxa, Zdenek

    2012-01-01

    WMAgent is the core component of the CMS workload management system. One of the features of this job managing platform is a configurable messaging system aimed at generating, distributing and processing alerts: short messages describing a given alert-worthy information or pathological condition. Apart from the framework's sub-components running within the WMAgent instances, there is a stand-alone application collecting alerts from all WMAgent instances running across the CMS distributed computing environment. The alert framework has a versatile design that allows for receiving alert messages also from other CMS production applications, such as PhEDEx data transfer manager. We present implementation details of the system, including its Python implementation using ZeroMQ, CouchDB message storage and future visions as well as operational experiences. Inter-operation with monitoring platforms such as Dashboard or Lemon is described.

  17. Synchronous message-based communication for distributed heterogeneous systems

    International Nuclear Information System (INIS)

    Wilkinson, N.; Dohan, D.

    1992-01-01

    The use of a synchronous, message-based real-time operating system (Unison) as the basis of transparent interprocess and inter-processor communication over VME-bus is described. The implementation of a synchronous, message-based protocol for network communication between heterogeneous systems is discussed. In particular, the design and implementation of a message-based session layer over a virtual circuit transport layer protocol using UDP/IP is described. Inter-process communication is achieved via a message-based semantic which is portable by virtue of its ease of implementation in other operating system environments. Protocol performance for network communication among heterogeneous architecture is presented, including VMS, Unix, Mach and Unison. (author)

  18. Secure message authentication system for node to node network

    Science.gov (United States)

    Sindhu, R.; Vanitha, M. M.; Norman, J.

    2017-10-01

    The Message verification remains some of the best actual methods for prevent the illegal and dis honored communication after presence progressed to WSNs (Wireless Sensor Networks). Intend for this purpose, several message verification systems must stand established, created on both symmetric key cryptography otherwise public key cryptosystems. Best of them will have some limits for great computational then statement above in count of deficiency of climb ability then flexibility in node settlement occurrence. In a polynomial based system was newly presented for these problems. Though, this system then situations delay will must the dimness of integral limitation firm in the point of polynomial: once the amount of message transferred remains the greater than the limitation then the opponent will completely improve the polynomial approaches. This paper suggests using ECC (Elliptic Curve Cryptography). Though using the node verification the technique in this paper permits some nodes to transfer a limitless amount of messages lacking misery in the limit problem. This system will have the message cause secrecy. Equally theoretic study then model effects show our planned system will be effective than the polynomial based method in positions of calculation then statement above in privacy points though message basis privacy.

  19. Sandia National Laboratories: National Security Missions: Defense Systems

    Science.gov (United States)

    ; Technology Defense Systems & Assessments About Defense Systems & Assessments Program Areas Audit Sandia's Economic Impact Licensing & Technology Transfer Browse Technology Portfolios ; Culture Work-Life Balance Special Programs Nuclear Weapons Defense Systems Global Security Energy Facebook

  20. MESA: Message-Based System Analysis Using Runtime Verification

    Science.gov (United States)

    Shafiei, Nastaran; Tkachuk, Oksana; Mehlitz, Peter

    2017-01-01

    In this paper, we present a novel approach and framework for run-time verication of large, safety critical messaging systems. This work was motivated by verifying the System Wide Information Management (SWIM) project of the Federal Aviation Administration (FAA). SWIM provides live air traffic, site and weather data streams for the whole National Airspace System (NAS), which can easily amount to several hundred messages per second. Such safety critical systems cannot be instrumented, therefore, verification and monitoring has to happen using a nonintrusive approach, by connecting to a variety of network interfaces. Due to a large number of potential properties to check, the verification framework needs to support efficient formulation of properties with a suitable Domain Specific Language (DSL). Our approach is to utilize a distributed system that is geared towards connectivity and scalability and interface it at the message queue level to a powerful verification engine. We implemented our approach in the tool called MESA: Message-Based System Analysis, which leverages the open source projects RACE (Runtime for Airspace Concept Evaluation) and TraceContract. RACE is a platform for instantiating and running highly concurrent and distributed systems and enables connectivity to SWIM and scalability. TraceContract is a runtime verication tool that allows for checking traces against properties specified in a powerful DSL. We applied our approach to verify a SWIM service against several requirements.We found errors such as duplicate and out-of-order messages.

  1. 2015 Assessment of the Ballistic Missile Defense System (BMDS)

    Science.gov (United States)

    2016-04-01

    Director, Operational Test and Evaluation 2015 Assessment of the Ballistic Missile Defense System (BMDS...Evaluation (DOT&E) as they pertain to the Ballistic Missile Defense System (BMDS). Congress specified these requirements in the fiscal year 2002 (FY02...systems are the Ground-based Midcourse Defense (GMD), Aegis Ballistic Missile Defense (Aegis BMD), Terminal High-Altitude Area Defense (THAAD), and

  2. NASIS data base management system: IBM 360 TSS implementation. Volume 6: NASIS message file

    Science.gov (United States)

    1973-01-01

    The message file for the NASA Aerospace Safety Information System (NASIS) is discussed. The message file contains all the message and term explanations for the system. The data contained in the file can be broken down into three separate sections: (1) global terms, (2) local terms, and (3) system messages. The various terms are defined and their use within the system is explained.

  3. NASIS data base management system - IBM 360/370 OS MVT implementation. 6: NASIS message file

    Science.gov (United States)

    1973-01-01

    The message file for the NASA Aerospace Safety Information System (NASIS) is discussed. The message file contains all the message and term explanations for the system. The data contained in the file can be broken down into three separate sections: (1) global terms, (2) local terms, and (3) system messages. The various terms are defined and their use within the system is explained.

  4. The message architecture of the LEP control system

    International Nuclear Information System (INIS)

    Altaber, J.; van der Stok, P.; Frammery, V.; Gareyte, C.; Rausch, R.

    1985-01-01

    The LEP control system will be constructed as a global communication system where microprocessors will be used everywhere, from the management of the communication mechanisms, the execution of complex control procedures, and the supervision of the equipment. To achieve this, the global control problem has been cut into sizeable functions which will be encapsulated into microprocessor modules containing enough hardware for the function to be mostly self-contained. This leads to a function architecture where messages are exchanged between the functions on miscellaneous media. It is shown how these message exchanges can be organized into a uniform flow of data all through the system

  5. Missile Defense: Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities

    Science.gov (United States)

    2016-04-28

    Page 1 GAO-16-339R Ballistic Missile Defense 441 G St. N.W. Washington, DC 20548 April 28, 2016 Congressional Committees Missile Defense... Ballistic Missile Defense System Testing Delays Affect Delivery of Capabilities For over half a century, the Department of Defense (DOD) has been...funding efforts to develop a system to detect, track, and defeat enemy ballistic missiles. The current system—the Ballistic Missile Defense System

  6. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    The 1993 policy to promote the consolidation of the United States defense industry began a series of acquisitions and mergers that went beyond the intent of the policy and left the Department of Defense (DoD...

  7. Strategic Framework for the Defense Acquisition System Understanding Defense Consolidation

    National Research Council Canada - National Science Library

    Potts, Anthony W

    2007-01-01

    ...% of defense product sales annually. Defense consolidation has diminished the flexibility required for surge capacity, diminished competitive innovations in products, and reduced competitive pricing based on multiple sources for products...

  8. Layered virus protection for the operations and administrative messaging system

    Science.gov (United States)

    Cortez, R. H.

    2002-01-01

    NASA's Deep Space Network (DSN) is critical in supporting the wide variety of operating and plannedunmanned flight projects. For day-to-day operations it relies on email communication between the three Deep Space Communication Complexes (Canberra, Goldstone, Madrid) and NASA's Jet Propulsion Laboratory. The Operations & Administrative Messaging system, based on the Microsoft Windows NTand Exchange platform, provides the infrastructure that is required for reliable, mission-critical messaging. The reliability of this system, however, is threatened by the proliferation of email viruses that continue to spread at alarming rates. A layered approach to email security has been implemented across the DSN to protect against this threat.

  9. Selected General Controls Over the Defense Business Management System

    National Research Council Canada - National Science Library

    1996-01-01

    .... The Defense Business Management System performs appropriation accounting, cost accounting, personnel, payroll, manpower, and management information functions for the Navy, the Air Force, five Defense...

  10. Design and Implementation of a Wireless Message Display System

    Directory of Open Access Journals (Sweden)

    M. U. M. Bakura

    2016-08-01

    Full Text Available The technology of displaying message is an important part of communication and advertisement. In recent times, Wireless communication has announced its arrival on big stage and the world is going with Smartphone technology. This work describes the design and implementation of a microcontroller based messaging display system. The messaging display system will be interfaced with an android application which will then be used to display information from the comfort of one‘s phone to an LCD screen using the Bluetooth application interface. The work employs the use of an ATMEGA328p Microcontroller mounted on an Arduino board, a Bluetooth Module (HC-06 and an LCD screen. Most of these electronic display systems were using wired cable connections, the Bluetooth technology used in this work is aimed at solving the problem of wired cable connections.The microcontroller provides all the functionality of the display notices and wireless control. A desired text message from a mobile phone is sent via android mobile application to the Bluetooth module located at the receiving end. The Mobile Application was created using online software called App Inventor. When the entire system was connected and tested, it functioned as designed without any noticeable problems. The Bluetooth module responded to commands being sent from the android application appropriately and in a timely manner. The system was able to display 80 characters on the 4 x 20 LCD within the range of 10m as designated by the Bluetooth datasheet.

  11. Running a reliable messaging infrastructure for CERN's control system

    International Nuclear Information System (INIS)

    Ehm, F.

    2012-01-01

    The current middle-ware for CERN's Control System is based on 2 implementations: CORBA-based Controls Middle-Ware (CMW) and Java Messaging Service (JMS). The JMS service is realized using the open source messaging product ActiveMQ and had became an increasing vital part of beam operations as data need to be transported reliably for various areas such as the beam protection system, post mortem analysis, beam commissioning or the alarm system. The current JMS service is made of 18 brokers running either in clusters or as single nodes. The main service is deployed as a 2 node cluster providing fail-over and load balancing capabilities for high availability. Non-critical applications running on virtual machines or desktop machines read data via a third broker to decouple the load from the operational main cluster. This scenario has been introduced last year and the statistics showed an up-time of 99.998% and an average data serving rate of 1.6 G-Byte per minute represented by around 150 messages per second. Deploying, running, maintaining and protecting such messaging infrastructure is not trivial and includes setting up of careful monitoring and failure pre-recognition. Naturally, lessons have been learnt and their outcome is very important for the current and future operation of such service. (author)

  12. Online Scheduling in Distributed Message Converter Systems

    NARCIS (Netherlands)

    Risse, Thomas; Wombacher, Andreas; Surridge, Mike; Taylor, Steve; Aberer, Karl

    The optimal distribution of jobs among hosts in distributed environments is an important factor to achieve high performance. The optimal strategy depends on the application. In this paper we present a new online scheduling strategy for distributed EDI converter system. The strategy is based on the

  13. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library

    2002-01-01

    .... The Defense Travel System was envisioned as a general support system designed to make business travel quicker, easier, and more efficient by providing automated commercial and Government travel...

  14. Defense Logistics Standard Systems Functional Requirements.

    Science.gov (United States)

    1987-03-01

    the design of retaillintermediate-level data bases to support end-user requisition control files. The wholesale system could then be restructured to... organza - Sale tions, the residual is sold Sales and merchandising responsibility rests Vitl the Defense Reutilization and Marketing Regions Those...File (DDF) advanced by ANSI Technical Committee X3L5 and ISO TC97/SC15 • The Data Extraction, Processing, and Restructuring System (EXPRESS) designed by

  15. Technical Evaluation Report 6: Chat and Instant Messaging Systems

    Directory of Open Access Journals (Sweden)

    Jennifer Stein

    2002-04-01

    Full Text Available Text-based conferencing can be both asynchronous (i.e., participants log into the conference at separate times, and synchronous (i.e., interaction takes place in real time. It is thus subject to the same wide variation as the online audio- and video-conferencing methods (see the earlier Reports in this series. Synchronous text-based approaches (e.g., online chat groups and instant messaging systems are highly popular among online users generally owing to their ability to bring together special-interest groups from around the world without cost. In distance education (DE, however, synchronous chat methods are less widely used, owing in part to the problems of arranging for working adults in different time zones to join a discussion group simultaneously. Instant text messaging is more popular among DE users in view of the choice it provides between responding to a message immediately (synchronous communication or after a delay (asynchronous. The different synchronous and asynchronous approaches are likely to become more widely used in parallel with one another, as they are integrated in individual product packages.

  16. Fault-tolerant Agreement in Synchronous Message-passing Systems

    CERN Document Server

    Raynal, Michel

    2010-01-01

    The present book focuses on the way to cope with the uncertainty created by process failures (crash, omission failures and Byzantine behavior) in synchronous message-passing systems (i.e., systems whose progress is governed by the passage of time). To that end, the book considers fundamental problems that distributed synchronous processes have to solve. These fundamental problems concern agreement among processes (if processes are unable to agree in one way or another in presence of failures, no non-trivial problem can be solved). They are consensus, interactive consistency, k-set agreement an

  17. Defense islands in bacterial and archaeal genomes and prediction of novel defense systems.

    Science.gov (United States)

    Makarova, Kira S; Wolf, Yuri I; Snir, Sagi; Koonin, Eugene V

    2011-11-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic "sinks" that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands.

  18. Military Message Experiment. Volume II.

    Science.gov (United States)

    1982-04-01

    elements of the Department of Defense. This resulted in a memorandum from the Director, Telecomunications and Comand and Control, OSD, in June 1975...1978 to April 1979 and provides a discussion of the telecomunications inter- face aspects of the experiment. This Final Report covers the period of...arise in the telecomunication system which require A retransmission of an outgoing message. A "service" message may be created within the

  19. Two Women with Multiple Disabilities Communicate with Distant Partners via a Special Text Messaging System

    Science.gov (United States)

    Lancioni, Giulio E.; O'Reilly, Mark F.; Singh, Nirbhay N.; Sigafoos, Jeff; Green, Vanessa A.; Oliva, Doretta; Alberti, Gloria; Carrella, Luigina

    2013-01-01

    This study extended the research on a special text messaging system, which allows persons with multiple disabilities to (a) write and send messages to distant partners and (b) have messages from those partners read out to them. The study involved two women with multiple disabilities (including blindness or minimal residual vision). The system…

  20. Information Management Principles Applied to the Ballistic Missile Defense System

    National Research Council Canada - National Science Library

    Koehler, John M

    2007-01-01

    .... Similarly several military systems with the single mission of missile defense have evolved in service stovepipes, and are now being integrated into a national and global missile defense architecture...

  1. MMS: An electronic message management system for emergency response

    DEFF Research Database (Denmark)

    Andersen, H.B.; Garde, H.; Andersen, V.

    1998-01-01

    among messages can be viewed in a graphic tree-like display. By employing the extensive filtration facilities offered by the MMS. users are able to monitor the current status of messages. And, in general, filtration provides users with means of surveying a possibly large number of responses to messages...... contingency plan and procedures to be applied during predefined stages of an emergency....

  2. A System for Exchanging Control and Status Messages in the NOvA Data Acquisition

    International Nuclear Information System (INIS)

    Biery, K.A.; Cooper, R.G.; Foulkes, S.C.; Guglielmo, G.M.; Piccoli, L.P.; Votava, M.E.V.; Fermilab

    2007-01-01

    In preparation for NOvA, a future neutrino experiment at Fermilab, we are developing a system for passing control and status messages in the data acquisition system. The DAQ system will consist of applications running on approximately 450 nodes. The message passing system will use a publish-subscribe model and will provide support for sending messages and receiving the associated replies. Additional features of the system include a layered architecture with custom APIs tailored to the needs of a DAQ system, the use of an open source messaging system for handling the reliable delivery of messages, the ability to send broadcasts to groups of applications, and APIs in Java, C++, and Python. Our choice for the open source system to deliver messages is EPICS. We will discuss the architecture of the system, our experience with EPICS, and preliminary test results

  3. A System for Exchanging Control and Status Messages in the NOvA Data Acquisition

    Energy Technology Data Exchange (ETDEWEB)

    Biery, K.A.; Cooper, R.G.; Foulkes, S.C.; Guglielmo, G.M.; Piccoli, L.P.; Votava, M.E.V.; /Fermilab

    2007-04-01

    In preparation for NOvA, a future neutrino experiment at Fermilab, we are developing a system for passing control and status messages in the data acquisition system. The DAQ system will consist of applications running on approximately 450 nodes. The message passing system will use a publish-subscribe model and will provide support for sending messages and receiving the associated replies. Additional features of the system include a layered architecture with custom APIs tailored to the needs of a DAQ system, the use of an open source messaging system for handling the reliable delivery of messages, the ability to send broadcasts to groups of applications, and APIs in Java, C++, and Python. Our choice for the open source system to deliver messages is EPICS. We will discuss the architecture of the system, our experience with EPICS, and preliminary test results.

  4. Validation of the computerized annunciation message list system (CAMLS)

    Energy Technology Data Exchange (ETDEWEB)

    Feher, M P; Davey, E C; Lupton, L R [AECL, Chalk River Labs., Chalk River, ON (Canada)

    1997-09-01

    The Computerized Annunciation Message List System is a computerized annunciation system for the control rooms of nuclear generating stations. CAMLS will alert operators to changes in plant conditions that may impact on safety and production and help staff to effectively respond. CAMLS is designed to: provide a clear and concise overview of the current problems or faults in the plant; provide an overview of the current state of the plant in terms of automatic process and equipment actions; provide support for specific operational tasks, through either pre-configured or operator-configured annunciation displays, including: rapid and efficient upset response, plant stabilization, problem diagnosis, recovery action planning and implementation, and rapid recovery from trip and return to power operation. To achieve this, several information processing, presentation,a nd interaction concepts were developed. 2 refs, 6 figs, 7 tabs.

  5. Validation of the computerized annunciation message list system (CAMLS)

    International Nuclear Information System (INIS)

    Feher, M.P.; Davey, E.C.; Lupton, L.R.

    1997-01-01

    The Computerized Annunciation Message List System is a computerized annunciation system for the control rooms of nuclear generating stations. CAMLS will alert operators to changes in plant conditions that may impact on safety and production and help staff to effectively respond. CAMLS is designed to: provide a clear and concise overview of the current problems or faults in the plant; provide an overview of the current state of the plant in terms of automatic process and equipment actions; provide support for specific operational tasks, through either pre-configured or operator-configured annunciation displays, including: rapid and efficient upset response, plant stabilization, problem diagnosis, recovery action planning and implementation, and rapid recovery from trip and return to power operation. To achieve this, several information processing, presentation,a nd interaction concepts were developed. 2 refs, 6 figs, 7 tabs

  6. Error message recording and reporting in the SLC control system

    International Nuclear Information System (INIS)

    Spencer, N.; Bogart, J.; Phinney, N.; Thompson, K.

    1985-01-01

    Error or information messages that are signaled by control software either in the VAX host computer or the local microprocessor clusters are handled by a dedicated VAX process (PARANOIA). Messages are recorded on disk for further analysis and displayed at the appropriate console. Another VAX process (ERRLOG) can be used to sort, list and histogram various categories of messages. The functions performed by these processes and the algorithms used are discussed

  7. Error message recording and reporting in the SLC control system

    International Nuclear Information System (INIS)

    Spencer, N.; Bogart, J.; Phinney, N.; Thompson, K.

    1985-04-01

    Error or information messages that are signaled by control software either in the VAX host computer or the local microprocessor clusters are handled by a dedicated VAX process (PARANOIA). Messages are recorded on disk for further analysis and displayed at the appropriate console. Another VAX process (ERRLOG) can be used to sort, list and histogram various categories of messages. The functions performed by these processes and the algorithms used are discussed

  8. Acquisition: Allegations to the Defense Hotline on the Management of the Defense Travel System

    National Research Council Canada - National Science Library

    2002-01-01

    Who Should Read This Report and Why? This report concerns those managers who are specifically involved with managing the Defense Travel System, as well as those managing the development of information technology systems...

  9. Real-time mobile customer short message system design and implementation

    Science.gov (United States)

    Han, Qirui; Sun, Fang

    To expand the current mobile phone short message service, and to make the contact between schools, teachers, parents and feedback of the modern school office system more timely and conveniently, designed and developed the Short Message System based on the Linux platform. The state-of-the-art principles and designed proposals in the Short Message System based on the Linux platform are introduced. Finally we propose an optimized secure access authentication method. At present, many schools,vbusinesses and research institutions ratify the promotion and application the messaging system gradually, which has shown benign market prospects.

  10. THE DEFENSE PLANNING SYSTEMS AND THEIR IMPLICATIONS

    Directory of Open Access Journals (Sweden)

    Laszlo STICZ

    2010-01-01

    Full Text Available Defense planning in the Alliance is a fundamental element of the arrangements which enable its member countries to enjoy the crucial political, military and resource advantages of collective defense and other common military efforts to enhance security and stability. In this respect, the aim of this paper is to outline the role of the Armed Forces and the specific processes aiming to achieve the ultimate goal of a nation regarding national security, with focus on defense planning and the PDPS.

  11. Evaluating user experiences of the secure messaging tool on the Veterans Affairs' patient portal system.

    Science.gov (United States)

    Haun, Jolie N; Lind, Jason D; Shimada, Stephanie L; Martin, Tracey L; Gosline, Robert M; Antinori, Nicole; Stewart, Max; Simon, Steven R

    2014-03-06

    The United States Department of Veterans Affairs has implemented an electronic asynchronous "Secure Messaging" tool within a Web-based patient portal (ie, My HealtheVet) to support patient-provider communication. This electronic resource promotes continuous and coordinated patient-centered care, but to date little research has evaluated patients' experiences and preferences for using Secure Messaging. The objectives of this mixed-methods study were to (1) characterize veterans' experiences using Secure Messaging in the My HealtheVet portal over a 3-month period, including system usability, (2) identify barriers to and facilitators of use, and (3) describe strategies to support veterans' use of Secure Messaging. We recruited 33 veterans who had access to and had previously used the portal's Secure Messaging tool. We used a combination of in-depth interviews, face-to-face user-testing, review of transmitted secure messages between veterans and staff, and telephone interviews three months following initial contact. We assessed participants' computer and health literacy during initial and follow-up interviews. We used a content-analysis approach to identify dominant themes in the qualitative data. We compared inferences from each of the data sources (interviews, user-testing, and message review) to identify convergent and divergent data trends. The majority of veterans (27/33, 82%) reported being satisfied with Secure Messaging at initial interview; satisfaction ratings increased to 97% (31/32, 1 missing) during follow-up interviews. Veterans noted Secure Messaging to be useful for communicating with their primary care team to manage health care needs (eg, health-related questions, test requests and results, medication refills and questions, managing appointments). Four domains emerged from interviews: (1) perceived benefits of using Secure Messaging, (2) barriers to using Secure Messaging, (3) facilitators for using Secure Messaging, and (4) suggestions for improving

  12. Nurses' perception of how an e-message system influences cross-sectoral communication

    DEFF Research Database (Denmark)

    Petersen, Helle V; Foged, Signe; Madsen, Annette L

    2018-01-01

    AIM: To investigate hospital and home care nurses' experiences on how an e-message system influences cross-sectoral communication 2 years after introduction. BACKGROUND: Cross-sectoral communication is identified as the main barrier for high quality in transitional care. An e-message system......-message system was used in both sectors but did not promote cross-sectoral dialogue. The home care nurses expressed distrust in the information from the hospital. The hospital nurses' intention was to provide relevant and accurate information but their main focus was to fulfil the standards within the system...... rather than the quality of the information exchanged. CONCLUSIONS: The e-message system supports a one-way information flow, rather than the intended loop of information exchange and dialogue. IMPLICATIONS FOR NURSING MANAGEMENT: Nurse managers should recognise that although an e-message system is being...

  13. Characteristics of electronic patient-provider messaging system utilisation in an urban health care organisation

    Directory of Open Access Journals (Sweden)

    Sean Patrick Mikles

    2014-12-01

    Full Text Available Introduction Research suggests that electronic messaging can improve patient engagement. Studies indicate that a ‘digital divide’ may exist, where certain patient populations may be using electronic messaging less frequently. This study aims to determine which patient characteristics are associated with different levels of usage of an electronic patient-provider messaging system in a diverse urban population.Methods Cross-sectional electronic health record data were extracted for patients 10 years of age or older who live in New York City and who visited a set of clinics between 1 July 2011 and 30 June 2012. Regression analyses determined which participant characteristics were associated with the sending of electronic messages.Results Older, female, English-speaking participants of white race who received more messages, had any diagnoses, more office visits and a provider who sent messages were more likely to send more messages. Non-Millennial, non-white participants who received fewer messages, had more office visits, any diagnoses, a provider who saw fewer patients with patient portal accounts, lived in a low socioeconomic status neighbourhood, and did not have private insurance were more likely to send zero messages.Conclusion This study found significant differences in electronic messaging usage based on demographic, socioeconomic and health-related patient characteristics. Future studies are needed to support these results and determine the causes of observed associations.

  14. DEFENSE-ATTACK INTERACTION OVER OPTIMALLY DESIGNED DEFENSE SYSTEMS VIA GAMES AND RELIABILITY

    Directory of Open Access Journals (Sweden)

    Isis Didier Lins

    2014-05-01

    Full Text Available This paper analyzes defense systems taking into account the strategic interactions between two rational agents; one of them is interested in designing a defense system against purposeful attacks of the other. The interaction is characterized by a sequential game with perfect and complete information. Reliability plays a fundamental role in both defining agents' actions and in measuring performance of the defense system for which a series-parallel configuration is set up by the defender. The attacker, in turn, focuses on only one defense subsystem in order to maximize her efficiency in attacking. An algorithm involving backward induction is developed to determine the equilibrium paths of the game. Application examples are also provided.

  15. HL7 Messaging Engine with Customizable Translation System

    Directory of Open Access Journals (Sweden)

    PRODAN, R.

    2010-05-01

    Full Text Available This paper introduces a new client-server messaging engine used to exchange clinical data between various medical software applications. Our portal uses the HL7 (Health Level Seven messaging standard to provide translated clinical data to HL7 and non-HL7 client applications. We used HL7 because this standard is worldwide used to facilitate the communication between clinical applications.

  16. Studies on the hepatic antioxidant defense system in &lambda ...

    African Journals Online (AJOL)

    Studies on the hepatic antioxidant defense system in λ cyhalothrin-induced ... Significant (P<0.05) elevation in the level of lipid peroxidation was observed in λ ... The results of the present investigation have indicated that the tissue antioxidant defense system is operating at a lower rate despite ... HOW TO USE AJOL.

  17. Deception used for Cyber Defense of Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Wayne F. Boyer; Miles A. McQueen

    2009-05-01

    Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

  18. Evaluating User Experiences of the Secure Messaging Tool on the Veterans Affairs’ Patient Portal System

    Science.gov (United States)

    Lind, Jason D; Shimada, Stephanie L; Martin, Tracey L; Gosline, Robert M; Antinori, Nicole; Stewart, Max; Simon, Steven R

    2014-01-01

    Background The United States Department of Veterans Affairs has implemented an electronic asynchronous “Secure Messaging” tool within a Web-based patient portal (ie, My HealtheVet) to support patient-provider communication. This electronic resource promotes continuous and coordinated patient-centered care, but to date little research has evaluated patients’ experiences and preferences for using Secure Messaging. Objective The objectives of this mixed-methods study were to (1) characterize veterans’ experiences using Secure Messaging in the My HealtheVet portal over a 3-month period, including system usability, (2) identify barriers to and facilitators of use, and (3) describe strategies to support veterans’ use of Secure Messaging. Methods We recruited 33 veterans who had access to and had previously used the portal’s Secure Messaging tool. We used a combination of in-depth interviews, face-to-face user-testing, review of transmitted secure messages between veterans and staff, and telephone interviews three months following initial contact. We assessed participants’ computer and health literacy during initial and follow-up interviews. We used a content-analysis approach to identify dominant themes in the qualitative data. We compared inferences from each of the data sources (interviews, user-testing, and message review) to identify convergent and divergent data trends. Results The majority of veterans (27/33, 82%) reported being satisfied with Secure Messaging at initial interview; satisfaction ratings increased to 97% (31/32, 1 missing) during follow-up interviews. Veterans noted Secure Messaging to be useful for communicating with their primary care team to manage health care needs (eg, health-related questions, test requests and results, medication refills and questions, managing appointments). Four domains emerged from interviews: (1) perceived benefits of using Secure Messaging, (2) barriers to using Secure Messaging, (3) facilitators for using

  19. Using Instant Messaging Systems as a Platform for Electronic Voting

    Science.gov (United States)

    Meletiadou, Anastasia; Grimm, Rüdiger

    Many Instant Messaging (IM) systems like Skype or Spark offer ex tended services such as file sharing, VoIP, or a shared whiteboard. As the name suggests, IM applications are predominantly used for spontaneous text-based communication for private or business purposes. In this paper we explore their potential to serve as platforms for secure collaborative applications like electronic contract negotiation, e-payment or electronic voting. Such applications have to deal with challenges like time constraints (“instant” com munication is desired), integration of media channels and the absence of one uni fying “sphere of control” covering all participants. In this paper, we address these challenges by discussing one particular secure collaborative application: secure decision processes for small groups. We provide the following contribu tions: (1) we define three varying scenarios and corresponding security require ments (2) we present an IM-based architecture implementing these scenarios, in cluding a Video-based authentication mechanism, and (3) we discuss poten tial attack patterns.

  20. Mobile Messaging Services-Based Personal Electrocardiogram Monitoring System

    Directory of Open Access Journals (Sweden)

    Ashraf A. Tahat

    2009-01-01

    Full Text Available A mobile monitoring system utilizing Bluetooth and mobile messaging services (MMS/SMSs with low-cost hardware equipment is proposed. A proof of concept prototype has been developed and implemented to enable transmission of an Electrocardiogram (ECG signal and body temperature of a patient, which can be expanded to include other vital signs. Communication between a mobile smart-phone and the ECG and temperature acquisition apparatus is implemented using the popular personal area network standard specification Bluetooth. When utilizing MMS for transmission, the mobile phone plots the received ECG signal and displays the temperature using special application software running on the client mobile phone itself, where the plot can be captured and saved as an image before transmission. Alternatively, SMS can be selected as a transmission means, where in this scenario, dedicated application software is required at the receiving device. The experimental setup can be operated for monitoring from anywhere in the globe covered by a cellular network that offers data services.

  1. Mobile messaging services-based personal electrocardiogram monitoring system.

    Science.gov (United States)

    Tahat, Ashraf A

    2009-01-01

    A mobile monitoring system utilizing Bluetooth and mobile messaging services (MMS/SMSs) with low-cost hardware equipment is proposed. A proof of concept prototype has been developed and implemented to enable transmission of an Electrocardiogram (ECG) signal and body temperature of a patient, which can be expanded to include other vital signs. Communication between a mobile smart-phone and the ECG and temperature acquisition apparatus is implemented using the popular personal area network standard specification Bluetooth. When utilizing MMS for transmission, the mobile phone plots the received ECG signal and displays the temperature using special application software running on the client mobile phone itself, where the plot can be captured and saved as an image before transmission. Alternatively, SMS can be selected as a transmission means, where in this scenario, dedicated application software is required at the receiving device. The experimental setup can be operated for monitoring from anywhere in the globe covered by a cellular network that offers data services.

  2. A Scalable and Reliable Message Transport Service for the ATLAS Trigger and Data Acquisition System

    CERN Document Server

    Kazarov, A; The ATLAS collaboration; Kolos, S; Lehmann Miotto, G; Soloviev, I

    2014-01-01

    The ATLAS Trigger and Data Acquisition (TDAQ) is a large distributed computing system composed of several thousands of interconnected computers and tens of thousands applications. During a run, TDAQ applications produce a lot of control and information messages with variable rates, addressed to TDAQ operators or to other applications. Reliable, fast and accurate delivery of the messages is important for the functioning of the whole TDAQ system. The Message Transport Service (MTS) provides facilities for the reliable transport, the filtering and the routing of the messages, basing on publish-subscribe-notify communication pattern with content-based message filtering. During the ongoing LHC shutdown, the MTS was re-implemented, taking into account important requirements like reliability, scalability and performance, handling of slow subscribers case and also simplicity of the design and the implementation. MTS uses CORBA middleware, a common layer for TDAQ infrastructure, and provides sending/subscribing APIs i...

  3. Modifying the behaviour of minix system calls through the redirection of messages

    OpenAIRE

    Pessolani, Pablo Andrés

    2011-01-01

    Minix 3 is an open-source operating system designed to be highly reliable, flexible, and secure. The kernel is small and user processes, specialized servers and device drivers runs as user-mode isolated processes. Minix is a client/server operating system that uses message transfers as communication primitives between processes. Minix system calls send messages to request for services to the Process Manager Server (PM) or the File System Server (FS), and then waiting for the results. The requ...

  4. A Wireless Text Messaging System Improves Communication for Neonatal Resuscitation.

    Science.gov (United States)

    Hughes Driscoll, Colleen A; Schub, Jamie A; Pollard, Kristi; El-Metwally, Dina

    Handoffs for neonatal resuscitation involve communicating critical delivery information (CDI). The authors sought to achieve ≥95% communication of CDI during resuscitation team requests. CDI included name of caller, urgency of request, location of delivery, gestation of fetus, status of amniotic fluid, and indication for presence of the resuscitation team. Three interventions were implemented: verbal scripted handoff, Spök text messaging, and Engage text messaging. Percentages of CDI communications were analyzed using statistical process control. Following implementation of Engage, the communication of all CDI, except for indication, was ≥95%; communication of indication occurred 93% of the time. Control limits for most CDI were narrower with Engage, indicating greater reliability of communication compared to the verbal handoff and Spök. Delayed resuscitation team arrival, a countermeasure, was not higher with text messaging compared to verbal handoff ( P = 1.00). Text messaging improved communication during high-risk deliveries, and it may represent an effective tool for other delivery centers.

  5. Emergency Message Dissemination System for Smartphones During Natural Disasters

    NARCIS (Netherlands)

    Wu, Xian; Mazurowski, Maciej; Chen, Zhen; Meratnia, Nirvana

    This paper revolves around the concept of utilizing the modern smartphone communication capabilities to transmit messages through an ad hoc network during a disaster, which renders the traditional cellular base station inaccessible. Due to dynamic and decentralized nature of the considered

  6. Application of optimization methods for nuclear energy system performance assessment by the MESSAGE software

    International Nuclear Information System (INIS)

    Andrianov, A.A.; Kuptsov, I.S.; Utyanskaya, T.V.

    2016-01-01

    This paper defines the multi-objective optimization and uncertainty treatment modules for the IAEA energy planning software MESSAGE intended for multi-objective optimization and sustainability assessments of innovative nuclear energy systems with account of uncertainty [ru

  7. Management of Contract Waivers and Deviations for Defense Systems

    National Research Council Canada - National Science Library

    1998-01-01

    This report is the fourth and final in a series of reports resulting from our audit of management of contract waivers and deviations for Defense systems and summarizes our overall evaluation. Report...

  8. Detection technique of targets for missile defense system

    Science.gov (United States)

    Guo, Hua-ling; Deng, Jia-hao; Cai, Ke-rong

    2009-11-01

    Ballistic missile defense system (BMDS) is a weapon system for intercepting enemy ballistic missiles. It includes ballistic-missile warning system, target discrimination system, anti-ballistic-missile guidance systems, and command-control communication system. Infrared imaging detection and laser imaging detection are widely used in BMDS for surveillance, target detection, target tracking, and target discrimination. Based on a comprehensive review of the application of target-detection techniques in the missile defense system, including infrared focal plane arrays (IRFPA), ground-based radar detection technology, 3-dimensional imaging laser radar with a photon counting avalanche photodiode (APD) arrays and microchip laser, this paper focuses on the infrared and laser imaging detection techniques in missile defense system, as well as the trends for their future development.

  9. Defense Islands in Bacterial and Archaeal Genomes and Prediction of Novel Defense Systems ▿†‡

    Science.gov (United States)

    Makarova, Kira S.; Wolf, Yuri I.; Snir, Sagi; Koonin, Eugene V.

    2011-01-01

    The arms race between cellular life forms and viruses is a major driving force of evolution. A substantial fraction of bacterial and archaeal genomes is dedicated to antivirus defense. We analyzed the distribution of defense genes and typical mobilome components (such as viral and transposon genes) in bacterial and archaeal genomes and demonstrated statistically significant clustering of antivirus defense systems and mobile genes and elements in genomic islands. The defense islands are enriched in putative operons and contain numerous overrepresented gene families. A detailed sequence analysis of the proteins encoded by genes in these families shows that many of them are diverged variants of known defense system components, whereas others show features, such as characteristic operonic organization, that are suggestive of novel defense systems. Thus, genomic islands provide abundant material for the experimental study of bacterial and archaeal antivirus defense. Except for the CRISPR-Cas systems, different classes of defense systems, in particular toxin-antitoxin and restriction-modification systems, show nonrandom clustering in defense islands. It remains unclear to what extent these associations reflect functional cooperation between different defense systems and to what extent the islands are genomic “sinks” that accumulate diverse nonessential genes, particularly those acquired via horizontal gene transfer. The characteristics of defense islands resemble those of mobilome islands. Defense and mobilome genes are nonrandomly associated in islands, suggesting nonadaptive evolution of the islands via a preferential attachment-like mechanism underpinned by the addictive properties of defense systems such as toxins-antitoxins and an important role of horizontal mobility in the evolution of these islands. PMID:21908672

  10. Design of Instant Messaging System of Multi-language E-commerce Platform

    Science.gov (United States)

    Yang, Heng; Chen, Xinyi; Li, Jiajia; Cao, Yaru

    2017-09-01

    This paper aims at researching the message system in the instant messaging system based on the multi-language e-commerce platform in order to design the instant messaging system in multi-language environment and exhibit the national characteristics based information as well as applying national languages to e-commerce. In order to develop beautiful and friendly system interface for the front end of the message system and reduce the development cost, the mature jQuery framework is adopted in this paper. The high-performance server Tomcat is adopted at the back end to process user requests, and MySQL database is adopted for data storage to persistently store user data, and meanwhile Oracle database is adopted as the message buffer for system optimization. Moreover, AJAX technology is adopted for the client to actively pull the newest data from the server at the specified time. In practical application, the system has strong reliability, good expansibility, short response time, high system throughput capacity and high user concurrency.

  11. Defense High Level Waste Disposal Container System Description Document

    International Nuclear Information System (INIS)

    Pettit, N. E.

    2001-01-01

    The Defense High Level Waste Disposal Container System supports the confinement and isolation of waste within the Engineered Barrier System of the Monitored Geologic Repository (MGR). Disposal containers are loaded and sealed in the surface waste handling facilities, transferred to the underground through the accesses using a rail mounted transporter, and emplaced in emplacement drifts. The defense high level waste (HLW) disposal container provides long-term confinement of the commercial HLW and defense HLW (including immobilized plutonium waste forms [IPWF]) placed within disposable canisters, and withstands the loading, transfer, emplacement, and retrieval loads and environments. US Department of Energy (DOE)-owned spent nuclear fuel (SNF) in disposable canisters may also be placed in a defense HLW disposal container along with commercial HLW waste forms, which is known as co-disposal. The Defense High Level Waste Disposal Container System provides containment of waste for a designated period of time, and limits radionuclide release. The disposal container/waste package maintains the waste in a designated configuration, withstands maximum handling and rockfall loads, limits the individual canister temperatures after emplacement, resists corrosion in the expected handling and repository environments, and provides containment of waste in the event of an accident. Defense HLW disposal containers for HLW disposal will hold up to five HLW canisters. Defense HLW disposal containers for co-disposal will hold up to five HLW canisters arranged in a ring and one DOE SNF canister inserted in the center and/or one or more DOE SNF canisters displacing a HLW canister in the ring. Defense HLW disposal containers also will hold two Multi-Canister Overpacks (MCOs) and two HLW canisters in one disposal container. The disposal container will include outer and inner cylinders, outer and inner cylinder lids, and may include a canister guide. An exterior label will provide a means by

  12. UNIPOLAR, BIPOLAR OR MULTIPOLAR INTERNATIONAL SYSTEM? THE DEFENSE INDUSTRY FACTOR

    OpenAIRE

    ÖZKAN, Gökhan

    2008-01-01

    International system can be defined as a complex system of systems that is comprised of economic, political, scientific, technological and military systems. It is hard to analyze this complex system. It is even harder to forecast its future. Nonetheless, there are factors such as the defense industry and military power that affect the dynamics of the international system much more than other factors. After the Revolution in Military Affairs, which transformed the military paradigm, significa...

  13. Microbial Genomics: The Expanding Universe of Bacterial Defense Systems.

    Science.gov (United States)

    Forsberg, Kevin J; Malik, Harmit S

    2018-04-23

    Bacteria protect themselves against infection using multiple defensive systems that move by horizontal gene transfer and accumulate in genomic 'defense islands'. A recent study exploited these features to uncover ten novel defense systems, substantially expanding the catalog of bacterial defense systems and predicting the discovery of many more. Copyright © 2018 Elsevier Ltd. All rights reserved.

  14. A Customized Workflow-Driven Instant Messaging System Support Team Communication in the Hospital.

    Science.gov (United States)

    Lee, Ying-Li; Chien, Tsai-Feng; Chen, Hsiu-Chin

    2016-01-01

    Effective communication among the healthcare team is a very important skill to support team resource management (TRM). However, we take too much effort to connect with other team members by using traditional telephone communication. In this study, we developed an instant messaging system embedded in the original hospital information system and evaluated the preliminary outcome and the usage of the system.

  15. Key technologies of the server monitor and control system based on GSM short messages

    International Nuclear Information System (INIS)

    Chen Taiwei; Zhou Zhenliu; Liu Baoxu

    2007-01-01

    The network management based on SNMP protocol cannot effectively monitor and control application-system states and key-process states on the computer server. Furthermore, it needs the administrator's longtime surveillance. When the administrator leaves the computer, he can't receive the malfunction message in time. In this paper we present a server monitor and control system based on monitor agents and GSM short messages, introduce the key technology to realize it, and implement a model system in the real network environment. (authors)

  16. Nonlinear unknown input sliding mode observer based chaotic system synchronization and message recovery scheme with uncertainty

    International Nuclear Information System (INIS)

    Sharma, Vivek; Sharma, B.B.; Nath, R.

    2017-01-01

    In the present manuscript, observer based synchronization and message recovery scheme is discussed for a system with uncertainties. LMI conditions are analytically derived solution of which gives the observer design matrices. Earlier approaches have used adaptive laws to address the uncertainties, however in present work, decoupling approach is used to make observer robust against uncertainties. The methodology requires upper bounds on nonlinearity and the message signal and estimates for these bounds are generated adaptively. Thus no information about the nature of nonlinearity and associated Lipschitz constant is needed in proposed approach. Message signal is recovered using equivalent output injection which is a low pass filtered equivalent of the discontinuous effort required to maintain the sliding motion. Finally, the efficacy of proposed Nonlinear Unknown Input Sliding Mode Observer (NUISMO) for chaotic communication is verified by conducting simulation studies on two chaotic systems i.e. third order Chua circuit and Rossler system.

  17. Space Reclamation for Uncoordinated Checkpointing in Message-Passing Systems. Ph.D. Thesis

    Science.gov (United States)

    Wang, Yi-Min

    1993-01-01

    Checkpointing and rollback recovery are techniques that can provide efficient recovery from transient process failures. In a message-passing system, the rollback of a message sender may cause the rollback of the corresponding receiver, and the system needs to roll back to a consistent set of checkpoints called recovery line. If the processes are allowed to take uncoordinated checkpoints, the above rollback propagation may result in the domino effect which prevents recovery line progression. Traditionally, only obsolete checkpoints before the global recovery line can be discarded, and the necessary and sufficient condition for identifying all garbage checkpoints has remained an open problem. A necessary and sufficient condition for achieving optimal garbage collection is derived and it is proved that the number of useful checkpoints is bounded by N(N+1)/2, where N is the number of processes. The approach is based on the maximum-sized antichain model of consistent global checkpoints and the technique of recovery line transformation and decomposition. It is also shown that, for systems requiring message logging to record in-transit messages, the same approach can be used to achieve optimal message log reclamation. As a final topic, a unifying framework is described by considering checkpoint coordination and exploiting piecewise determinism as mechanisms for bounding rollback propagation, and the applicability of the optimal garbage collection algorithm to domino-free recovery protocols is demonstrated.

  18. CHAOS: An SDN-Based Moving Target Defense System

    Directory of Open Access Journals (Sweden)

    Yuan Shi

    2017-01-01

    Full Text Available Moving target defense (MTD has provided a dynamic and proactive network defense to reduce or move the attack surface that is available for exploitation. However, traditional network is difficult to realize dynamic and active security defense effectively and comprehensively. Software-defined networking (SDN points out a brand-new path for building dynamic and proactive defense system. In this paper, we propose CHAOS, an SDN-based MTD system. Utilizing the programmability and flexibility of SDN, CHAOS obfuscates the attack surface including host mutation obfuscation, ports obfuscation, and obfuscation based on decoy servers, thereby enhancing the unpredictability of the networking environment. We propose the Chaos Tower Obfuscation (CTO method, which uses the Chaos Tower Structure (CTS to depict the hierarchy of all the hosts in an intranet and define expected connection and unexpected connection. Moreover, we develop fast CTO algorithms to achieve a different degree of obfuscation for the hosts in each layer. We design and implement CHAOS as an application of SDN controller. Our approach makes it very easy to realize moving target defense in networks. Our experimental results show that a network protected by CHAOS is capable of decreasing the percentage of information disclosure effectively to guarantee the normal flow of traffic.

  19. Multiple operating system rotation environment moving target defense

    Science.gov (United States)

    Evans, Nathaniel; Thompson, Michael

    2016-03-22

    Systems and methods for providing a multiple operating system rotation environment ("MORE") moving target defense ("MTD") computing system are described. The MORE-MTD system provides enhanced computer system security through a rotation of multiple operating systems. The MORE-MTD system increases attacker uncertainty, increases the cost of attacking the system, reduces the likelihood of an attacker locating a vulnerability, and reduces the exposure time of any located vulnerability. The MORE-MTD environment is effectuated by rotation of the operating systems at a given interval. The rotating operating systems create a consistently changing attack surface for remote attackers.

  20. A Defense of an Amodal Number System

    Directory of Open Access Journals (Sweden)

    Abel Wajnerman Paz

    2018-04-01

    Full Text Available It has been argued that the approximate number system (ANS constitutes a problem for the grounded approach to cognition because it implies that some conceptual tasks are performed by non-perceptual systems. The ANS is considered non-perceptual mainly because it processes stimuli from different modalities. Jones (2015 has recently argued that this system has many features (such as being modular which are characteristic of sensory systems. Additionally, he affirms that traditional sensory systems also process inputs from different modalities. This suggests that the ANS is a perceptual system and therefore it is not problematic for the grounded view. In this paper, I defend the amodal approach to the ANS against these two arguments. In the first place, perceptual systems do not possess the properties attributed to the ANS and therefore these properties do not imply that the ANS is perceptual. In the second place, I will propose that a sensory system only needs to be dedicated to process modality-specific information, which is consistent with responding to inputs from different modalities. I argue that the cross-modal responses exhibited by traditional sensory systems are consistent with modality-specific information whereas some responses exhibited by the ANS are not.

  1. Cooperative Autonomous Resilient Defense Platform for Cyber-Physical Systems

    OpenAIRE

    Azab, Mohamed Mahmoud Mahmoud

    2013-01-01

    Cyber-Physical Systems (CPS) entail the tight integration of and coordination between computational and physical resources. These systems are increasingly becoming vital to modernizing the national critical infrastructure systems ranging from healthcare, to transportation and energy, to homeland security and national defense. Advances in CPS technology are needed to help improve their current capabilities as well as their adaptability, autonomicity, efficiency, reliability, safety and usabili...

  2. Information Management Principles Applied to the Ballistic Missile Defense System

    Science.gov (United States)

    2007-03-01

    of a BMDS. From this, the Army produced the Nike -Zeus system comprised of four radars, the Zeus missile, and a computer fire control system (General...made the Nike -Zeus our first National Missile Defense (NMD) system named Sentinel. The architecture was to cover 14 locations, 10 of which were...1999). Additionally, there are cultural impacts (Gordon & Gordon, 1999). A company choosing an Apple OS may have to wage a big fight against the

  3. REQUIREMENTS FOR SYSTEMS DEVELOPMENT LIFE CYCLE MODELS FOR LARGE-SCALE DEFENSE SYSTEMS

    Directory of Open Access Journals (Sweden)

    Kadir Alpaslan DEMIR

    2015-10-01

    Full Text Available TLarge-scale defense system projects are strategic for maintaining and increasing the national defense capability. Therefore, governments spend billions of dollars in the acquisition and development of large-scale defense systems. The scale of defense systems is always increasing and the costs to build them are skyrocketing. Today, defense systems are software intensive and they are either a system of systems or a part of it. Historically, the project performances observed in the development of these systems have been signifi cantly poor when compared to other types of projects. It is obvious that the currently used systems development life cycle models are insuffi cient to address today’s challenges of building these systems. Using a systems development life cycle model that is specifi cally designed for largescale defense system developments and is effective in dealing with today’s and near-future challenges will help to improve project performances. The fi rst step in the development a large-scale defense systems development life cycle model is the identifi cation of requirements for such a model. This paper contributes to the body of literature in the fi eld by providing a set of requirements for system development life cycle models for large-scale defense systems. Furthermore, a research agenda is proposed.

  4. Strategic defense and attack for reliability systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2008-01-01

    This article illustrates a method by which arbitrarily complex series/parallel reliability systems can be analyzed. The method is illustrated with the series-parallel and parallel-series systems. Analytical expressions are determined for the investments and utilities of the defender and the attacker, depend on their unit costs of investment for each component, the contest intensity for each component, and their evaluations of the value of system functionality. For a series-parallel system, infinitely many components in parallel benefit the defender maximally regardless of the finite number of parallel subsystems in series. Conversely, infinitely many components in series benefit the attacker maximally regardless of the finite number of components in parallel in each subsystem. For a parallel-series system, the results are opposite. With equivalent components, equal unit costs for defender and attacker, equal intensity for all components, and equally many components in series and parallel, the defender always prefers the series-parallel system rather than the parallel-series system, and converse holds for the attacker. Hence from the defender's perspective, ceteris paribus, the series-parallel system is more reliable, and has fewer 'cut sets' or failure modes

  5. Experience in Modelling Nuclear Energy Systems with MESSAGE: Country Case Studies

    International Nuclear Information System (INIS)

    2018-01-01

    Member States have recognized the increasing need to model future nuclear power scenarios in order to develop strategies for sustainable nuclear energy systems. The IAEA model for energy supply strategy alternatives and their general environmental impacts (MESSAGE) code is a tool that supports energy analysis and planning in Member States. This publication documents the experience gained on modelling and scenario analysis of nuclear energy systems (NES) using the MESSAGE code through various case studies performed by the participating Member States on evaluation and planning for nuclear energy sustainability at the regional or national level. The publication also elaborates on experience gained in modelling of global nuclear energy systems with a focus on specific aspects of collaboration among technology holder and technology user countries and the introduction of innovative nuclear technologies. It presents country case studies covering a variety of nuclear energy systems based on a once-through fuel cycle and a closed fuel cycle for thermal reactors, fast reactors and advanced systems. The feedback from case studies proves the analytical capabilities of the MESSAGE model and highlight the path forward for further advancements in the MESSAGE code and NES modelling.

  6. Defense High Level Waste Disposal Container System Description Document

    International Nuclear Information System (INIS)

    2000-01-01

    The Defense High Level Waste Disposal Container System supports the confinement and isolation of waste within the Engineered Barrier System of the Monitored Geologic Repository (MGR). Disposal containers are loaded and sealed in the surface waste handling facilities, transferred to the underground through the accesses using a rail mounted transporter, and emplaced in emplacement drifts. The defense high level waste (HLW) disposal container provides long-term confinement of the commercial HLW and defense HLW (including immobilized plutonium waste forms (IPWF)) placed within disposable canisters, and withstands the loading, transfer, emplacement, and retrieval loads and environments. U.S. Department of Energy (DOE)-owned spent nuclear fuel (SNF) in disposable canisters may also be placed in a defense HLW disposal container along with commercial HLW waste forms, which is known as 'co-disposal'. The Defense High Level Waste Disposal Container System provides containment of waste for a designated period of time, and limits radionuclide release. The disposal container/waste package maintains the waste in a designated configuration, withstands maximum handling and rockfall loads, limits the individual canister temperatures after emplacement, resists corrosion in the expected handling and repository environments, and provides containment of waste in the event of an accident. Defense HLW disposal containers for HLW disposal will hold up to five HLW canisters. Defense HLW disposal containers for co-disposal will hold up to five HLW canisters arranged in a ring and one DOE SNF canister in the ring. Defense HLW disposal containers also will hold two Multi-Canister Overpacks (MCOs) and two HLW canisters in one disposal container. The disposal container will include outer and inner cylinders, outer and inner cylinder lids, and may include a canister guide. An exterior label will provide a means by which to identify the disposal container and its contents. Different materials

  7. Message-Passing Receivers for Single Carrier Systems with Frequency-Domain Equalization

    DEFF Research Database (Denmark)

    Zhang, Chuanzong; Manchón, Carles Navarro; Wang, Zhongyong

    2015-01-01

    In this letter, we design iterative receiver algorithms for joint frequency-domain equalization and decoding in a single carrier system assuming perfect channel state information. Based on an approximate inference framework that combines belief propagation (BP) and the mean field (MF) approximation......, we propose two receiver algorithms with, respectively, parallel and sequential message-passing schedules in the MF part. A recently proposed receiver based on generalized approximate message passing (GAMP) is used as a benchmarking reference. The simulation results show that the BP-MF receiver...

  8. Department of Defense Intelligence Information System

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1994-01-01

    The objectives of the audit were to determine whether the systems that comprise the DoDIIS are interoperable and whether oversight of acquisition management is adequate to assure that the development...

  9. A privacy protection for an mHealth messaging system

    Science.gov (United States)

    Aaleswara, Lakshmipathi; Akopian, David; Chronopoulos, Anthony T.

    2015-03-01

    In this paper, we propose a new software system that employs features that help the organization to comply with USA HIPAA regulations. The system uses SMS as the primary way of communication to transfer information. Lack of knowledge about some diseases is still a major reason for some harmful diseases spreading. The developed system includes different features that may help to communicate amongst low income people who don't even have access to the internet. Since the software system deals with Personal Health Information (PHI) it is equipped with an access control authentication system mechanism to protect privacy. The system is analyzed for performance to identify how much overhead the privacy rules impose.

  10. Defense against common-mode failures in protection system design

    International Nuclear Information System (INIS)

    Wyman, R.H.; Johnson, G.L.

    1998-01-01

    The introduction of digital instrumentation and control into reactor safety systems creates a heightened concern about common-mode failure. This paper discusses the concern and methods of cope with the concern. Common-mode failures have been a 'fact-of-life' in existing systems. The informal introduction of defense-in-depth and diversity (D-in-D and D) - coupled with the fact that hardware common-mode failures are often distributed in time - has allowed systems to deal with past common-mode failures. However, identical software operating in identical redundant systems presents the potential for simultaneous failure. Consequently, the use of digital systems raises the concern about common-mode failure to a new level. A more methodical approach to mitigating common-mode failure is needed to address these concerns. Purposeful introduction of D-in-D and D has been used as a defense against common-mode failure in reactor protection systems. At least two diverse systems are provided to mitigate any potential initiating event. Additionally, diverse displays and controls are provided to allow the operator to monitor plant status and manually initiate engineered safety features. A special form of common-mode failure analysis called 'defense-in-depth and diversity analysis' has been developed to identify possible common-mode failure vulnerabilities in digital systems. An overview of this analysis technique is provided. (author)

  11. Defense against common-mode failures in protection system design

    International Nuclear Information System (INIS)

    Wyman, R.H.; Johnson, G.L.

    1997-01-01

    The introduction of digital instrumentation and control into reactor safety systems creates a heightened concern about common-mode failure. This paper discusses the concern and methods to cope with the concern. Common-mode failures have been a ''fact-of-life'' in existing systems. The informal introduction of defense-in-depth and diversity (D-in-D ampersand D)-coupled with the fact that hardware common-mode failures are often distributed in time-has allowed systems to deal with past common-mode failures. However, identical software operating in identical redundant systems presents the potential for simultaneous failure. Consequently, the use of digital systems raises the concern about common-mode failure to a new level. A more methodical approach to mitigating common-mode failure is needed to address these concerns. Purposeful introduction of D-in-D ampersand D has been used as a defense against common-mode failure in reactor protection systems. At least two diverse systems are provided to mitigate any potential initiating event. Additionally, diverse displays and controls are provided to allow the operator to monitor plant status and manually initiate engineered safety features. A special form of conimon-mode failure analysis called ''defense-in-depth and diversity analysis'' has been developed to identify possible conimon-mode failure vulnerabilities in digital systems. An overview of this analysis technique is provided

  12. 75 FR 65439 - Defense Federal Acquisition Regulation Supplement; Electronic Subcontracting Reporting System

    Science.gov (United States)

    2010-10-25

    ... Accounting Service or Missile Defense Agency. (2) For DoD, the authority to acknowledge receipt or reject... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Parts 219 and 252 [DFARS Case 2009-D002] Defense Federal Acquisition Regulation Supplement; Electronic Subcontracting Reporting...

  13. Flood risk and economically optimal safety targets for coastal flood defense systems

    NARCIS (Netherlands)

    Dupuits, E.J.C.; Schweckendiek, T.

    2015-01-01

    A front defense can improve the reliability of a rear defense in a coastal flood defense system. The influence of this interdependency on the accompanying economically optimal safety targets of both front and rear defense is investigated. The results preliminary suggest that the optimal safety level

  14. A critical analysis of the X.400 model of message handling systems

    NARCIS (Netherlands)

    van Sinderen, Marten J.; Dorregeest, Evert

    1988-01-01

    The CCITT X.400 model of store and forward Message Handling Systems (MHS) serves as a common basis for the definition of electronic mail services and protocols both within CCITT and ISO. This paper presents an analysis of this model and its related recommendations from two perspectives. First the

  15. Technical Evaluation Report 14: Chat and Instant Messaging Systems (synchronous: Report 2/ 3

    Directory of Open Access Journals (Sweden)

    Ellen Kinsel

    2002-10-01

    Full Text Available This study extends the earlier review of online chat systems (Report 6, by reviewing a further seven products that provide text-based instant messaging (IM. The functionality of these products in distance education contexts is stressed in relation to their comparative costs, complexity, control, clarity, technical framework, and other functional options.

  16. The Synthesis Method of Automated System of Operational Planning in Low-Space Communication System Messaging

    Directory of Open Access Journals (Sweden)

    Serhii Kovbasiuk

    2017-04-01

    Full Text Available One of the reasons for the decrease of efficiency in low-speed communication systems, satellite communication, which are based on nanoplatform is a high degree of operational planning centralisation. To overcome this problem the method which carries out the distribution of tasks of communications operational planning minimizing the exchange of information between spatially remote sites, and takes into account the computing performance of software and hardware was developed. The technique is based on the use of methods of structural and parametric synthesis, simulation and statistical analysis of the results. Its use allows to obtain the optimal structure of the automated system of operational planning in low-space communication system messaging evaluation of efficiency in terms of fixed communication of information load.

  17. Egg incubator control system with short message service (sms) fault ...

    African Journals Online (AJOL)

    The egg incubator system with temperature sensor can measure the state of the incubator and automatically change to the suitable condition for the egg. The health of the egg is very important for the development of embryo. The status condition in the incubator system will appear on the liquid crystal display (LCD) screen.

  18. Defense and attack of complex and dependent systems

    International Nuclear Information System (INIS)

    Hausken, Kjell

    2010-01-01

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  19. Defense and attack of complex and dependent systems

    Energy Technology Data Exchange (ETDEWEB)

    Hausken, Kjell, E-mail: kjell.hausken@uis.n [Faculty of Social Sciences, University of Stavanger, N-4036 Stavanger (Norway)

    2010-01-15

    A framework is constructed for how to analyze the strategic defense of an infrastructure subject to attack by a strategic attacker. Merging operations research, reliability theory, and game theory for optimal analytical impact, the optimization program for the defender and attacker is specified. Targets can be in parallel, series, combined series-parallel, complex, k-out-of-n redundancy, independent, interdependent, and dependent. The defender and attacker determine how much to invest in defending versus attacking each of multiple targets. A target can have economic, human, and symbolic values, subjectively assessed by the defender and attacker. A contest success function determines the probability of a successful attack on each target, dependent on the investments by the defender and attacker into each target, and on characteristics of the contest. The defender minimizes the expected damage plus the defense costs. The attacker maximizes the expected damage minus the attack costs. Each agent is concerned about how his investments vary across the targets, and the impact on his utilities. Interdependent systems are analyzed where the defense and attack on one target impacts all targets. Dependent systems are analyzed applying Markov analysis and repeated games where a successful attack on one target in the first period impacts the unit costs of defense and attack, and the contest intensity, for the other target in the second period.

  20. A CORBA sharing and messaging server-client information system

    International Nuclear Information System (INIS)

    Fernandes, H.; Pereira, J.P.A.; Varandas, C.A.F.

    2002-01-01

    The design and implementation of a CORBA (Common Object Request Broker Architecture) system has been evaluated to control and remotely operate experiments through an internet/intranet connection. The main objective of this framework is to share an experiment in a multi-user environment, possibly running over a supervisor administration. This should be done in a scalable and extensible framework for data acquisition, independent of conditions such as network infrastructures, operating system or data exchange protocols

  1. Applying a message oriented middleware architecture to the TJ-II remote participation system

    International Nuclear Information System (INIS)

    Sanchez, E.; Portas, A.; Pereira, A.; Vega, J.

    2006-01-01

    A message oriented middleware (MOM) has been introduced into the TJ-II data acquisition system to on-line distribute information. Java message service (JMS) has been chosen as the messaging application program interface (API) in order to ensure multiplatform portability. A library of C++ classes providing interface for JMS Java classes has been developed. This allows C++ programs to inter-communicate through JMS. In addition, a set of C wrapper functions has also been developed to provide basic messaging functionalities for C or FORTRAN programs. These functions are used in TJ-II LabView data acquisition applications. Several software applications that take advantage of the MOM architecture have been developed. Firstly, a general-user application allows monitoring of the data acquisition systems. Secondly, a simple application permits the visualization of TJ-II monitor signals with on-line data refreshing. These applications are written in the Java language, thereby ensuring its portability. These software tools provide new functionalities to the TJ-II remote participation system and are equally used in the local environment

  2. Applying a message oriented middleware architecture to the TJ-II remote participation system

    Energy Technology Data Exchange (ETDEWEB)

    Sanchez, E. [Asociacion EURATOM/CIEMAT para Fusion, Avda Complutense 22, 28040 Madrid (Spain)]. E-mail: edi.sanchez@ciemat.es; Portas, A. [Asociacion EURATOM/CIEMAT para Fusion, Avda Complutense 22, 28040 Madrid (Spain); Pereira, A. [Asociacion EURATOM/CIEMAT para Fusion, Avda Complutense 22, 28040 Madrid (Spain); Vega, J. [Asociacion EURATOM/CIEMAT para Fusion, Avda Complutense 22, 28040 Madrid (Spain)

    2006-07-15

    A message oriented middleware (MOM) has been introduced into the TJ-II data acquisition system to on-line distribute information. Java message service (JMS) has been chosen as the messaging application program interface (API) in order to ensure multiplatform portability. A library of C++ classes providing interface for JMS Java classes has been developed. This allows C++ programs to inter-communicate through JMS. In addition, a set of C wrapper functions has also been developed to provide basic messaging functionalities for C or FORTRAN programs. These functions are used in TJ-II LabView data acquisition applications. Several software applications that take advantage of the MOM architecture have been developed. Firstly, a general-user application allows monitoring of the data acquisition systems. Secondly, a simple application permits the visualization of TJ-II monitor signals with on-line data refreshing. These applications are written in the Java language, thereby ensuring its portability. These software tools provide new functionalities to the TJ-II remote participation system and are equally used in the local environment.

  3. Design and implementation of modular home security system with short messaging system

    Directory of Open Access Journals (Sweden)

    Budijono Santoso

    2014-03-01

    Full Text Available Today we are living in 21st century where crime become increasing and everyone wants to secure they asset at their home. In that situation user must have system with advance technology so person do not worry when getting away from his home. It is therefore the purpose of this design to provide home security device, which send fast information to user GSM (Global System for Mobile mobile device using SMS (Short Messaging System and also activate - deactivate system by SMS. The Modular design of this Home Security System make expandable their capability by add more sensors on that system. Hardware of this system has been designed using microcontroller AT Mega 328, PIR (Passive Infra Red motion sensor as the primary sensor for motion detection, camera for capturing images, GSM module for sending and receiving SMS and buzzer for alarm. For software this system using Arduino IDE for Arduino and Putty for testing connection programming in GSM module. This Home Security System can monitor home area that surrounding by PIR sensor and sending SMS, save images capture by camera, and make people panic by turn on the buzzer when trespassing surrounding area that detected by PIR sensor. The Modular Home Security System has been tested and succeed detect human movement.

  4. In defense of the classical height system

    Science.gov (United States)

    Foroughi, Ismael; Vaníček, Petr; Sheng, Michael; Kingdon, Robert William; Santos, Marcelo C.

    2017-11-01

    In many European countries, normal heights referred to the quasi-geoid as introduced by Molodenskij in the mid-20th century are preferred to the classical height system that consists of orthometric heights and the geoid as a reference surface for these heights. The rationale for this choice is supposed to be that in the classical height system, neither the geoid, nor the orthometric height can be ever known with centimetre level accuracy because one would need to know the topographical mass density to a level that can never be achieved. The aim of this paper is to question the validity of this rationale. The common way of assessing the congruency of a local geoid model and the orthometric heights is to compare the geoid heights with the difference between orthometric heights provided by leveling and geodetic heights provided by GNSS. On the other hand, testing the congruency of a quasi-geoidal model with normal height a similar procedure is used, except that instead of orthometric heights, normal heights are employed. For the area of Auvergne, France, which is now a more or less standard choice for precise geoid or quasi-geoid testing, only the normal heights are supplied by the Institute Geographic National, the provider of the data. This is clearly the consequence of the European preference for the Molodenskij system. The quality of the height system is to be judged by the congruency of the difference of the geoid/quasi-geoid heights subtracted from the geodetic heights and orthometric/normal heights. To assess the congruency of the classical height system, the Helmert approximation of orthometric heights is typically used as the transformation between normal and Helmert's heights is easily done. However, the evaluation of the differences between Helmert's and the rigorous orthometric heights is somewhat more involved as will be seen from the review in this paper. For the area of interest, the differences between normal and Helmert's heights at the control

  5. Defense IRM: Alternatives Should Be Considered in Developing the New Civilian Personnel System

    National Research Council Canada - National Science Library

    1999-01-01

    ... regional centers, and attempting to improve personnel management business processes. A key part of this initiative is Defense's development of a new information management system-the Defense Civilian Personnel Data System (DCPDs...

  6. System justification and the defense of committed relationship ideology.

    Science.gov (United States)

    Day, Martin V; Kay, Aaron C; Holmes, John G; Napier, Jaime L

    2011-08-01

    A consequential ideology in Western society is the uncontested belief that a committed relationship is the most important adult relationship and that almost all people want to marry or seriously couple (DePaulo & Morris, 2005). In the present article, we investigated the extent to which the system justification motive may contribute to the adoption of this ideology. In Studies 1 and 2, we examined whether a heightened motive to maintain the status quo would increase defense of committed relationship values. In Study 3, we examined the reverse association, that is, whether a threat to committed relationship ideology would also affect sociopolitical system endorsement. As past research has found that the justification of political systems depends upon how much these systems are perceived as controlling, in Study 4 we tested whether the defense of the system of committed relationships would also increase when framed as controlling. Results from Studies 1-4 were consistent with our hypotheses, but only for men. In Study 5, using cross-cultural data, we sought to replicate these findings correlationally and probe for a cause of the gender effect. Results from more than 33,000 respondents indicated a relationship (for men) between defense of the sociopolitical system and defense of marriage in countries where the traditional advantages of men over women were most threatened. In Studies 6 and 7, we investigated when this gender difference disappears. Results revealed that when we measured (Study 6) or manipulated (Study 7) personal relationship identity rather than relationship ideology, effects also emerge for women.

  7. Planning a transportation system for US Defense Transuranic waste

    International Nuclear Information System (INIS)

    Gilbert, K.V.; Hurley, J.D.; Smith, L.J.; McFadden, M.H.; Raudenbush, M.H.; Fedie, M.L.

    1983-05-01

    The development and planning of a transportation system for US Department of Energy (USDOE) Defense Transuranic (TRU) waste has required the talents and expertise of many people. Coordination activities, design activities, fabrication, research and development, operations, and transportation are but a few of the areas around which this system is built. Due to the large number of organizations, regulations and personalities the planning task becomes extremely complex. The intent of this paper is to discuss the steps taken in planning this system, to identify the various organizations around which this system is designed, and to discuss program progress to date, scheduling, and future plans. 9 figures, 1 table

  8. Planning a transportation system for US defense transuranic waste

    International Nuclear Information System (INIS)

    Gilbert, K.V.; Hurley, J.D.; Smith, L.J.; McFadden, M.H.; Raudenbush, M.H.; Fedie, M.L.

    1983-01-01

    The development and planning of a transportation system for US Department of Energy (USDOE) Defense Transuranic (TRU) waste has required the talents and expertise of many people. Coordination activities, design activities, fabrication, research and development, operations, and transportation are but a few of the areas around which this system is built. Due to the large number of organizations, regulations and personalities the planning task becomes extremely complex. The intent of this paper is to discuss the steps taken in planning this system, to identify the various organizations around which this system is designed, and to discuss program progress to date, scheduling, and future plans

  9. Conflicting demands of No Child Left Behind and state systems: Mixed messages about school performance.

    OpenAIRE

    Robert L. Linn

    2005-01-01

    An ever-increasing reliance on student performance on tests holds schools and educators accountable both to state accountability systems and also to the accountability requirements of the No Child Left Behind (NCLB) Act of 2001. While each state has constructed its own definition of Adequate Yearly Progress (AYP) requirements within the confines of NCLB, substantial differences between the accountability requirements of many state systems and NCLB still have resulted in mixed messages regardi...

  10. Simple messaging and collaboration system for heterogeneous organizations operating in disaster environments

    OpenAIRE

    Meyer, Ramsey

    2011-01-01

    Approved for public release; distribution is unlimited. A novel communication system for use by a wide variety of first responders in disaster response is described. The system is based primarily on SMS messaging technologies and either indigenous mobile phone service providers or mobile phone service brought in via cellular-on-wheels (COWs), UAVs, rapidly deployed towers, etc. End users use either their own cell phones, running a native SMS application, or low-cost phones that are dist...

  11. Message Embedded Chaotic Masking Synchronization Scheme Based on the Generalized Lorenz System and Its Security Analysis

    Czech Academy of Sciences Publication Activity Database

    Čelikovský, Sergej; Lynnyk, Volodymyr

    2016-01-01

    Roč. 26, č. 8 (2016), 1650140-1-1650140-15 ISSN 0218-1274 R&D Projects: GA ČR GA13-20433S Institutional support: RVO:67985556 Keywords : Chaotic masking * generalized Lorenz system * message embedded synchronization Subject RIV: BC - Control Systems Theory Impact factor: 1.329, year: 2016 http://library.utia.cas.cz/separaty/2016/TR/celikovsky-0461536.pdf

  12. The design about the intrusion defense system for IHEP

    International Nuclear Information System (INIS)

    Liu Baoxu; Xu Rongsheng; Yu Chuansong; Wu Chunzhen

    2003-01-01

    With the development of network technologies, limitations on traditional methods of network security protection are becoming more and more obvious. An individual network security product or the simple combination of several products can hardly complete the goal of keeping from hackers' intrusion. Therefore, on the basis of the analyses about the security problems of IHEPNET which is an open and scientific research network, the author designs an intrusion defense system especially for IHEPNET

  13. Department of Defense Systems Engineering FY 2012 Annual Report

    Science.gov (United States)

    2013-03-01

    by the Utility Helicopter PMO, is utilizing the latest Defense Acquisition Guidelines and previously approved PEO AVN SEP examples to develop all...efforts. As a whole, all of PEO AVN Program Management Offices understand the importance of systems engineering. They stress the continued use of...established SE guidelines, practices and procedures throughout our acquisition processes. PEO AVN , working with the AMRDEC SE Division, has

  14. Technical Evaluation Reports 15. Chat and Instant Messaging Systems (synchronous: Report 3/ 3

    Directory of Open Access Journals (Sweden)

    Brian Ludwig

    2002-10-01

    Full Text Available [Previous reviews of chat and IM systems are presented in Reports 6 and 14 in this series.]A further set of four text-based instant messaging (IM products was evaluated: AT&T Anywhere, Parachat, Sonork, and Yahoo Messenger, all available at no cost. Yahoo Messenger was judged to be the most effective of the three products for use by distance education (DE teachers and students, being compatible with most common operating systems and accommodating up to 50 chat room participants. Yahoo Messenger also possesses integrated audio and video capabilities. AT&T Anywhere is an efficient product, which supports Windows-based operating systems only. Parachat (Basic version is a basic, browser accessed chat board without instant messaging (IM capabilities.

  15. Virtual file system on NoSQL for processing high volumes of HL7 messages.

    Science.gov (United States)

    Kimura, Eizen; Ishihara, Ken

    2015-01-01

    The Standardized Structured Medical Information Exchange (SS-MIX) is intended to be the standard repository for HL7 messages that depend on a local file system. However, its scalability is limited. We implemented a virtual file system using NoSQL to incorporate modern computing technology into SS-MIX and allow the system to integrate local patient IDs from different healthcare systems into a universal system. We discuss its implementation using the database MongoDB and describe its performance in a case study.

  16. Year 2000 Reporting for Defense Finance and Accounting Service Cleveland Center Systems

    National Research Council Canada - National Science Library

    Lane, F

    1998-01-01

    .... For this report, we evaluated whether DFAS: entered all required data elements into the Defense Integration Support Tools for each system, and verified that information in the Defense Integration Support Tools database was consistent...

  17. Evolution of System Safety at NASA as Related to Defense-in-Depth

    Science.gov (United States)

    Dezfuli, Homayoon

    2015-01-01

    Presentation given at the Defense-in-Depth Inter-Agency Workshop on August 26, 2015 in Rockville, MD by Homayoon Dezfuli. The presentation addresses the evolution of system safety at NASA as related to Defense-in-Depth.

  18. Ontology-Driven Instant Messaging-Based Dialogue System for Device Control

    KAUST Repository

    Noguera-Arnaldos, José Ángel

    2015-10-14

    The im4Things platform aims to develop a communication interface for devices in the Internet of the Things (IoT) through intelligent dialogue based on written natural language over instant messaging services. This type of communication can be established in different ways such as order sending and, status querying. Also, the devices themselves are responsible for alerting users when a change has been produced in the device’s sensors. The system has been validated and it has obtained promising results.

  19. The application of coloured Petri nets to verification of distributed systems specified by message Sequence Charts

    OpenAIRE

    CHERNENOK S.A.; NEPOMNIASCHY V.A.

    2015-01-01

    The language of message sequence charts (MSC) is a popular scenario-based specification language used to describe the interaction of components in distributed systems. However, the methods for validation of MSC diagrams are underdeveloped. This paper describes a method for translation of MSC diagrams into coloured Petri nets (CPN). The method is applied to the property verification of these diagrams. The considered set of diagram elements is extended by the elements of UML sequence diagrams a...

  20. Analysis of Parking Reliability Guidance of Urban Parking Variable Message Sign System

    OpenAIRE

    Zhenyu Mei; Ye Tian; Dongping Li

    2012-01-01

    Operators of parking guidance and information systems (PGIS) often encounter difficulty in determining when and how to provide reliable car park availability information to drivers. Reliability has become a key factor to ensure the benefits of urban PGIS. The present paper is the first to define the guiding parking reliability of urban parking variable message signs (VMSs). By analyzing the parking choice under guiding and optional parking lots, a guiding parking reliability model was constru...

  1. Control Systems Cyber Security:Defense in Depth Strategies

    Energy Technology Data Exchange (ETDEWEB)

    David Kuipers; Mark Fabro

    2006-05-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  2. Design and implementation of a children vaccination reminder system based on short message service

    Directory of Open Access Journals (Sweden)

    Marjan Ghazisaeedi

    2016-09-01

    Full Text Available Background: Most problems related to quality of care and patient safety are related to human negligence. One of the causes of these problems is forgetting to do something. This problem can be avoided with information technology in many cases. Some forgotten are very important. Among these is failure to comply with vaccination schedule by parents that can result in inappropriate outcomes. In this study, we developed and evaluated a SMS reminder system for regular and timely vaccination of children. Methods: In this developmental-applied research, firstly, a child vaccination reminder system was designed and implemented to help parents reduce the forgetfulness. This system based on the child's vaccination history and the date of birth, offer time and type of future vaccines. Then the parents of 27 children, that their vaccination was between 22 June and 21 August 2015, referred to Children's Medical Center, were sent text messages by using this system. We evaluated the accuracy of the system logic by using some scenarios. In addition, we evaluated parents' satisfaction with the system using a questionnaire. Results: In all cases but one, the system proposed the type and date of future children vaccines correctly. All the parents who have received text messages had good perception and satisfaction on the majority of questions (total mean score of 4.15 out of 5. Most parents (4.92 out of 5 stated that using the system to remind their visit for child immunization was helpful and willing to offer the system to their friends and other families. Conclusion: Using the short message system is beneficial for parents to remind their children’s vaccination time and increases their satisfaction. So, it can be considered as an important and essential tool in providing healthcare services. SMS is an easy, cheap and effective way to improve the quality of care services.

  3. Minmax defense strategy for complex multi-state systems

    International Nuclear Information System (INIS)

    Hausken, Kjell; Levitin, Gregory

    2009-01-01

    This paper presents a general optimization methodology that merges game theory and multi-state system survivability theory. The defender has multiple alternatives of defense strategy that presumes separation and protection of system elements. The attacker also has multiple alternatives of its attack strategy based on a combination of different possible attack actions against different groups of system elements. The defender minimizes, and the attacker maximizes, the expected damage caused by the attack (taking into account the unreliability of system elements and the multi-state nature of complex series-parallel systems). The problem is defined as a two-period minmax non-cooperative game between the defender who moves first and the attacker who moves second. An exhaustive minmax optimization algorithm is presented based on a double-loop genetic algorithm for determining the solution. A universal generating function technique is applied for evaluating the losses caused by system performance reduction. Illustrative examples with solutions are presented

  4. A Message-Passing Hardware/Software Cosimulation Environment for Reconfigurable Computing Systems

    Directory of Open Access Journals (Sweden)

    Manuel Saldaña

    2009-01-01

    Full Text Available High-performance reconfigurable computers (HPRCs provide a mix of standard processors and FPGAs to collectively accelerate applications. This introduces new design challenges, such as the need for portable programming models across HPRCs and system-level verification tools. To address the need for cosimulating a complete heterogeneous application using both software and hardware in an HPRC, we have created a tool called the Message-passing Simulation Framework (MSF. We have used it to simulate and develop an interface enabling an MPI-based approach to exchange data between X86 processors and hardware engines inside FPGAs. The MSF can also be used as an application development tool that enables multiple FPGAs in simulation to exchange messages amongst themselves and with X86 processors. As an example, we simulate a LINPACK benchmark hardware core using an Intel-FSB-Xilinx-FPGA platform to quickly prototype the hardware, to test the communications. and to verify the benchmark results.

  5. Redesigning the Structure of Republic Indonesian Defense System; An Analysis of Systems Thinking

    Directory of Open Access Journals (Sweden)

    Ade Muhammad

    2013-09-01

    Full Text Available The phenomenon of Shrinking Defense Capabilities is only the tip of the iceberg of Indonesian Defense System’s problem. The root of the problem that lies beneath and outside is keep untouched. This journal is the part of the efforts to reveal the phenomenon’s structure that binding as a system. The present structure is a cause of that phenomenon and the basis of the current organization responsible for Republic Indonesia Defense sector. With the Systems thinking analysis, the research has revealed the structure that become the problem cause and give a holistic solution trough redesigning new structure based on two theories namely the Strategic-Operational Management with Vision Dissemination of Prof. Dr. Jürgen Strohhecker and the Defense System Generic Dr. Ir. Muhammad Tasrif, M.Eng and Ir. Ade Muhammad, M.Han. The logical consequences would also changing of formation of Indonesian Defense Organization. Keywords : Design, Redesigning, Defense System, System, Defense, Holistic

  6. The effect of mobile phone short messaging system on healthy food choices among Iranian postmenopausal women.

    Science.gov (United States)

    Vakili, Mahdis; Abedi, Parvin; Afshari, Poorandokht; Kaboli, Nayereh Esmael

    2015-01-01

    Central adiposity and metabolic syndrome are quite common among postmenopausal women. Dietary diversity and healthy food choices have essential role in health and also in prevention of obesity. The main objective of this study was to evaluate the impact of mobile phone short messaging system on healthy food choices among Iranian postmenopausal women. This was a randomized controlled trial in which 100 postmenopausal women aged 40-60 years were recruited and assigned to two groups (50 each in the intervention and control groups). Food frequency consumption was measured using a questionnaire. A total of 16 text messages including information about modification of food selection (healthy choices, benefits, methods, etc.,) were sent to participants in the intervention group during 4 months follow-up (1/week). The Chi-square and independent t-test used for data analysis. Ninety-two women completed the study. The consumption of Vitamin A rich fruits and vegetables significantly increased in the intervention group compared to the control group (P mobile phone short messaging system can improve the healthy food choices regarding Vitamin A rich fruits and vegetables and fish among postmenopausal women.

  7. The effect of mobile phone short messaging system on healthy food choices among Iranian postmenopausal women

    Directory of Open Access Journals (Sweden)

    Mahdis Vakili

    2015-01-01

    Full Text Available Introduction: Central adiposity and metabolic syndrome are quite common among postmenopausal women. Dietary diversity and healthy food choices have essential role in health and also in prevention of obesity. The main objective of this study was to evaluate the impact of mobile phone short messaging system on healthy food choices among Iranian postmenopausal women. Materials and Methods: This was a randomized controlled trial in which 100 postmenopausal women aged 40-60 years were recruited and assigned to two groups (50 each in the intervention and control groups. Food frequency consumption was measured using a questionnaire. A total of 16 text messages including information about modification of food selection (healthy choices, benefits, methods, etc., were sent to participants in the intervention group during 4 months follow-up (1/week. The Chi-square and independent t-test used for data analysis. Ninety-two women completed the study. Results: The consumption of Vitamin A rich fruits and vegetables significantly increased in the intervention group compared to the control group (P < 0.001. More women in the intervention group consumed fish after intervention (P = 0.02. The consumption of green leafy vegetables showed a nonsignificant increase in the intervention group. Conclusion: Using mobile phone short messaging system can improve the healthy food choices regarding Vitamin A rich fruits and vegetables and fish among postmenopausal women.

  8. Multi-views storage model and access methods of conversation history in converged IP messaging system

    Science.gov (United States)

    Lu, Meilian; Yang, Dong; Zhou, Xing

    2013-03-01

    Based on the analysis of the requirements of conversation history storage in CPM (Converged IP Messaging) system, a Multi-views storage model and access methods of conversation history are proposed. The storage model separates logical views from physical storage and divides the storage into system managed region and user managed region. It simultaneously supports conversation view, system pre-defined view and user-defined view of storage. The rationality and feasibility of multi-view presentation, the physical storage model and access methods are validated through the implemented prototype. It proves that, this proposal has good scalability, which will help to optimize the physical data storage structure and improve storage performance.

  9. A SECURE MESSAGE TRANSMISSION SYSTEM ARCHITECTURE FOR COMPUTER NETWORKS EMPLOYING SMART CARDS

    Directory of Open Access Journals (Sweden)

    Geylani KARDAŞ

    2008-01-01

    Full Text Available In this study, we introduce a mobile system architecture which employs smart cards for secure message transmission in computer networks. The use of smart card provides two security services as authentication and confidentiality in our design. The security of the system is provided by asymmetric encryption. Hence, smart cards are used to store personal account information as well as private key of each user for encryption / decryption operations. This offers further security, authentication and mobility to the system architecture. A real implementation of the proposed architecture which utilizes the JavaCard technology is also discussed in this study.

  10. The clinical usefulness of a web-based messaging system between patients with Crohn disease and their physicians.

    Science.gov (United States)

    Jeong, Da Eun; Kim, Kyeong Ok; Jang, Byung Ik; Kim, Eun Young; Jung, Jin Tae; Jeon, Seong Woo; Lee, Hyun Seok; Kim, Eun Soo; Park, Kyung Sik; Cho, Kwang Bum

    2016-06-01

    To avoid missing events associated with clinical activity, the authors previously developed a novel, web-based, self-reporting Crohn disease (CD) symptom diary. However, although this diary provided a means of self-checking based on responses to set questions based on Harvey-Bradshaw index scores, it was limited in terms of describing other specific symptoms. Thus, the authors added a space to the questionnaire, which allows patients to send clinicians questions or a description of unpredictable events. The aim of the present study was to assess the clinical usefulness of this messaging system by analyzing patients' messages.The messaging system between patients and their doctors was included in a webpage created for recording patients' symptom diaries (www.cdsd.or.kr). Using this system, patients can send messages easily at any time and doctors can read and respond to these messages immediately using a smart phone or computer. In the present study, the authors retrospectively reviewed 686 messages sent by 152 patients from July 2012 to July 2014 and patient medical records.Mean patient age was 29.0 ± 11.6 years and the male-to-female ratio was 99:53. Most messages regarded symptoms (381 messages, 55.5%), which was followed by self-reports about general condition (195 messages, 28.4%) and questions about treatment (71 messages, 10.3%). With respect to symptoms, abdominal pain was most common (145 cases, 21.1%) followed by hematochezia (36 cases, 5.2%). Problems about medication were the most frequently associated with treatment (65, 91.5%). Patients above 40 years showed a greater tendency to focus on symptoms and treatment (P = 0.025). The doctor answer rate was 56.3% (n = 386), and based on these responses, an early visit was needed in 28 cases (7.3%).Using this web-based messaging system, patients were able to obtain proper advice from their physicians without visiting clinics or searching the Internet, and in addition, 7.3% of messages prompted an early

  11. Transportation System Risk Assessment on DOE Defense Program shipments

    International Nuclear Information System (INIS)

    Brumburgh, G.P.; Kimura, C.Y.; Alesso, H.P.; Prassinos, P.G.

    1992-01-01

    Substantial effort has been expended concerning the level of safety provided to persons, property, and the environment from the hazards associated with transporting radioactive material. This work provided an impetus for the Department of Energy to investigate the use of probabilistic risk assessment techniques to supplement the deterministic approach to transportation safety. The DOE recently decided to incorporate the methodologies associated with PRAs in the process for authorizing the transportation of nuclear components, special assemblies, and radioactive materials affiliated with the DOE Defense Program. Accordingly, the LLNL, sponsored by the DOE/AL, is tasked with developing a safety guide series to provide guidance to preparers performing a transportation system risk assessment

  12. The Defense Message System and the U.S. Coast Guard

    Science.gov (United States)

    1992-06-01

    these mail services, the Internet also provides a File Transfer Protocol (FTP) and remote login between host computers (TELNET) capabilities. 17 [Ref...the Joint Maritime Intelligence Element (JMIE), Zincdust, and Emerald . [Ref. 27] 4. Secure Data Network The Coast Guard’s Secure Data Network (SDN

  13. Design and Acquisition of Software for Defense Systems

    Science.gov (United States)

    2018-02-14

    embrace of iterative development has benefited bottom lines and cost , schedule, and testing performance, while the Department and its defense industrial...February 2018 CLEARED FOR OPEN PUBLICATION February 14, 2018 DEPARTMENT OF DEFENSE OFFICE OF PREPUBLICATION AND SECURITY REVIEW...Force concluded that the Department of Defense would benefit from the implementation of continuous iterative development best practices as software

  14. A novel lung slice system with compromised antioxidant defenses

    Energy Technology Data Exchange (ETDEWEB)

    Hardwick, S.J.; Adam, A.; Cohen, G.M. (Univ. of London (England)); Smith, L.L. (Imperial Chemical Industries PLC, Cheshire (England))

    1990-04-01

    In order to facilitate the study of oxidative stress in lung tissue, rat lung slices with impaired antioxidant defenses were prepared and used. Incubation of lung slices with the antineoplastic agent 1,3-bis(2-chloroethyl)-1-nitrosourea (BCNU) (100 {mu}M) in an amino acid-rich medium for 45 min produced a near-maximal (approximately 85%), irreversible inhibition of glutathione reductase, accompanied by only a modest (approximately 15%) decrease in pulmonary nonprotein sulfhydryls (NPSH) and no alteration in intracellular ATP, NADP{sup +}, and NADPH levels. The amounts of NADP(H), ATP, and NPSH were stable over a 4-hr incubation period following the removal from BCNU. The viability of the system was further evaluated by measuring the rate of evolution of {sup 14}CO{sub 2} from D-({sup 14}C(U))-glucose. The rates of evolution were almost identical in the compromised system when compared with control slices over a 4-hr time period. By using slices with compromised oxidative defenses, preliminary results have been obtained with paraquat, nitrofurantoin, and 2,3-dimethoxy-1,4-naphthoquinone.

  15. A novel lung slice system with compromised antioxidant defenses

    International Nuclear Information System (INIS)

    Hardwick, S.J.; Adam, A.; Cohen, G.M.; Smith, L.L.

    1990-01-01

    In order to facilitate the study of oxidative stress in lung tissue, rat lung slices with impaired antioxidant defenses were prepared and used. Incubation of lung slices with the antineoplastic agent 1,3-bis(2-chloroethyl)-1-nitrosourea (BCNU) (100 μM) in an amino acid-rich medium for 45 min produced a near-maximal (approximately 85%), irreversible inhibition of glutathione reductase, accompanied by only a modest (approximately 15%) decrease in pulmonary nonprotein sulfhydryls (NPSH) and no alteration in intracellular ATP, NADP + , and NADPH levels. The amounts of NADP(H), ATP, and NPSH were stable over a 4-hr incubation period following the removal from BCNU. The viability of the system was further evaluated by measuring the rate of evolution of 14 CO 2 from D-[ 14 C(U)]-glucose. The rates of evolution were almost identical in the compromised system when compared with control slices over a 4-hr time period. By using slices with compromised oxidative defenses, preliminary results have been obtained with paraquat, nitrofurantoin, and 2,3-dimethoxy-1,4-naphthoquinone

  16. Secure communication based on multi-input multi-output chaotic system with large message amplitude

    International Nuclear Information System (INIS)

    Zheng, G.; Boutat, D.; Floquet, T.; Barbot, J.P.

    2009-01-01

    This paper deals with the problem of secure communication based on multi-input multi-output (MIMO) chaotic systems. Single input secure communication based on chaos can be easily extended to multiple ones by some combinations technologies, however all the combined inputs possess the same risk to be broken. In order to reduce this risk, a new secure communication scheme based on chaos with MIMO is discussed in this paper. Moreover, since the amplitude of messages in traditional schemes is limited because it would affect the quality of synchronization, the proposed scheme is also improved into an amplitude-independent one.

  17. Missile Defense Agency Ballistic Missile Defense System (BMDS): Programmatic Environmental Impact Statement. Volume 2. Appendices A - J

    Science.gov (United States)

    2007-01-01

    talk about what Star Wars is. It just came 19 out on DVD, great movies . 20 And the message of those movies is that... reception levels. It performs surveillance, tracks the target, and controls firing functions. The radar communicates with the interceptor while it is...used to power the THAAD radar system, is a self-contained trailer in a noise-dampening shroud that contains a diesel generator, governor and

  18. Defense Strategies for Asymmetric Networked Systems with Discrete Components

    Directory of Open Access Journals (Sweden)

    Nageswara S. V. Rao

    2018-05-01

    Full Text Available We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the systems and hence plays a critical, asymmetric role in the infrastructure operations. The individual components of the systems can be attacked by cyber and physical means and can be appropriately reinforced to withstand these attacks. We formulate the problem of ensuring the infrastructure performance as a game between an attacker and a provider, who choose the numbers of the components of the systems and network to attack and reinforce, respectively. The costs and benefits of attacks and reinforcements are characterized using the sum-form, product-form and composite utility functions, each composed of a survival probability term and a component cost term. We present a two-level characterization of the correlations within the infrastructure: (i the aggregate failure correlation function specifies the infrastructure failure probability given the failure of an individual system or network, and (ii the survival probabilities of the systems and network satisfy first-order differential conditions that capture the component-level correlations using multiplier functions. We derive Nash equilibrium conditions that provide expressions for individual system survival probabilities and also the expected infrastructure capacity specified by the total number of operational components. We apply these results to derive and analyze defense strategies for distributed cloud computing infrastructures using cyber-physical models.

  19. Defense Strategies for Asymmetric Networked Systems with Discrete Components.

    Science.gov (United States)

    Rao, Nageswara S V; Ma, Chris Y T; Hausken, Kjell; He, Fei; Yau, David K Y; Zhuang, Jun

    2018-05-03

    We consider infrastructures consisting of a network of systems, each composed of discrete components. The network provides the vital connectivity between the systems and hence plays a critical, asymmetric role in the infrastructure operations. The individual components of the systems can be attacked by cyber and physical means and can be appropriately reinforced to withstand these attacks. We formulate the problem of ensuring the infrastructure performance as a game between an attacker and a provider, who choose the numbers of the components of the systems and network to attack and reinforce, respectively. The costs and benefits of attacks and reinforcements are characterized using the sum-form, product-form and composite utility functions, each composed of a survival probability term and a component cost term. We present a two-level characterization of the correlations within the infrastructure: (i) the aggregate failure correlation function specifies the infrastructure failure probability given the failure of an individual system or network, and (ii) the survival probabilities of the systems and network satisfy first-order differential conditions that capture the component-level correlations using multiplier functions. We derive Nash equilibrium conditions that provide expressions for individual system survival probabilities and also the expected infrastructure capacity specified by the total number of operational components. We apply these results to derive and analyze defense strategies for distributed cloud computing infrastructures using cyber-physical models.

  20. Study on combat effectiveness of air defense missile weapon system based on queuing theory

    Science.gov (United States)

    Zhao, Z. Q.; Hao, J. X.; Li, L. J.

    2017-01-01

    Queuing Theory is a method to analyze the combat effectiveness of air defense missile weapon system. The model of service probability based on the queuing theory was constructed, and applied to analyzing the combat effectiveness of "Sidewinder" and "Tor-M1" air defense missile weapon system. Finally aimed at different targets densities, the combat effectiveness of different combat units of two types' defense missile weapon system is calculated. This method can be used to analyze the usefulness of air defense missile weapon system.

  1. Guidance Optimization for Tactical Homing Missiles and Air Defense Systems

    Directory of Open Access Journals (Sweden)

    Yunes Sh. ALQUDSI

    2018-03-01

    Full Text Available The aim of this paper is to develop a functional approach to optimize the engagement effectiveness of the tactical homing missiles and air defense systems by utilizing the differential geometric concepts. In this paper the engagement geometry of the interceptor and the target is developed and expressed in differential geometric terms in order to demonstrate the possibilities of the impact triangles and specify the earliest interception based on the direct intercept geometry. Optimizing the missile heading angle and suitable missile velocity against the target velocity is then examined to achieve minimum missile latax, minimum time-to-go (time-to-hit and minimum appropriate missile velocity that is guaranteed a quick and precise interception for the given target. The study terminates with different scenarios of engagement optimization with two-dimensional simulation to demonstrate the applicability of the DG approach and to show its properties.

  2. 77 FR 39125 - Defense Acquisition Regulations System; Defense Federal Acquisition Regulation Supplement; Only...

    Science.gov (United States)

    2012-06-29

    ... market research/industry communication. In 2008, the Office of Management and Budget and Office of... unique or brand name specifications, and enhancing acquisition planning. In 2010, the Government... strategic defense capabilities, because of a shift to ``lowest price possible.'' Further, according to this...

  3. Using Organizational Systems Theory to Improve Defense Acquisition and Warfighter Requirements

    National Research Council Canada - National Science Library

    Alexander, Michael J

    2007-01-01

    .... Hence, this MBA study employed a systems approach to more credibly pinpoint improvement areas in the Defense Acquisition System through the use of systems theory and an organizational systems model...

  4. 75 FR 75549 - Defense Federal Acquisition Regulation Supplement; Business Systems-Definition and Administration...

    Science.gov (United States)

    2010-12-03

    ..., et al. Defense Federal Acquisition Regulation Supplement; Business Systems-- Definition and... Regulation Supplement; Business Systems--Definition and Administration (DFARS Case 2009-D038) AGENCY: Defense.... SUPPLEMENTARY INFORMATION: I. Background DoD published a proposed rule for Business Systems--Definition and...

  5. Defense Enterprise Accounting and Management System-Increment 1 (DEAMS Inc 1)

    Science.gov (United States)

    2016-03-01

    information accurately and in conformance with Generally Accepted Accounting Principles , to comply with Congressional requirements of the Chief Financial ...2016 Major Automated Information System Annual Report Defense Enterprise Accounting and Management System-Increment 1 (DEAMS Inc 1) Defense...Phone: 937-257-2714 Fax: DSN Phone: 787-2714 DSN Fax: Date Assigned: August 17, 2015 Program Information Program Name Defense Enterprise Accounting

  6. Message Encryption in Robot Operating System: Collateral Effects of Hardening Mobile Robots

    Directory of Open Access Journals (Sweden)

    Francisco J. Rodríguez-Lera

    2018-03-01

    Full Text Available In human–robot interaction situations, robot sensors collect huge amounts of data from the environment in order to characterize the situation. Some of the gathered data ought to be treated as private, such as medical data (i.e., medication guidelines, personal, and safety information (i.e., images of children, home habits, alarm codes, etc.. However, most robotic software development frameworks are not designed for securely managing this information. This paper analyzes the scenario of hardening one of the most widely used robotic middlewares, Robot Operating System (ROS. The study investigates a robot’s performance when ciphering the messages interchanged between ROS nodes under the publish/subscribe paradigm. In particular, this research focuses on the nodes that manage cameras and LIDAR sensors, which are two of the most extended sensing solutions in mobile robotics, and analyzes the collateral effects on the robot’s achievement under different computing capabilities and encryption algorithms (3DES, AES, and Blowfish to robot performance. The findings present empirical evidence that simple encryption algorithms are lightweight enough to provide cyber-security even in low-powered robots when carefully designed and implemented. Nevertheless, these techniques come with a number of serious drawbacks regarding robot autonomy and performance if they are applied randomly. To avoid these issues, we define a taxonomy that links the type of ROS message, computational units, and the encryption methods. As a result, we present a model to select the optimal options for hardening a mobile robot using ROS.

  7. Nurses' perspectives on how an e-message system supports cross-sectoral communication in relation to medication administration

    DEFF Research Database (Denmark)

    Foged, Signe; Nørholm, Vibeke; Andersen, Ove

    2018-01-01

    AIMS AND OBJECTIVES: The aim was to describe nurses' perspectives on how an e-message system supports communication between hospital and home care nurses in relation to medication administration. BACKGROUND: Medication administration is a complex process involving a high risk of error. Unclear......: The e-message system did not provide the information needed by the home care nurses to ensure safe medication administration after discharge due to (a) limitations of the system, (b) hospital nurses' lack of knowledge about home care nurses' information needs, and (c) hospital nurses' lack of access...... safe medication administration; however, the e-message system did not support exchange of the information needed. This article is protected by copyright. All rights reserved....

  8. Efficient Messaging through Cluster Coordinators in Decentralized Controlled Material Flow Systems

    Directory of Open Access Journals (Sweden)

    Lieberoth-Leden Christian

    2016-01-01

    Full Text Available The modularization of the hard- and software is one approach handling the demand for increasing flexibility and changeability of automated material flow systems. A control that is distributed across several different hardware controllers leads to a great demand for coordination between the modules while planning for example transports, especially if there is a mutual dependency between the modules on the executing tasks. Short-term changes in planning often initiate a rescheduling chain reaction, which causes a high communication load in the system. In the presented approach, module clusters with a centralized coordinator are automatically formed out of multiple modules and substitutional take over the surrounding communication for the modules. As a result, they minimize exchanged messages by focusing on the essential information.

  9. Defense Nuclear Material Stewardship Integrated Inventory Information Management System (IIIMS).

    Energy Technology Data Exchange (ETDEWEB)

    Aas, Christopher A.; Lenhart, James E.; Bray, Olin H.; Witcher, Christina Jenkin

    2004-11-01

    Sandia National Laboratories was tasked with developing the Defense Nuclear Material Stewardship Integrated Inventory Information Management System (IIIMS) with the sponsorship of NA-125.3 and the concurrence of DOE/NNSA field and area offices. The purpose of IIIMS was to modernize nuclear materials management information systems at the enterprise level. Projects over the course of several years attempted to spearhead this modernization. The scope of IIIMS was broken into broad enterprise-oriented materials management and materials forecasting. The IIIMS prototype was developed to allow multiple participating user groups to explore nuclear material requirements and needs in detail. The purpose of material forecasting was to determine nuclear material availability over a 10 to 15 year period in light of the dynamic nature of nuclear materials management. Formal DOE Directives (requirements) were needed to direct IIIMS efforts but were never issued and the project has been halted. When restarted, duplicating or re-engineering the activities from 1999 to 2003 is unnecessary, and in fact future initiatives can build on previous work. IIIMS requirements should be structured to provide high confidence that discrepancies are detected, and classified information is not divulged. Enterprise-wide materials management systems maintained by the military can be used as overall models to base IIIMS implementation concepts upon.

  10. 75 FR 3178 - Defense Federal Acquisition Regulation Supplement; Lead System Integrators

    Science.gov (United States)

    2010-01-20

    ... Government procurement. Amy G. Williams, Editor, Defense Acquisition Regulations System. 0 Accordingly, the..., without change, an interim rule amending the Defense Federal Acquisition Regulation Supplement (DFARS) to... limitations on the award of new contracts for lead system integrator functions in the acquisition of major DoD...

  11. 77 FR 11355 - Defense Federal Acquisition Regulation Supplement; Business Systems-Definition and Administration...

    Science.gov (United States)

    2012-02-24

    ...D published an initial proposed rule for Business Systems-- Definition and Administration (DFARS... the definition and administration of contractor business systems as follows: A. Contractor business..., 245, and 252 RIN 0750-AG58 Defense Federal Acquisition Regulation Supplement; Business Systems...

  12. Factors Influencing the Effectiveness of Systems Engineering Training and Education in the Department of Defense

    Science.gov (United States)

    2011-04-30

    learning. Recommendations are also presented for additional research into a more effective systems engineering andragogy . 15. SUBJECT TERMS 16...into a more effective systems engineering andragogy . Purpose Competency-based training for defense acquisition workers in the systems engineering

  13. Followup Audit of Controls Over Operating System and Security Software and Other General Controls for Computer Systems Supporting the Defense Finance and Accounting Service

    National Research Council Canada - National Science Library

    1996-01-01

    This is the third in a series of followup audits made to evaluate the corrective actions taken by the Defense Finance and Accounting Service, the Defense Information Systems Agency, and the Defense...

  14. On defense strategies for system of systems using aggregated correlations

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Nageswara S. [ORNL; Imam, Neena [ORNL; Ma, Chris Y. T. [Hang Seng Management College, Hon Kong; Hausken, Kjell [University of Stavanger, Norway; He, Fei [Texas A& M University, Kingsville, TX, USA; Zhuang, Jun [University at Buffalo (SUNY)

    2017-04-01

    We consider a System of Systems (SoS) wherein each system Si, i = 1; 2; ... ;N, is composed of discrete cyber and physical components which can be attacked and reinforced. We characterize the disruptions using aggregate failure correlation functions given by the conditional failure probability of SoS given the failure of an individual system. We formulate the problem of ensuring the survival of SoS as a game between an attacker and a provider, each with a utility function composed of asurvival probability term and a cost term, both expressed in terms of the number of components attacked and reinforced. The survival probabilities of systems satisfy simple product-form, first-order differential conditions, which simplify the Nash Equilibrium (NE) conditions. We derive the sensitivity functions that highlight the dependence of SoS survival probability at NE on cost terms, correlation functions, and individual system survival probabilities.We apply these results to a simplified model of distributed cloud computing infrastructure.

  15. Systemic Lupus Erythematosus in Primary Care: An Update and Practical Messages for the General Practitioner

    Science.gov (United States)

    Gergianaki, Irini; Bertsias, George

    2018-01-01

    Systemic Lupus Erythematosus (SLE) is a complex chronic autoimmune disease that manifests a wide range of organ involvement. Traditionally, the diagnosis and management of SLE is provided at secondary and tertiary centers to ensure prompt initiation of treatment, adequate control of flares and prevention of irreversible organ damage. Notwithstanding, the role of primary care in SLE is also emerging as there are still significant unmet needs such as the diagnostic delay at the community level and the high burden of therapy- and disease-related comorbidities. In the present review, we summarize practical messages for primary care physicians and general practitioners (GPs) concerning early diagnosis and proper referral of patients with SLE. In addition, we discuss the main comorbidities complicating the disease course and the recommended preventative measures, and we also provide an update on the role and current educational needs of GPs regarding the disease. PMID:29896474

  16. Interoperability In Multi-Layered Active Defense:The Need For Commonality And Robustness Between Active Defense Weapon Systems

    Science.gov (United States)

    2016-02-16

    into areas where there is no access to maritime platforms. Sea-based interceptor platforms have the ability to intercept targets at each stage of the...argues that the most efficient concept for integrating active defense weapon systems is a multi- layered architecture with redundant intercept ...faster data transfer and will prevent data loss. The need for almost 100% interception successes is increasing as the threat becomes more

  17. Analysis of System Training Impact for Major Defense Acquisition Programs (MDAPs): Training Systems Acquisition

    Science.gov (United States)

    2012-07-01

    Training Systems Acquisition IDA Document D-4648 Log: H 12-001032 July 2012 Approved for public release; distribution is unlimited...Background The Patriot system began because of the need to replace an aging and limited air defense system in the 1970s, the Nike -Hercules, and...simulation technology, embedded training and distributed learning (DoD Instruction 1322.26), and instrumentation systems that provide “anytime, anyplace

  18. Defense Travel System: an analysis of the system's reservation module

    OpenAIRE

    Logan, Anita Guevara

    2008-01-01

    MBA Professional Report The purpose of this project is to determine if the DTS reservation module is in compliance based with the standards set by the DOD. By examining flights given in DTS and comparing them to a commercial online travel company (Expedia) will determine whether the implementation of ITA software in 2007, as part of the renovation process is effective and that the reservation module currently meeting standards. Another purpose is to determine if the system has improved...

  19. Conflicting demands of No Child Left Behind and state systems: Mixed messages about school performance.

    Directory of Open Access Journals (Sweden)

    Robert L. Linn

    2005-06-01

    Full Text Available An ever-increasing reliance on student performance on tests holds schools and educators accountable both to state accountability systems and also to the accountability requirements of the No Child Left Behind (NCLB Act of 2001. While each state has constructed its own definition of Adequate Yearly Progress (AYP requirements within the confines of NCLB, substantial differences between the accountability requirements of many state systems and NCLB still have resulted in mixed messages regarding the performance of schools. Several features of NCLB accountability and state accountability systems contribute to the identification of a school as meeting goals according to NCLB but failing to do so according to the state accountability system, or vise versa. These include the multiple hurdles of NCLB, the comparison of performance against a fixed target rather than changes in achievement, and the definition of performance goals. The result of these features is a set of AYP measures that is inconsistent both with existing state accountability systems and also with state NAEP performance. Using existing achievement to set the cut-score measured by AYP and using the highest-performing schools to set the year-to-year improvement standards would improve the NCLB accountability system.

  20. THE PLANNING, PROGRAMING, BUDGETING SYSTEM AND ITS IMPLEMENTATION IN THE SERBIAN MINISTRY OF DEFENSE

    Directory of Open Access Journals (Sweden)

    Sasa RADUSKI

    2010-01-01

    Full Text Available The main purpose of introducing the PPBES to the Serbian Ministry of Defense and the Serbian Armed Forces is to provide a rational management of resources and to maintain and build capacity of the Ministry and the Serbian Armed Forces in order to achieve their goals, objectives and missions.Expected results of implementation of the PPBES are reflected in increasing the efficiency and rationalization of the defense planning to a higher level, ensuring compatibility with defense planning and budgeting system of the state and developing a foundation for the effective management of defense resources.

  1. Using a Computer-based Messaging System at a High School To Increase School/Home Communication.

    Science.gov (United States)

    Burden, Mitzi K.

    Minimal communication between school and home was found to contribute to low performance by students at McDuffie High School (South Carolina). This report describes the experience of establishing a computer-based telephone messaging system in the high school and involving parents, teachers, and students in its use. Additional strategies employed…

  2. Usage of the hybrid encryption in a cloud instant messages exchange system

    Science.gov (United States)

    Kvyetnyy, Roman N.; Romanyuk, Olexander N.; Titarchuk, Evgenii O.; Gromaszek, Konrad; Mussabekov, Nazarbek

    2016-09-01

    A new approach for constructing cloud instant messaging represented in this article allows users to encrypt data locally by using Diffie - Hellman key exchange protocol. The described approach allows to construct a cloud service which operates only by users encrypted messages; encryption and decryption takes place locally at the user party using a symmetric AES encryption. A feature of the service is the conferences support without the need for messages reecryption for each participant. In the article it is given an example of the protocol implementation on the ECC and RSA encryption algorithms basis, as well as a comparison of these implementations.

  3. Buying Program of the Standard Automated Materiel Management System. Automated Small Purchase System: Defense Supply Center Philadelphia

    National Research Council Canada - National Science Library

    2001-01-01

    The Standard Automated Materiel Management System Automated Small Purchase System is a fully automated micro-purchases system used by the General and Industrial Directorate at the Defense Supply Center Philadelphia...

  4. Analysis of Nuclear Option in Planning on Java Bali Integrated Electricity System By Using Message Program

    International Nuclear Information System (INIS)

    Masdin; Sudi-Ariyanto; Nuryanti

    2004-01-01

    The growth of national energy demand in the future still become a great challenge for energy supply sector in Indonesia. The current energy supply strategy focuses the development and diversification of all energy options including fossil fuel, renewable energy and nuclear energy. Based on the Comprehensive Assessment Of Different Energy Source For Electricity Demand Study (CADES), final energy demand will grow from 4,065 PJ in 2000 to about 8,200 PJ in 2025. In this paper, the analysis of national energy system network will be divided into 2 regions, namely Java Bali region and Outside Java Bali region. Period of time horizon chosen in this study is 25 years (2000 to 2025). Simulation of network system configuration based on minimum objective function criteria was done by using MESSAGE (Model for Energy Supply Strategy Alternatives and their General Environmental Impacts) computer program. The focus of the analysis in this paper is simulation of electricity planning sector for Java Bali region. The result of simulation shows that for scenarios with no limitation on all fuel for power plant, scenario where fuel oil as constant supply for power plant and also configuration with limitation on gas supply, Nuclear Power Plant (NPP) does not appear during the study period using cost parameter set in this study. If there are limitations on gas supply and constrains of emissions (SO 2 and CO 2 ) due to coal combustion, NPP would become competitive and appear at about year 2015. (author)

  5. Ontology-Driven Instant Messaging-Based Dialogue System for Device Control

    KAUST Repository

    Noguera-Arnaldos, José Á ngel; Rodriguez-Garcia, Miguel Angel; Ochoa, José Luis; Paredes-Valverde, Mario André s; Alcaraz-Má rmol, Gema; Valencia-Garcí a, Rafael

    2015-01-01

    The im4Things platform aims to develop a communication interface for devices in the Internet of the Things (IoT) through intelligent dialogue based on written natural language over instant messaging services. This type of communication can

  6. Jasmonic acid and salicylic acid activate a common defense system in rice.

    Science.gov (United States)

    Tamaoki, Daisuke; Seo, Shigemi; Yamada, Shoko; Kano, Akihito; Miyamoto, Ayumi; Shishido, Hodaka; Miyoshi, Seika; Taniguchi, Shiduku; Akimitsu, Kazuya; Gomi, Kenji

    2013-06-01

    Jasmonic acid (JA) and salicylic acid (SA) play important roles in plant defense systems. JA and SA signaling pathways interact antagonistically in dicotyledonous plants, but, the status of crosstalk between JA and SA signaling is unknown in monocots. Our rice microarray analysis showed that more than half of the genes upregulated by the SA analog BTH are also upregulated by JA, suggesting that a major portion of the SA-upregulated genes are regulated by JA-dependent signaling in rice. A common defense system that is activated by both JA and SA is thus proposed which plays an important role in pathogen defense responses in rice.

  7. Department of Defense Quality Management Systems and ISO 9000:2000

    National Research Council Canada - National Science Library

    Lucius, Tommie

    2002-01-01

    ...) to the Department of Defense (DoD) quality management system (QMS) in procurement. In particular, the researcher will examine the new standard and its utility for DoD procurement, focusing on changes from the previous ISO 9000 series...

  8. Controls Over Operating System and Security Software Supporting the Defense Finance and Accounting Service

    National Research Council Canada - National Science Library

    McKinney, Terry

    1994-01-01

    This is the final in a series of three audits of management controls over the operating systems and security software used by the information processing centers that support the Defense Finance and Accounting Centers (DFAS...

  9. Performance Analysis and Optimal Allocation of Layered Defense M/M/N Queueing Systems

    Directory of Open Access Journals (Sweden)

    Longyue Li

    2016-01-01

    Full Text Available One important mission of strategic defense is to develop an integrated layered Ballistic Missile Defense System (BMDS. Motivated by the queueing theory, we presented a work for the representation, modeling, performance simulation, and channels optimal allocation of the layered BMDS M/M/N queueing systems. Firstly, in order to simulate the process of defense and to study the Defense Effectiveness (DE, we modeled and simulated the M/M/N queueing system of layered BMDS. Specifically, we proposed the M/M/N/N and M/M/N/C queueing model for short defense depth and long defense depth, respectively; single target channel and multiple target channels were distinguished in each model. Secondly, we considered the problem of assigning limited target channels to incoming targets, we illustrated how to allocate channels for achieving the best DE, and we also proposed a novel and robust search algorithm for obtaining the minimum channel requirements across a set of neighborhoods. Simultaneously, we presented examples of optimal allocation problems under different constraints. Thirdly, several simulation examples verified the effectiveness of the proposed queueing models. This work may help to understand the rules of queueing process and to provide optimal configuration suggestions for defense decision-making.

  10. Analysis of Parking Reliability Guidance of Urban Parking Variable Message Sign System

    Directory of Open Access Journals (Sweden)

    Zhenyu Mei

    2012-01-01

    Full Text Available Operators of parking guidance and information systems (PGIS often encounter difficulty in determining when and how to provide reliable car park availability information to drivers. Reliability has become a key factor to ensure the benefits of urban PGIS. The present paper is the first to define the guiding parking reliability of urban parking variable message signs (VMSs. By analyzing the parking choice under guiding and optional parking lots, a guiding parking reliability model was constructed. A mathematical program was formulated to determine the guiding parking reliability of VMS. The procedures were applied to a numerical example, and the factors that affect guiding reliability were analyzed. The quantitative changes of the parking berths and the display conditions of VMS were found to be the most important factors influencing guiding reliability. The parking guiding VMS achieved the best benefit when the parking supply was close to or was less than the demand. The combination of a guiding parking reliability model and parking choice behavior offers potential for PGIS operators to reduce traffic congestion in central city areas.

  11. Trial of real-time locating and messaging system with Bluetooth low energy.

    Science.gov (United States)

    Arisaka, Naoya; Mamorita, Noritaka; Isonaka, Risa; Kawakami, Tadashi; Takeuchi, Akihiro

    2016-09-14

    Hospital real-time location systems (RTLS) are increasing efficiency and reducing operational costs, but room access tags are necessary. We developed three iPhone 5 applications for an RTLS and communications using Bluetooth low energy (BLE). The applications were: Peripheral device tags, Central beacons, and a Monitor. A Peripheral communicated with a Central using BLE. The Central communicated with a Monitor using sockets on TCP/IP (Transmission Control Protocol/Internet Protocol) via a WLAN (wireless local area network). To determine a BLE threshold level for the received signal strength indicator (RSSI), relationships between signal strength and distance were measured in our laboratory and on the terrace. The BLE RSSI threshold was set at -70 dB, about 10 m. While an individual with a Peripheral moved around in a concrete building, the Peripheral was captured in a few 10-sec units at about 10 m from a Central. The Central and Monitor showed and saved the approach events, location, and Peripheral's nickname sequentially in real time. Remote Centrals also interactively communicate with Peripherals by intermediating through Monitors that found the nickname in the event database. Trial applications using BLE on iPhones worked well for patient tracking, and messaging in indoor environments.

  12. Application of System and Integration Readiness Levels to Department of Defense Research and Development

    Science.gov (United States)

    2016-07-01

    prompting folding foot-pegs. The human-motorcycle interface maturity followed the technical maturity at the expense of safety. Early airplanes were...this paper shows matrix notation in both reduced tensor notation and matrix notation as a convenience for a multidisciplinary audience. SRLj, [SRL...index for managing the acquisition of defense systems. Paper presented at National Defense Industrial Association 13th Annual Systems Engineering

  13. Drone Defense System Architecture for U.S. Navy Strategic Facilities

    Science.gov (United States)

    2017-09-01

    unlimited. DRONE DEFENSE SYSTEM ARCHITECTURE FOR U.S. NAVY STRATEGIC FACILITIES by David Arteche, Kenneth Chivers, Bryce Howard, Terrell Long, Walter...and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington, VA 22202-4302, and to the Office of Management and Budget, Paperwork Reduction...project report 4. TITLE AND SUBTITLE DRONE DEFENSE SYSTEM ARCHITECTURE FOR U.S. NAVY STRATEGIC FACILITIES 5. FUNDING NUMBERS 6. AUTHOR(S) David Arteche

  14. Reactions to threatening health messages.

    Science.gov (United States)

    Ten Hoor, Gill A; Peters, Gjalt-Jorn Y; Kalagi, Janice; de Groot, Lianne; Grootjans, Karlijne; Huschens, Alexander; Köhninger, Constanze; Kölgen, Lizan; Pelssers, Isabelle; Schütt, Toby; Thomas, Sophia; Ruiter, Robert A C; Kok, Gerjo

    2012-11-21

    Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness) may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence that threatening health messages in the form of distressing imagery in anti-smoking and anti-alcohol campaigns cause defensive reactions. We simulated both Brown et al. experiments, asking participants to estimate the reactions of the original study subjects to the threatening health information (n = 93). Afterwards, we presented the actual original study outcomes. One week later, we assessed whether this knowledge of the actual study outcomes helped participants to more successfully estimate the effectiveness of the threatening health information (n = 72). Results showed that participants were initially convinced of the effectiveness of threatening health messages and were unable to anticipate the defensive reactions that in fact occurred. Furthermore, these estimates did not improve after participants had been explained the dynamics of threatening communication as well as what the effects of the threatening communication had been in reality. These findings are consistent with the hypothesis that the effectiveness of threatening health messages is intuitively appealing. What is more, providing empirical evidence against the use of threatening health messages has very little effect on this intuitive appeal.

  15. Performance of the Defense Acquisition System, 2013 Annual Report

    Science.gov (United States)

    2013-06-28

    causes in the 18 analyses conducted by PARCA over the last 3 years (see Bliss , 2012a; Bliss , 2013). 34 Performance of the Defense Acquisition...assumptions (Arena et al., 2012; Bliss , 2012b). Framing assumptions are any explicit or implicit assumptions central in shaping cost, schedule, and...contracts starting after 1980 (n = 367) Cy cl e tim e in y ea rs All development contract cycle times increased significantly after 1980 59

  16. Immunity, suicide or both? Ecological determinants for the combined evolution of anti-pathogen defense systems.

    Science.gov (United States)

    Iranzo, Jaime; Lobkovsky, Alexander E; Wolf, Yuri I; Koonin, Eugene V

    2015-03-13

    Parasite-host arms race is one of the key factors in the evolution of life. Most cellular life forms, in particular prokaryotes, possess diverse forms of defense against pathogens including innate immunity, adaptive immunity and programmed cell death (altruistic suicide). Coevolution of these different but interacting defense strategies yields complex evolutionary regimes. We develop and extensively analyze a computational model of coevolution of different defense strategies to show that suicide as a defense mechanism can evolve only in structured populations and when the attainable degree of immunity against pathogens is limited. The general principle of defense evolution seems to be that hosts do not evolve two costly defense mechanisms when one is sufficient. Thus, the evolutionary interplay of innate immunity, adaptive immunity and suicide, leads to an equilibrium state where the combination of all three defense strategies is limited to a distinct, small region of the parameter space. The three strategies can stably coexist only if none of them are highly effective. Coupled adaptive immunity-suicide systems, the existence of which is implied by the colocalization of genes for the two types of defense in prokaryotic genomes, can evolve either when immunity-associated suicide is more efficacious than other suicide systems or when adaptive immunity functionally depends on the associated suicide system. Computational modeling reveals a broad range of outcomes of coevolution of anti-pathogen defense strategies depending on the relative efficacy of different mechanisms and population structure. Some of the predictions of the model appear compatible with recent experimental evolution results and call for additional experiments.

  17. Ukraine - USA partnership for peace. AEMS project on development and improving of 'Defense' automated emergency management system of the Civil Defense Department of Ukraine

    International Nuclear Information System (INIS)

    1998-01-01

    AEMS project is destined for the development and improving of 'Defense' system of the Civil Defense Department of Ukraine. 'Defense' system is destined for prevention and operation prognosis of emergencies of technological and natural character on the territory of Ukraine as well as for the elaboration of the solutions on protection and rescue of the population and national economy resources. The data are processed at national, regional, district and town levels. By the results of task solutions possible losses of human and material resources as well as necessary forces and means for removal of these consequences are defined. (R.P.)

  18. Citizens’ adaptive or avoiding behavioral response to an emergency message on their mobile phone

    NARCIS (Netherlands)

    Gutteling, J.M.; Terpstra, T.; Kerstholt, J.H.

    2017-01-01

    Since November 2012, Dutch civil defense organizations employ NL-Alert, a cellular broadcast-based warning system to inform the public. Individuals receive a message on their mobile phone about the actual threat, as well as some advice how to deal with the situation at hand. This study reports on

  19. The Symbolic Role of Organizational Message Artifacts in a Communication System Assessment.

    Science.gov (United States)

    Meyer, John C.

    This paper calls for the inclusion of narrative, thematic, and metaphor analysis as organizational assessment or communication audit methods and discusses some practical means of integrating these symbolic interpretational devices. The paper begins by defining the notion of symbol as the message content important to the organizational member. It…

  20. Modeling of Target Tracking System for Homing Missiles and Air Defense Systems

    Directory of Open Access Journals (Sweden)

    Yunes Sh. ALQUDSI

    2018-06-01

    Full Text Available One reason of why the guidance and control systems are imperfect is due to the dynamics of both the tracker and the missile, which appears as an error in the alignment with the LOS and delay in the response of the missile to change its orientation. Other reasons are the bias and disturbances as well as the noise about and within the system such as the thermal noise. This paper deals with the tracking system used in the homing guidance and air defense systems. A realistic model for the tracking system model is developed including the receiver servo dynamics and the possible disturbance and noise that may affect the accuracy of the tracking signals measured by the seeker sensor. Modeling the parameters variability and uncertainty is also examined to determine the robustness margin of the tracking system.

  1. 76 FR 28855 - Defense Federal Acquisition Regulation Supplement; Business Systems-Definition and Administration

    Science.gov (United States)

    2011-05-18

    ...; Business Systems-- Definition and Administration; Interim Rule #0;#0;Federal Register / Vol. 76 , No. 96...-AG58 Defense Federal Acquisition Regulation Supplement; Business Systems--Definition and Administration... an initial proposed rule for Business Systems-- Definition and Administration (DFARS Case 2009-D038...

  2. 75 FR 76692 - Defense Federal Acquisition Regulation Supplement; Business Systems-Definition and Administration...

    Science.gov (United States)

    2010-12-09

    ..., and 252 RIN 0750-AG58 Defense Federal Acquisition Regulation Supplement; Business Systems--Definition... for Business Systems--Definition and Administration (DFARS Case 2009-D038) in the Federal Register on... improve the effectiveness of DoD oversight of contractor business systems. The comment period is being...

  3. Subtle Messages.

    Science.gov (United States)

    Tamplin de Poinsot, Nan

    1999-01-01

    Describes a self-portrait assignment inspired by the work of Frida Kahlo. Discusses Frida Kahlo's artwork and use of surrealist and symbolist views. States that each student had to incorporate personal symbolism in the portrait to convey a message about him or herself in a subtle manner. (CMK)

  4. Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures (Dagstuhl Seminar 14292)

    NARCIS (Netherlands)

    Dacer, Marc; Kargl, Frank; König, Hartmut; Valdes, Alfonso

    2014-01-01

    This report documents the program and the outcomes of Dagstuhl Seminar 14292 “Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures”. The main objective of the seminar was to discuss new approaches and ideas for securing industrial control systems. It

  5. Charges Assessed the Army by the Defense Logistics Agency for Deployable Medical Systems

    National Research Council Canada - National Science Library

    1995-01-01

    .... Deployable medical systems are standardized modular field hospitals that can be prepositioned in the event of a contingency, national emergency, or war operations. In FY 1994, the Defense Personnel Support Center billed the Army $25 million for acquiring and assembling deployable medical systems.

  6. 75 FR 12173 - Proposed Information Collection; Comment Request; Defense Priorities and Allocations System

    Science.gov (United States)

    2010-03-15

    ... Allocations System regulation (15 CFR part 700) must retain the records for at least 3 years. II. Method of... Request; Defense Priorities and Allocations System AGENCY: Bureau of Industry and Security, Commerce...: Direct all written comments to Diana Hynek, Departmental Paperwork Clearance Officer, Department of...

  7. 78 FR 28756 - Defense Federal Acquisition Regulation Supplement: System for Award Management Name Changes...

    Science.gov (United States)

    2013-05-16

    ... Management Name Changes, Phase 1 Implementation (DFARS Case 2012- D053) AGENCY: Defense Acquisition... Excluded Parties Listing System (EPLS) databases into the System for Award Management (SAM) database. DATES... enacted in an effort to improve the management and promotion of electronic Government services and...

  8. A Messaging Infrastructure for WLCG

    International Nuclear Information System (INIS)

    Casey, James; Cons, Lionel; Lapka, Wojciech; Paladin, Massimo; Skaburskas, Konstantin

    2011-01-01

    During the EGEE-III project operational tools such as SAM, Nagios, Gridview, the regional Dashboard and GGUS moved to a communication architecture based on ActiveMQ, an open-source enterprise messaging solution. LHC experiments, in particular ATLAS, developed prototypes of systems using the same messaging infrastructure, validating the system for their use-cases. In this paper we describe the WLCG messaging use cases and outline an improved messaging architecture based on the experience gained during the EGEE-III period. We show how this provides a solid basis for many applications, including the grid middleware, to improve their resilience and reliability.

  9. Allowable residual contamination levels: transuranic advanced disposal systems for defense waste

    International Nuclear Information System (INIS)

    Kennedy, W.E. Jr.; Napier, B.A.

    1982-01-01

    An evaluation of advanced disposal systems for defense transuranic (TRU) wastes is being conducted using the Allowable Residual Contamination Level (ARCL) method. The ARCL method is based on compliance with a radiation dose rate limit through a site-specific analysis of the potential for radiation exposure to individuals. For defense TRU wastes at the Hanford Site near Richland, Washington, various advanced disposal techniques are being studied to determine their potential for application. This paper presents a discussion of the results of the first stage of the TRU advanced disposal systems project

  10. Development of a text messaging system to improve receipt of survivorship care in adolescent and young adult survivors of childhood cancer.

    Science.gov (United States)

    Casillas, Jacqueline; Goyal, Anju; Bryman, Jason; Alquaddoomi, Faisal; Ganz, Patricia A; Lidington, Emma; Macadangdang, Joshua; Estrin, Deborah

    2017-08-01

    This study aimed to develop and examine the acceptability, feasibility, and usability of a text messaging, or Short Message Service (SMS), system for improving the receipt of survivorship care for adolescent and young adult (AYA) survivors of childhood cancer. Researchers developed and refined the text messaging system based on qualitative data from AYA survivors in an iterative three-stage process. In stage 1, a focus group (n = 4) addressed acceptability; in stage 2, key informant interviews (n = 10) following a 6-week trial addressed feasibility; and in stage 3, key informant interviews (n = 23) following a 6-week trial addressed usability. Qualitative data were analyzed using a constant comparative analytic approach exploring in-depth themes. The final system includes programmed reminders to schedule and attend late effect screening appointments, tailored suggestions for community resources for cancer survivors, and messages prompting participant feedback regarding the appointments and resources. Participants found the text messaging system an acceptable form of communication, the screening reminders and feedback prompts feasible for improving the receipt of survivorship care, and the tailored suggestions for community resources usable for connecting survivors to relevant services. Participants suggested supplementing survivorship care visits and forming AYA survivor social networks as future implementations for the text messaging system. The text messaging system may assist AYA survivors by coordinating late effect screening appointments, facilitating a partnership with the survivorship care team, and connecting survivors with relevant community resources. The text messaging system has the potential to improve the receipt of survivorship care.

  11. Roadmap Modeling and Assessment Approach for Defense Technology System of Systems

    Directory of Open Access Journals (Sweden)

    Hui Lu

    2018-06-01

    Full Text Available Advanced defense technology plays a crucial role in safeguarding national safety and development interests. Aiming to handle the problems of current research and development (R&D management approaches faced with the rocketing complexities of system of systems, the authors propose a novel roadmap modeling and assessment methodology through studying the driving forces of general technology development and analyzing realistic requirements of defense technology management in this article. First, a requirement decomposition framework is designed based on multi-view theories and text-mining tools are used to construct a multi-layer knowledge-flow network model. Second, the contribution rates of requirement elements at different levels are evaluated using a multi-criteria decision-making approach and the node importance is assessed based on the topological structure of multi-layer network. Third, it is utilized to demonstrate the effectiveness of the proposed approaches that illustrative examples of the technology requirements in maritime security strategy investigating and a dual-layer knowledge-flow network consists of patents that belong to the “Coherent Light Generator (CLC” classification from the United States Patent and Trademark Office (USPTO database and the related academic papers from Web of Science. Finally, the contributions, potential applications, and drawbacks of this work are discussed and research outlooks are provided.

  12. Advanced Messaging Concept Development Basic Safety Message

    Data.gov (United States)

    Department of Transportation — Contains all Basic Safety Messages (BSMs) collected during the Advanced Messaging Concept Development (AMCD) field testing program. For this project, all of the Part...

  13. Acquisition Management of the Defense Counterintelligence Information System

    National Research Council Canada - National Science Library

    2002-01-01

    .... Specifically, the audit determined whether the information technology system was being cost-effectively acquired, monitored, tested, secured, and prepared for deployment and system life-cycle support...

  14. DMS message design workshops.

    Science.gov (United States)

    2009-03-01

    This report summarizes the training conducted statewide regarding the design and display of messages on : dynamic message signs. The training is based on the Dynamic Message Sign Message Design and Display : Manual (0-4023-P3). Researchers developed ...

  15. Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    International Nuclear Information System (INIS)

    Durling, R L; Price, D E; Spero, K K

    2005-01-01

    For over ten years, the Counterproliferation Analysis and Planning System (CAPS) at Lawrence Livermore National Laboratory (LLNL) has been a planning tool used by U.S. combatant commands for mission support planning against foreign programs engaged in the manufacture of weapons of mass destruction (WMD). CAPS is endorsed by the Secretary of Defense as the preferred counterproliferation tool to be used by the nation's armed services. A sister system, the Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging CAPS expertise designed to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented

  16. Vulnerability And Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    International Nuclear Information System (INIS)

    Durling, R.L. Jr.; Price, D.E.; Spero, K.K.

    2005-01-01

    For over ten years, the Counterproliferation Analysis and Planning System (CAPS) at Lawrence Livermore National Laboratory (LLNL) has been a planning tool used by U.S. combatant commands for mission support planning against foreign programs engaged in the manufacture of weapons of mass destruction (WMD). CAPS is endorsed by the Secretary of Defense as the preferred counterproliferation tool to be used by the nation's armed services. A sister system, the Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging CAPS expertise designed to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities is presented

  17. Network Randomization and Dynamic Defense for Critical Infrastructure Systems

    Energy Technology Data Exchange (ETDEWEB)

    Chavez, Adrian R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Martin, Mitchell Tyler [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hamlet, Jason [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Stout, William M.S. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Lee, Erik [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-04-01

    Critical Infrastructure control systems continue to foster predictable communication paths, static configurations, and unpatched systems that allow easy access to our nation's most critical assets. This makes them attractive targets for cyber intrusion. We seek to address these attack vectors by automatically randomizing network settings, randomizing applications on the end devices themselves, and dynamically defending these systems against active attacks. Applying these protective measures will convert control systems into moving targets that proactively defend themselves against attack. Sandia National Laboratories has led this effort by gathering operational and technical requirements from Tennessee Valley Authority (TVA) and performing research and development to create a proof-of-concept solution. Our proof-of-concept has been tested in a laboratory environment with over 300 nodes. The vision of this project is to enhance control system security by converting existing control systems into moving targets and building these security measures into future systems while meeting the unique constraints that control systems face.

  18. Changes in the glucosinolate-myrosinase defense system in Brassica juncea cotyledons during seedling development.

    Science.gov (United States)

    Wallace, S K; Eigenbrode, Sanford D

    2002-02-01

    Optimal defense theory (ODT) predicts that plant defenses will be allocated to plant organs and tissues in proportion to their relative fitness values and susceptibilities to attack. This study was designed to test ODT predictions on the myrosinase-glucosinolate defense system in Brassica juncea by examining the relationships between the fitness value of B. juncea cotyledons and the levels and effectiveness of cotyledon defenses. Specifically, we estimated fitness value of cotyledons during plant development by measuring plant growth and seed production after cotyledon damage or removal at successive seedling ages. Cotyledon removal within five days of emergence had a significant impact on growth and seed production, but cotyledon removal at later stages did not. Consistent with ODT, glucosinolate and myrosinase levels in cotyledons also declined with seedling age, as did relative defenses against a generalist herbivore, Spodoptera eridania, as estimated by bioassay. Declines in glucosinolates were as predicted by a passive, allometric dilution model based on cotyledon expansion. Declines in myrosinase activity were significantly more gradual than predicted by allometric dilution, suggesting active retention of myrosinase activity as young cotyledons expand.

  19. Defense Systems Management Review. Volume 3, Number 2, Spring 1980. Managing the Process.

    Science.gov (United States)

    1980-01-01

    and no one did. As a result, many literally curled up and died, and for no known medical reason. Major Mayer ended a lecture on the subject with a plea...November 6, 1978. 10. Fred E. Rosell, Jr., "’ rip Report-Visit to Defense Documentation Center (DDC), May 16, 1978," Defense Systems Management College...easily expandable to splits among three or more producers. To do this for three companies, you must determine the split between Companies A and B as a

  20. Getting Your Message Across: Mobile Phone Text Messaging

    Science.gov (United States)

    Beecher, Constance C.; Hayungs, Lori

    2017-01-01

    Want to send a message that 99% of your audience will read? Many Extension professionals are familiar with using social media tools to enhance Extension programming. Extension professionals may be less familiar with the use of mobile phone text-based marketing tools. The purpose of this article is to introduce SMS (short message system) marketing…

  1. 75 FR 71560 - Defense Federal Acquisition Regulation Supplement; Cost and Software Data Reporting System (DFARS...

    Science.gov (United States)

    2010-11-24

    ... also asked what allowance is provided for contractors with accounting software that does not... RIN 0750-AG46 Defense Federal Acquisition Regulation Supplement; Cost and Software Data Reporting... Regulation Supplement (DFARS) to address DoD Cost and Software Data Reporting system requirements for Major...

  2. External Quality Control Review of the Defense Information Systems Agency Audit Organization

    Science.gov (United States)

    2012-08-07

    We are providing this report for your information and use. We have reviewed the system of quality control for the audit organization of the Defense...audit organization encompasses the audit organization’s leadership, emphasis on performing high quality work, and policies and procedures established

  3. Second Line of Defense Virtual Private Network Guidance for Deployed and New CAS Systems

    Energy Technology Data Exchange (ETDEWEB)

    Singh, Surya V.; Thronas, Aaron I.

    2010-01-01

    This paper discusses the importance of remote access via virtual private network (VPN) for the Second Line of Defense (SLD) Central Alarm System (CAS) sites, the requirements for maintaining secure channels while using VPN and implementation requirements for current and future sites.

  4. Convergence of Health Level Seven Version 2 Messages to Semantic Web Technologies for Software-Intensive Systems in Telemedicine Trauma Care.

    Science.gov (United States)

    Menezes, Pedro Monteiro; Cook, Timothy Wayne; Cavalini, Luciana Tricai

    2016-01-01

    To present the technical background and the development of a procedure that enriches the semantics of Health Level Seven version 2 (HL7v2) messages for software-intensive systems in telemedicine trauma care. This study followed a multilevel model-driven approach for the development of semantically interoperable health information systems. The Pre-Hospital Trauma Life Support (PHTLS) ABCDE protocol was adopted as the use case. A prototype application embedded the semantics into an HL7v2 message as an eXtensible Markup Language (XML) file, which was validated against an XML schema that defines constraints on a common reference model. This message was exchanged with a second prototype application, developed on the Mirth middleware, which was also used to parse and validate both the original and the hybrid messages. Both versions of the data instance (one pure XML, one embedded in the HL7v2 message) were equally validated and the RDF-based semantics recovered by the receiving side of the prototype from the shared XML schema. This study demonstrated the semantic enrichment of HL7v2 messages for intensive-software telemedicine systems for trauma care, by validating components of extracts generated in various computing environments. The adoption of the method proposed in this study ensures the compliance of the HL7v2 standard in Semantic Web technologies.

  5. Defense Contract Management Command Support to System Acquisition Program Managers

    National Research Council Canada - National Science Library

    1999-01-01

    .... This report discusses the planning of contract administration office support to system acquisition program managers through the program integration process and the customer support outreach program...

  6. Reactions to threatening health messages

    Directory of Open Access Journals (Sweden)

    ten Hoor Gill A

    2012-11-01

    Full Text Available Abstract Background Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence that threatening health messages in the form of distressing imagery in anti-smoking and anti-alcohol campaigns cause defensive reactions. Methods We simulated both Brown et al. experiments, asking participants to estimate the reactions of the original study subjects to the threatening health information (n = 93. Afterwards, we presented the actual original study outcomes. One week later, we assessed whether this knowledge of the actual study outcomes helped participants to more successfully estimate the effectiveness of the threatening health information (n = 72. Results Results showed that participants were initially convinced of the effectiveness of threatening health messages and were unable to anticipate the defensive reactions that in fact occurred. Furthermore, these estimates did not improve after participants had been explained the dynamics of threatening communication as well as what the effects of the threatening communication had been in reality. Conclusions These findings are consistent with the hypothesis that the effectiveness of threatening health messages is intuitively appealing. What is more, providing empirical evidence against the use of threatening health messages has very little effect on this intuitive appeal.

  7. Patriot/Medium Extended Air Defense System Combined Aggregate Program (Patriot/MEADS CAP)

    Science.gov (United States)

    2013-12-01

    SPONSOR/MONITOR’S REPORT NUMBER(S) 12. DISTRIBUTION /AVAILABILITY STATEMENT Approved for public release; distribution unlimited 13. SUPPLEMENTARY...States, Germany, and Italy to replace the U.S. Patriot air defense systems, Patriot and Hawk systems in Germany, and the Nike system in Italy. The MEADS...combat demonstrated capability against these threats. MEADS will employ a netted distributed architecture with modular components to increase

  8. Reactions to threatening health messages

    OpenAIRE

    ten Hoor, Gill A; Peters, Gjalt-Jorn Y; Kalagi, Janice; de Groot, Lianne; Grootjans, Karlijne; Huschens, Alexander; K?hninger, Constanze; K?lgen, Lizan; Pelssers, Isabelle; Sch?tt, Toby; Thomas, Sophia; Ruiter, Robert AC; Kok, Gerjo

    2012-01-01

    Abstract Background Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness) may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence th...

  9. Towards an integrated defense system for cyber security situation awareness experiment

    Science.gov (United States)

    Zhang, Hanlin; Wei, Sixiao; Ge, Linqiang; Shen, Dan; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe

    2015-05-01

    In this paper, an implemented defense system is demonstrated to carry out cyber security situation awareness. The developed system consists of distributed passive and active network sensors designed to effectively capture suspicious information associated with cyber threats, effective detection schemes to accurately distinguish attacks, and network actors to rapidly mitigate attacks. Based on the collected data from network sensors, image-based and signals-based detection schemes are implemented to detect attacks. To further mitigate attacks, deployed dynamic firewalls on hosts dynamically update detection information reported from the detection schemes and block attacks. The experimental results show the effectiveness of the proposed system. A future plan to design an effective defense system is also discussed based on system theory.

  10. Multiple Identified Neurons and Peripheral Nerves Innervating the Prothoracic Defense Glands in Stick Insects Reveal Evolutionary Conserved and Novel Elements of a Chemical Defense System

    Directory of Open Access Journals (Sweden)

    Johannes Strauß

    2017-11-01

    Full Text Available The defense glands in the dorsal prothorax are an important autapomorphic trait of stick insects (Phasmatodea. Here, we study the functional anatomy and neuronal innervation of the defense glands in Anisomorpha paromalus (Westwood, 1859 (Pseudophasmatinae, a species which sprays its defense secretions when disturbed or attacked. We use a neuroanatomical approach to identify the nerves innervating the gland muscles and the motoneurons with axons in the different nerves. The defense gland is innervated by nerves originating from two segments, the subesophageal ganglion (SOG, and the prothoracic ganglion. Axonal tracing confirms the gland innervation via the anterior subesophageal nerve, and two intersegmental nerves, the posterior subesophageal nerve, and the anterior prothoracic nerve. Axonal tracing of individual nerves reveals eight identified neuron types in the subesophageal or prothoracic ganglion. The strongest innervating nerve of the gland is the anterior subesophageal nerve, which also supplies dorsal longitudinal thorax muscles (neck muscles by separate nerve branches. Tracing of individual nerve branches reveals different sets of motoneurons innervating the defense gland (one ipsilateral and one contralateral subesophageal neuron or the neck muscle (ventral median neurons. The ipsilateral and contralateral subesophageal neurons have no homologs in related taxa like locusts and crickets, and thus evolved within stick insects with the differentiation of the defense glands. The overall innervation pattern suggests that the longitudinal gland muscles derived from dorsal longitudinal neck muscles. In sum, the innervating nerves for dorsal longitudinal muscles are conserved in stick insects, while the neuronal control system was specialized with conserved motoneurons for the persisting neck muscles, and evolutionarily novel subesophageal and prothoracic motoneurons innervating the defense gland.

  11. Development of System Architecture to Investigate the Impact of Integrated Air and Missile Defense in a Distributed Lethality Environment

    Science.gov (United States)

    2017-12-01

    SYSTEM ARCHITECTURE TO INVESTIGATE THE IMPACT OF INTEGRATED AIR AND MISSILE DEFENSE IN A DISTRIBUTED LETHALITY ENVIRONMENT by Justin K. Davis...TO INVESTIGATE THE IMPACT OF INTEGRATED AIR AND MISSILE DEFENSE IN A DISTRIBUTED LETHALITY ENVIRONMENT 5. FUNDING NUMBERS 6. AUTHOR(S) Justin K...ARCHITECTURE TO INVESTIGATE THE IMPACT OF INTEGRATED AIR AND MISSILE DEFENSE IN A DISTRIBUTED LETHALITY ENVIRONMENT Justin K. Davis Lieutenant

  12. Information Management Principles Applied to the Ballistic Missile Defense System

    National Research Council Canada - National Science Library

    Koehler, John M

    2007-01-01

    Information systems (IS) have evolved over the last 50 plus years from individual components with single functionality to grand architectures that integrate multiple individual business functions into global organizational enterprises...

  13. Defense strategies for asymmetric networked systems under composite utilities

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Nageswara S. [ORNL; Ma, Chris Y. T. [Hang Seng Management College, Hon Kong; Hausken, Kjell [University of Stavanger, Norway; He, Fei [Texas A& M University, Kingsville, TX, USA; Yau, David K. Y. [Singapore University of Technology and Design; Zhuang, Jun [University at Buffalo (SUNY)

    2017-11-01

    We consider an infrastructure of networked systems with discrete components that can be reinforced at certain costs to guard against attacks. The communications network plays a critical, asymmetric role of providing the vital connectivity between the systems. We characterize the correlations within this infrastructure at two levels using (a) aggregate failure correlation function that specifies the infrastructure failure probability giventhe failure of an individual system or network, and (b) first order differential conditions on system survival probabilities that characterize component-level correlations. We formulate an infrastructure survival game between an attacker and a provider, who attacks and reinforces individual components, respectively. They use the composite utility functions composed of a survival probability term and a cost term, and the previously studiedsum-form and product-form utility functions are their special cases. At Nash Equilibrium, we derive expressions for individual system survival probabilities and the expected total number of operational components. We apply and discuss these estimates for a simplified model of distributed cloud computing infrastructure

  14. Analysis and Verification of Message Sequence Charts of Distributed Systems with the Help of Coloured Petri Nets

    Directory of Open Access Journals (Sweden)

    S. A. Chernenok

    2014-01-01

    Full Text Available The standard language of message sequence charts MSC is intended to describe scenarios of object interaction. Due to their expressiveness and simplicity MSC diagrams are widely used in practice at all stages of system design and development. In particular, the MSC language is used for describing communication behavior in distributed systems and communication protocols. In this paper the method for analysis and verification of MSC and HMSC diagrams is considered. The method is based on the translation of (HMSC into coloured Petri nets. The translation algorithms cover most standard elements of the MSC including data concepts. Size estimates of the CPN which is the result of the translation are given. Properties of the resulting CPN are analyzed and verified by using the known system CPN Tools and the CPN verifier based on the known tool SPIN. The translation method has been demonstrated by the example.

  15. Strategy and Guidelines for Transitioning a Helicopter Squadron to the Defense Messaging System within the 21 Concept

    National Research Council Canada - National Science Library

    Wheeler, QWuentin

    1998-01-01

    .... The result is a strategy and methodology that achieves DMS and IT 21 objectives. It recommends an architecture that is flexible for future growth, provides group collaboration opportunities, and maximizes shared database...

  16. Modular Open System Architecture for Reducing Contamination Risk in the Space and Missile Defense Supply Chain

    Science.gov (United States)

    Seasly, Elaine

    2015-01-01

    To combat contamination of physical assets and provide reliable data to decision makers in the space and missile defense community, a modular open system architecture for creation of contamination models and standards is proposed. Predictive tools for quantifying the effects of contamination can be calibrated from NASA data of long-term orbiting assets. This data can then be extrapolated to missile defense predictive models. By utilizing a modular open system architecture, sensitive data can be de-coupled and protected while benefitting from open source data of calibrated models. This system architecture will include modules that will allow the designer to trade the effects of baseline performance against the lifecycle degradation due to contamination while modeling the lifecycle costs of alternative designs. In this way, each member of the supply chain becomes an informed and active participant in managing contamination risk early in the system lifecycle.

  17. Performance of the Defense Acquisition System, 2016 Annual Report

    Science.gov (United States)

    2016-10-24

    reversing the trend . However, competition rates declined again in FY 2015 despite an increased goal and strong management emphasis by the DAE through the...engineering; industrial and contract property management ; information technology; life-cycle logistics ; production, quality, and manufacturing; program...Helicopter Army LONGBOW HELLFIRE Longbow Apache Precision Strike Missile System Army LMP Logistics Modernization Program Army LPD 17 San Antonio

  18. Systems Concepts for Integrated Air Defense of Multinational Mobile Crisis Reaction Forces (Concepts de systemes pour la defense aerienne integree de forces internationales mobiles d'intervention en situation de crise)

    National Research Council Canada - National Science Library

    2001-01-01

    The meeting proceedings from this symposium on System Concepts for Integrated Air Defense of Multinational Mobile Crisis Reaction Forces was organized and sponsored by the Systems Concepts and Integration (SCI...

  19. A Recommender System in the Cyber Defense Domain

    Science.gov (United States)

    2014-03-27

    monitoring software is a java based program sending updates to the database on the sensor machine. The host monitoring program gathers information about...3.2.2 Database. A MySQL database located on the sensor machine acts as the storage for the sensors on the network. Snort, Nmap, vulnerability scores, and...machine with the IDS and the recommender is labeled “sensor”. The recommender system code is written in java and compiled using java version 1.6.024

  20. Protecting Networks Via Automated Defense of Cyber Systems

    Science.gov (United States)

    2016-09-01

    gray-hats/. 61 Hu, Youfan, Yan Zhang, Chen Xu, Long Lin, Robert L. Snyder, and Zhong Lin Wang. “Self-Powered System with Wireless Data Transmission ...wires will almost completely cease to exist, replaced by mobile nanodevices, which are tiny computers measured in nanometers with integrated wireless ... energy companies, was hypothesized to cost $10,000. Raiu went on to opine, “The cost of entry for [advanced persistent threats] is decreasing …. We’re

  1. Microwave Plasma Propulsion Systems for Defensive Counter-Space

    Science.gov (United States)

    2007-09-01

    microwave/ECR-based propulsion system. No electron cathode or neutralizer is needed. There are no electrodes to erode, sputter or damage. Measurement of...without the need for a cathode neutralizer, a wide range of performance parameters can be achieved by selecting the size and length of the resonance...EC • Earth Coverage Antenna NCA • Narrow coverege Antenna LNA • Low Noise Amplifier Rx • Receive Tx =Transmit IV IV TI.IO CMOI Figure 53

  2. Designing for scale: optimising the health information system architecture for mobile maternal health messaging in South Africa (MomConnect).

    Science.gov (United States)

    Seebregts, Christopher; Dane, Pierre; Parsons, Annie Neo; Fogwill, Thomas; Rogers, Debbie; Bekker, Marcha; Shaw, Vincent; Barron, Peter

    2018-01-01

    MomConnect is a national initiative coordinated by the South African National Department of Health that sends text-based mobile phone messages free of charge to pregnant women who voluntarily register at any public healthcare facility in South Africa. We describe the system design and architecture of the MomConnect technical platform, planned as a nationally scalable and extensible initiative. It uses a health information exchange that can connect any standards-compliant electronic front-end application to any standards-compliant electronic back-end database. The implementation of the MomConnect technical platform, in turn, is a national reference application for electronic interoperability in line with the South African National Health Normative Standards Framework. The use of open content and messaging standards enables the architecture to include any application adhering to the selected standards. Its national implementation at scale demonstrates both the use of this technology and a key objective of global health information systems, which is to achieve implementation scale. The system's limited clinical information, initially, allowed the architecture to focus on the base standards and profiles for interoperability in a resource-constrained environment with limited connectivity and infrastructural capacity. Maintenance of the system requires mobilisation of national resources. Future work aims to use the standard interfaces to include data from additional applications as well as to extend and interface the framework with other public health information systems in South Africa. The development of this platform has also shown the benefits of interoperability at both an organisational and technical level in South Africa.

  3. Integrated defense system framework and high fidelity hardware-in-the-loop sensor stimulators

    Science.gov (United States)

    Buford, James A., Jr.; Barnett, Thomas C., Jr.; Vatz, Bernard W., II; Williams, M. Joshua; Van Bebber, James; Burson, Cliff

    2008-04-01

    The Strategic Defense Center of the U.S. Army Aviation and Missile Research, Development and Engineering Center (AMRDEC), System Simulation and Development Directorate (SS&DD) provides modeling and simulation (M&S) tools, providing medium and hi-fi sensor stimulation, and test control frameworks to evaluate performance of integrated defense systems. These systems include hardware and software representations provided by and operated by Service Program Offices or their representatives. The representations are geographically distributed, but linked together to provide a dynamic, real-time, interactive test environment that is centrally controlled and synchronized through Global Positioning System (GPS) sources. The distributed nodes and the central control facility communicate through the Single Stimulation Framework (SSF). Operation of the SSF provides characterization and assessment of the integrated defense systems. This paper will summarize the concept, features, and functions of the SSF. The complex communications will be discussed, as well as the philosophy of stimulating the participating system components externally with consistent scenarios and truth state data that will bypass the simulation of these events by the individual participants.

  4. Toward a Science of Autonomy for Physical Systems: Defense

    OpenAIRE

    Arkin, Ronald C.; Sukhatme, Gaurav S.

    2016-01-01

    Militaries around the world have long been cognizant of the potential benefits associated with autonomous systems both in the conduct of warfare and in its prevention. This has lead to the declaration by some that this technology will lead to a fundamental change in the ways in which war is conducted, i.e., a revolution in military affairs (RMA) not unlike gunpowder, the long bow, the rifled bullet, the aircraft carrier, etc. Indeed the United States has created roadmaps for robotics with eve...

  5. A Visualized Message Interface (VMI) for intelligent messaging services

    International Nuclear Information System (INIS)

    Endo, T.; Kasahara, H.; Nakagawa, T.

    1984-01-01

    In CCITT, Message Handling Systems (MHS) have been studied from the viewpoint of communications protocol standardization. In addition to MHS services, Message Processing (MP) services, such as image processing, filing and retrieving services, will come into increasing demand in office automation field. These messaging services, including MHS services, can be thought of as Intelligent Messaging (IM) services. IM services include many basic services, optional user facilities and service parameters. Accordingly, it is necessary to deal with these parameters and MP procedures in as systematic and user-friendly a manner as possible. As one step towards realizing a user-friendly IM services interface, the characteristics of IM service parameters are studied and a Visualized Message Interface (VMI) which resembles a conventional letter exchange format is presented. The concept of VMI formation is discussed using the generic document structure concept as well as a Screen Interface and Protocol Interface conversion package

  6. Dynamic defense and network randomization for computer systems

    Science.gov (United States)

    Chavez, Adrian R.; Stout, William M. S.; Hamlet, Jason R.; Lee, Erik James; Martin, Mitchell Tyler

    2018-05-29

    The various technologies presented herein relate to determining a network attack is taking place, and further to adjust one or more network parameters such that the network becomes dynamically configured. A plurality of machine learning algorithms are configured to recognize an active attack pattern. Notification of the attack can be generated, and knowledge gained from the detected attack pattern can be utilized to improve the knowledge of the algorithms to detect a subsequent attack vector(s). Further, network settings and application communications can be dynamically randomized, wherein artificial diversity converts control systems into moving targets that help mitigate the early reconnaissance stages of an attack. An attack(s) based upon a known static address(es) of a critical infrastructure network device(s) can be mitigated by the dynamic randomization. Network parameters that can be randomized include IP addresses, application port numbers, paths data packets navigate through the network, application randomization, etc.

  7. Y-12 defense programs. Nuclear Packaging Systems testing capabilities

    International Nuclear Information System (INIS)

    1995-06-01

    The Nuclear Packaging Systems (NPS) Department can manage/accomplish any packaging task. The NPS organization is responsible for managing the design, testing, certification, procurement, operation, refurbishment, maintenance, and disposal of packaging used to transport radioactive materials, other hazardous materials, and general cargoes on public roads and within the Oak Ridge Y-12 Plant. Additionally, the NPS Department has developed a Quality Assurance plan for all packaging, design and procurement of nonweapon shipping containers for radioactive materials, and design and procurement of performance-oriented packaging for hazardous materials. Further, the NPS Department is responsible for preparation and submittal of Safety Analysis Reports for Packaging (SARP). The NPS Department coordinates shipping container procurement and safety certification activities that have lead-times of up to two years. A Packaging Testing Capabilities Table at the Oak Ridge complex is included as a table

  8. Ginsan activated the antioxidant defense systems in irradiated mice

    Energy Technology Data Exchange (ETDEWEB)

    Song, Jie Young; Son, Soo Jung; Ahn, Ji Yeon; Shim, Ji Young; Han, Young Soo; Jung, In Sung; Yun, Yeon Sook [KIRMS Daegu (Korea, Republic of)

    2003-07-01

    Ginsan, a polysaccharide extracted from Panax ginseng, has hematopoietic activity and is also known as a good biological-response modifier. In this investigation, we studied the effects of ginsan on the {gamma}-radiation induced alterations of some antioxidant systems in spleen of Balb/c mice. There are many data that irradiation induces Reactive Oxygen Species (ROS), which plays an important causative role in radiation damage of cell. The level of ROS in cells is regulated by enzymatic and nonenzymatic antioxidant systems. The most powerful ones among them are superoxide dismutases (SODs) catalyzing the dismutation of superoxide anion radical o{sub 2} to H{sub 2}O{sub 2}, catalase deactivating h-2O{sub 2} and reduced glutathion (GSH) detoxifying H{sub 2}O{sub 2} and other ROS> At the 5{sub th} day after sublethal whole body irradiation, splenocytes of irradiated mice expressed only marginally increased levels of Mn-SOD, however, Cu/Zn-SOD, catalase, thioredoxine reductase (TR) and thioredoxine (TRX) mRNA (135% increase compared to control), however, the combination of irradiation with ginsan increased the SODs and GPX production more effectively. In addition to the above results, we obtained the similar data of protein expression. The enzyme activities of SOD, catalase, and GPX of ginsan-treated and irradiated mice were significantly enhanced by 140, 115, 126% respectively, compared with those of irradiated mice. Based on these results, we propose that the induction of antioxidant enzymes of ginsan is at least in part due to its capacity to protect against radiation.

  9. PRINCIPLES OF THE SYSTEM OF "CUSTOMIZABLE” DEFENSE ON THE FULL BASKETBALL COURT

    Directory of Open Access Journals (Sweden)

    Pavle Rubin

    2010-09-01

    Full Text Available The problem of this work stems from the fact that the tactics (not just applications, but also to create the principles of basketball games and variants belongs to the domain experts of this sport (coaches, theorists, etc.. Every devising, selecting and applying specific tactics should satisfy two main objectives, to: be the greater surprise and provide adequate "response" to the opponent's tactics. The possibility of surprising opponent is primarily associated with the phase of defense, till firstly from an offense is expected to find and implement an adequate solution ("response". Prerequisite that this defense could be successfully adopted is that the players (they know, and they can play quality individual defense (one - on - one. Another prerequisite is that the basketball players fully adopted the principles of the system: zone pressing and "man to man" (variations of "pressing" on the full court. The defense in the foul court is, even more demanding because of the space that is defended, which allows players to adapt to the possible, at least the first time, adequate "response" on offense.

  10. Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    International Nuclear Information System (INIS)

    Price, D E; Durling, R L

    2005-01-01

    The Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging Lawrence Livermore National Laboratory's expertise in weapons systems and in sparse information analysis to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented

  11. Use of the Homeland-Defense Operational Planning System (HOPS) for Emergency Management

    International Nuclear Information System (INIS)

    Durling, Jr. R.L.; Price, D.E.

    2005-01-01

    The Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging Lawrence Livermore National Laboratory's expertise in weapons systems and in sparse information analysis to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented

  12. Safety assessment of inter-channel / inter-system digital communications: A defensive measures approach

    International Nuclear Information System (INIS)

    Thuy, N. N. Q.

    2006-01-01

    Inappropriately designed inter-channel and inter-system digital communications could initiate common cause failure of multiple channels or multiple systems. Defensive measures were introduced in EPRI report TR-1002835 (Guideline for Performing Defense-in-Depth and Diversity Assessments for Digital Upgrades) to assess, on a deterministic basis, the susceptibility of digital systems architectures to common-cause failures. This paper suggests how this approach could be applied to assess inter-channel and inter-system digital communications from a safety standpoint. The first step of the approach is to systematically identify the so called 'influence factors' that one end of the data communication path can have on the other. Potential factors to be considered would typically include data values, data volumes and data rates. The second step of the approach is to characterize the ways possible failures of a given end of the communication path could affect these influence factors (e.g., incorrect data values, excessive data rates, time-outs, incorrect data volumes). The third step is to analyze the designed-in measures taken to guarantee independence of the other end. In addition to classical error detection and correction codes, typical defensive measures are one-way data communication, fixed-rate data communication, fixed-volume data communication, validation of data values. (authors)

  13. Whole body exposure to low-dose γ-radiation enhances the antioxidant defense system

    International Nuclear Information System (INIS)

    Pathak, C.M.; Avti, P.K.; Khanduja, K.L.; Sharma, S.C.

    2008-01-01

    It is believed that the extent of cellular damage by low- radiation dose is proportional to the effects observed at high radiation dose as per the Linear-No-Threshold (LNT) hypothesis. However, this notion may not be true at low-dose radiation exposure in the living system. Recent evidence suggest that the living organisms do not respond to ionizing radiations in a linear manner in the low dose range 0.01-0.5Gy and rather restore the homeostasis both in vivo and in vitro by normal physiological mechanisms such as cellular and DNA repair processes, immune reactions, antioxidant defense, adaptive responses, activation of immune functions, stimulation of growth etc. In this study, we have attempted to find the critical radiation dose range and the post irradiation period during which the antioxidant defense systems in the lungs, liver and kidneys remain stimulated in these organs after whole body exposure of the animals to low-dose radiation

  14. Use of multimedia messaging system (MMS) by junior doctors for scan image transmission in neurosurgery.

    Science.gov (United States)

    Ling, Ji Min; Lim, Kim Zhuan; Ng, Wai Hoe

    2012-02-01

    Multimedia Messaging Service (MMS) is used by neurosurgical residents to transmit scan images to the attending neurosurgeon in conjunction with telephone consultation. This service has been well received by the attending neurosurgeons, who felt that after viewing scan images on their phones, they felt increased confidence in clinical decision making and that it reduced the need for recall to the hospital. The use of MMS can be extended to junior doctors making referrals from regional hospitals with no neurosurgical cover. This study aims to validate the competency of non-neurosurgically trained junior doctors in selecting optimal images to transmit via MMS to the attending neurosurgeon on call. Ten junior doctors with no formal neurosurgical training and five neurosurgical residents were interviewed. They were shown the full complement of images together with relevant clinical history and assessment. They were then asked to make the radiological diagnosis and then select two images for MMS transmission to the attending neurosurgeon that they thought would best aid the neurosurgeon in clinical decision making. The attending neurosurgeon was asked to comment, on each image, whether his management plan would differ if he was shown the entire series of the images. All the images chosen are deemed appropriate, and the decision made based on the MMS images would be similar if the entire series of images were available to the neurosurgeon. However, 7 of 10 junior doctors were unable to read magnetic resonance images of lumbar spine. There was no significant difference in the images chosen by the neurosurgical residents and the junior doctors. It is feasible and safe for junior doctors to utilize MMS to transmit computed tomographic images to a neurosurgeon while making an urgent referral. The images selected are representative of the disease pathology and facilitate clinical decision making. Copyright © 2012 Elsevier Inc. All rights reserved.

  15. PRENACEL - a mHealth messaging system to complement antenatal care: a cluster randomized trial.

    Science.gov (United States)

    Oliveira-Ciabati, Lívia; Vieira, Carolina Sales; Franzon, Ana Carolina Arruda; Alves, Domingos; Zaratini, Fabiani Spessoto; Braga, Giordana Campos; Sanchez, Jazmin Andrea Cifuentes; Bonifácio, Lívia Pimenta; Andrade, Magna Santos; Fernandes, Mariana; Quintana, Silvana Maria; Fabio, Suzi Volpato; Pileggi, Vicky Nogueira; Vieira, Elisabeth Meloni; Souza, João Paulo

    2017-11-07

    The aim of this study was to determine whether PRENACEL (a bi-directional, mobile-phone based, short text message service (SMS)) increases the coverage of recommended antenatal care (ANC) practices. A parallel, cluster-randomized trial in which 20 public primary Health Care Units (PHCUs) were randomly allocated to the intervention (10 PHCUs) or control (10 PHCUs) group. The study population included pregnant women aged 18 or above with a gestational age of 20 weeks or less. Pregnant women receiving ANC in intervention PHCUs were invited through leaflets and posters to register in PRENACEL. Women who registered in PRENACEL received a weekly set of short text messages with health education and health promotion content related to pregnancy and childbirth and were also able to clarify ANC queries through SMS. All women received routine ANC. The primary outcome was the proportion of women with high ANC Score, a composite measure of coverage of recommended ANC practices. Chi-square or Fisher's exact tests and multivariate log-binomial regression were used to analyze the outcomes. A total of 1210 eligible women received ANC in the participating PHCUs and took part of this study (770 in the intervention group and 440 in the control group). 20.4% (157/770) of intervention-group women registered in PRENACEL, but only 116 read all messages (73.9% of women who registered in PRENACEL, 116/157). The adjusted intention-to-treat analysis suggested no difference between intervention and control groups in the primary outcome (Adjusted Relative Risk (AdjRR): 1.05 (95% Confidence Interval (CI): 1.00-1.09). Both crude and adjusted per-protocol analysis suggested a positive effect of PRENACEL (Crude RR (95% CI): 1.14 (1.06-1.22), AdjRR (95% CI): 1.12 (1.05-1.21). The multivariate analysis also suggests that the PRENACEL group (women who read all SMS) had higher mean ANC score [48.5 (±4.2) vs 45.2 (±8.7), p celular, aumenta a cobertura das práticas recomendadas de cuidados pr

  16. Mixed messages

    Science.gov (United States)

    Chen, Christopher B.; Hall, Kevin; Tsuyuki, Ross T.

    2014-01-01

    Background: More than 5 years ago, the Blueprint for Pharmacy developed a plan for transitioning pharmacy practice toward more patient-centred care. Much of the strategy for change involves communicating the new vision. Objective: To evaluate the communication of the Vision for Pharmacy by the organizations and corporations that signed the Blueprint for Pharmacy’s Commitment to Act. Methods: The list of 88 signatories of the Commitment to Act was obtained from the Blueprint for Pharmacy document. The website of each of these signatories was searched for all references to the Blueprint for Pharmacy or Vision for Pharmacy. Each of the identified references was then analyzed using summative content analysis. Results: A total of 934 references were identified from the webpages of the 88 signatories. Of these references, 549 were merely links to the Blueprint for Pharmacy’s website, 350 of the references provided some detailed information about the Blueprint for Pharmacy and only 35 references provided any specific plans to transition pharmacy practice. Conclusion: Widespread proliferation of the Vision for Pharmacy has not been achieved. One possible explanation for this is that communication of the vision by the signatories has been incomplete. To ensure the success of future communications, change leaders must develop strategies that consider how individual pharmacists and pharmacies understand the message. PMID:24660012

  17. MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats

    Directory of Open Access Journals (Sweden)

    Daesung Moon

    2014-12-01

    Full Text Available Here we report on the issue of Advanced Persistent Threats (APT, which use malware for the purpose of leaking the data of large corporations and government agencies. APT attacks target systems continuously by utilizing intelligent and complex technologies. To overthrow the elaborate security network of target systems, it conducts an attack after undergoing a pre-reconnaissance phase. An APT attack causes financial loss, information leakage, etc. They can easily bypass the antivirus system of a target system. In this paper, we propose a Multi-Layer Defense System (MLDS that can defend against APT. This system applies a reinforced defense system by collecting and analyzing log information and various information from devices, by installing the agent on the network appliance, server and end-user. It also discusses how to detect an APT attack when one cannot block the initial intrusion while continuing to conduct other activities. Thus, this system is able to minimize the possibility of initial intrusion and damages of the system by promptly responding through rapid detection of an attack when the target system is attacked.

  18. An Analysis of the Competitive Strategy in the Industry Providing a Defense System of Systems

    National Research Council Canada - National Science Library

    Melone, James

    2000-01-01

    .... Both the 1996 Defense Science Board Report on Vertical Integration and DoD's 1999 report on Price Based Acquisition recommend that DoD take steps to further understanding of competitive conditions...

  19. Management and Archiving e-mail Messages in Governmental Organization

    OpenAIRE

    Ashraf Mohamed A.Mohsen

    2006-01-01

    The study deals great issue of digital preservation that is e-mail archiving, it covered all aspects of the topic; it discuss: e-mail system, components of e-mail message, advantages and disadvantages of e-mail, official e-mail messages, management of e-mail messages, organizing and arrangement of e-mail messages, keeping and deleting messages, archiving e-mail messages, and some related issues like: privacy and security.

  20. Financial Management: U.S. Army Corps of Engineers Financial Information Imported Into the Defense Departmental Reporting System - Audited Financial Statements

    National Research Council Canada - National Science Library

    Granetto, Paul J; Peek, Marvin L; Armstrong, Jack L; Wenzel, Paul C; Furey, Kathleen A; Zimmerman, Craig W

    2004-01-01

    ... are: the Corps of Engineers Financial Management System, the Corps of Engineers Enterprise Management Information System, and the Defense Departmental Reporting System - Audited Financial Statements...

  1. Development of fusion fuel cycles: Large deviations from US defense program systems

    Energy Technology Data Exchange (ETDEWEB)

    Klein, James Edward, E-mail: james.klein@srnl.doe.gov; Poore, Anita Sue; Babineau, David W.

    2015-10-15

    Highlights: • All tritium fuel cycles start with a “Tritium Process.” All have similar tritium processing steps. • Fusion tritium fuel cycles minimize process tritium inventories for various reasons. • US defense program facility designs did not minimize in-process inventories. • Reduced inventory tritium facilities will lower public risk. - Abstract: Fusion energy research is dominated by plasma physics and materials technology development needs with smaller levels of effort and funding dedicated to tritium fuel cycle development. The fuel cycle is necessary to supply and recycle tritium at the required throughput rate; additionally, tritium confinement throughout the facility is needed to meet regulatory and environmental release limits. Small fuel cycle development efforts are sometimes rationalized by stating that tritium processing technology has already been developed by nuclear weapons programs and these existing processes only need rescaling or engineering design to meet the needs of fusion fuel cycles. This paper compares and contrasts features of tritium fusion fuel cycles to United States Cold War era defense program tritium systems. It is concluded that further tritium fuel cycle development activities are needed to provide technology development beneficial to both fusion and defense programs tritium systems.

  2. The natural defense system and the normative self model [version 1; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Philippe Kourilsky

    2016-05-01

    Full Text Available Infectious agents are not the only agressors, and the immune system is not the sole defender of the organism. In an enlarged perspective, the ‘normative self model’ postulates that a ‘natural defense system’ protects man and other complex organisms against the environmental and internal hazards of life, including infections and cancers. It involves multiple error detection and correction mechanisms that confer robustness to the body at all levels of its organization. According to the model, the self relies on a set of physiological norms, and NONself (meaning : Non Obedient to the Norms of the self is anything ‘off-norms’. The natural defense system comprises a set of ‘civil defenses’ (to which all cells in organs and tissues contribute, and a ‘professional army ‘, made of a smaller set of mobile cells. Mobile and non mobile cells differ in their tuning abilities. Tuning extends the recognition capabilities of NONself by the mobile cells, which increase their defensive function. To prevent them to drift, which would compromise self/NONself discrimination, the more plastic mobile cells need to periodically refer to the more stable non mobile cells to keep within physiological standards.

  3. Strategic Defense Initiative Overview

    National Research Council Canada - National Science Library

    1990-01-01

    ... to Third World and other nations. I will then discuss the scope of the SDI effort, the evolving strategic defense system architectures and theater defense, our compliancy with the ABM Treaty, technology spinoffs resulting from SDI...

  4. COMBINED EFFECTS OF CO2 AND O3 ON ANTIOXIDATIVE AND PHOTOPROTECTIVE DEFENSE SYSTEMS IN NEEDLES OF PONDEROSA PINE

    Science.gov (United States)

    To determine interactive effects of important environmental stresses on biochemical defense mechanisms of tree seedlings, we studied responses to elevated O3 and elevated atmospheric CO2 on antioxidative and photoprotective systems in needles of ponderosa pine (Pinus ponderosa Do...

  5. Multi-Modal Intelligent Traffic Signal Systems (MMITSS) Basic Safety Message

    Data.gov (United States)

    Department of Transportation — Data were collected during the Multi-Modal Intelligent Transportation Signal Systems (MMITSS) study. MMITSS is a next-generation traffic signal system that seeks to...

  6. CLASSIFICATION OF THE MGR DEFENSE HIGH-LEVEL WASTE DISPOSAL CONTAINER SYSTEM

    International Nuclear Information System (INIS)

    J.A. Ziegler

    1999-01-01

    The purpose of this analysis is to document the Quality Assurance (QA) classification of the Monitored Geologic Repository (MGR) defense high-level waste disposal container system structures, systems and components (SSCs) performed by the MGR Safety Assurance Department. This analysis also provides the basis for revision of YMP/90-55Q, Q-List (YMP 1998). The Q-List identifies those MGR SSCs subject to the requirements of DOE/RW-0333PY ''Quality Assurance Requirements and Description'' (QARD) (DOE 1998)

  7. Defense nuclear energy systems selection methodology for civil nuclear power applications

    International Nuclear Information System (INIS)

    Scarborough, J.C.

    1986-01-01

    A methodology developed to select a preferred nuclear power system for a US Department of Defense (DOD) application has been used to evaluate preferred nuclear power systems for a remote island community in Southeast Asia. The plant would provide ∼10 MW of electric power, possibly low-temperature process heat for the local community, and would supplement existing island diesel electric capacity. The nuclear power system evaluation procedure was evolved from a disciplined methodology for ranking ten nuclear power designs under joint development by the US Department of Energy (DOE) and DOD. These included six designs proposed by industry for the Secure Military Power Plant Program (now termed Multimegawatt Terrestrial Reactor Program), the SP-100 Program, the North Warning System Program, and the Modular Advanced High-Temperature Gas-Cooled Reactor (HTGR) and Liquid-Metal Reactor (LMR) programs. The 15 evaluation criteria established for the civil application were generally similar to those developed and used for the defense energy systems evaluation, except that the weighting factor applied to each individual criterion differed. The criteria and their weighting (importance) functions for the civil application are described

  8. Nonblocking and orphan free message logging protocols

    Science.gov (United States)

    Alvisi, Lorenzo; Hoppe, Bruce; Marzullo, Keith

    1992-12-01

    Currently existing message logging protocols demonstrate a classic pessimistic vs. optimistic tradeoff. We show that the optimistic-pessimistic tradeoff is not inherent to the problem of message logging. We construct a message-logging protocol that has the positive features of both optimistic and pessimistic protocol: our protocol prevents orphans and allows simple failure recovery; however, it requires no blocking in failure-free runs. Furthermore, this protocol does not introduce any additional message overhead as compared to one implemented for a system in which messages may be lost but processes do not crash.

  9. Microvillar cell surface as a natural defense system against xenobiotics: a new interpretation of multidrug resistance.

    Science.gov (United States)

    Lange, K; Gartzke, J

    2001-08-01

    The phenomenon of multidrug resistance (MDR) is reinterpreted on the basis of the recently proposed concept of microvillar signaling. According to this notion, substrate and ion fluxes across the surface of differentiated cells occur via transporters and ion channels that reside in membrane domains at the tips of microvilli (MV). The flux rates are regulated by the actin-based cytoskeletal core structure of MV, acting as a diffusion barrier between the microvillar tip compartment and the cytoplasm. The expression of this diffusion barrier system is a novel aspect of cell differentiation and represents a functional component of the natural defense system of epithelial cells against environmental hazardous ions and lipophilic compounds. Because of the specific organization of epithelial Ca(2+) signaling and the secretion, lipophilic compounds associated with the plasma membrane are transferred from the basal to the apical cell surface by a lipid flow mechanism. Drug release from the apical pole occurs by either direct secretion from the cell surface or metabolization by the microvillar cytochrome P-450 system and efflux of the metabolites and conjugation products through the large multifunctional anion channels localized in apical MV. The natural microvillar defense system also provides a mechanistic basis of acquired MDR in tumor cells. The microvillar surface organization is lost in rapidly growing cells such as tumor or embryonic cells but is restored during exposure of tumor cells to cytotoxins by induction of a prolonged G(0)/G(1) resting phase.

  10. The Effect of Hydroxylated Fullerene Nanoparticles on Antioxidant Defense System in Brain Ischemia Rat

    Directory of Open Access Journals (Sweden)

    2017-05-01

    Full Text Available Background and Objectives: According to the previous findings, brain ischemia attenuates the brain antioxidant defense system. This study aimed to investigate the effect of hydroxylated fullerene nanoparticle on antioxidant defense system in ischemic brain rat. Methods: In this Experimental study, rats were divided into three groups (n=6 in each group: sham, ischemic control, and ischemic treatment group. Brain ischemia was induced by middle cerebral artery (MCA occlusion for 90 minutes followed by a 24-hour reperfusion. Ischemic treatment animals received fullerene nanoparticles intraperitoneally at a dose of 10mg/kg immediately after the end of MCA occlusion. After 24-h reperfusion period, brain catalase and superoxide dismutase (SOD, and glutathione activities were assessed by biochemical methods. The data were analyzed using one-way ANOVA and Tukey post-hoc test. Results: The mean glutathione level and catalase and SOD activities in sham animals were 1±0.18%, 1±0.20%, and 1±0.04%, respectively. Induction of brain ischemia decreased the value of glutathione level and catalase and SOD activities in control ischemic rats and their values were obtained to be 0.55±0.09%, 0.44±0.05%, and 0.86±0.02%, respectively. Fullerene significantly increased the activities of catalase (0.93±0.29% and SOD (1.33±0.22% in ischemic treatment group compared to ischemic control rats, but did not change the glutathione level (0.52±0.25%. Conclusion: The results of this study showed that treatment with fullerene nanoparticles improves the brain antioxidant defense system, which is weakened during brain ischemia, through increasing catalase and SOD activities.

  11. Avoiding Message-Dependent Deadlock in Network-Based Systems on Chip

    NARCIS (Netherlands)

    Hansson, A.; Goossens, K.; Rãdulescu, A.

    2007-01-01

    Networks on chip (NoCs) are an essential component of systems on chip (SoCs) and much research is devoted to deadlock avoidance in NoCs. Prior work focuses on the router network while protocol interactions between NoC and intellectual property (IP) modules are not considered. These interactions

  12. DMPD: Toll-like receptors and the host defense against microbial pathogens: bringingspecificity to the innate-immune system. [Dynamic Macrophage Pathway CSML Database

    Lifescience Database Archive (English)

    Full Text Available 15075354 Toll-like receptors and the host defense against microbial pathogens: brin...oc Biol. 2004 May;75(5):749-55. Epub 2004 Jan 14. (.png) (.svg) (.html) (.csml) Show Toll-like receptors and the host defense again...immune system. PubmedID 15075354 Title Toll-like receptors and the host defense against microbial pathogens:

  13. Message-Passing Receiver for OFDM Systems over Highly Delay-Dispersive Channels

    DEFF Research Database (Denmark)

    Barbu, Oana-Elena; Manchón, Carles Navarro; Rom, Christian

    2017-01-01

    Propagation channels with maximum excess delay exceeding the duration of the cyclic prefix (CP) in OFDM systems cause intercarrier and intersymbol interference which, unless accounted for, degrade the receiver performance. Using tools from Bayesian inference and sparse signal reconstruction, we...... derive an iterative algorithm that estimates an approximate representation of the channel impulse response and the noise variance, estimates and cancels the intrinsic interference and decodes the data over a block of symbols. Simulation results show that the receiver employing our algorithm outperforms...

  14. Method for performing diversity and defense-in-depth analyses of reactor protection systems

    International Nuclear Information System (INIS)

    Preckshot, G.G.

    1994-12-01

    The purpose of this NUREG is to describe a method for analyzing computer-based nuclear reactor protection systems that discovers design vulnerabilities to common-mode failure. The potential for common-mode failure has become an important issue as the software content of protection systems has increased. This potential was not present in earlier analog protection systems because it could usually be assumed that common-mode failure, if it did occur, was due to slow processes such as corrosion or premature wear-out. This assumption is no longer true for systems containing software. It is the purpose of the analysis method described here to determine points of a design for which credible common-mode failures are uncompensated either by diversity or defense-in-depth

  15. Architecture for WSN Nodes Integration in Context Aware Systems Using Semantic Messages

    Science.gov (United States)

    Larizgoitia, Iker; Muguira, Leire; Vazquez, Juan Ignacio

    Wireless sensor networks (WSN) are becoming extremely popular in the development of context aware systems. Traditionally WSN have been focused on capturing data, which was later analyzed and interpreted in a server with more computational power. In this kind of scenario the problem of representing the sensor information needs to be addressed. Every node in the network might have different sensors attached; therefore their correspondent packet structures will be different. The server has to be aware of the meaning of every single structure and data in order to be able to interpret them. Multiple sensors, multiple nodes, multiple packet structures (and not following a standard format) is neither scalable nor interoperable. Context aware systems have solved this problem with the use of semantic technologies. They provide a common framework to achieve a standard definition of any domain. Nevertheless, these representations are computationally expensive, so a WSN cannot afford them. The work presented in this paper tries to bridge the gap between the sensor information and its semantic representation, by defining a simple architecture that enables the definition of this information natively in a semantic way, achieving the integration of the semantic information in the network packets. This will have several benefits, the most important being the possibility of promoting every WSN node to a real semantic information source.

  16. Coordinated Actions of Glyoxalase and Antioxidant Defense Systems in Conferring Abiotic Stress Tolerance in Plants

    Directory of Open Access Journals (Sweden)

    Mirza Hasanuzzaman

    2017-01-01

    Full Text Available Being sessile organisms, plants are frequently exposed to various environmental stresses that cause several physiological disorders and even death. Oxidative stress is one of the common consequences of abiotic stress in plants, which is caused by excess generation of reactive oxygen species (ROS. Sometimes ROS production exceeds the capacity of antioxidant defense systems, which leads to oxidative stress. In line with ROS, plants also produce a high amount of methylglyoxal (MG, which is an α-oxoaldehyde compound, highly reactive, cytotoxic, and produced via different enzymatic and non-enzymatic reactions. This MG can impair cells or cell components and can even destroy DNA or cause mutation. Under stress conditions, MG concentration in plants can be increased 2- to 6-fold compared with normal conditions depending on the plant species. However, plants have a system developed to detoxify this MG consisting of two major enzymes: glyoxalase I (Gly I and glyoxalase II (Gly II, and hence known as the glyoxalase system. Recently, a novel glyoxalase enzyme, named glyoxalase III (Gly III, has been detected in plants, providing a shorter pathway for MG detoxification, which is also a signpost in the research of abiotic stress tolerance. Glutathione (GSH acts as a co-factor for this system. Therefore, this system not only detoxifies MG but also plays a role in maintaining GSH homeostasis and subsequent ROS detoxification. Upregulation of both Gly I and Gly II as well as their overexpression in plant species showed enhanced tolerance to various abiotic stresses including salinity, drought, metal toxicity, and extreme temperature. In the past few decades, a considerable amount of reports have indicated that both antioxidant defense and glyoxalase systems have strong interactions in conferring abiotic stress tolerance in plants through the detoxification of ROS and MG. In this review, we will focus on the mechanisms of these interactions and the coordinated

  17. Coordinated Actions of Glyoxalase and Antioxidant Defense Systems in Conferring Abiotic Stress Tolerance in Plants

    Science.gov (United States)

    Hasanuzzaman, Mirza; Nahar, Kamrun; Hossain, Md. Shahadat; Mahmud, Jubayer Al; Rahman, Anisur; Inafuku, Masashi; Oku, Hirosuke; Fujita, Masayuki

    2017-01-01

    Being sessile organisms, plants are frequently exposed to various environmental stresses that cause several physiological disorders and even death. Oxidative stress is one of the common consequences of abiotic stress in plants, which is caused by excess generation of reactive oxygen species (ROS). Sometimes ROS production exceeds the capacity of antioxidant defense systems, which leads to oxidative stress. In line with ROS, plants also produce a high amount of methylglyoxal (MG), which is an α-oxoaldehyde compound, highly reactive, cytotoxic, and produced via different enzymatic and non-enzymatic reactions. This MG can impair cells or cell components and can even destroy DNA or cause mutation. Under stress conditions, MG concentration in plants can be increased 2- to 6-fold compared with normal conditions depending on the plant species. However, plants have a system developed to detoxify this MG consisting of two major enzymes: glyoxalase I (Gly I) and glyoxalase II (Gly II), and hence known as the glyoxalase system. Recently, a novel glyoxalase enzyme, named glyoxalase III (Gly III), has been detected in plants, providing a shorter pathway for MG detoxification, which is also a signpost in the research of abiotic stress tolerance. Glutathione (GSH) acts as a co-factor for this system. Therefore, this system not only detoxifies MG but also plays a role in maintaining GSH homeostasis and subsequent ROS detoxification. Upregulation of both Gly I and Gly II as well as their overexpression in plant species showed enhanced tolerance to various abiotic stresses including salinity, drought, metal toxicity, and extreme temperature. In the past few decades, a considerable amount of reports have indicated that both antioxidant defense and glyoxalase systems have strong interactions in conferring abiotic stress tolerance in plants through the detoxification of ROS and MG. In this review, we will focus on the mechanisms of these interactions and the coordinated action of

  18. Self-Assembly of Multi-nanozymes to Mimic an Intracellular Antioxidant Defense System.

    Science.gov (United States)

    Huang, Yanyan; Liu, Zhen; Liu, Chaoqun; Ju, Enguo; Zhang, Yan; Ren, Jinsong; Qu, Xiaogang

    2016-06-01

    In this work, for the first time, we constructed a novel multi-nanozymes cooperative platform to mimic intracellular antioxidant enzyme-based defense system. V2 O5 nanowire served as a glutathione peroxidase (GPx) mimic while MnO2 nanoparticle was used to mimic superoxide dismutase (SOD) and catalase (CAT). Dopamine was used as a linker to achieve the assembling of the nanomaterials. The obtained V2 O5 @pDA@MnO2 nanocomposite could serve as one multi-nanozyme model to mimic intracellular antioxidant enzyme-based defense procedure in which, for example SOD, CAT, and GPx co-participate. In addition, through assembling with dopamine, the hybrid nanocomposites provided synergistic antioxidative effect. Importantly, both in vitro and in vivo experiments demonstrated that our biocompatible system exhibited excellent intracellular reactive oxygen species (ROS) removal ability to protect cell components against oxidative stress, showing its potential application in inflammation therapy. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  19. The impact of flavour, device type and warning messages on youth preferences for electronic nicotine delivery systems: evidence from an online discrete choice experiment.

    Science.gov (United States)

    Shang, Ce; Huang, Jidong; Chaloupka, Frank J; Emery, Sherry L

    2017-11-02

    To examine the impact of flavour, device type and health warning messages on youth preference for electronic nicotine delivery systems (ENDS), and to provide evidence and data to inform the Food and Drug Administration's potential regulatory actions on ENDS. An online discrete choice experiment was conducted in September 2015. Each participant was given nine choice sets and asked to choose one out of two alternative ENDS products, with varying characteristics in three attributes (flavour, device type and warning message). The impact of the attributes on the probability of choosing ENDS was analysed using conditional and nested logit regressions, controlling for individual sociodemographic characteristics and current smoking status. A general population sample of 515 participants (50 ever-users and 465 never-users of ENDS) aged 14-17 years were recruited to complete the experiment using an online panel. Fruit/sweets/beverage flavours significantly increase the probability of choosing ENDS among youth (pe-cigarettes, increase (p<0.05) the probability of choosing ENDS among adolescent never-users. Warning messages reduce (p<0.01) the probability of choosing ENDS among never-users. Restricting fruit/sweets/beverage flavours in ENDS, regulating modifiable vaping devices and adopting strong health warning messages may reduce the uptake of ENDS among youth. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2017. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  20. Message survival and decision dynamics in a class of reactive complex systems subject to external fields

    Science.gov (United States)

    Rodriguez Lucatero, C.; Schaum, A.; Alarcon Ramos, L.; Bernal-Jaquez, R.

    2014-07-01

    In this study, the dynamics of decisions in complex networks subject to external fields are studied within a Markov process framework using nonlinear dynamical systems theory. A mathematical discrete-time model is derived using a set of basic assumptions regarding the convincement mechanisms associated with two competing opinions. The model is analyzed with respect to the multiplicity of critical points and the stability of extinction states. Sufficient conditions for extinction are derived in terms of the convincement probabilities and the maximum eigenvalues of the associated connectivity matrices. The influences of exogenous (e.g., mass media-based) effects on decision behavior are analyzed qualitatively. The current analysis predicts: (i) the presence of fixed-point multiplicity (with a maximum number of four different fixed points), multi-stability, and sensitivity with respect to the process parameters; and (ii) the bounded but significant impact of exogenous perturbations on the decision behavior. These predictions were verified using a set of numerical simulations based on a scale-free network topology.

  1. Prospect: A Picture Exchange Communication System (PECS)-based Instant Messaging Application for Autism Spectrum Condition

    Science.gov (United States)

    Raja, Pravind; Zainuri Saringat, Mohd; Mustapha, Aida; Zainal, Abidah

    2017-08-01

    Autism Spectrum Disorder (ASC) has widely gained the common attention from the public especially autistic communities. Individuals with ASC are said to have poor verbal skills and this affects them in carrying out their daily basis which they are afraid to expose themselves to the world due to their problems. ASC is diagnosed among children ranging from ages 5-12 years old and they suffer from the abnormal functioning of the brain which in turn causes lack of development activities. Thus, studies have shown that diagrammatic approaches help children with ASC to overcome their issues and improvise their visual and verbal skills. Picture Exchange Communication System or PECS consists of a series of illustrated cards and each cards has its own illustration with a caption on it. These children will understand the cards and they can compile several other cards to form sentences. This paper presents a mobile application called the Prospect, which has been developed using the agile development model for digital representation of PECS. The application is hoped to enhance the learning process and a better yielding results.

  2. The Child Protection System from the Perspective of Young People: Messages from 3 Studies

    Directory of Open Access Journals (Sweden)

    Carme Montserrat

    2014-10-01

    Full Text Available This article reports findings and reflections based on the results of three different research projects conducted between 2008 and 2013 and focusing on the perspective of young care leavers in Spain. The overall aim was to examine these young people’s perceptions and evaluations of how they were treated while in the public care system, mainly residential care. Reviewing these qualitative studies, the most common and relevant issues highlighted by young people were related to the following themes: (a entering care; (b stability and emotional bonds in care; (c education; (d friends; (e labelling, stigmatization, rights and opportunities; (f autonomy and responsibility versus overprotection; (g contact with parents, siblings and extended family; (h maltreatment in care; and (i leaving care. One of the main elements used in their assessments was comparison (i between their previous situation within their birth family and the quality of care experienced in the residential home; and (ii between what these young people commonly refer to as “normal children” and children in care. Recommendations deriving from their advice and opinions are also debated.

  3. Configuration of Risk Monitor System by PLant Defense-In.Depth Monitor and Relability Monitor

    DEFF Research Database (Denmark)

    Yoshikawa, Hidekazu; Lind, Morten; Yang, Ming

    2012-01-01

    A new method of risk monitor system of a nuclear power plant has been proposed from the aspect by what degree of safety functions incorporated in the plant system is maintained by multiple barriers of defense-in-depth (DiD). Wherein, the central idea is plant DiD risk monitor and reliability...... monitor derived from the four aspects of (i) design principle of nuclear safety to realize DiD concept, (ii) definition of risk and risk to be monitored, (iii) severe accident phenomena as major risk, (iv) scheme of risk ranking, and (v) dynamic risk display. In this paper, the overall frame...... of the proposed frame on risk monitor system is summarized and the detailed discussion is made on the definitions of major terminologies of risk, risk ranking, anatomy of fault occurrence, two-layer configuration of risk monitor, how to configure individual elements of plant DiD risk monitor and its example...

  4. Bifurcation and complex dynamics of a discrete-time predator-prey system involving group defense

    Directory of Open Access Journals (Sweden)

    S. M. Sohel Rana

    2015-09-01

    Full Text Available In this paper, we investigate the dynamics of a discrete-time predator-prey system involving group defense. The existence and local stability of positive fixed point of the discrete dynamical system is analyzed algebraically. It is shown that the system undergoes a flip bifurcation and a Neimark-Sacker bifurcation in the interior of R+2 by using bifurcation theory. Numerical simulation results not only show the consistence with the theoretical analysis but also display the new and interesting dynamical behaviors, including phase portraits, period-7, 20-orbits, attracting invariant circle, cascade of period-doubling bifurcation from period-20 leading to chaos, quasi-periodic orbits, and sudden disappearance of the chaotic dynamics and attracting chaotic set. The Lyapunov exponents are numerically computed to characterize the complexity of the dynamical behaviors.

  5. Changing the paradigm: a radiation protection model for utilizing active systems in homeland defense applications

    International Nuclear Information System (INIS)

    Hertel, Nolan E.; Shannon, Michael P.

    2008-01-01

    Full text: The emerging threat from non-state actors and terrorist organizations openly asserting the use of weapons of mass destruction has led to an increased global emphasis on homeland defense and national security. The threat is real and thus many states are spending large amounts of resources to combat the problem. Issues such as unsecured radioactive sources, illicit movement of nuclear material, the use of radioactive sources in the medical and industrial sectors are just a few of the areas being examined. Countering these threats involves a major paradigm shift in the manner in which radiation is viewed. Radiation-based technologies are playing a key role in this emerging area from the development of new passive detection modalities to the use of active systems for detecting illicit materials. The screening of humans, baggage and cargo present overwhelming challenges. With these developments comes the concern from both governmental agencies and the public as to the safety of such systems. This paper will explore one such modality; the employment of radiation-based illicit material detection systems. The authors will present a review of the international (IAEA) and US regulatory and statutory documents as well as recommendations from scientific bodies such as the International Commission on Radiological Protection and the International Commission on Radiation Units and Measurements. This review coupled with sound scientific data are used to develop a proposed framework for the future employment of active systems for homeland defense applications. Issues considered include the ability to effectively measure and/or predict dose, is the As Low As Reasonably Achievable (ALARA) concept appropriate?, how much dose should be allowed relative to national security?, where does the linear-no-threshold hypothesis fit in? The authors use this analysis to develop a model which examines the trade-offs and cost-benefits in using the proposed systems. The major findings of

  6. EMI Messaging Guidelines

    CERN Document Server

    Cons, L.

    2011-01-01

    Guidelines for potential users of messaging within EMI. The goal is to provide enough practical information so that EMI product teams can start investigating whether using messaging in their products can be beneficial or not.

  7. CHAIRMAN'S WELCOME MESSAGE Chairman's message

    Science.gov (United States)

    Oldham, Mark

    2010-11-01

    Every clinical physicist I have asked readily acknowledges the great desirability of a 3D dosimetry system for the verification of advanced radiation therapy treatments. An accurate and practical 3D dosimetry system would greatly strengthen the foundation of quality assurance in radiation therapy by enabling a rigorous and comprehensive whole system test. Such systems are now emerging, and the innovations and progress that led to them are remarkably captured in the proceedings of five prior DOSGEL conferences, the last three of which are freely available in the Journal of Physics: Conference Series. These meetings included a focus on the technical challenges of various approaches to 3D dosimetry. When considering plans for the present 6th meeting, the scientific committee recognized that the field has matured, and a broader focus was desirable, including a strengthening of the clinical and applications component, while preserving a strong technical component. There was also the desire to embrace a variety of other semi-3D techniques which have also recently emerged to implementation in the clinic. In accordance with these sentiments, the committee approved changing the name of the conference from the International Conference on Radiotherapy Gel Dosimetry (DOSGEL) to the International Conference on 3D Radiation Dosimetry (IC3DDose) and to the following objectives - Conference Objectives: 1. To provide a forum to discuss the latest research and developments in 3D and advanced radiation dosimetry. 2. To elevate the quality of radiation therapy treatments (quality assurance QA) through improved clinical dosimetry. 3. To explore the dosimetric challenges posed by modern radiation treatment techniques 4. To energize and diversify dosimetry research and clinical practice by encouraging interaction and synergy between advanced, 3D, and semi-3D dosimetry techniques The scientific program of the IC3DDose2010 meeting has been crafted to meet the objectives listed above, and

  8. Male resource defense mating system in primates? An experimental test in wild capuchin monkeys.

    Directory of Open Access Journals (Sweden)

    Barbara Tiddi

    Full Text Available Ecological models of mating systems provide a theoretical framework to predict the effect of the defendability of both breeding resources and mating partners on mating patterns. In resource-based mating systems, male control over breeding resources is tightly linked to female mating preference. To date, few field studies have experimentally investigated the relationship between male resource control and female mating preference in mammals due to difficulties in manipulating ecological factors (e.g., food contestability. We tested the within-group male resource defense hypothesis experimentally in a wild population of black capuchin monkeys (Sapajus nigritus in Iguazú National Park, Argentina. Sapajus spp. represent an ideal study model as, in contrast to most primates, they have been previously argued to be characterized by female mate choice and a resource-based mating system in which within-group resource monopolization by high-ranking males drives female mating preference for those males. Here, we examined whether females (N = 12 showed a weaker preference for alpha males during mating seasons in which food distribution was experimentally manipulated to be less defendable relative to those in which it was highly defendable. Results did not support the within-group male resource defense hypothesis, as female sexual preferences for alpha males did not vary based on food defendability. We discuss possible reasons for our results, including the possibility of other direct and indirect benefits females receive in exercising mate choice, the potential lack of tolerance over food directed towards females by alpha males, and phylogenetic constraints.

  9. Designing for scale: optimising the health information system architecture for mobile maternal health messaging in South Africa (MomConnect)

    CSIR Research Space (South Africa)

    Seebregts, C

    2018-04-01

    Full Text Available MomConnect is a national initiative coordinated by the South African National Department of Health that sends text-based mobile phone messages free of charge to pregnant women who voluntarily register at any public healthcare facility in South...

  10. Shigella infection of intestinal epithelium and circumvention of the host innate defense system.

    Science.gov (United States)

    Ashida, Hiroshi; Ogawa, Michinaga; Mimuro, Hitomi; Sasakawa, Chihiro

    2009-01-01

    Shigella, Gram-negative bacteria closely related to Escherichia coli, are highly adapted human pathogens that cause bacillary dysentery. Although Shigella have neither adherence factors nor flagella required for attaching or accessing the intestinal epithelium, Shigella are capable of colonizing the intestinal epithelium by exploiting epithelial-cell functions and circumventing the host innate immune response. During Shigella infection, they deliver many numbers of effectors through the type III secretion system into the surrounding space and directly into the host-cell cytoplasm. The effectors play pivotal roles from the onset of bacterial infection through to the establishment of the colonization of the intestinal epithelium, such as bacterial invasion, intracellular survival, subversion of the host immune defense response, and maintenance of the infectious foothold. These examples suggest that Shigella have evolved highly sophisticated infectious and intracellular strategies to establish replicative niches in the intestinal epithelium.

  11. How arbuscular mycorrhizal fungi influence the defense system of sunflower during different abiotic stresses.

    Science.gov (United States)

    Mayer, Zoltán; Duc, Nguyen Hong; Sasvári, Zita; Posta, Katalin

    2017-12-01

    The association between terrestrial plants and arbuscular mycorrhizal (AM) fungi is one of the most common and widespread mutualistic plant-fungi interaction. AM fungi are of beneficial effects on the water and nutrient uptake of plants and increase plant defense mechanisms to alleviate different stresses. The aim of this study was to determine the level of polyphenol oxidase (PPO), guaiacol peroxidase (POX) and glutathione S-transferase (GST) enzyme activities and to track the expression of glutathione S-transferase (GST) gene in plant-arbuscular mycorrhizal system under temperature- and mechanical stress conditions. Our results suggest that induced tolerance of mycorrhizal sunflower to high temperature may be attributed to the induction of GST, POX and PPO enzyme activities as well as to the elevated expression of GST. However, the degree of tolerance of the plant is significantly influenced by the age which is probably justified by the energy considerations.

  12. Coevolutionary arms race versus host defense chase in a tropical herbivore-plant system.

    Science.gov (United States)

    Endara, María-José; Coley, Phyllis D; Ghabash, Gabrielle; Nicholls, James A; Dexter, Kyle G; Donoso, David A; Stone, Graham N; Pennington, R Toby; Kursar, Thomas A

    2017-09-05

    Coevolutionary models suggest that herbivores drive diversification and community composition in plants. For herbivores, many questions remain regarding how plant defenses shape host choice and community structure. We addressed these questions using the tree genus Inga and its lepidopteran herbivores in the Amazon. We constructed phylogenies for both plants and insects and quantified host associations and plant defenses. We found that similarity in herbivore assemblages between Inga species was correlated with similarity in defenses. There was no correlation with phylogeny, a result consistent with our observations that the expression of defenses in Inga is independent of phylogeny. Furthermore, host defensive traits explained 40% of herbivore community similarity. Analyses at finer taxonomic scales showed that different lepidopteran clades select hosts based on different defenses, suggesting taxon-specific histories of herbivore-host plant interactions. Finally, we compared the phylogeny and defenses of Inga to phylogenies for the major lepidopteran clades. We found that closely related herbivores fed on Inga with similar defenses rather than on closely related plants. Together, these results suggest that plant defenses might be more evolutionarily labile than the herbivore traits related to host association. Hence, there is an apparent asymmetry in the evolutionary interactions between Inga and its herbivores. Although plants may evolve under selection by herbivores, we hypothesize that herbivores may not show coevolutionary adaptations, but instead "chase" hosts based on the herbivore's own traits at the time that they encounter a new host, a pattern more consistent with resource tracking than with the arms race model of coevolution.

  13. Documentation of the Federal Financial System Process at the Defense Finance and Accounting Service Indianapolis Center

    National Research Council Canada - National Science Library

    Gimble, Thomas

    1997-01-01

    .... In September 1994, the Defense Finance and Accounting Service (DFAS) transferred the responsibility for preparing the departmental accounting reports for Department 971 appropriations to the DFAS Indianapolis Center...

  14. Diabetes education via mobile text messaging.

    Science.gov (United States)

    Wangberg, Silje C; Arsand, Eirik; Andersson, Niklas

    2006-01-01

    Living with diabetes makes great educational demands on a family. We have tested the feasibility of using the mobile phone short message service (SMS) for reaching people with diabetes information. We also assessed user satisfaction and perceived pros and cons of the medium through interviews. Eleven parents of children with type 1 diabetes received messages for 11 weeks. The parents were positive about the system and said that they would like to continue to use it. The pop-up reminding effect of SMS messages in busy everyday life was noted as positive. Some parents experienced the messages as somewhat intrusive, arriving too often and at inconvenient times. The parents also noted the potential of the messages to facilitate communication with their adolescent children. The inability to store all of the messages or to print them out were seen as major disadvantages. Overall, the SMS seems to hold promise as means of delivering diabetes information.

  15. Defense-in-depth and diversity assessment of the RESAR-414 Integrated Protection System

    International Nuclear Information System (INIS)

    1979-01-01

    This report discusses the defense-in-depth and diversity principles as they apply to safety related instrumentation and presents guidelines which can be used to assess the degree to which the designs of complex, interconnected safety systems conform to these principles. These guidelines are based on the use of the block concept, an approach in which the components and modules of the system are aggregated into a small number of functional units, or blocks, to simplify the analysis. It is believed that the use of the block concept and the guidelines will result in a conservative assessment of the capability of such systems to function when subjected to postulated to common-mode failures. A preliminary assessment of the RESAR-414 Integrated Protection System by means of the guidelines is also presented. The results of this assessment support the conclusion that, for purposes of a preliminary design approval, the RESAR-414 Integrated Protection System is acceptable. However, the assessment, has also resulted in requirements for additional analyses and tests, the results of which must demonstrate conformance to the guidelines prior to the issuance of a Final Design Approval

  16. Stereoselective phytotoxicity of HCH mediated by photosynthetic and antioxidant defense systems in Arabidopsis thaliana.

    Science.gov (United States)

    Zhang, Qiong; Zhou, Cong; Zhang, Quan; Qian, Haifeng; Liu, Weiping; Zhao, Meirong

    2013-01-01

    Hexachlorocyclohexane (HCH) has been used for plant protection and sanitation world-widely, and its isomers have been detected in water, soil, and air as well as in vegetation. As a sink for lipophilic pollutants, vegetation is very important for the degradation and fate of organic contamination; however, little was known about their phytotoxicity and mechanisms of toxic effect. In this study, the stereoselective phototoxicity of four isomers (α, β, γ, and δ) of HCHs mediated by independent as well as interconnecting systems of photosynthesis and enzymatic antioxidant defense system in Arabidopsis thaliana were assessed. Our results revealed that all the HCHs not only stimulated the activities of catalase (CAT) and peroxidase (POD), but also inhibited the activity of superoxide dismutase (SOD). In photosynthesis system, the photosynthetic efficiency of PSI and PSII were all down regulated. Meanwhile, results from both systems showed that δ-HCH was the most toxic one, while α-HCH the least in Arabidopsis thaliana. For the first time, stereoselective effects of different isomers of HCH in plant were demonstrated. And the results suggest that it requires further research to fully elucidate the environmental toxicity and their mechanisms.

  17. Stereoselective phytotoxicity of HCH mediated by photosynthetic and antioxidant defense systems in Arabidopsis thaliana.

    Directory of Open Access Journals (Sweden)

    Qiong Zhang

    Full Text Available BACKGROUND: Hexachlorocyclohexane (HCH has been used for plant protection and sanitation world-widely, and its isomers have been detected in water, soil, and air as well as in vegetation. As a sink for lipophilic pollutants, vegetation is very important for the degradation and fate of organic contamination; however, little was known about their phytotoxicity and mechanisms of toxic effect. In this study, the stereoselective phototoxicity of four isomers (α, β, γ, and δ of HCHs mediated by independent as well as interconnecting systems of photosynthesis and enzymatic antioxidant defense system in Arabidopsis thaliana were assessed. PRINCIPAL FINDINGS: Our results revealed that all the HCHs not only stimulated the activities of catalase (CAT and peroxidase (POD, but also inhibited the activity of superoxide dismutase (SOD. In photosynthesis system, the photosynthetic efficiency of PSI and PSII were all down regulated. Meanwhile, results from both systems showed that δ-HCH was the most toxic one, while α-HCH the least in Arabidopsis thaliana. CONCLUSIONS: For the first time, stereoselective effects of different isomers of HCH in plant were demonstrated. And the results suggest that it requires further research to fully elucidate the environmental toxicity and their mechanisms.

  18. Configuration of risk monitor system by plant defense-in-depth risk monitor and reliability monitor

    International Nuclear Information System (INIS)

    Yoshikawa, Hidekazu; Lind Morten; Yang Ming; Hashim Muhammad; Zhang Zhijian

    2012-01-01

    A new method of risk monitor system of a nuclear power plant has been proposed from the aspect by what degree of safety functions incorporated in the plant system is maintained by multiple barriers of defense-in-depth (DiD). Wherein, the central idea is plant DiD risk monitor and reliability monitor derived from the five aspects of (1) design principle of nuclear safety based on DiD concept, (2) definition of risk and risk to be monitored, (3) severe accident phenomena as major risk, (4) scheme of risk ranking, and (5) dynamic risk display. In this paper, the overall frame of the proposed risk monitor system is summarized and the detailed discussion is made on major items such as definition of risk and risk ranking, anatomy of fault occurrence, two-layer configuration of risk monitor, how to configure individual elements of plant DiD risk monitor, and lastly how to apply for a PWR safety system. (author)

  19. Extracting messages masked by chaos

    International Nuclear Information System (INIS)

    Perez, G.; Cerdeira, H.A.

    1995-01-01

    We show how to extract messages that are masked by a chaotic signal in a system of two Lorenz oscillators. This mask removal is done for two different modes of transmission, a digital one where a parameter of the sender is switched between two values, and an analog mode, where a small amplitude message is added to the carrier signal. We achieve this without using a second Lorenz oscillator as receiver, and without doing a full reconstruction of the dynamics. This method is robust with respect to transformations that impede the unmasking using a Lorenz receiver, and is not affected by the broad-band noise that is inherent to the synchronization process. We also discuss the limitations of this way of extraction for messages in high frequency bands. (author). 12 refs, 4 figs

  20. 78 FR 44931 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2013-07-25

    ...), as amended. This system will provide DLA installations with the ability to rapidly and effectively... Defense Privacy and Civil Liberties Web site at http://dpclo.defense.gov/privacy/SORNs/component/dla/index...: First name, last name, work email, work phone number, mobile phone number, short message service (SMS...

  1. Joint-Service Integration: An Organizational Culture Study of the United States Department of Defense Voluntary Education System

    Science.gov (United States)

    Benson, Martin K.

    2010-01-01

    The purpose of the descriptive case study with a multiple case framework was to (a) describe the organizational cultures of education programs and leaders in the United States (U.S.) Department of Defense (DoD) voluntary education system on Oahu, Hawaii; (b) determine if an overlapping common organizational culture exists; and (c) assess the…

  2. Teaching Clinical (and Nonclinical) Psychology through Applications to the Legal System: Violence Risk Assessment and the Insanity Defense

    Science.gov (United States)

    Costanzo, Marina L.; Costanzo, Mark A.

    2013-01-01

    The prediction of dangerousness and the insanity defense are two areas where psychologists provide research-based expertise to the courts. Teachers of psychology can use these topics to capture the attention of students and to show how psychological research and theory can inform and influence the legal system. Specifically, teachers can use the…

  3. Aggregatibacter actinomycetemcomitans, a potent immunoregulator of the periodontal host defense system and alveolar bone homeostasis

    Science.gov (United States)

    Herbert, Bethany A.; Novince, Chad M.; Kirkwood, Keith L.

    2015-01-01

    Summary Aggregatibacter actinomycetemcomitans is a perio-pathogenic bacteria that has long been associated with localized aggressive periodontitis. The mechanisms of its pathogenicity have been studied in humans and pre-clinical experimental models. Although different serotypes of A. actinomycetemcomitans have differential virulence factor expression, A. actinomycetemcomitans cytolethal distending toxin (CDT), leukotoxin, and lipopolysaccharide (LPS) have been most extensively studied in the context of modulating the host immune response. Following colonization and attachment in the oral cavity, A. actinomycetemcomitans employs CDT, leukotoxin, and LPS to evade host innate defense mechanisms and drive a pathophysiologic inflammatory response. This supra-physiologic immune response state perturbs normal periodontal tissue remodeling/turnover and ultimately has catabolic effects on periodontal tissue homeostasis. In this review, we have divided the host response into two systems: non-hematopoietic and hematopoietic. Non-hematopoietic barriers include epithelium and fibroblasts that initiate the innate immune host response. The hematopoietic system contains lymphoid and myeloid-derived cell lineages that are responsible for expanding the immune response and driving the pathophysiologic inflammatory state in the local periodontal microenvironment. Effector systems and signaling transduction pathways activated and utilized in response to A. actinomycetemcomitans will be discussed to further delineate immune cell mechanisms during A. actinomycetemcomitans infection. Finally, we will discuss the osteo-immunomodulatory effects induced by A. actinomycetemcomitans and dissect the catabolic disruption of balanced osteoclast-osteoblast mediated bone remodeling, which subsequently leads to net alveolar bone loss. PMID:26197893

  4. The biocontrol endophytic bacterium Pseudomonas fluorescens PICF7 induces systemic defense responses in aerial tissues upon colonization of olive roots

    Directory of Open Access Journals (Sweden)

    Carmen eGómez-Lama Cabanás

    2014-09-01

    Full Text Available Pseudomonas fluorescens PICF7, a native olive root endophyte and effective biocontrol agent (BCA against Verticillium wilt of olive, is able to trigger a broad range of defense responses in root tissues of this woody plant. In order to elucidate whether strain PICF7 also induces systemic defense responses in above-ground organs, aerial tissues of olive plants grown under non-gnotobiotic conditions were collected at different time points after root bacterization with this endophytic BCA. A suppression subtractive hybridization (SSH cDNA library, enriched in up-regulated genes, was generated. This strategy enabled the identification of 376 ESTs (99 contigs and 277 singlets, many of them related to response to different stresses. Five ESTs, involved in defense responses, were selected to carry out time-course quantitative real-time PCR (qRT-PCR experiments aiming to: (i validate the induction of these genes, and (ii shed light on their expression pattern along time (from 1 to 15 days. Induction of olive genes potentially coding for lypoxigenase 2, catalase, 1-aminocyclopropane-1-carboxylate oxidase and phenylananine ammonia-lyase was thus confirmed at some time points. Computational analysis also revealed that different transcription factors were up-regulated in olive aerial tissues (i.e. jerf, bHLH, WRKYs, as previously reported for roots. Results confirmed that root colonization by this endophytic bacterium does not only trigger defense responses in this organ but also mount a wide array of systemic defense responses in distant tissues (stems, leaves. This sheds light on how olive plants respond to the ‘non-hostile’ colonization by a bacterial endophyte and how induced defense response can contribute to the biocontrol activity of strain PICF7.

  5. Unified Internet Messaging

    OpenAIRE

    Healy, Paul; Barber, Declan

    2015-01-01

    As telephony services, mobile services and internet services continue to converge, the prospect of providing Unified Messaging and even Unified Communications becomes increasingly achievable. This paper discusses the growing importance of IP-based networks to Unified Messaging developments and examines some of the key services and protocols that are likely to make Unified Messaging more widely available. In this initial paper, we limit ourselves initially to the unification of text-based mess...

  6. Pb-induced cellular defense system in the root meristematic cells of Allium sativum L.

    Science.gov (United States)

    Jiang, Wusheng; Liu, Donghua

    2010-03-02

    Electron microscopy (EM) techniques enable identification of the main accumulations of lead (Pb) in cells and cellular organelles and observations of changes in cell ultrastructure. Although there is extensive literature relating to studies on the influence of heavy metals on plants, Pb tolerance strategies of plants have not yet been fully explained. Allium sativum L. is a potential plant for absorption and accumulation of heavy metals. In previous investigations the effects of different concentrations (10(-5) to 10(-3) M) of Pb were investigated in A. sativum, indicating a significant inhibitory effect on shoot and root growth at 10(-3) to 10(-4) M Pb. In the present study, we used EM and cytochemistry to investigate ultrastructural alterations, identify the synthesis and distribution of cysteine-rich proteins induced by Pb and explain the possible mechanisms of the Pb-induced cellular defense system in A. sativum. After 1 h of Pb treatment, dictyosomes were accompanied by numerous vesicles within cytoplasm. The endoplasm reticulum (ER) with swollen cisternae was arranged along the cell wall after 2 h. Some flattened cisternae were broken up into small closed vesicles and the nuclear envelope was generally more dilated after 4 h. During 24-36 h, phenomena appeared such as high vacuolization of cytoplasm and electron-dense granules in cell walls, vacuoles, cytoplasm and mitochondrial membranes. Other changes included mitochondrial swelling and loss of cristae, and vacuolization of ER and dictyosomes during 48-72 h. In the Pb-treatment groups, silver grains were observed in cell walls and in cytoplasm, suggesting the Gomori-Swift reaction can indirectly evaluate the Pb effects on plant cells. Cell walls can immobilize some Pb ions. Cysteine-rich proteins in cell walls were confirmed by the Gomori-Swift reaction. The morphological alterations in plasma membrane, dictyosomes and ER reflect the features of detoxification and tolerance under Pb stress. Vacuoles are

  7. Pb-induced cellular defense system in the root meristematic cells of Allium sativum L

    Directory of Open Access Journals (Sweden)

    Liu Donghua

    2010-03-01

    Full Text Available Abstract Background Electron microscopy (EM techniques enable identification of the main accumulations of lead (Pb in cells and cellular organelles and observations of changes in cell ultrastructure. Although there is extensive literature relating to studies on the influence of heavy metals on plants, Pb tolerance strategies of plants have not yet been fully explained. Allium sativum L. is a potential plant for absorption and accumulation of heavy metals. In previous investigations the effects of different concentrations (10-5 to 10-3 M of Pb were investigated in A. sativum, indicating a significant inhibitory effect on shoot and root growth at 10-3 to 10-4 M Pb. In the present study, we used EM and cytochemistry to investigate ultrastructural alterations, identify the synthesis and distribution of cysteine-rich proteins induced by Pb and explain the possible mechanisms of the Pb-induced cellular defense system in A. sativum. Results After 1 h of Pb treatment, dictyosomes were accompanied by numerous vesicles within cytoplasm. The endoplasm reticulum (ER with swollen cisternae was arranged along the cell wall after 2 h. Some flattened cisternae were broken up into small closed vesicles and the nuclear envelope was generally more dilated after 4 h. During 24-36 h, phenomena appeared such as high vacuolization of cytoplasm and electron-dense granules in cell walls, vacuoles, cytoplasm and mitochondrial membranes. Other changes included mitochondrial swelling and loss of cristae, and vacuolization of ER and dictyosomes during 48-72 h. In the Pb-treatment groups, silver grains were observed in cell walls and in cytoplasm, suggesting the Gomori-Swift reaction can indirectly evaluate the Pb effects on plant cells. Conclusions Cell walls can immobilize some Pb ions. Cysteine-rich proteins in cell walls were confirmed by the Gomori-Swift reaction. The morphological alterations in plasma membrane, dictyosomes and ER reflect the features of detoxification

  8. Transforming Defense

    National Research Council Canada - National Science Library

    Lamb, Christopher J; Bunn, M. E; Lutes, Charles; Cavoli, Christopher

    2005-01-01

    .... Despite the resources and attention consumed by the war on terror, and recent decisions by the White House to curtail the growth of defense spending, the senior leadership of the Department of Defense (DoD...

  9. Defense Logistics Army Should Assess Cost and Benefits of the Workload Performance System Expansion

    National Research Council Canada - National Science Library

    1999-01-01

    .... In the Department of Defense's (DOD) fiscal years 1997 and 1998 Annual Statements of Assurance, DOD noted difficulties in relating personnel requirements to workload and budget as a material weakness in the Army's manpower requirements...

  10. Impact of Defense Industry Mergers on The Cost of Military Weapons Systems

    National Research Council Canada - National Science Library

    Alfonso, Grisko R

    2007-01-01

    .... The Selected Acquisition Reports (SARs) provided the data for this research. The analysis of the data suggests that the defense industry's consolidation did not result in higher costs for DoD's military weapons in the post-merger period...

  11. Defense Science Board Task Force Report on Next-Generation Unmanned Undersea Systems

    Science.gov (United States)

    2016-10-01

    commercial platforms. Theconcepts will be validated through modeling and simulation (M&S) and operationalexperimentation to facilitate rapid... Markowitz Private Consultant Mr. Robert Nesbit Private Consultant Mr. Frank Serna Draper Laboratory RADM Charles Young (RET) Private Consultant Defense

  12. Price-Based Acquisition. Issues and Challenges for Defense Department Procurement of Weapon Systems

    National Research Council Canada - National Science Library

    Lorell, Mark A; Graser, John C; Cook, Cynthia R

    2005-01-01

    .... Critics of this traditional, CBA method see it as imposing heavy regulatory burdens on the government and the contractor and tending to discourage potential non-defense contractors from competing...

  13. Re-engineering software systems in the Department of Defense using integrated computer aided software engineering tools

    OpenAIRE

    Jennings, Charles A.

    1992-01-01

    Approved for public release; distribution is unlimited The Department of Defense (DoD) is plagues with severe cost overruns and delays in developing software systems. Existing software within Dod, some developed 15-to 20 years ago, require continual maintenance and modification. Major difficulties arise with maintaining older systems due to cryptic source code and a lack of adequate documentation. To remedy this situation, the DoD, is pursuing the integrated computer aided software engi...

  14. Auctioning Bulk Mobile Messages

    NARCIS (Netherlands)

    S. Meij (Simon); L-F. Pau (Louis-François); H.W.G.M. van Heck (Eric)

    2003-01-01

    textabstractThe search for enablers of continued growth of SMS traffic, as well as the take-off of the more diversified MMS message contents, open up for enterprises the potential of bulk use of mobile messaging , instead of essentially one-by-one use. In parallel, such enterprises or value added

  15. The Impact of Civilian Control on Contemporary Defense Planning Systems: Challenges for South East Europe

    Science.gov (United States)

    2011-03-01

    Long-Term Defense Planning,” Information and Security: An International Journal 23, no. 1 (2009): 62-72; and Nicu Ionel Sava, Western (NATO/PfP...questionable relevance elsewhere in the world.” Huntington advanced his notions of “objective” and “subjective” control explicitly around the...chamber committees for defense: Public Order Committee and National Security Committee. These two discuss the proposals advanced by the government. Then

  16. Salivary innate defense system in type 1 diabetes mellitus in children with mixed and permanent dentition.

    Science.gov (United States)

    Zalewska, Anna; Knaś, Małgorzata; Kuźmiuk, Anna; Waszkiewicz, Napoleon; Niczyporuk, Marek; Waszkiel, Danuta; Zwierz, Krzysztof

    2013-11-01

    It should be expected that type 1 diabetes mellitus may disturb innate and acquired immunity. There are no data on type 1 diabetes mellitus-related changes in the salivary flow and the protein output responsible for the innate immunity of saliva depending on the quality of dentition reflecting the age of child. The aim of this work was the evaluation of parameters responsible for the innate immunity of saliva in children and adolescents with type 1 diabetes mellitus. In diabetic children, adolescent and healthy volunteers, the salivary flow, the output and the concentration of the activity of peroxidase (colorimetry), lysozyme (radial immunodiffusion) and lactoferrin (ELISA) were determined. In children with mixed and permanent dentition, type 1 diabetes mellitus significantly decreases (as compared with the appropriate controls) the unstimulated salivary flow, the output, concentration of peroxidase and the output of the lysozyme and lactoferrin. In conclusion, it may be stated that type 1 diabetes mellitus causes functional changes in the salivary glands, resulting in a decrease of the salivary flow and weakening of the salivary innate defense system, thus creating a threat to the oral and general health of type 1 diabetes mellitus children. The results showed that the salivary glands of younger children, when compared to adolescents with type 1 diabetes mellitus, are more susceptible to the injurious effects of the disease.

  17. Brassinosteroids Denigrate the Seasonal Stress through Antioxidant Defense System in Seedlings of Brassica juncea L.

    Directory of Open Access Journals (Sweden)

    Sandeep Kumar

    2014-05-01

    Full Text Available The present work has been undertaken to study the effect of exogenously application of 24-epiBL and 28-homoBL on soluble protein, proline contents and antioxidant defense system of Brassica juncea L. RLM 619 under the influence of seasonal stress. It was observed that 24-epiBL and 28-homoBL treatment enhance the soluble protein, dry weight and shoot length of B. juncea seedlings under seasonal stress. If seeds treated with the different concentrations (10-6, 10-8 and 10-10 M of 24-epiBL and 28-homoBL revealed batter growth, protein and proline contents as compare to untreated seedlings. Similarly the activities of antioxidant enzymes SOD, CAT, APOX, DHAR, PPO and Auxinases were enhanced by the application of different concentration of both brassinosteroids, whereas MDA content was decrease with both brassinosteroids treatments. Then we have concluded that both brassinolides have the seasonal stress ameliorative properties in B. juncea seedlings grown under the influence of seasonal stress. This study culminates to the role of brassinolides as an anti-stress property for protection of plant from various types of stresses.

  18. Plant natriuretic peptides: Systemic regulators of plant homeostasis and defense that can affect cardiomyoblasts

    KAUST Repository

    Gehring, Christoph A.

    2010-09-01

    Immunologic evidence has suggested the presence of biologically active natriuretic peptide (NPs) hormones in plants because antiatrial NP antibodies affinity purify biologically active plant NPs (PNP). In the model plant, an Arabidopsis thaliana PNP (AtPNP-A) has been identified and characterized. AtPNP-A belongs to a novel class of molecules that share some similarity with the cell wall loosening expansins but do not contain the carbohydrate-binding wall anchor thus suggesting that PNPs and atrial natriuretic peptides are heterologs. AtPNP-A acts systemically, and this is consistent with its localization in the apoplastic extracellular space and the conductive tissue. Furthermore, AtPNP-A signals via the second messenger cyclic guanosine 3′,5′-monophosphate and modulates ion and water transport and homeostasis. It also plays a critical role in host defense against pathogens. AtPNP-A can be classified as novel paracrine plant hormone because it is secreted into the apoplastic space in response to stress and can enhance its own expression. Interestingly, purified recombinant PNP induces apo-ptosis in a dose-dependent manner and was most effective on cardiac myoblast cell lines. Because PNP is mimicking the effect of ANP in some instances, PNP may prove to provide useful leads for development of novel therapeutic NPs. Copyright © 2013 by The American Federation for Medical Research.

  19. Effects of lead on tolerance, bioaccumulation, and antioxidative defense system of green algae, Cladophora.

    Science.gov (United States)

    Cao, De-ju; Shi, Xiao-dong; Li, Hao; Xie, Pan-pan; Zhang, Hui-min; Deng, Juan-wei; Liang, Yue-gan

    2015-02-01

    Effects of various concentrations (0.5, 1.0, 2.5, 5.0, 7.5, and 10.0 mg/L) of lead (Pb(2+)) on the growth, bioaccumulation, and antioxidative defense system of green algae, Cladophora, was investigated. Low concentrations of Pb(2+) accelerated Cladophora growth, but concentrations of 10.0 mg/L and above inhibited the growth because of the hinderance to photosynthesis. The total soluble sugar content of Cladophora was affected by Pb(2+) treatment, but the protein content showed no significant changes. The malondialdehyde (MDA) content and peroxidase(POD) activity of Cladophora gradually increased whereas superoxide dismutase(SOD) decreased with Pb(2+) concentrations. Catalase (CAT) activity exhibited no significant changes following Pb(2+) treatment. Pb(2+) accumulated in Cladophora and that the lead content in Cladophora was correlated with POD growth, MDA, and Metallothionein (MT). POD and MT play a role in the survival of Cladophora in Pb-contaminated environments. This study suggests that Cladophora can be a choice organism for the phytoremediation of Pb-polluted coastal areas. Copyright © 2014 Elsevier Inc. All rights reserved.

  20. Plant natriuretic peptides: Systemic regulators of plant homeostasis and defense that can affect cardiomyoblasts

    KAUST Repository

    Gehring, Christoph A; Irving, Helen R.

    2010-01-01

    Immunologic evidence has suggested the presence of biologically active natriuretic peptide (NPs) hormones in plants because antiatrial NP antibodies affinity purify biologically active plant NPs (PNP). In the model plant, an Arabidopsis thaliana PNP (AtPNP-A) has been identified and characterized. AtPNP-A belongs to a novel class of molecules that share some similarity with the cell wall loosening expansins but do not contain the carbohydrate-binding wall anchor thus suggesting that PNPs and atrial natriuretic peptides are heterologs. AtPNP-A acts systemically, and this is consistent with its localization in the apoplastic extracellular space and the conductive tissue. Furthermore, AtPNP-A signals via the second messenger cyclic guanosine 3′,5′-monophosphate and modulates ion and water transport and homeostasis. It also plays a critical role in host defense against pathogens. AtPNP-A can be classified as novel paracrine plant hormone because it is secreted into the apoplastic space in response to stress and can enhance its own expression. Interestingly, purified recombinant PNP induces apo-ptosis in a dose-dependent manner and was most effective on cardiac myoblast cell lines. Because PNP is mimicking the effect of ANP in some instances, PNP may prove to provide useful leads for development of novel therapeutic NPs. Copyright © 2013 by The American Federation for Medical Research.

  1. Physiological, biochemical and defense system responses of parthenium hysterophorus to vehicular exhaust pollution

    International Nuclear Information System (INIS)

    Khalid, N.; Hussain, M.; Hameed, M.; Ahmad, R.

    2017-01-01

    Pollution caused by vehicular exhaust emissions detrimentally affect plants and other living beings. This investigation was carried out to evaluate the effects of vehicular exhaust pollutants on Parthenium hysterophorus at various sites along two major roads [Pindi Bhattian to Lillah (M-2) and Faisalabad to Sargodha (FSR)]in the Punjab, Pakistan. Control samples of P. hysterophorus were also collected from 100m away from the roads. Chlorophyll contents, photosynthetic rate, transpiration rate, stomatal conductance, substomatal CO/sub 2/ concentration, water use efficiency, total free amino acids and total antioxidant activity of P. hysterophorus were measured. The results depicted significant reductions in chlorophyll a, chlorophyll b, total chlorophyll and carotenoid contents of P. hysterophorus. Likewise, reduction in stomatal conductance was also recorded which resulted in lowered photosynthetic and transpiration rates. The overall reduction in photosynthetic rate of P. hysterophorus was 30.92% and 35.38% along M-2 and FSR roads, respectively. The limited photosynthesis resulted in increased levels of sub stomatal /sub 2/ concentration and water use efficiency. The elevated levels of free amino acids and total antioxidant activity were noted and could be attributed to activation of plant's defense system to cope with the deleterious effects of vehicular air pollutants. The significant correlations between various attributes of P. hysterophorus with traffic density signifies the stress caused by vehicular emissions. (author)

  2. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2005-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  3. Cruise Missile Defense

    National Research Council Canada - National Science Library

    Hichkad, Ravi R; Bolkcom, Christopher

    2004-01-01

    Congress has expressed interest in cruise missile defense for years. Cruise missiles (CMs) are essentially unmanned attack aircraft -- vehicles composed of an airframe, propulsion system, guidance system, and weapons payload...

  4. Contemporary strategic management approach in the defense system by U.S. methodology concept

    Directory of Open Access Journals (Sweden)

    Veselin I. Mrdak

    2013-12-01

    Full Text Available The paper wants to emphasize the importance of contemporary strategic management approachs in the defense system. Displays the work of American author Leslie Lewis and C. Robert Roll "Strategy-to- tasks: a methodology for resource allocation and management". It were used by parts of the discussion above, in order to describe the strategy-to-tasks methodology for planning, programming and budgeting system (PPBS. In developed Western countries adopted some elements of strategic management to determine and monitor the execution of strategic plans in the defense system. This trend is spreading to other countries as a result of the necessity of obeying certain methodological and technological achievements. The uncritical acceptance of a strategic management approach can cause great confusion and problems, and the terminology and scientific explanation for this trend is of great importance. Introduction PPBS is a resource management framework based on force planning concept. It was developed at the lRand Company during the late eighties and is adapted to the special needs of several DoD organization. The planning, programming and budgeting system (PPBS PPBS is DoD`ş primary system for planning and managing defense resources. It links the overall U.S. national security strategy to specific programs. It was designed to facilitate fiscally-constrained planning, programming and budgeting in terms of complete programs (i.e. forces and systems rather than through artificial budget categories. The goal is to determine forces, systems and program costs. Strategy-to-tasks and the PPBS The Strategy-To-Tasks methodology, regardless of its application, it must be consistent and supportive of each phase of the PPBS. This section describes the basics frameworks of which are adapted to resource allocation and management activities for the Special Operations Command (USSOCOM. The authors have used it during the various phases of the PPBS. The National Security

  5. Aggregatibacter actinomycetemcomitans, a potent immunoregulator of the periodontal host defense system and alveolar bone homeostasis.

    Science.gov (United States)

    Herbert, B A; Novince, C M; Kirkwood, K L

    2016-06-01

    Aggregatibacter actinomycetemcomitans is a perio-pathogenic bacteria that has long been associated with localized aggressive periodontitis. The mechanisms of its pathogenicity have been studied in humans and preclinical experimental models. Although different serotypes of A. actinomycetemcomitans have differential virulence factor expression, A. actinomycetemcomitans cytolethal distending toxin (CDT), leukotoxin, and lipopolysaccharide (LPS) have been most extensively studied in the context of modulating the host immune response. Following colonization and attachment in the oral cavity, A. actinomycetemcomitans employs CDT, leukotoxin, and LPS to evade host innate defense mechanisms and drive a pathophysiologic inflammatory response. This supra-physiologic immune response state perturbs normal periodontal tissue remodeling/turnover and ultimately has catabolic effects on periodontal tissue homeostasis. In this review, we have divided the host response into two systems: non-hematopoietic and hematopoietic. Non-hematopoietic barriers include epithelium and fibroblasts that initiate the innate immune host response. The hematopoietic system contains lymphoid and myeloid-derived cell lineages that are responsible for expanding the immune response and driving the pathophysiologic inflammatory state in the local periodontal microenvironment. Effector systems and signaling transduction pathways activated and utilized in response to A. actinomycetemcomitans will be discussed to further delineate immune cell mechanisms during A. actinomycetemcomitans infection. Finally, we will discuss the osteo-immunomodulatory effects induced by A. actinomycetemcomitans and dissect the catabolic disruption of balanced osteoclast-osteoblast-mediated bone remodeling, which subsequently leads to net alveolar bone loss. © 2015 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  6. A survey of COTS wireless transceiver solutions for unmanned/unattended homeland defense systems

    Science.gov (United States)

    Wurth, Timothy J.; Wells, Jeffrey S.; Trimble, Michael L.

    2004-08-01

    As the war on terrorism continues abroad, the need to maintain security at home remains a major concern. Every aspect of the security effort can benefit from rapid information transfer. Advances in Commercial-Off-the-Shelf (COTS) radios make them valuable in applications ranging from deployed sensors on unsecured borders, to organizing an emergency response team. Additionally, the reduced cost and availability of these transceivers make them a viable alternative to custom developments. As an example, COTS radios can serve as the communication element in Unattended Ground Sensor (UGS) and munitions systems. Other applications include networked sonobuoys and networked RFID tracking. An additional advantage of COTS solutions is that they are available in a small form factor. They have extremely small mechanical outlines and are easily installed in systems requiring miniature designs and light payloads such as man-pack emplaced radios for the Army"s Future Combat System (FCS), as well as missions carried out by Unmanned Aerial Vehicles (UAV). The availability of the COTS radios result in a low-cost alternative for communication links that are applicable to military and Homeland Defense projects. They provide an easily obtainable, low-cost radio alternative enabling quick design cycles to meet mission timeliness. COTS solutions eliminate months from a typical design cycle and have many features already implemented such as ad-hoc routing and encryption. This enables robust hardware to be fielded quickly when a new need arises. The focus of this paper is to identify different COTS modules that can efficiently and cost effectively be applied to these and other various applications.

  7. The effect of short message system (SMS) reminder on adherence to a healthy diet, medication, and cessation of smoking among adult patients with cardiovascular diseases.

    Science.gov (United States)

    Akhu-Zaheya, Laila M; Shiyab, Wa'ed Y

    2017-02-01

    Cardiovascular Disease is the leading cause of death worldwide. Non-adherence to a recommended regimen among patients with Cardiovascular Diseases represents a significant problem which could lead to an increase in Cardiovascular Diseases. This study aimed to assess the effects of Short Message System (SMS) reminders on adherence to a healthy diet, medication, and cessation of smoking among adult patients with Cardiovascular Diseases. Randomized controlled trial design with three groups was used for this study. A non-probability convenient sample of 160 patients was recruited in this study. The participants were assigned randomly to an experimental group (received SMS regarding adherence to a healthy diet, medication, and smoking cessation), placebo group (received general messages) and control group (routine care). Morisky 8-Item Medication Adherence Scale (MMAS), Mediterranean Diet Adherence Screener (MEDAS), and Readiness to Quit Ladder, were used to assess patients' adherence to medication, adherence to Mediterranean diet, and smoking cessation, respectively. The outcomes were assessed at the beginning of the study and three months later, following completion of the intervention. One way ANONVA was used to assess the study hypothesis. Significant differences between study groups found in terms of adherence to medication (p=.001) and adherence to a healthy diet (p=.000); however, no significant difference was found between groups, in terms of intention to quit smoking, and/or the number of cigarettes smoked (p= .327), (p=.34), respectively. It is documented that SMS is effective in improving adherence to a healthy diet and medication. SMS could be a promising solution for management of different chronic diseases. It is recommended to apply Short Message System (SMS) via cellphone services to improve patient's adherence to a healthy diet and medication. However, further research is needed to support the effectiveness of SMS. Copyright © 2016 Elsevier Ireland

  8. Complex Dynamical Behaviors in a Predator-Prey System with Generalized Group Defense and Impulsive Control Strategy

    Directory of Open Access Journals (Sweden)

    Shunyi Li

    2013-01-01

    Full Text Available A predator-prey system with generalized group defense and impulsive control strategy is investigated. By using Floquet theorem and small amplitude perturbation skills, a local asymptotically stable prey-eradication periodic solution is obtained when the impulsive period is less than some critical value. Otherwise, the system is permanent if the impulsive period is larger than the critical value. By using bifurcation theory, we show the existence and stability of positive periodic solution when the pest eradication lost its stability. Numerical examples show that the system considered has more complicated dynamics, including (1 high-order quasiperiodic and periodic oscillation, (2 period-doubling and halving bifurcation, (3 nonunique dynamics (meaning that several attractors coexist, and (4 chaos and attractor crisis. Further, the importance of the impulsive period, the released amount of mature predators and the degree of group defense effect are discussed. Finally, the biological implications of the results and the impulsive control strategy are discussed.

  9. Assessing the Operational Value of Situational Awareness for AEGIS and Ship Self Defense System (SSDS) Platforms through the Application of the Knowledge Value Added (KVA) Methodology

    National Research Council Canada - National Science Library

    Uchytil, Joseph S

    2006-01-01

    .... The objective of this research is to analyze the AEGIS and Ship Self Defense System (SSDS) track management systems to determine potential operational benefits that could be realized through the application of an OA...

  10. AMS: Area Message Service for SLC

    International Nuclear Information System (INIS)

    Crane, M.; Mackenzie, R.; Millsom, D.; Zelazny, M.

    1993-04-01

    The Area Message Service (AMS) is a TCP/IP based messaging service currently in use at SLAC. A number of projects under development here at SLAC require and application level interface to the 4.3BSD UNIX socket level communications functions using TCP/IP over ethernet. AMS provides connection management, solicited message transfer, unsolicited message transfer, and asynchronous notification of pending messages. AMS is written completely in ANSI 'C' and is currently portable over three hardware/operating system/network manager platforms, VAX/VMS/Multinet, PC/MS-DOS/Pathworks, VME 68K/pSOS/pNA. The basic architecture is a client-server connection where either end of the interface may be the server. This allows for connections and data flow to be initiated from either end of the interface. Included in the paper are details concerning the connection management, the handling of the multi-platform code, and the implementation process

  11. Use of the CRISPR/Cas9 system as an intracellular defense against HIV-1 infection in human cells.

    Science.gov (United States)

    Liao, Hsin-Kai; Gu, Ying; Diaz, Arturo; Marlett, John; Takahashi, Yuta; Li, Mo; Suzuki, Keiichiro; Xu, Ruo; Hishida, Tomoaki; Chang, Chan-Jung; Esteban, Concepcion Rodriguez; Young, John; Izpisua Belmonte, Juan Carlos

    2015-03-10

    To combat hostile viruses, bacteria and archaea have evolved a unique antiviral defense system composed of clustered regularly interspaced short palindromic repeats (CRISPRs), together with CRISPR-associated genes (Cas). The CRISPR/Cas9 system develops an adaptive immune resistance to foreign plasmids and viruses by creating site-specific DNA double-stranded breaks (DSBs). Here we adapt the CRISPR/Cas9 system to human cells for intracellular defense against foreign DNA and viruses. Using HIV-1 infection as a model, our results demonstrate that the CRISPR/Cas9 system disrupts latently integrated viral genome and provides long-term adaptive defense against new viral infection, expression and replication in human cells. We show that engineered human-induced pluripotent stem cells stably expressing HIV-targeted CRISPR/Cas9 can be efficiently differentiated into HIV reservoir cell types and maintain their resistance to HIV-1 challenge. These results unveil the potential of the CRISPR/Cas9 system as a new therapeutic strategy against viral infections.

  12. CARF and WYL domains: ligand-binding regulators of prokaryotic defense systems

    Directory of Open Access Journals (Sweden)

    Kira eMakarova

    2014-04-01

    Full Text Available CRISPR-Cas adaptive immunity systems of bacteria and archaea insert fragments of virus or plasmid DNA as spacer sequences into CRISPR repeat loci. Processed transcripts encompassing these spacers guide the cleavage of the cognate foreign DNA or RNA. Most CRISPR-Cas loci, in addition to recognized cas genes, also include genes that are not directly implicated in spacer acquisition, CRISPR transcript processing or interference. Here we comprehensively analyze sequences, structures and genomic neighborhoods of one of the most widespread groups of such genes that encode proteins containing a predicted nucleotide-binding domain with a Rossmann-like fold, which we denote CARF (CRISPR-associated Rossmann fold. Several CARF protein structures have been determined but functional characterization of these proteins is lacking. The CARF domain is most frequently combined with a C-terminal winged helix-turn-helix DNA-binding domain and effector domains most of which are predicted to possess DNase or RNase activity. Divergent CARF domains are also found in RtcR proteins, sigma-54 dependent regulators of the rtc RNA repair operon. CARF genes frequently co-occur with those coding for proteins containing the WYL domain with the Sm-like SH3 β-barrel fold, which is also predicted to bind ligands. CRISPR-Cas and possibly other defense systems are predicted to be transcriptionally regulated by multiple ligand-binding proteins containing WYL and CARF domains which sense modified nucleotides and nucleotide derivatives generated during virus infection. We hypothesize that CARF domains also transmit the signal from the bound ligand to the fused effector domains which attack either alien or self nucleic acids, resulting, respectively, in immunity complementing the CRISPR-Cas action or in dormancy/programmed cell death.

  13. Pipecolic Acid Orchestrates Plant Systemic Acquired Resistance and Defense Priming via Salicylic Acid-Dependent and -Independent Pathways.

    Science.gov (United States)

    Bernsdorff, Friederike; Döring, Anne-Christin; Gruner, Katrin; Schuck, Stefan; Bräutigam, Andrea; Zeier, Jürgen

    2016-01-01

    We investigated the relationships of the two immune-regulatory plant metabolites, salicylic acid (SA) and pipecolic acid (Pip), in the establishment of plant systemic acquired resistance (SAR), SAR-associated defense priming, and basal immunity. Using SA-deficient sid2, Pip-deficient ald1, and sid2 ald1 plants deficient in both SA and Pip, we show that SA and Pip act both independently from each other and synergistically in Arabidopsis thaliana basal immunity to Pseudomonas syringae. Transcriptome analyses reveal that SAR establishment in Arabidopsis is characterized by a strong transcriptional response systemically induced in the foliage that prepares plants for future pathogen attack by preactivating multiple stages of defense signaling and that SA accumulation upon SAR activation leads to the downregulation of photosynthesis and attenuated jasmonate responses systemically within the plant. Whereas systemic Pip elevations are indispensable for SAR and necessary for virtually the whole transcriptional SAR response, a moderate but significant SA-independent component of SAR activation and SAR gene expression is revealed. During SAR, Pip orchestrates SA-dependent and SA-independent priming of pathogen responses in a FLAVIN-DEPENDENT-MONOOXYGENASE1 (FMO1)-dependent manner. We conclude that a Pip/FMO1 signaling module acts as an indispensable switch for the activation of SAR and associated defense priming events and that SA amplifies Pip-triggered responses to different degrees in the distal tissue of SAR-activated plants. © 2016 American Society of Plant Biologists. All rights reserved.

  14. Defense AT&L (Volume 35, Number 3, May-June 2006)

    Science.gov (United States)

    2006-06-01

    purchasing, and will also result in better stew - ardship of taxpayer dollars. 29 Defense AT&L: May-June 2006 The authors welcome comments and questions. They...Quality Individual or Team Award • Naval Air Depot Cherry Point Environmental Manage- ment System Team (Edward Childs, Wesley Lamb , James Byrd, Billy...program, congratulated the winners in a naval message saying, “I am proud that you are working hard to achieve superior environmental stew - ardship while

  15. MORPHOLOGICAL STRATEGIES IN TEXT MESSAGING AMONG ...

    African Journals Online (AJOL)

    Text messaging is the application of abridged morphological forms in order ... the emergence of the Global System for Mobile Communication (GSM) in the world. ... Our thesis statement is that these morphological patterns as used in SMS are ...

  16. Results from a national survey of Crown prosecutors and defense counsel on impaired driving in Canada: a "System Improvements" perspective.

    Science.gov (United States)

    Robertson, Robyn; Vanlaar, Ward; Simpson, Herb; Boase, Paul

    2009-01-01

    This article summarizes the main findings from a study designed to examine the legal process in Canada as it applies to alcohol-impaired driving from the point of view of Crown prosecutors and defense counsel, and to identify evidentiary or procedural factors that may impact the legal process, the rights of the accused, and interactions of all parts in the legal process. The data in this study were collected by means of a survey that was mailed out to the population of Crown prosecutors and defense counsel in Canada. In total, 765 prosecutors and 270 defense lawyers or an estimated 33% of all Canadian prosecutors and 15% of defense lawyers completed and returned the questionnaire. The "systems improvement" paradigm was used to interpret the findings and draw conclusions. Such an approach acknowledges the importance of the context in which countermeasures are implemented and delivered and the structures or entities used to deliver countermeasures to a designated target group. Results on type of charges and breath alcohol concentration, caseload, case outcomes, case preparation time, conviction rate at trial and overall conviction rate, reasons for acquittals and time to resolve cases are described. The findings from this national survey suggest that there are important challenges within the criminal justice system that impede the effective and efficient processing of impaired driving cases. Some of these challenges occur as a function of practices and policies, while others occur as a function of legislation. This study illustrates that a "system improvements" approach that acknowledges the importance of all elements of the criminal justice system and the interaction between those elements, can be beneficial in overcoming the alcohol-impaired driving problem.

  17. Engineered cell-cell communication via DNA messaging

    Directory of Open Access Journals (Sweden)

    Ortiz Monica E

    2012-09-01

    Full Text Available Abstract Background Evolution has selected for organisms that benefit from genetically encoded cell-cell communication. Engineers have begun to repurpose elements of natural communication systems to realize programmed pattern formation and coordinate other population-level behaviors. However, existing engineered systems rely on system-specific small molecules to send molecular messages among cells. Thus, the information transmission capacity of current engineered biological communication systems is physically limited by specific biomolecules that are capable of sending only a single message, typically “regulate transcription.” Results We have engineered a cell-cell communication platform using bacteriophage M13 gene products to autonomously package and deliver heterologous DNA messages of varying lengths and encoded functions. We demonstrate the decoupling of messages from a common communication channel via the autonomous transmission of various arbitrary genetic messages. Further, we increase the range of engineered DNA messaging across semisolid media by linking message transmission or receipt to active cellular chemotaxis. Conclusions We demonstrate decoupling of a communication channel from message transmission within engineered biological systems via the autonomous targeted transduction of user-specified heterologous DNA messages. We also demonstrate that bacteriophage M13 particle production and message transduction occurs among chemotactic bacteria. We use chemotaxis to improve the range of DNA messaging, increasing both transmission distance and communication bit rates relative to existing small molecule-based communication systems. We postulate that integration of different engineered cell-cell communication platforms will allow for more complex spatial programming of dynamic cellular consortia.

  18. Alpha-tocopherol alters endogenous oxidative defense system in mungbean plants under water-deficit condition

    International Nuclear Information System (INIS)

    Sadiq, M.; Akram, N.A.; Javed, M.T.

    2016-01-01

    Foliar spray of plant growth regulating compounds including antioxidants is an effective strategy to overcome the adverse effects of environmental constraints on different plants. A pot experiment was conducted to assess the influence of exogenously applied alpha-tocopherol (Toc) in up-regulating the oxidative defense system in two mungbean cultivars (Cyclone 7008 and Cyclone 8009) grown under normal and water deficit conditions. After 30-day of water deficit treatment, four levels of Toc (0 (non spray), 100, 200 and 300 mg L-1) were applied as a foliage application (at vegetative growth stage). A significant reduction was observed in plant height and total soluble proteins, while an increase was observed in the levels of hydrogen peroxide (H/sub 2/O/sub 2/), ascorbic acid, total phenolics, malondialdehyde (MDA), total free amino acids and the activities of enzymatic (SOD, POD and CAT) antioxidants in both mungbean cultivars under drought conditions. Foliar spray of Toc was effective in improving plant height, AsA, total soluble proteins, total free amino acids, and activities of POD and CAT enzymes, but reduced MDA under water stress conditions. However, no prominent change was observed on the concentrations of H/sub 2/O/sub 2/, phenolics, and SOD enzyme due to foliar-applied Toc in both mungbean cultivars under both water regimes. Both mungbean cultivars were almost similar in all attributes measured except that cv. Cyclone 7008 was higher in the levels of H/sub 2/O/sub 2/ and TSP while cv. Cyclone 8009 in phenolics. So, from the results of this study we can suggest that exogenous application of Toc is effective in improving growth and antioxidative potential of mungbean plants under dry arid environment. (author)

  19. IEEE Computer Society/Software Engineering Institute Watts S. Humphrey Software Process Achievement Award 2016: Raytheon Integrated Defense Systems Design for Six Sigma Team

    Science.gov (United States)

    2017-04-01

    worldwide • $23 billion in sales for 2015 Raytheon Integrated Defense Systems (IDS) is one of five businesses within Raytheon Company and is headquartered...Raytheon Integrated Defense Systems DFSS team has developed and implemented numerous leading-edge improvement and optimization methodologies resulting in...our software systems . In this section, we explain the first methodology, the application of statistical test optimization (STO) using Design of

  20. Compact, readily deployable reactor systems for secure power for civilian and defense applications

    International Nuclear Information System (INIS)

    Powell, J.R.; Farrell, J.P.

    2008-01-01

    The U.S. electricity system is a very complex, highly interdependent network of large power plants and long transmission lines that requires constant and precise control. Disruption can rapidly propagate through the infrastructure, causing major portions to fail, as seen in the past. Such events have been triggered by natural causes. Global terrorism raises the possibility of deliberate physical attacks on the system against power plants, transmission lines, sub-stations, etc. - or cyber attacks against computers and controls to shut it down for long periods. Domestic military bases that depend on the civilian electric grid cannot function if it goes down for extended times. Natural disasters like hurricanes Katrina and Rita have shown the need for secure emergency power. If nuclear, biological, or chemical attacks on cities were to occur, panic and evacuations would shut down much of the U.S. electric system for many months. A new reactor system, DEER (Deployable Electric Energy Reactor) can provide secure emergency power for civilian and defense needs. The DEER system is compact and quickly deployable using existing types of transport vehicles. The DEER reactors have integral gamma shields, and can be transported from their deployment site after shutdown, with very low and acceptable radiation doses to handling and transport personnel. Two DEER system concepts are described with detailed neutronic and thermal hydraulic analyses of 10 and 50 MW(e) designs for each concept. The baseline DEER-1 system uses commercial TRIGA fuel, with water coolant at standard PWR conditions. The sealed DEER-1 reactor operates for several years without refueling. After shutdown, it is removed to appropriate site for refueling or disposal. If needed, a new DEER-1 reactor can be installed at the location. The advanced DEER-2 system uses existing TRISO fuel particles in porous fuel elements with direct water cooling of the particles. After shutdown, the spent TRISO fuel particles are

  1. Instant Messaging by SIP

    Science.gov (United States)

    Muhi, Daniel; Dulai, Tibor; Jaskó, Szilárd

    2008-11-01

    SIP is a general-purpose application layer protocol which is able to establish sessions between two or more parties. These sessions are mainly telephone calls and multimedia conferences. However it can be used for other purposes like instant messaging and presence service. SIP has a very important role in mobile communication as more and more communicating applications are going mobile. In this paper we would like to show how SIP can be used for instant messaging purposes.

  2. A Game Theoretic Model for the Optimal Disposition of Integrated Air Defense System Assets

    Science.gov (United States)

    2015-03-26

    fellows of Miami Valley Philosophical and Lifting Society v Acknowledgements I want to thank LTC Brian J. Lunday and Lt Col Matthew J. Robbins for...on the defender’s valuation of tar- gets. However, if we assume that Hamas, the attacker, knows the layout of Israel’s defense, they may attack

  3. 75 FR 32122 - Revisions to Defense Priorities and Allocations System Regulations

    Science.gov (United States)

    2010-06-07

    ... INFORMATION CONTACT: John Isbell, Director (Acting), Defense Programs Division, Office of Strategic Industries.... 700.15 would reflect the time period in which the Office of Strategic Industries and Economic Security... allocation action; (c) The written signature on a manually placed order, or the digital signature or name on...

  4. Thiamine primed defense provides reliable alternative to systemic fungicide carbendazim against sheath blight disease in rice (Oryza sativa L.).

    Science.gov (United States)

    Bahuguna, Rajeev Nayan; Joshi, Rohit; Shukla, Alok; Pandey, Mayank; Kumar, J

    2012-08-01

    A novel pathogen defense strategy by thiamine priming was evaluated for its efficacy against sheath blight pathogen, Rhizoctonia solani AG-1A, of rice and compared with that of systemic fungicide, carbendazim (BCM). Seeds of semidwarf, high yielding, basmati rice variety Vasumati were treated with thiamine (50 mM) and BCM (4 mM). The pot cultured plants were challenge inoculated with R. solani after 40 days of sowing and effect of thiamine and BCM on rice growth and yield traits was examined. Higher hydrogen peroxide content, total phenolics accumulation, phenylalanine ammonia lyase (PAL) activity and superoxide dismutase (SOD) activity under thiamine treatment displayed elevated level of systemic resistance, which was further augmented under challenging pathogen infection. High transcript level of phenylalanine ammonia lyase (PAL) and manganese superoxide dismutase (MnSOD) validated mode of thiamine primed defense. Though minimum disease severity was observed under BCM treatment, thiamine produced comparable results, with 18.12 per cent lower efficacy. Along with fortifying defense components and minor influence on photosynthetic pigments and nitrate reductase (NR) activity, thiamine treatment significantly reduced pathogen-induced loss in photosynthesis, stomatal conductance, chlorophyll fluorescence, NR activity and NR transcript level. Physiological traits affected under pathogen infection were found signatory for characterizing plant's response under disease and were detectable at early stage of infection. These findings provide a novel paradigm for developing alternative, environmentally safe strategies to control plant diseases. Copyright © 2012 Elsevier Masson SAS. All rights reserved.

  5. Metallothionein-mediated antioxidant defense system and its response to exercise training are impaired in human type 2 diabetes

    DEFF Research Database (Denmark)

    Scheede-Bergdahl, Celena; Penkowa, Milena; Hidalgo, Juan

    2005-01-01

    lower levels of MT-I+II were also detected in the plasma of type 2 diabetic subjects compared with control subjects. These results suggest that, in control subjects, the MT-I+II defense system is active and inducible within skeletal muscle tissue and plasma. In type 2 diabetes, reduced levels of MT......Oxidative stress is implicated in diabetes complications, during which endogenous antioxidant defenses have important pathophysiological consequences. To date, the significance of endogenous antioxidants such as metallothioneins I and II (MT-I+II) in type 2 diabetes remains unclear. To examine....... Immunohistochemical analysis revealed reduced MT-I+II levels in the skeletal muscle of type 2 diabetic subjects compared with control subjects. Control subjects produced a robust increase of MT-I+II in response to training; however, in type 2 diabetes, MT-I+II levels remained essentially unchanged. Significantly...

  6. Acquisition Planning at the Defense Communications Agency.

    Science.gov (United States)

    1984-04-01

    guidelines for interaction are developed under the leadership of DCA agencywide integrators with the participation of personnel from DCA, the Services...Communications System DCSO - Defense Communications System Organizatin . DDN - Defense Data Network DEC - Decision Making DG - Defense Guidance DIA - Defense

  7. Asynchronous Message Service Reference Implementation

    Science.gov (United States)

    Burleigh, Scott C.

    2011-01-01

    This software provides a library of middleware functions with a simple application programming interface, enabling implementation of distributed applications in conformance with the CCSDS AMS (Consultative Committee for Space Data Systems Asynchronous Message Service) specification. The AMS service, and its protocols, implement an architectural concept under which the modules of mission systems may be designed as if they were to operate in isolation, each one producing and consuming mission information without explicit awareness of which other modules are currently operating. Communication relationships among such modules are self-configuring; this tends to minimize complexity in the development and operations of modular data systems. A system built on this model is a society of generally autonomous, inter-operating modules that may fluctuate freely over time in response to changing mission objectives, modules functional upgrades, and recovery from individual module failure. The purpose of AMS, then, is to reduce mission cost and risk by providing standard, reusable infrastructure for the exchange of information among data system modules in a manner that is simple to use, highly automated, flexible, robust, scalable, and efficient. The implementation is designed to spawn multiple threads of AMS functionality under the control of an AMS application program. These threads enable all members of an AMS-based, distributed application to discover one another in real time, subscribe to messages on specific topics, and to publish messages on specific topics. The query/reply (client/server) communication model is also supported. Message exchange is optionally subject to encryption (to support confidentiality) and authorization. Fault tolerance measures in the discovery protocol minimize the likelihood of overall application failure due to any single operational error anywhere in the system. The multi-threaded design simplifies processing while enabling application nodes to

  8. Ballistic Missile Defense

    OpenAIRE

    Mayer, Michael

    2011-01-01

    At the 2010 NATO summit in Lisbon, the alliance decided to move forward on the development of a territorial ballistic missile defense (BMD) system and explore avenues for cooperation with Russia in this endeavor. Substantial progress on BMD has been made over the past decade, but some questions remain regarding the ultimate strategic utility of such a system and whether its benefi ts outweigh the possible opportunity costs. Missile defense has been a point of contention between the US and its...

  9. Comparing Information Assurance Awareness Training for End-Users: A Content Analysis Examination of Air Force and Defense Information Systems Agency User Training Modules

    National Research Council Canada - National Science Library

    Fruge, John W

    2008-01-01

    Today, the threats to information security and assurance are great. While there are many avenues for IT professionals to safeguard against these threats, many times these defenses prove useless against typical system users...

  10. Review of the all Source Analysis System as a Part of the Audit of the Effectiveness of the Defense Acquisition Board Review Process-FY 1993.

    Science.gov (United States)

    1993-04-20

    OFFICE OF THE INSPECTOR GENERAL REVIEW OF THE ALL SOURCE ANALYSIS SYSTEM AS A PART OF THE AUDIT OF THE EFFECTIVENESS OF THE DEFENSE...System as a Part of the Audit of the Effectiveness of the Defense Acquisition Board Review Process--FY 1993 (Report No. 93-087) We are providing...appreciate the courtesies extended to the audit staff. If you have questions on this report, please contact Program Director Russell A. Rau at (703) 693

  11. The message is the message-maker.

    Science.gov (United States)

    Chalkley, A B

    1977-03-01

    For those engaged in family planning or other demographic work of an active kind, serious errors can be made and much money and skill wasted unless there is a clear idea of available means of communication. Literacy and media-diffusion figures offer vague parameters, especially in Asia, and the role of spoken communication -- considered key in "illiterate" societies -- is even more difficult to assess. For mass media, the starting point is "diffusion rates" representing numbers of TV sets owned or newspapers sold per 1000 population and so on -- measures of quantity. This article surveys the population growth rates, urban-rural distribution, educational levels, literacy rates, numbers of newspapers bought, radios and TVs owned (per 1000 population) for 12 Asian countries, and discusses their meaning in terms of media use. Chief among the points made are that print media still have an enormous role to play in the developing countries -- newspaper diffusion rates are quite high, even in countries with low urban population (especially India). The quality of electronic media (too often considered the natural "wave of the future" everywhere) varies but is generally not high. Where they are fully developed their role is vital -- but it might be noted that it is the message makers themselves who are most vital. Choosing the right medium and the proper message for it is essential.

  12. The Defense Civilian Intelligence Personnel System: An Independent Assessment of Design, Implementation, and Impact

    Science.gov (United States)

    2010-06-01

    terrorist attacks: …[T]he necessity of defense against a terrorist attack is urgent… I am a real radical on personnel systems…[ Y ]ou need to have...recruiting among the “ millennial ” generation of workers who are more accustomed to instant feedback and recognition and would not be content with a...political affiliation, race, color, religion , national origin, sex, marital status, age, or handicap condition, and with proper regard for their

  13. PRINCIPLES OF THE SYSTEM OF "CUSTOMIZABLE” DEFENSE ON THE FULL BASKETBALL COURT

    OpenAIRE

    Pavle Rubin

    2010-01-01

    The problem of this work stems from the fact that the tactics (not just applications, but also to create the principles of basketball games and variants) belongs to the domain experts of this sport (coaches, theorists, etc.). Every devising, selecting and applying specific tactics should satisfy two main objectives, to: be the greater surprise and provide adequate "response" to the opponent's tactics. The possibility of surprising opponent is primarily associated with the phase of defense, ti...

  14. Department of Defense perspective

    International Nuclear Information System (INIS)

    Devine, R.

    1985-01-01

    This paper examines radiation instrumentation from the Department of Defense perspective. Radiation survey instruments and calibration, or RADIAC, as it is called in the services, while administratively falling under the Assistant Secretary of Defense for Atomic Energy, has generally been managed at a lower level. The Naval Electronics Systems Command and Army Signal Corp are the two principles in the Department of Defense for RADIAC. The actions of the services are coordinated through the tri-service RADIAC working group, which meets about every year and a half. Several points from this organization are highlighted

  15. An Examination of Adolescent Recall of Anti-Smoking Messages: Attitudes, Message Type, and Message Perceptions.

    Science.gov (United States)

    Bigsby, Elisabeth; Monahan, Jennifer L; Ewoldsen, David R

    2017-04-01

    Delayed message recall may be influenced by currently held accessible attitudes, the nature of the message, and message perceptions (perception of bias and message elaboration). This study examined the potential of message perceptions to mediate the influence of valenced attitude accessibility and message type on unaided recall of anti-smoking Public Service Announcements (PSAs). In a field experiment, ninth grade students (N = 244) watched three PSAs and responded to items on laptop computers. Twelve weeks later, follow-up telephone surveys were conducted to assess unaided recall. Both valenced attitude accessibility and message type were associated with message perceptions. However, only perception of message bias partially mediated the relationship between message type and unaided recall.

  16. Crafting a Real-Time Information Aggregator for Mobile Messaging

    Directory of Open Access Journals (Sweden)

    Jenq-Shiou Leu

    2010-01-01

    Full Text Available Mobile messaging is evolving beyond SMS (Short Message Service text messaging with the introduction of MMS (Multimedia Messaging Service. In the past, such a scheme is used for peer-to-peer communication. Messages are generally displayed on a cellular phone with a limited-sized screen. However, such a visualizing process is not suitable to broadcast real-time SMS/MMS messages to people in public. To facilitate the instancy and publicity, we develop a real-time information aggregator—Visualizing SMS and MMS Messages System (VSMMS—to realize the concept by integrating SMS and MMS messaging over GSM/GPRS/UMTS onto a remote display device. The device exhibits messages on a larger display device in public. VSMMS features a revolutionized variation of mass media broadcasting. In this paper, we practically illustrate how to design and implement VSMMS and use a M/M/1 model to conduct a theoretical analysis about the message delay in the system queue. Meanwhile, we make an empirical performance evaluation about the message transmission time over different networks.

  17. Popular Mobilization Messaging

    Directory of Open Access Journals (Sweden)

    James Garrison

    2017-04-01

    Full Text Available This Research Paper examines the Iraqi Popular Mobilization Unit’s (PMU messaging on the organisation’s website and social media platforms through early January 2017 to develop a more nuanced understanding of the PMU’s outlook, both present and future. After providing an overview of the PMU’s media presence online, the paper discusses how the organisation promotes its core narrative: that it is a cross-confessional and patriotic force for the defence of all Iraqis against a brutal and evil IS. The paper then addresses the PMU’s use of messaging to refute the sectarian portrayal of the organisation in some quarters before turning to the way the PMU approaches regional and international states in its media. Finally, the paper summarises the PMU’s messaging strategy and discusses how this strategy implies a less threatening future for the organisation than is often anticipated.

  18. A message to school girls.

    Science.gov (United States)

    Akinwande, A

    1993-06-01

    Information, education, and communication (IEC) programs need to be strengthened to appeal to adolescents, who are increasingly contributing to unwanted pregnancy and are using abortion as a means of birth control. Successful IEC programs have the following characteristics: 1) established communication theories that guide development of materials; 2) a multimedia and a mass media approach to information dissemination, and 3) emphasis on visual displays. The primary emphasis should be on presentation of a concise, clear message with the appropriate visual medium. Many communication specialists in developing countries, however, lack the training to design and use effective IEC software. Designing effective messages involves a process of integrating scientific ideas with artistic appeal. The aim is to stimulate the target audience to change its behavior of life style. The message must be convincing and contain practical and useful information. The IEC Software Design Cycle focuses on analysis and diagnosis, design production, pretesting and modification, and distribution and evaluation. Each of these processes are described. Necessary before any attempt is made is obtaining data on historical, sociocultural, and demographic characteristics, economic activities, health and social services, communication infrastructure, marriage and family life patterns, and decision making systems. Focus group discussions may be used to collect information about the target group. An example is given of the process of development, in a course through the Center or African Family Studies, of a poster about premarital sex directed to 11-16 year olds. On the basis of focus group discussions, it was decided that the message would be to encourage girls to talk with their mothers about family life and premarital sex. The poster was produced with 2 school girls talking in front of the school. The evaluation yielded modifications such as including a school building that resembled actual

  19. Message passing for quantified Boolean formulas

    International Nuclear Information System (INIS)

    Zhang, Pan; Ramezanpour, Abolfazl; Zecchina, Riccardo; Zdeborová, Lenka

    2012-01-01

    We introduce two types of message passing algorithms for quantified Boolean formulas (QBF). The first type is a message passing based heuristics that can prove unsatisfiability of the QBF by assigning the universal variables in such a way that the remaining formula is unsatisfiable. In the second type, we use message passing to guide branching heuristics of a Davis–Putnam–Logemann–Loveland (DPLL) complete solver. Numerical experiments show that on random QBFs our branching heuristics give robust exponential efficiency gain with respect to state-of-the-art solvers. We also manage to solve some previously unsolved benchmarks from the QBFLIB library. Apart from this, our study sheds light on using message passing in small systems and as subroutines in complete solvers

  20. CRISPR-Cas Defense System and Potential Prophages in Cyanobacteria Associated with the Coral Black Band Disease.

    Science.gov (United States)

    Buerger, Patrick; Wood-Charlson, Elisha M; Weynberg, Karen D; Willis, Bette L; van Oppen, Madeleine J H

    2016-01-01

    Understanding how pathogens maintain their virulence is critical to developing tools to mitigate disease in animal populations. We sequenced and assembled the first draft genome of Roseofilum reptotaenium AO1, the dominant cyanobacterium underlying pathogenicity of the virulent coral black band disease (BBD), and analyzed parts of the BBD-associated Geitlerinema sp. BBD_1991 genome in silico . Both cyanobacteria are equipped with an adaptive, heritable clustered regularly interspaced short palindromic repeats (CRISPR)-Cas defense system type I-D and have potential virulence genes located within several prophage regions. The defense system helps to prevent infection by viruses and mobile genetic elements via identification of short fingerprints of the intruding DNA, which are stored as templates in the bacterial genome, in so-called "CRISPRs." Analysis of CRISPR target sequences (protospacers) revealed an unusually high number of self-targeting spacers in R. reptotaenium AO1 and extraordinary long CRIPSR arrays of up to 260 spacers in Geitlerinema sp. BBD_1991. The self-targeting spacers are unlikely to be a form of autoimmunity; instead these target an incomplete lysogenic bacteriophage. Lysogenic virus induction experiments with mitomycin C and UV light did not reveal an actively replicating virus population in R. reptotaenium AO1 cultures, suggesting that phage functionality is compromised or excision could be blocked by the CRISPR-Cas system. Potential prophages were identified in three regions of R. reptotaenium AO1 and five regions of Geitlerinema sp. BBD_1991, containing putative BBD relevant virulence genes, such as an NAD-dependent epimerase/dehydratase (a homolog in terms of functionality to the third and fourth most expressed gene in BBD), lysozyme/metalloendopeptidases and other lipopolysaccharide modification genes. To date, viruses have not been considered to be a component of the BBD consortium or a contributor to the virulence of R. reptotaenium AO1

  1. SMS Messaging Applications

    CERN Document Server

    Pero, Nicola

    2009-01-01

    Cell phones are the most common communication device on the planet, and Short Message Service (SMS) is the chief channel for companies to offer services, accept requests, report news, and download binary files over cell phones. This guide describes the protocols and best practices (things that ensure you won't get sued or lose your right to offer a service) you need to know to make SMS messaging part of an organizational service. Issues such as character sets, differences among vendors, common practices in Europe and North America, and API choices are covered.

  2. Upon a Message-Oriented Trading API

    Directory of Open Access Journals (Sweden)

    Claudiu VINTE

    2010-01-01

    Full Text Available In this paper, we introduce the premises for a trading system application-programming interface (API based on a message-oriented middleware (MOM, and present the results of our research regarding the design and the implementation of a simulation-trading system employing a service-oriented architecture (SOA and messaging. Our research has been conducted with the aim of creating a simulation-trading platform, within the academic environment, that will provide both the foundation for future experiments with trading systems architectures, components, APIs, and the framework for research on trading strategies, trading algorithm design, and equity markets analysis tools. Mathematics Subject Classification: 68M14 (distributed systems.

  3. TXT@WORK: pediatric hospitalists and text messaging.

    Science.gov (United States)

    Kuhlmann, Stephanie; Ahlers-Schmidt, Carolyn R; Steinberger, Erik

    2014-07-01

    Many studies assess provider-patient communication through text messaging; however, minimal research has addressed communication among physicians. The purpose of this study was to evaluate the use of text messaging by pediatric hospitalists. A brief, anonymous, electronic survey was distributed through the American Academy of Pediatrics Section on Hospital Medicine Listserv in February 2012. Survey questions assessed work-related text messaging. Of the 106 pediatric hospitalist respondents, 97 met inclusion criteria. Most were female (73%) and had been in practice text messages, some (12%) more than 10 times per shift. More than half (53%) received work-related text messages when not at work. When asked to identify all potential work recipients, most often sent work-related text messages to other pediatric hospitalists (64%), fellows or resident physicians (37%), and subspecialists/consulting physicians (28%). When asked their preferred mode for brief communication, respondents' preferences varied. Many (46%) respondents worried privacy laws can be violated by sending/receiving text messages, and some (30%) reported having received protected health information (PHI) through text messages. However, only 11% reported their institution offered encryption software for text messaging. Physicians were using text messaging as a means of brief, work-related communication. Concerns arose regarding transfer of PHI using unsecure systems and work-life balance. Future research should examine accuracy and effectiveness of text message communication in the hospital, as well as patient privacy issues.

  4. Planetary Defense

    Science.gov (United States)

    2016-05-01

    4 Abstract Planetary defense against asteroids should be a major concern for every government in the world . Millions of asteroids and...helps make Planetary Defense viable because defending the Earth against asteroids benefits from all the above technologies. So if our planet security...information about their physical characteristics so we can employ the right strategies. It is a crucial difference if asteroids are made up of metal

  5. Game Theory for Proactive Dynamic Defense and Attack Mitigation in Cyber-Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Letchford, Joshua [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-09-01

    While there has been a great deal of security research focused on preventing attacks, there has been less work on how one should balance security and resilience investments. In this work we developed and evaluated models that captured both explicit defenses and other mitigations that reduce the impact of attacks. We examined these issues both in more broadly applicable general Stackelberg models and in more specific network and power grid settings. Finally, we compared these solutions to existing work in terms of both solution quality and computational overhead.

  6. Radioactive material defense construction using wind fan system against nuclear fallout in the aspect of nano-scopic dispersion

    International Nuclear Information System (INIS)

    Woo, Tae Ho

    2012-01-01

    Highlights: ► A realistic radiation protection system using aerodynamics is suggested. ► Manual formation procedure is constructed by this modeling. ► Chemical and natural accidents by wind fan are applicable. ► Nuclear disaster is avoided by national defense system. ► A sample case is realistically modeled. -- Abstract: Radioactive fallout defense system (RFDS) is suggested against possible nuclear accidents. A procedure consisting of several stages is considered. In particular, the dispersion of radioactive material is investigated for the case of wind fan operation where the radioactive molecules are considered as nano-scopic material. The modeling is done for one country dealing with a possible nuclear accident in another country. This study is thus applicable to regions where westerlies are prevailing. An aerodynamic fan analysis is performed. The incoming free wind stream is characterized by random sampling in Monte-Carlo simulation. The velocity of the fan is a critical aspect of the model. This model is applicable for volcanic ashes, nuclear bomb fallout, chemical material dispersion, and any other material combined with airflow. In addition, this fan could be studied, with nano-scale considerations, by a multi-scale technique.

  7. Are Instant Messages Speech?

    Science.gov (United States)

    Baron, Naomi S.

    Instant messaging (IM) is commonly viewed as a “spoken” medium, in light of its reputation for informality, non-standard spelling and punctuation, and use of lexical shortenings and emoticons. However, the actual nature of IM is an empirical issue that bears linguistic analysis.

  8. Microprocessorized message multiplexer

    International Nuclear Information System (INIS)

    Ejzman, S.; Guglielmi, L.; Jaeger, J.J.

    1980-07-01

    The 'Microprocessorized Message Multiplexer' is an elementary development tool used to create and debug the software of a target microprocessor (User Module: UM). It connects together four devices: a terminal, a cassette recorder, the target microprocessor and a host computer where macro and editor for the M 6800 microprocessor are resident [fr

  9. Grounding in Instant Messaging

    Science.gov (United States)

    Fox Tree, Jean E.; Mayer, Sarah A.; Betts, Teresa E.

    2011-01-01

    In two experiments, we investigated predictions of the "collaborative theory of language use" (Clark, 1996) as applied to instant messaging (IM). This theory describes how the presence and absence of different grounding constraints causes people to interact differently across different communicative media (Clark & Brennan, 1991). In Study 1, we…

  10. The Prodiguer Messaging Platform

    Science.gov (United States)

    Denvil, S.; Greenslade, M. A.; Carenton, N.; Levavasseur, G.; Raciazek, J.

    2015-12-01

    CONVERGENCE is a French multi-partner national project designed to gather HPC and informatics expertise to innovate in the context of running French global climate models with differing grids and at differing resolutions. Efficient and reliable execution of these models and the management and dissemination of model output are some of the complexities that CONVERGENCE aims to resolve.At any one moment in time, researchers affiliated with the Institut Pierre Simon Laplace (IPSL) climate modeling group, are running hundreds of global climate simulations. These simulations execute upon a heterogeneous set of French High Performance Computing (HPC) environments. The IPSL's simulation execution runtime libIGCM (library for IPSL Global Climate Modeling group) has recently been enhanced so as to support hitherto impossible realtime use cases such as simulation monitoring, data publication, metrics collection, simulation control, visualizations … etc. At the core of this enhancement is Prodiguer: an AMQP (Advanced Message Queue Protocol) based event driven asynchronous distributed messaging platform. libIGCM now dispatches copious amounts of information, in the form of messages, to the platform for remote processing by Prodiguer software agents at IPSL servers in Paris. Such processing takes several forms: Persisting message content to database(s); Launching rollback jobs upon simulation failure; Notifying downstream applications; Automation of visualization pipelines; We will describe and/or demonstrate the platform's: Technical implementation; Inherent ease of scalability; Inherent adaptiveness in respect to supervising simulations; Web portal receiving simulation notifications in realtime.

  11. 3. Secure Messaging

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 1. Electronic Commerce - Secure Messaging. V Rajaraman. Series Article Volume 6 Issue 1 January 2001 pp 8-17. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/01/0008-0017 ...

  12. STRATEGY AND EVALUATION OF THE OPERATION OF QUALITY MANAGEMENT SYSTEMS MEDICAL EDUCATION. THE FIRST MESSAGE. PROBLEM FORMULATION

    Directory of Open Access Journals (Sweden)

    O. P. Mintser

    2015-09-01

    Full Text Available The article is devoted to functioning of the quality management by ISO 9001 standard. The problem of inefficient and non-working systems is pointed out, the causes of their inefficiency are investigated. The phenomenon of simultaneous existence of two parallel management systems: formal quality management system and living systems of managerial decisions making is studied. To study this situation the measure of «efficiency of quality management system» is introduced; further tasks for creating indicators and mechanisms for its evaluation are defined.

  13. Erosion/corrosion concerns in feed preparation systems at the Defense Waste Processing Facility

    International Nuclear Information System (INIS)

    Gee, J.T.; Chandler, C.T.; Daugherty, W.L.; Imrich, K.J.; Jenkins, C.F.

    1997-01-01

    The Savannah River Site (SRS) has been operating a nuclear fuel cycle since the 1950's to produce nuclear materials in support of the national defense effort. The Department of Energy authorized the construction of the Defense Waste Processing Facility (DWPF) to immobilize the high level radioactive waste resulting from these processes as a durable borosilicate glass. The DWPF, after having undergone extensive testing, has been approved for operations and is currently immobilizing radioactive waste. To ensure reliability of the DWPF remote canyon processing equipment, a materials evaluation program was performed prior to radioactive operations to determine to what extent erosion/corrosion would impact design life of equipment. The program consisted of performing pre-service baseline inspections on critical equipment and follow-up inspections after completion of DWPF cold chemical demonstration runs. Non-destructive examination (NDE) techniques were used to assess erosion/corrosion as well as evaluation of corrosion coupon racks. These results were used to arrive at predicted equipment life for selected feed preparation equipment. It was concluded with the exception of the coil and agitator for the slurry mix evaporator (SME), which are exposed to erosive glass frit particles, all of the equipment should meet its design life

  14. Role of salicylic acid in induction of plant defense system in chickpea (Cicer arietinum L.).

    Science.gov (United States)

    War, Abdul Rashid; Paulraj, Michael Gabriel; War, Mohd Yousf; Ignacimuthu, Savarimuthu

    2011-11-01

    Salicylic acid (SA), a plant hormone plays an important role in induction of plant defense against a variety of biotic and abiotic stresses through morphological, physiological and biochemical mechanisms. A series of experiments were carried out to evaluate the biochemical response of the chickpea (Cicer arietinum L.) plants to a range of SA concentrations (1, 1.5, and 2 mM). Water treated plants were maintained as control. Activities of peroxidase (POD) and polyphenol oxidase (PPO) were evaluated and amounts of total phenols, hydrogen peroxide (H2O2), and proteins were calculated after 96 h of treatment. Plants responded very quickly to SA at 1.5 mM and showed higher induction of POD and PPO activities, besides the higher accumulation of phenols, H2O2 and proteins. Plants treated with SA at 2 mM showed phytotoxic symptoms. These results suggest that SA at 1.5 mM is safe to these plants and could be utilized for the induction of plant defense.

  15. 77 FR 76938 - Defense Federal Acquisition Regulation Supplement: Contracting Activity Updates (DFARS Case 2012...

    Science.gov (United States)

    2012-12-31

    ... Security Cooperation Agency, the Defense Security Service, the Defense Threat Reduction Agency, the Missile... DEPARTMENT OF DEFENSE Defense Acquisition Regulations System 48 CFR Part 202 RIN 0750-AH81 Defense...: Defense Acquisition Regulations System, Department of Defense (DoD). ACTION: Final rule. SUMMARY: DoD is...

  16. Does the Screening Status of Message Characters Affect Message Effects?

    Science.gov (United States)

    Alber, Julia M.; Glanz, Karen

    2018-01-01

    Public health messages can be used to increase awareness about colorectal cancer screenings. Free or inexpensive images for creating health messages are readily available, yet little is known about how a pictured individual's engagement in the behavior of interest affects message outcomes. Participants (N = 360), aged 50 to 75 years, completed an…

  17. PROBCON-HDW: A probability and consequence system of codes for long-term analysis of Hanford defense wastes

    International Nuclear Information System (INIS)

    Piepho, M.G.; Nguyen, T.H.

    1988-12-01

    The PROBCON-HDW (PROBability and CONsequence analysis for Hanford defense waste) computer code system calculates the long-term cumulative releases of radionuclides from the Hanford defense wastes (HDW) to the accessible environment and compares the releases to environmental release limits as defined in 40 CFR 191. PROBCON-HDW takes into account the variability of input parameter values used in models to calculate HDW release and transport in the vadose zone to the accessible environment (taken here as groundwater). A human intrusion scenario, which consists of drilling boreholes into the waste beneath the waste sites and bringing waste to the surface, is also included in PROBCON-HDW. PROBCON-HDW also includes the capability to combine the cumulative releases according to various long-term (10,000 year) scenarios into a composite risk curve or complementary cumulative distribution function (CCDF). The system structure of the PROBCON-HDW codes, the mathematical models in PROBCON-HDW, the input files, the input formats, the command files, and the graphical output results of several HDW release scenarios are described in the report. 3 refs., 7 figs., 9 tabs

  18. Application of the defense-in-depth concept to qualify computer-based instrumentation and control systems important to safety

    International Nuclear Information System (INIS)

    Seidel, F.

    1998-01-01

    In parallel to the technological development, the authorities and expert organisations are preparing the application of computer-based I and C to NPPs from the regulatory point of view. Generally the associated world-wide procedure follows steps like identification of safety issues, completion of the regulatory framework particularly regarding the licensing requirements and furthermore, recommendation of an appropriate set of qualification methods to prove that the requirements are met. The paper's intention is to show from the regulatory point of view that the choice as well as the combination of the qualification methods depend on system design features and development strategy. Similar as for the safety system design required, a defense-in-depth qualification concept is suggested to be helpful in order to prove that the computer-based system meets the licensing requirements. (author)

  19. Application of the defense-in-depth concept to qualify computer-based instrumentation and control systems important to safety

    Energy Technology Data Exchange (ETDEWEB)

    Seidel, F [Federal Office for Radiation Protection, Salzgitter (Germany)

    1998-10-01

    In parallel to the technological development, the authorities and expert organisations are preparing the application of computer-based I and C to NPPs from the regulatory point of view. Generally the associated world-wide procedure follows steps like identification of safety issues, completion of the regulatory framework particularly regarding the licensing requirements and furthermore, recommendation of an appropriate set of qualification methods to prove that the requirements are met. The paper`s intention is to show from the regulatory point of view that the choice as well as the combination of the qualification methods depend on system design features and development strategy. Similar as for the safety system design required, a defense-in-depth qualification concept is suggested to be helpful in order to prove that the computer-based system meets the licensing requirements. (author)

  20. Host-pathogen interactions between the human innate immune system and Candida albicans - Understanding and modeling defense and evasion strategies

    Directory of Open Access Journals (Sweden)

    Sybille eDühring

    2015-06-01

    Full Text Available The diploid, polymorphic yeast Candida albicans is one of the most important humanpathogenic fungi. C. albicans can grow, proliferate and coexist as a commensal on or within thehuman host for a long time. Alterations in the host environment, however, can render C. albicansvirulent. In this review, we describe the immunological cross-talk between C. albicans and thehuman innate immune system. We give an overview in form of pairs of human defense strategiesincluding immunological mechanisms as well as general stressors such as nutrient limitation,pH, fever etc. and the corresponding fungal response and evasion mechanisms. FurthermoreComputational Systems Biology approaches to model and investigate these complex interactionare highlighted with a special focus on game-theoretical methods and agent-based models. Anoutlook on interesting questions to be tackled by Systems Biology regarding entangled defenseand evasion mechanisms is given.

  1. The Puerto Rico Seismic Network Broadcast System: A user friendly GUI to broadcast earthquake messages, to generate shakemaps and to update catalogues

    Science.gov (United States)

    Velez, J.; Huerfano, V.; von Hillebrandt, C.

    2007-12-01

    The Puerto Rico Seismic Network (PRSN) has historically provided locations and magnitudes for earthquakes in the Puerto Rico and Virgin Islands (PRVI) region. PRSN is the reporting authority for the region bounded by latitudes 17.0N to 20.0N, and longitudes 63.5W to 69.0W. The main objective of the PRSN is to record, process, analyze, provide information and research local, regional and teleseismic earthquakes, providing high quality data and information to be able to respond to the needs of the emergency management, academic and research communities, and the general public. The PRSN runs Earthworm software (Johnson et al, 1995) to acquire and write waveforms to disk for permanent archival. Automatic locations and alerts are generated for events in Puerto Rico, the Intra America Seas, and the Atlantic by the EarlyBird system (Whitmore and Sokolowski, 2002), which monitors PRSN stations as well as some 40 additional stations run by networks operating in North, Central and South America and other sites in the Caribbean. PRDANIS (Puerto Rico Data Analysis and Information System) software, developed by PRSN, supports manual locations and analyst review of automatic locations of events within the PRSN area of responsibility (AOR), using all the broadband, strong-motion and short-period waveforms Rapidly available information regarding the geographic distribution of ground shaking in relation to the population and infrastructure at risk can assist emergency response communities in efficient and optimized allocation of resources following a large earthquake. The ShakeMap system developed by the USGS provides near real-time maps of instrumental ground motions and shaking intensity and has proven effective in rapid assessment of the extent of shaking and potential damage after significant earthquakes (Wald, 2004). In Northern and Southern California, the Pacific Northwest, and the states of Utah and Nevada, ShakeMaps are used for emergency planning and response, loss

  2. Degree sequence in message transfer

    Science.gov (United States)

    Yamuna, M.

    2017-11-01

    Message encryption is always an issue in current communication scenario. Methods are being devised using various domains. Graphs satisfy numerous unique properties which can be used for message transfer. In this paper, I propose a message encryption method based on degree sequence of graphs.

  3. Your Co-author Received 150 Citations: Pride, but Not Envy, Mediates the Effect of System-Generated Achievement Messages on Motivation.

    Science.gov (United States)

    Utz, Sonja; Muscanell, Nicole L

    2018-01-01

    ResearchGate, a social network site for academics, prominently displays the achievements of people one follows ("With 150 new reads, X was the most read author from their institute"). The goal of this paper was to examine the emotional and motivational effects of these system-generated messages, thereby extending prior research on envy-evoking status updates on Facebook to a professional context. We also extend the research on social comparisons and more broadly, on emotional responses elicited by social media. Specifically, social media research has largely focused on examining emotional reactions to content that is both generated by and is about others. In this research we directly examine updates generated by the system (ResearchGate) while also directly comparing reactions to updates about others' achievements with reactions to updates that are about the self-i.e., one's personal achievements which are also displayed on ResearchGate ("With 150 new reads, you were the most read author from your institute"). Particular attention was paid to the mediating role of envy and pride. The results of our quasi-experimental field study ( n = 419) showed that the achievements of others elicited envy, whereas personal achievements elicited pride. People exposed to their personal achievements (vs. the achievement of others) showed a higher motivation to work harder. This effect was mediated by pride, but not envy. The theoretical and practical implications of these findings are discussed.

  4. Your Co-author Received 150 Citations: Pride, but Not Envy, Mediates the Effect of System-Generated Achievement Messages on Motivation

    Science.gov (United States)

    Utz, Sonja; Muscanell, Nicole L.

    2018-01-01

    ResearchGate, a social network site for academics, prominently displays the achievements of people one follows (“With 150 new reads, X was the most read author from their institute”). The goal of this paper was to examine the emotional and motivational effects of these system-generated messages, thereby extending prior research on envy-evoking status updates on Facebook to a professional context. We also extend the research on social comparisons and more broadly, on emotional responses elicited by social media. Specifically, social media research has largely focused on examining emotional reactions to content that is both generated by and is about others. In this research we directly examine updates generated by the system (ResearchGate) while also directly comparing reactions to updates about others’ achievements with reactions to updates that are about the self—i.e., one’s personal achievements which are also displayed on ResearchGate (“With 150 new reads, you were the most read author from your institute”). Particular attention was paid to the mediating role of envy and pride. The results of our quasi-experimental field study (n = 419) showed that the achievements of others elicited envy, whereas personal achievements elicited pride. People exposed to their personal achievements (vs. the achievement of others) showed a higher motivation to work harder. This effect was mediated by pride, but not envy. The theoretical and practical implications of these findings are discussed. PMID:29780339

  5. Your Co-author Received 150 Citations: Pride, but Not Envy, Mediates the Effect of System-Generated Achievement Messages on Motivation

    Directory of Open Access Journals (Sweden)

    Sonja Utz

    2018-05-01

    Full Text Available ResearchGate, a social network site for academics, prominently displays the achievements of people one follows (“With 150 new reads, X was the most read author from their institute”. The goal of this paper was to examine the emotional and motivational effects of these system-generated messages, thereby extending prior research on envy-evoking status updates on Facebook to a professional context. We also extend the research on social comparisons and more broadly, on emotional responses elicited by social media. Specifically, social media research has largely focused on examining emotional reactions to content that is both generated by and is about others. In this research we directly examine updates generated by the system (ResearchGate while also directly comparing reactions to updates about others’ achievements with reactions to updates that are about the self—i.e., one’s personal achievements which are also displayed on ResearchGate (“With 150 new reads, you were the most read author from your institute”. Particular attention was paid to the mediating role of envy and pride. The results of our quasi-experimental field study (n = 419 showed that the achievements of others elicited envy, whereas personal achievements elicited pride. People exposed to their personal achievements (vs. the achievement of others showed a higher motivation to work harder. This effect was mediated by pride, but not envy. The theoretical and practical implications of these findings are discussed.

  6. Message from Fermilab Director

    CERN Multimedia

    2009-01-01

    With this issue’s message, Fermilab Director Pier Oddone opens a new series of occasional exchanges between CERN and other laboratories world-wide. As part of this exchange, CERN Director-General Rolf Heuer, wrote a message in Tuesday’s edition of Fermilab TodayPerspectivesNothing is more important for our worldwide particle physics community than successfully turning on the LHC later this year. The promise for great discoveries is huge, and many of the plans for our future depend on LHC results. Those of us planning national programmes in anticipation of data from the LHC face formidable challenges to develop future facilities that are complementary to the LHC, whatever the physics discoveries may be. At Fermilab, this has led us to move forcefully with a programme at the intensity frontier, where experiments with neutrinos and rare decays open a complementary window into nature. Our ultimate goal for a unified picture of nat...

  7. Capturing asteroids into bound orbits around the earth: Massive early return on an asteroid terminal defense system

    International Nuclear Information System (INIS)

    Hills, J.G.

    1992-01-01

    Nuclear explosives may be used to capture small asteroids (e.g., 20--50 meters in diameter) into bound orbits around the earth. The captured objects could be used for construction material for manned and unmanned activity in Earth orbit. Asteroids with small approach velocities, which are the ones most likely to have close approaches to the Earth, require the least energy for capture. They are particularly easy to capture if they pass within one Earth radius of the surface of the Earth. They could be intercepted with intercontinental missiles if the latter were retrofit with a more flexible guiding and homing capability. This asteroid capture-defense system could be implemented in a few years at low cost by using decommissioned ICMs. The economic value of even one captured asteroid is many times the initial investment. The asteroid capture system would be an essential part of the learning curve for dealing with larger asteroids that can hit the earth

  8. Defense Business Board

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Business Board Search Search Defense Business Board: Search Search Defense Business Board: Search Defense Business Board Business Excellence in Defense of the Nation Defense Business Board Home Charter Members Meetings Studies Contact Us The Defense

  9. The Information Ecology of Personal Health Record Systems: Secure Messaging as Catalyst and Its Evolving Impact on Use and Consequences

    Science.gov (United States)

    Nazi, Kim M.

    2012-01-01

    Personal Health Records (PHRs) and PHR systems have been designed as consumer-oriented tools to empower patients and improve health care. Despite significant consumer interest and anticipated benefits, adoption remains low. Understanding the consumer perspective is necessary, but insufficient by itself. Consumer PHR use also has broad implications…

  10. Synergistic effects of plant defense elicitors and Trichoderma harzianum on enhanced induction of antioxidant defense system in tomato against Fusarium wilt disease.

    Science.gov (United States)

    Zehra, Andleeb; Meena, Mukesh; Dubey, Manish Kumar; Aamir, Mohd; Upadhyay, R S

    2017-11-02

    Plant defense against their pathogens can be induced by a complex network of different inducers. The present study investigates the synergistic effect of Trichoderma harzianum, exogenous salicylic acid (SA) and methyl jasmonate (MeJA) over the response and regulation of the antioxidant defense mechanisms and lipid peroxidation in tomato plants against Fusarium wilt disease. In the present work, tomato plants were infected by Fusarium oxysporum f. sp. lycopersici 3 days after inoculated with T. harzianum and/or sprayed daily for 3 days with chemical inducers (SA and MeJA). Plants were analysed at 0, 24, 48, 72 and 96 h after inoculation with Fusarium oxysporum f. sp. lycopersici. Infection of tomato plants by pathogen led to strong reduction in the dry weight of roots and shoots with the enhanced concentration of H 2 O 2 and varying degree of lipid peroxidation. Concurrently, exogenous SA, when applied with pathogen greatly enhanced H 2 O 2 content as well as activities of antioxidant enzymes except catalase (CAT) and ascorbate peroxidase (APx). The pathogen challenged plants pretreated with T. harzianum and MeJA together exhibited less lipid peroxidation and as well as the elevated level of ascorbic acid and enhanced activities of antioxidant enzymes. All applied treatments protected tomato seedlings against Fusarium wilt disease but the percentage of protection was found higher in plants pretreated with the combination of T. harzianum and chemical inducers.

  11. Cyber security level assignment for research reactor digital instrumentation and control system architecture using concept of defense in depth

    International Nuclear Information System (INIS)

    Shin, Jin Soo; Heo, Gyun Young; Son, Han Seong; Kim, Young Ki; Park, Jaek Wan

    2012-01-01

    Due to recent aging of the analog instrumentation of many nuclear power plants (NPPs) and research reactors, the system reliability decreases while maintenance and testing costs increase. In addition, it is difficult to find the substitutable analog equipment s due to obsolescence. Therefore, the instrumentation and control (I and C) systems have changed from analog system to digital system due to these facts. With the introduction of digital systems, research reactors are forced to care for the problem of cyber attacks because I and C systems have been digitalized using networks or communication systems. Especially, it is more issued at research reactors due to the accessibility of human resources. In the real world, an IBM researcher has been successful in controlling the software by penetrating a NPPs network in U.S. on July 2008 and acquiring the control right of nuclear facilities after one week. Moreover, the malignant code called 'stuxnet' impaired the nearly 1,000 centrifugal separators in Iran according to an IAEA report. The problem of cyber attacks highlights the important of cyber security, which should be emphasized. Defense.in.depth (DID) is a significant concept for the cyber security to work properly. DID institutes and maintains a hardy program for critical digital asset (CDA) by implementing multiple security boundaries. In this work, we assign cyber security levels to a typical digital I and C system using DID concept. This work is very useful in applying the concept of DID to nuclear industry with respect to cyber security

  12. Cyber security level assignment for research reactor digital instrumentation and control system architecture using concept of defense in depth

    Energy Technology Data Exchange (ETDEWEB)

    Shin, Jin Soo; Heo, Gyun Young [Kyung Hee University, Seoul (Korea, Republic of); Son, Han Seong [Joongbu Univ., Chungnam (Korea, Republic of); Kim, Young Ki; Park, Jaek Wan [KAERI, Daejeon (Korea, Republic of)

    2012-10-15

    Due to recent aging of the analog instrumentation of many nuclear power plants (NPPs) and research reactors, the system reliability decreases while maintenance and testing costs increase. In addition, it is difficult to find the substitutable analog equipment s due to obsolescence. Therefore, the instrumentation and control (I and C) systems have changed from analog system to digital system due to these facts. With the introduction of digital systems, research reactors are forced to care for the problem of cyber attacks because I and C systems have been digitalized using networks or communication systems. Especially, it is more issued at research reactors due to the accessibility of human resources. In the real world, an IBM researcher has been successful in controlling the software by penetrating a NPPs network in U.S. on July 2008 and acquiring the control right of nuclear facilities after one week. Moreover, the malignant code called 'stuxnet' impaired the nearly 1,000 centrifugal separators in Iran according to an IAEA report. The problem of cyber attacks highlights the important of cyber security, which should be emphasized. Defense.in.depth (DID) is a significant concept for the cyber security to work properly. DID institutes and maintains a hardy program for critical digital asset (CDA) by implementing multiple security boundaries. In this work, we assign cyber security levels to a typical digital I and C system using DID concept. This work is very useful in applying the concept of DID to nuclear industry with respect to cyber security.

  13. Designing Integrated Approaches to Support People with Multimorbidity: Key Messages from Systematic Reviews, Health System Leaders and Citizens.

    Science.gov (United States)

    Wilson, Michael G; Lavis, John N; Gauvin, Francois-Pierre

    2016-11-01

    Living with multiple chronic conditions (multimorbidity) - and facing complex, uncoordinated and fragmented care - is part of the daily life of a growing number of Canadians. We undertook: a knowledge synthesis; a "gap analysis" of existing systematic reviews; an issue brief that synthesized the available evidence about the problem, three options for addressing it and implementation considerations; a stakeholder dialogue involving key health-system leaders; and a citizen panel. We identified several recommendations for actions that can be taken, including: developing evidence-based guidance that providers can use to help achieve goals set by patients; embracing approaches to supporting self-management; supporting greater communication and collaboration across healthcare providers as well as between healthcare providers and patients; and investing more efforts in health promotion and disease prevention. Our results point to the need for health system decision-makers to support bottom-up, person-centred approaches to developing models of care that are tailored for people with multimorbidity and support a research agenda to address the identified priorities. Copyright © 2016 Longwoods Publishing.

  14. Overview of the molecular defense systems used by sea urchin embryos to cope with UV radiation.

    Science.gov (United States)

    Bonaventura, Rosa; Matranga, Valeria

    2017-07-01

    The sea urchin embryo is a well-recognized developmental biology model and its use in toxicological studies has been widely appreciated. Many studies have focused on the evaluation of the effects of chemical stressors and their mixture in marine ecosystems using sea urchin embryos. These are well equipped with defense genes used to cope with chemical stressors. Recently, ultraviolet radiation (UVR), particularly UVB (280-315 nm), received more attention as a physical stressor. Mainly in the Polar Regions, but also at temperate latitudes, the penetration of UVB into the oceans increases as a consequence of the reduction of the Earth's ozone layer. In general, UVR induces oxidative stress in marine organisms affecting molecular targets such as DNA, proteins, and lipids. Depending on the UVR dose, developing sea urchin embryos show morphological perturbations affecting mainly the skeleton formation and patterning. Nevertheless, embryos are able to protect themselves against excessive UVR, using mechanisms acting at different levels: transcriptional, translational and post-translational. In this review, we recommend the sea urchin embryo as a suitable model for testing physical stressors such as UVR and summarize the mechanisms adopted to deal with UVR. Moreover, we review UV-induced apoptotic events and the combined effects of UVR and other stressors. Copyright © 2016 Elsevier Ltd. All rights reserved.

  15. Noise Parameters of CW Radar Sensors Used in Active Defense Systems

    Directory of Open Access Journals (Sweden)

    V. Jenik

    2012-06-01

    Full Text Available Active defense represents an innovative way of protecting military vehicles. It is based on the employment of a set of radar sensors which detect an approaching threat missile and activate a suitable counter-measure. Since the radar sensors are supposed to detect flying missiles very fast and, at the same time, distinguish them from stationary or slow-moving objects, CW Doppler radar sensors can be employed with a benefit. The submitted article deals with a complex noise analysis of this type of sensors. The analysis considers the noise of linear and quasi-linear RF components, phase-noise of the local oscillator as well as the noise of low-frequency circuits. Since the incidence of the phase-noise depends strongly upon the time delay between the reference and the cross-talked signals, a new method of measuring noise parameters utilizing a reflecting wall has been developed and verified. The achieved results confirm potentially high influence of the phase-noise on the noise parameters of the mentioned type of radar sensors. Obtained results can be used for the analysis of noise parameters of the similar but even more complex sensors.

  16. A highly specific phage defense system is a conserved feature of the Vibrio cholerae mobilome.

    Directory of Open Access Journals (Sweden)

    Brendan J O'Hara

    2017-06-01

    Full Text Available Vibrio cholerae-specific bacteriophages are common features of the microbial community during cholera infection in humans. Phages impose strong selective pressure that favors the expansion of phage-resistant strains over their vulnerable counterparts. The mechanisms allowing virulent V. cholerae strains to defend against the ubiquitous threat of predatory phages have not been established. Here, we show that V. cholerae PLEs (phage-inducible chromosomal island-like elements are widespread genomic islands dedicated to phage defense. Analysis of V. cholerae isolates spanning a 60-year collection period identified five unique PLEs. Remarkably, we found that all PLEs (regardless of geographic or temporal origin respond to infection by a myovirus called ICP1, the most prominent V. cholerae phage found in cholera patient stool samples from Bangladesh. We found that PLE activity reduces phage genome replication and accelerates cell lysis following ICP1 infection, killing infected host cells and preventing the production of progeny phage. PLEs are mobilized by ICP1 infection and can spread to neighboring cells such that protection from phage predation can be horizontally acquired. Our results reveal that PLEs are a persistent feature of the V. cholerae mobilome that are adapted to providing protection from a single predatory phage and advance our understanding of how phages influence pathogen evolution.

  17. A highly specific phage defense system is a conserved feature of the Vibrio cholerae mobilome.

    Science.gov (United States)

    O'Hara, Brendan J; Barth, Zachary K; McKitterick, Amelia C; Seed, Kimberley D

    2017-06-01

    Vibrio cholerae-specific bacteriophages are common features of the microbial community during cholera infection in humans. Phages impose strong selective pressure that favors the expansion of phage-resistant strains over their vulnerable counterparts. The mechanisms allowing virulent V. cholerae strains to defend against the ubiquitous threat of predatory phages have not been established. Here, we show that V. cholerae PLEs (phage-inducible chromosomal island-like elements) are widespread genomic islands dedicated to phage defense. Analysis of V. cholerae isolates spanning a 60-year collection period identified five unique PLEs. Remarkably, we found that all PLEs (regardless of geographic or temporal origin) respond to infection by a myovirus called ICP1, the most prominent V. cholerae phage found in cholera patient stool samples from Bangladesh. We found that PLE activity reduces phage genome replication and accelerates cell lysis following ICP1 infection, killing infected host cells and preventing the production of progeny phage. PLEs are mobilized by ICP1 infection and can spread to neighboring cells such that protection from phage predation can be horizontally acquired. Our results reveal that PLEs are a persistent feature of the V. cholerae mobilome that are adapted to providing protection from a single predatory phage and advance our understanding of how phages influence pathogen evolution.

  18. An Investigation into Patient Non-Attendance and Use of a Short-Message Reminder System at a University Dental Clinic.

    Science.gov (United States)

    Storrs, Mark J; Ramov, Helen M; Lalloo, Ratilal

    2016-01-01

    Non-attended appointments in health care facilities create inefficiencies and loss of clinical productivity: clinical teaching hours are reduced, impacting students' ability to meet the competencies necessary for professional registration. The aim of this study was to assess demographic and time-related factors for patient non-attendance at a dental school clinic in Australia. Appointment data were extracted from the patient management system for the years 2011 and 2012. Data included the status of appointment (attended, cancelled, or failed to attend [FTA]) and an array of demographic and time-related factors. Multinomial logistic regression was conducted to assess relationships between these factors and appointment status. Attendance rates were also compared by year following implementation of a short message service (SMS) reminder at the beginning of 2012. The results showed that, of 58,622 appointments booked with students during 2011 and 2012, 68% of patients attended, 23% cancelled, and 9% were FTA. The percentage of non-attended (cancelled or FTA) appointments differed by demographic and time-related factors. Females were 7% less likely to be FTA, those aged 16-24 years were five times more likely to be FTA, and early morning appointments were 18% less likely to be cancelled and FTA. With the SMS reminder system, the odds of a cancellation were 15% higher, but FTAs were 14% lower (both were statistically significant differences). This study found that failing to attend an appointment was significantly related to a number of factors. Clinical scheduling and reminder systems may need to take these factors into account to decrease the number of teaching hours lost due to patients' missing their appointments.

  19. FY 1997 Financial Reporting by The Defense Automated Printing Service

    National Research Council Canada - National Science Library

    1998-01-01

    .... The accuracy of information in the financial systems and reported on financial statements is the joint responsibility of the Defense Automated Printing Service and the Defense Logistics Agency...

  20. Involvement of an antioxidant defense system in the adaptive response to cadmium in maize seedlings (Zea mays L.).

    Science.gov (United States)

    Xu, Xianghua; Liu, Cuiying; Zhao, Xiaoyan; Li, Renying; Deng, Wenjing

    2014-11-01

    Chemical and biological analyses were used to investigate the growth response and antioxidant defense mechanism of maize seedlings (Zea mays L.) grown in soils with 0-100 mg kg(-1) Cd. Results showed that maize seedlings have strong abilities to accumulate and tolerate high concentrations of Cd. For soil with 50 mg kg(-1) Cd, the Cd contents in roots and shoots of maize seedlings are as large as 295.6 and 153.0 mg kg(-1) DW, respectively, without visible symptoms of toxicity. Lower soil Cd concentrations lead to a decrease in reduced glutathione (GSH) content in leaves of maize seedlings, whereas higher soil Cd concentrations resulted in an increase in the activities of superoxide dismutase, guaiacol peroxidase, catalase, and ascorbate peroxidase. Maize seedlings have strong capacities to adapt to low concentrations of Cd by consuming GSH and to develop an antioxidative enzyme system to defend against high-Cd stress.

  1. ROMANIA’S PARTICIPATION TO THE AEGIS BALLISTIC MISSILE DEFENSE SYSTEM AS REFLECTED BY ROMANIAN NEWSPAPERS’ EVALUATIVE DISCOURSE

    Directory of Open Access Journals (Sweden)

    Raluca Mihaela LEVONIAN

    2012-01-01

    Full Text Available This study aims to investigate Romanian media discourse on the current standing of the relations between Romania and the United States of America in the military fi eld. The main topic investigated is connected to Romania’s decision to host the land-based component of the Balllistic Missile Defense System on its ground, an event which attracted signifi cant media coverage during the year 2011. The corpus analyzed consisted of 37 news and opinion items and reports published on the site of three Romanian newspapers. The main research questions were to assess whether the evaluations of this event were positive or negative, who were the actors issuing these statements and what objects were discussed in association to this event. The results showed that positive evaluations were more common than negative evaluations and that the offi cial stances on this topic formed a very coherent perspective, endorsing the project.

  2. A System Engineering Approach to the Design of the Air Defense Artillery Simulation (ADASIM) Architecture

    National Research Council Canada - National Science Library

    Kwinn, Michael J., Jr; Henderson, Steven J; Wolter, Jason

    2005-01-01

    ... making significant investments in time or money. likewise, M AND S drastically improves our ability to conduct integration testing of new and existing systems in large-scale system of systems (SOS...

  3. A Holistic Approach to Manufacturing System Design in the Defense Aerospace Industry

    National Research Council Canada - National Science Library

    Vaughn, Amanda

    2002-01-01

    .... Also, manufacturing systems are complex systems that need to be carefully designed in a holistic manner and there are shortcomings with available tools and methods to assist in the design of these systems...

  4. AMS: Area Message Service for SLC

    International Nuclear Information System (INIS)

    Crane, M.; Mackenzie, R.; Millsom, D.; Zelazny, M.

    1993-01-01

    The Area Message Service (AMS) is a TCP/IP based messaging service currently in use at SLAC. A number of projects under development here at SLAC require an application level interface to the 4.3BSD UNIX socket level communications functions using TCP/IP over ethernet. AMS provides connection management, solicited message transfer, unsolicited message transfer, and asynchronous notification of pending messages. AMS is written completely in ANSI open-quote C close-quote and is currently portable over three hardware/operating system/network manager platforms, VAX/VMS/Multinet, PC/MS-DOS/Pathworks, VME 68K/pSOS/pNA. The basic architecture is a client-server connection where either end of the interface may be the server. This allows for connections and data flow to be initiated from either end of the interface. Included in the paper are details concerning the connection management, the handling of the multi-platform code, and the implementation process

  5. HOMA: Israel's National Missile Defense Strategy (Abridged Version)

    National Research Council Canada - National Science Library

    Lailari, Guermantes

    2002-01-01

    ... (Hebrew for Fortress Wall), Chapter 1 discusses the fundamentals of missile defense and the reason why Israel's missile defense system affects US national security interests, Chapter 2 describes Israel's missile defense...

  6. Nuclear fuel cycle modelling using MESSAGE

    International Nuclear Information System (INIS)

    Guiying Zhang; Dongsheng Niu; Guoliang Xu; Hui Zhang; Jue Li; Lei Cao; Zeqin Guo; Zhichao Wang; Yutong Qiu; Yanming Shi; Gaoliang Li

    2017-01-01

    In order to demonstrate the possibilities of application of MESSAGE tool for the modelling of a Nuclear Energy System at the national level, one of the possible open nuclear fuel cycle options based on thermal reactors has been modelled using MESSAGE. The steps of the front-end and back-end of nuclear fuel cycle and nuclear reactor operation are described. The optimal structure for Nuclear Power Development and optimal schedule for introducing various reactor technologies and fuel cycle options; infrastructure facilities, nuclear material flows and waste, investments and other costs are demonstrated. (author)

  7. Broadcasting a message in a parallel computer

    Science.gov (United States)

    Berg, Jeremy E [Rochester, MN; Faraj, Ahmad A [Rochester, MN

    2011-08-02

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer. The parallel computer includes a plurality of compute nodes connected together using a data communications network. The data communications network optimized for point to point data communications and is characterized by at least two dimensions. The compute nodes are organized into at least one operational group of compute nodes for collective parallel operations of the parallel computer. One compute node of the operational group assigned to be a logical root. Broadcasting a message in a parallel computer includes: establishing a Hamiltonian path along all of the compute nodes in at least one plane of the data communications network and in the operational group; and broadcasting, by the logical root to the remaining compute nodes, the logical root's message along the established Hamiltonian path.

  8. Message transfer in a communication network

    Indian Academy of Sciences (India)

    Examples of transport processes on networks include the traffic of informa- tion packets [1–4], transport processes on biological networks [5,6], and road traffic. ... for this system. In the case of single message transfer, we study the dependence of average travel times on the hub density, and find that travel times fall off as a.

  9. Graphical route information on variable message signs

    NARCIS (Netherlands)

    Alkim, T.P.; Mede, P.H.J. van der; Janssen, W.H.

    2002-01-01

    Reports on experiments in the Netherlands on the use of graphical route information panels (GRIP) as part of variable message systems (VMS) providing information to drivers. GRIP appear to be as safe as regular VMS. Digestion of the information presented is initially quicker for regular VMS, but

  10. Using Instant Messaging for Online Reference Service

    Science.gov (United States)

    Forster, Shirley

    2006-01-01

    Many libraries are using co-browsing chat products to provide reference services to their patrons, whilst their patrons are online and using the internet. The concept of such an online service is highly desirable, but many libraries are concerned that they will never be able to afford such a system. This may have changed: Instant Messaging (IM)…

  11. Creating buzz: the neural correlates of effective message propagation.

    Science.gov (United States)

    Falk, Emily B; Morelli, Sylvia A; Welborn, B Locke; Dambacher, Karl; Lieberman, Matthew D

    2013-07-01

    Social interaction promotes the spread of values, attitudes, and behaviors. Here, we report on neural responses to ideas that are destined to spread. We scanned message communicators using functional MRI during their initial exposure to the to-be-communicated ideas. These message communicators then had the opportunity to spread the messages and their corresponding subjective evaluations to message recipients outside the scanner. Successful ideas were associated with neural responses in the communicators' mentalizing systems and reward systems when they first heard the messages, prior to spreading them. Similarly, individuals more able to spread their own views to others produced greater mentalizing-system activity during initial encoding. Unlike prior social-influence studies that focused on the individuals being influenced, this investigation focused on the brains of influencers. Successful social influence is reliably associated with an influencer-to-be's state of mind when first encoding ideas.

  12. Knowledge-based software design for Defense-in-Depth risk monitor system and application for AP1000

    International Nuclear Information System (INIS)

    Ma Zhanguo; Yoshikawa, Hidekazu; Yang Ming; Nakagawa, Takashi

    2017-01-01

    As part of the new risk monitor system, the software for the plant Defense-in-Depth (DiD) risk monitor system was designed based on the state-transition and finite-state machine, and then the knowledge-based software was developed by object-oriented method utilizing the Unified Modeling Language (UML). Currently, there are mainly two functions in the developed plant DiD risk monitor software that are knowledge-base editor which is used to model the system in a hierarchical manner and the interaction simulator that simulates the interactions between the different actors in the model. In this paper, a model for playing its behavior is called an Actor which is modeled at the top level. The passive safety AP1000 power plant was studied and the small-break loss-of-coolant accident (SBLOCA) design basis accident transient is modeled using the plant DiD risk monitor software. Furthermore, the simulation result is shown for the interactions between the actors which are defined in the plant DiD risk monitor system as PLANT actor, OPERATOR actor, and SUPERVISOR actor. This paper shows that it is feasible to model the nuclear power plant knowledge base using the software modeling technique. The software can make the large knowledge base for the nuclear power plant with small effort. (author)

  13. Salicylic acid-mediated and RNA-silencing defense mechanisms cooperate in the restriction of systemic spread of plum pox virus in tobacco.

    Science.gov (United States)

    Alamillo, Josefa M; Saénz, Pilar; García, Juan Antonio

    2006-10-01

    Plum pox virus (PPV) is able to replicate in inoculated leaves of Nicotiana tabacum, but is defective in systemic movement in this host. However, PPV produces a systemic infection in transgenic tobacco expressing the silencing suppressor P1/HC-Pro from tobacco etch virus (TEV). In this work we show that PPV is able to move to upper non-inoculated leaves of tobacco plants expressing bacterial salicylate hydroxylase (NahG) that degrades salicylic acid (SA). Replication and accumulation of PPV is higher in the locally infected leaves of plants deficient in SA or expressing TEV P1/HC-Pro silencing suppressor. Accumulation of viral derived small RNAs was reduced in the NahG transgenic plants, suggesting that SA might act as an enhancer of the RNA-silencing antiviral defense in tobacco. Besides, expression of SA-mediated defense transcripts, such as those of pathogenesis-related (PR) proteins PR-1 and PR-2 or alternative oxidase-1, as well as that of the putative RNA-dependent RNA polymerase NtRDR1, is induced in response to PPV infection, and the expression patterns of these defense transcripts are altered in the TEV P1/HC-Pro transgenic plants. Long-distance movement of PPV is highly enhanced in NahG x P1/HC-Pro double-transgenic plants and systemic symptoms in these plants reveal that the expression of an RNA-silencing suppressor and the lack of SA produce additive but distinct effects. Our results suggest that SA might act as an enhancer of the RNA-silencing antiviral defense in tobacco, and that silencing suppressors, such as P1/HC-Pro, also alter the SA-mediated defense. Both an RNA-silencing and an SA-mediated defense mechanism could act together to limit PPV infection.

  14. The persuasive effects of framing messages on fruit and vegetable consumption according to regulatory focus theory.

    Science.gov (United States)

    Dijkstra, Arie; Rothman, Alexander; Pietersma, Suzanne

    2011-08-01

    According to Regulatory Focus theory (RFT), outcomes in persuasive messages can be framed in four different ways, as gains, non-gains, losses or non-losses. In study 1, the persuasiveness of all four frames was compared and the presence/absence effect that was expected on the basis of the feature-positive effect was verified: Statements about present outcomes (gain, loss) were more persuasive than those about absent outcomes (non-gain, non-loss). However, this study failed to support the prediction that a gain-framed message would be more persuasive than a loss-framed message when promoting a prevention behaviour. Study 2 was designed to examine the latter finding. It was hypothesised that the threat posed by the loss-framed message in study 1 was too low to elicit a defensive reaction. Therefore, in study 2, the personal relevance of the gain and the loss framed message was manipulated. Consistent with predictions, the gain-framed message was more persuasive than the loss-framed message, but only when the message was personalised to increase self-relevance. Moreover, the effect was due to a significant drop in persuasion in the loss condition, probably caused by a defensive reaction. These data shed a new light on the findings of past framing studies.

  15. Defense Acquisitions: 2009 Review of Future Combat System Is Critical to Program's Direction

    National Research Council Canada - National Science Library

    Francis, Paul L

    2008-01-01

    The Future Combat System (FCS) program which comprises 14 integrated weapon systems and an advanced information network is the centerpiece of the Army's effort to transition to a lighter, more agile, and more capable combat force...

  16. Defense Acquisitions: Analysis of Processes Used to Evaluate Active Protection Systems

    National Research Council Canada - National Science Library

    Francis, Paul; Graveline, William R; Ahearn, Marie P; Breen, Beverly; Davis, Tana; Jenkins, Letisha; Patton, Kenneth E; Swierczek, Robert

    2007-01-01

    .... In 2005, the lead systems integrator for the Army's Future Combat Systems (FCS) program sought proposals for an APS developer and design and to deliver APS prototypes on vehicles by fiscal year 2009...

  17. System Re-set: High LET Radiation or Transient Musculoskeletal Disuse Cause Lasting Changes in Oxidative Defense Pathways Within Bone

    Science.gov (United States)

    Kumar, Akhilesh; Chatterjee, A.; Alwood, Joshua S.; Dvorochkin, Natalya; Almeida, Eduardo A. C.

    2011-01-01

    Six months post-IR, there were no notable changes in skeletal expression of 84 principal genes in the p53 signaling pathway due to low dose IR (0.5Gy), HU, or both. In contrast, numerous genes relevant to oxidative stress were regulated by the treatments, typically in a direction indicative of increased oxidative stress and impaired defense. IR and HU independently reduced (between 0.46 to 0.88 fold) expression levels of Noxa1, Gpx3, Prdx2, Prdx3, and Zmynd17. Surprisingly, transient HU alone (sham-irradiated) decreased expression of several redox-related genes (Gpx1,Gstk1, Prdx1, Txnrd2), which were not affected significantly by IR alone. Irradiation increased (1.13 fold) expression of a gene responsible for production of superoxides by neutrophils (NCF2). Of interest, only combined treatment with HU and IR led to increased expression levels of Ercc2, (1.19 fold), a DNA excision repair enzyme. Differences in gene expression levels may reflect a change in gene expression on a per cell basis, a shift in the repertoire of specific cell types within the tissue, or both. Serum nitrite/nitrate levels were elevated to comparable levels (1.6-fold) due to IR, HU or both, indicative of elevated systemic nitrosyl stress. CONCLUSIONS The magnitude of changes in skeletal expression of oxidative stress-related genes six months after irradiation and/or transient unloading tended to be relatively modest (0.46-1.15 fold), whereas the p53 pathway was not affected. The finding that many different oxidative stress-related genes differed from controls at this late time point implicates a generalized impairment of oxidative defense within skeletal tissue, which coincides with both profound radiation damage to osteoprogenitors/stem cells in bone marrow and impaired remodeling of mineralized tissue.

  18. System response of a DOE Defense Program package in a transportation accident environment

    International Nuclear Information System (INIS)

    Chen, T.F.; Hovingh, J.; Kimura, C.Y.

    1992-01-01

    The system response in a transportation accident environment is an element to be considered in an overall Transportation System Risk Assessment (TSRA) framework. The system response analysis uses the accident conditions and the subsequent accident progression analysis to develop the accident source term, which in turn, is used in the consequence analysis. This paper proposes a methodology for the preparation of the system response aspect of the TSRA

  19. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    Countless studies, however, have demonstrated the weakness in this system.15 The tension between easily remembered passwords and suffi...vulnerabilities Undiscovered flaws The patch model for Internet security has failed spectacularly. Caida , 2004 Signature-Based Defense Anti virus, intrusion

  20. Short Message System (SMS) revisited

    DEFF Research Database (Denmark)

    Simonsen, Eivind Ortind; Dahl, Mads Ronald

    In a rapidly changing world of technology, communication and information is everywhere around us. Technology is constantly moving the frontier for what is possible and having an increasing impact on education. New inventions create new ways of effective mass communication and the expectations from...... to meet this challenge is to make use of new technological achievements in some novel way (CMS, LMS, VLE, RSS etc.). Another way is to take one step backwards, and employ an older technology that is stable and which people are familiar with. At the Faculty of Health, Aarhus University, Denmark, the latter...

  1. A Systems Biology Approach to the Coordination of Defensive and Offensive Molecular Mechanisms in the Innate and Adaptive Host-Pathogen Interaction Networks.

    Science.gov (United States)

    Wu, Chia-Chou; Chen, Bor-Sen

    2016-01-01

    Infected zebrafish coordinates defensive and offensive molecular mechanisms in response to Candida albicans infections, and invasive C. albicans coordinates corresponding molecular mechanisms to interact with the host. However, knowledge of the ensuing infection-activated signaling networks in both host and pathogen and their interspecific crosstalk during the innate and adaptive phases of the infection processes remains incomplete. In the present study, dynamic network modeling, protein interaction databases, and dual transcriptome data from zebrafish and C. albicans during infection were used to infer infection-activated host-pathogen dynamic interaction networks. The consideration of host-pathogen dynamic interaction systems as innate and adaptive loops and subsequent comparisons of inferred innate and adaptive networks indicated previously unrecognized crosstalk between known pathways and suggested roles of immunological memory in the coordination of host defensive and offensive molecular mechanisms to achieve specific and powerful defense against pathogens. Moreover, pathogens enhance intraspecific crosstalk and abrogate host apoptosis to accommodate enhanced host defense mechanisms during the adaptive phase. Accordingly, links between physiological phenomena and changes in the coordination of defensive and offensive molecular mechanisms highlight the importance of host-pathogen molecular interaction networks, and consequent inferences of the host-pathogen relationship could be translated into biomedical applications.

  2. GOOF: OCTOPUS error messages, ORDER, ORDERLIB, FLOE, CHAT, and LOD

    Energy Technology Data Exchange (ETDEWEB)

    Whitten, G.

    1977-07-10

    This is a compilation of the error messages returned by five parts of the Livermore timesharing system: the ORDER batch-processor, the ORDERLIB subroutine library, the FLOE operating system, the CHAT compiler, and the LOD loader.

  3. Instant messaging at the hospital: supporting articulation work?

    Science.gov (United States)

    Iversen, Tobias Buschmann; Melby, Line; Toussaint, Pieter

    2013-09-01

    Clinical work is increasingly fragmented and requires extensive articulation and coordination. Computer systems may support such work. In this study, we investigate how instant messaging functions as a tool for supporting articulation work at the hospital. This paper aims to describe the characteristics of instant messaging communication in terms of number and length of messages, distribution over time, and the number of participants included in conversations. We also aim to determine what kind of articulation work is supported by analysing message content. Analysis of one month's worth of instant messages sent through the perioperative coordination and communication system at a Danish hospital. Instant messaging was found to be used extensively for articulation work, mostly through short, simple conversational exchanges. It is used particularly often for communication concerning the patient, specifically, the coordination and logistics of patient care. Instant messaging is used by all actors involved in the perioperative domain. Articulation work and clinical work are hard to separate in a real clinical setting. Predefined messages and strict workflow design do not suffice when supporting communication in the context of collaborative clinical work. Flexibility is of vital importance, and this needs to be reflected in the design of supportive communication systems. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  4. Survey of Instant Messaging Applications Encryption Methods

    OpenAIRE

    Kabakuş, Abdullah; Kara, Resul

    2015-01-01

    Instant messaging applications has already taken the place of traditional Short Messaging Service (SMS) and Multimedia Messaging Service (MMS) due to their popularity and usage easement they provide. Users of instant messaging applications are able to send both text and audio messages, different types of attachments such as photos, videos, contact information to their contacts in real time. Because of instant messaging applications use internet instead of Short Message Service Technical Reali...

  5. Multi-modal low cost mobile indoor surveillance system on the Robust Artificial Intelligence-based Defense Electro Robot (RAIDER)

    Science.gov (United States)

    Nair, Binu M.; Diskin, Yakov; Asari, Vijayan K.

    2012-10-01

    We present an autonomous system capable of performing security check routines. The surveillance machine, the Clearpath Husky robotic platform, is equipped with three IP cameras with different orientations for the surveillance tasks of face recognition, human activity recognition, autonomous navigation and 3D reconstruction of its environment. Combining the computer vision algorithms onto a robotic machine has given birth to the Robust Artificial Intelligencebased Defense Electro-Robot (RAIDER). The end purpose of the RAIDER is to conduct a patrolling routine on a single floor of a building several times a day. As the RAIDER travels down the corridors off-line algorithms use two of the RAIDER's side mounted cameras to perform a 3D reconstruction from monocular vision technique that updates a 3D model to the most current state of the indoor environment. Using frames from the front mounted camera, positioned at the human eye level, the system performs face recognition with real time training of unknown subjects. Human activity recognition algorithm will also be implemented in which each detected person is assigned to a set of action classes picked to classify ordinary and harmful student activities in a hallway setting.The system is designed to detect changes and irregularities within an environment as well as familiarize with regular faces and actions to distinguish potentially dangerous behavior. In this paper, we present the various algorithms and their modifications which when implemented on the RAIDER serves the purpose of indoor surveillance.

  6. Strain-Related Differences on Response of Liver and Kidney Antioxidant Defense System in Two Rat Strains Following Diazinon Exposure

    Directory of Open Access Journals (Sweden)

    Maryam Salehi

    2016-02-01

    Full Text Available Background Diazinon (DZN is one of the most organophosphates that widely used in agriculture and ectoparasiticide formulations. Its extensive use as an effective pesticide was associated with the environmental deleterious effects on biological systems. Objectives The aim of this study was to investigate the potency of DZN to affect serum biochemical parameters and the antioxidant defense system in the liver and kidney of two rat strains. Materials and Methods In this experimental study, 30 female Wistar and 30 female Norway rats were randomly divided into control and DZN groups. DZN group was divided into four subgroups: 25, 50, 100 and 200 mg/kg of DZN administered groups by i.p. injection. The parameters were evaluated after 24 hours. Results At higher doses of DZN, superoxide dismutase, catalase, glutathione S-transferase and lactate dehydrogenase activities and glutathione (GSH and malondialdehyde levels in liver and kidney of Wistar rats were higher than Norway rats. At these concentrations, DZN increased some serum biochemical indices such as liver enzymes activities and levels of urea, uric acid and creatinine in Wistar rat. Conclusions DZN at higher doses alters the oxidant-antioxidant balance in liver and kidney of both rat strains and induces oxidative stress, which is associated with a depletion of GSH and increased lipid peroxidation. However, Wistar rats are found to be more sensitive to the toxicity of DZN compared to Norway rats. In addition, the effect of DZN on liver antioxidant system was more than kidney.

  7. Remotely Piloted Aerial Systems Survivability: A Defense-in-Depth Approach

    Science.gov (United States)

    2012-09-01

    The 2007 roadmap fails to account for the fact that survivability and interoperability cannot be divorced when dealing with a system of systems...School, Monterrey , CA, August 2004), http://www.nps.edu/Academics/Schools/GSEAS/Departments/SE/Documents/SE- Scholarship.doc, (accessed 13 December 2009...Statement on Systems Engineering Scholarship.” Naval Postgraduate School, Monterrey , CA, August 2004. http://www.nps.edu/Academics/Schools/GSEAS

  8. Defense-in-depth for common cause failure of nuclear power plant safety system software

    International Nuclear Information System (INIS)

    Tian Lu

    2012-01-01

    This paper briefly describes the development of digital I and C system in nuclear power plant, and analyses the viewpoints of NRC and other nuclear safety authorities on Software Common Cause Failure (SWCCF). In view of the SWCCF issue introduced by the digitized platform adopted in nuclear power plant safety system, this paper illustrated a diversified defence strategy for computer software and hardware. A diversified defence-in-depth solution is provided for digital safety system of nuclear power plant. Meanwhile, analysis on problems may be faced during application of nuclear safety license are analyzed, and direction of future nuclear safety I and C system development are put forward. (author)

  9. Randomized Trial of a Smartphone Mobile Application Compared to Text Messaging to Support Smoking Cessation

    OpenAIRE

    Buller, David B.; Borland, Ron; Bettinghaus, Erwin P.; Shane, James H.; Zimmerman, Donald E.

    2014-01-01

    Background: Text messaging has successfully supported smoking cessation. This study compares a mobile application with text messaging to support smoking cessation. Materials and Methods: Young adult smokers 18–30 years old (n=102) participated in a randomized pretest–posttest trial. Smokers received a smartphone application (REQ-Mobile) with short messages and interactive tools or a text messaging system (onQ), managed by an expert system. Self-reported usability of REQ-Mobile and qu...

  10. 75 FR 2457 - Defense Federal Acquisition Regulation Supplement; Business Systems-Definition and Administration...

    Science.gov (United States)

    2010-01-15

    ... element of an acceptable estimating system. * * * * * (c) * * * (3) The auditor conducts estimating system... as contained in 252.215-7002(d). * * * * * (f) The ACO, in consultation with the auditor, shall-- (1... findings--(1) Reporting of audit findings. The auditor shall document findings and recommendations in a...

  11. Alternative Data Storage Solution for Mobile Messaging Services

    Directory of Open Access Journals (Sweden)

    David C. C. Ong

    2007-01-01

    Full Text Available In recent years, mobile devices have become relatively more powerful with additional features which have the capability to provide multimedia streaming. Better, faster and more reliable data storage solutions in the mobile messaging platform have become more essential with these additional improvements. The existing mobile messaging infrastructure, in particular the data storage platform has become less proficient in coping with the increased demand for its services. This demand especially in the mobile messaging area (i.e. SMS – Short Messaging Service, MMS – Multimedia Messaging Service, which may well exceeded 250,000 requests per second, means that the need to evaluate competing data management systems has become not only necessary but essential. This paper presents an evaluation of SMS and MMS platforms using different database management systems – DBMS and recommends the best data management strategies for these platforms.

  12. Guidelines on the defense-in-depth and diversity planning and analysis in digital instrumentation and control systems

    Energy Technology Data Exchange (ETDEWEB)

    Cheon, Se Woo; Park, Jong Kyun; Lee, Ki Young; Kwon, Ki Choon; Lee, Jang Soo; Kim, Jang Yeol

    2000-08-01

    Digital instrumentation and control (I and C) systems are becoming an ever-increasing part in I and C systems of nuclear power plants due to such features such as versatility, flexibility, and reduced sizes. The digital technology introduces a possibility that common-cause or common-mode failures (CCF or CMF) may cause redundant safety systems to fail in such a way that there is loss of safety function. A special form of CMF analysis called 'defense-in-depth and diversity' (D-in-D and D) analysis has been developed to identify possible common-mode failure vulnerabilities and to support a specific licensing action in digital systems. There are two main stages in D-in-D and D activities: both plan and analysis. The purposes of this technical report are (i) to review background of D-in-D and D and some of important issues in digital D-in-D and D, (ii) to provide guidelines for a vendor to prepare planning and/or analysis documents on D-in-D and D, and (iii) to provide guidelines for an evaluator to review applicant's D-in-D and D planning and/or analysis documents, to ensure that the requirements of the D-in-D and D for digital I and C systems are followed. Most of guidelines suggested in this report were based on NUREG/CR-6303 which was published in 1994. The report will be helpful for a vendor to prepare and for an evaluator to review both D-in-D and D planning or analysis documents for digital I and C systems such as the KNGR project.

  13. Guidelines on the defense-in-depth and diversity planning and analysis in digital instrumentation and control systems

    International Nuclear Information System (INIS)

    Cheon, Se Woo; Park, Jong Kyun; Lee, Ki Young; Kwon, Ki Choon; Lee, Jang Soo; Kim, Jang Yeol

    2000-08-01

    Digital instrumentation and control (I and C) systems are becoming an ever-increasing part in I and C systems of nuclear power plants due to such features such as versatility, flexibility, and reduced sizes. The digital technology introduces a possibility that common-cause or common-mode failures (CCF or CMF) may cause redundant safety systems to fail in such a way that there is loss of safety function. A special form of CMF analysis called 'defense-in-depth and diversity' (D-in-D and D) analysis has been developed to identify possible common-mode failure vulnerabilities and to support a specific licensing action in digital systems. There are two main stages in D-in-D and D activities: both plan and analysis. The purposes of this technical report are i) to review background of D-in-D and D and some of important issues in digital D-in-D and D, ii) to provide guidelines for a vendor to prepare planning and/or analysis documents on D-in-D and D, and iii) to provide guidelines for an evaluator to review applicant's D-in-D and D planning and/or analysis documents, to ensure that the requirements of the D-in-D and D for digital I and C systems are followed. Most of guidelines suggested in this report were based on NUREG/CR-6303 which was published in 1994. The report will be helpful for a vendor to prepare and for an evaluator to review both D-in-D and D planning or analysis documents for digital I and C systems such as the KNGR project

  14. Defense Hotline Allegations Concerning the Biometric Identification System for Access Omnibus Contract

    National Research Council Canada - National Science Library

    2008-01-01

    .... According to the Strategic Services Sourcing (S3) performance work statement the purpose of the BISA is to provide a biometric base access control system that can operate in a hostile environment...

  15. Improving Air Force Active Network Defense Systems through an Analysis of Intrusion Detection Techniques

    National Research Council Canada - National Science Library

    Dunklee, David R

    2007-01-01

    .... The research then presents four recommendations to improve DCC operations. These include: Transition or improve the current signature-based IDS systems to include the capability to query and visualize network flows to detect malicious traffic...

  16. In immune defense: redefining the role of the immune system in chronic disease.

    Science.gov (United States)

    Rubinow, Katya B; Rubinow, David R

    2017-03-01

    The recognition of altered immune system function in many chronic disease states has proven to be a pivotal advance in biomedical research over the past decade. For many metabolic and mood disorders, this altered immune activity has been characterized as inflammation, with the attendant assumption that the immune response is aberrant. However, accumulating evidence challenges this assumption and suggests that the immune system may be mounting adaptive responses to chronic stressors. Further, the inordinate complexity of immune function renders a simplistic, binary model incapable of capturing critical mechanistic insights. In this perspective article, we propose alternative paradigms for understanding the role of the immune system in chronic disease. By invoking allostasis or systems biology rather than inflammation, we can ascribe greater functional significance to immune mediators, gain newfound appreciation of the adaptive facets of altered immune activity, and better avoid the potentially disastrous effects of translating erroneous assumptions into novel therapeutic strategies.

  17. Defense Acquisitions. Greater Synergies Possible for DOD's Intelligence, Surveillance, and Reconnaissance Systems

    National Research Council Canada - National Science Library

    2007-01-01

    ... before committing to the development and demonstration of a new system. For example, the Global Hawk program which experienced a 261 percent cost growth had significant overlap of technology maturation, design, and production...

  18. Increasing the Operational Value of Event Messages

    Science.gov (United States)

    Li, Zhenping; Savkli, Cetin; Smith, Dan

    2003-01-01

    Assessing the health of a space mission has traditionally been performed using telemetry analysis tools. Parameter values are compared to known operational limits and are plotted over various time periods. This presentation begins with the notion that there is an incredible amount of untapped information contained within the mission s event message logs. Through creative advancements in message handling tools, the event message logs can be used to better assess spacecraft and ground system status and to highlight and report on conditions not readily apparent when messages are evaluated one-at-a-time during a real-time pass. Work in this area is being funded as part of a larger NASA effort at the Goddard Space Flight Center to create component-based, middleware-based, standards-based general purpose ground system architecture referred to as GMSEC - the GSFC Mission Services Evolution Center. The new capabilities and operational concepts for event display, event data analyses and data mining are being developed by Lockheed Martin and the new subsystem has been named GREAT - the GMSEC Reusable Event Analysis Toolkit. Planned for use on existing and future missions, GREAT has the potential to increase operational efficiency in areas of problem detection and analysis, general status reporting, and real-time situational awareness.

  19. ACHIEVING MISSION ASSURANCE AGAINST A CYBER THREAT WITH THE DEFENSE ACQUISITION SYSTEM

    Science.gov (United States)

    2016-02-13

    assurance to be “ baked in” to system design. Second, FMAs and vulnerability assessments should be conducted prior to every acquisition milestone...Before this guidance, most direction seemed to be biased toward addressing network IT rather than the systems and software characteristic of weapon...vulnerability assessments, it failed to mandate three important characteristics . First, the requirement for execution of an FMA was missing. The

  20. Advanced technologies for maintenance of electrical systems and equipment at the Savannah River Site Defense Waste Processing Facility

    International Nuclear Information System (INIS)

    Husler, R.O.; Weir, T.J.

    1991-01-01

    An enhanced maintenance program is being established to characterize and monitor cables, components, and process response at the Savannah River Site, Defense Waste Processing Facility. This facility was designed and constructed to immobilize the radioactive waste currently stored in underground storage tanks and is expected to begin operation in 1993. The plant is initiating the program to baseline and monitor instrument and control (I ampersand C) and electrical equipment, remote process equipment, embedded instrument and control cables, and in-cell jumper cables used in the facility. This program is based on the electronic characterization and diagnostic (ECAD) system which was modified to include process response analysis and to meet rigid Department of Energy equipment requirements. The system consists of computer-automated, state-of-the-art electronics. The data that are gathered are stored in a computerized database for analysis, trending, and troubleshooting. It is anticipated that the data which are gathered and trended will aid in life extension for the facility

  1. Survey of the Diversity and Defense-in-Depth Technologies for Application to NPP Digital I and C Systems

    International Nuclear Information System (INIS)

    Cheon, S. W.; Kim, J. Y.; Choi, J. G.

    2011-09-01

    This report reviews the nature of common-cause failures (CCFs) of the digital I and C (instrumentation and control) systems, diversity and defense-in-depth (D3) technologies and those practices in nuclear power plants. The report presents the diversity strategies, which consist of combinations of diversity attributes and their associated criteria. The report also presents assessment of the nature of CCFs and compensating diversity attributes. The diversity usage classification scheme involves three families of strategies: (1) different technologies (Strategies A), (2) different approaches within the same technology (Strategies B), and (3) different architectures within the same technology (Strategies C). The grouping of diversity criteria combinations establishes baseline diversity usage and facilitates a systematic organization of strategic approaches for coping with CCF vulnerabilities. Effectively, these baseline sets of diversity criteria constitute appropriate CCF mitigating strategies for digital safety systems. The strategies represent guidance on acceptable diversity usage and can be applied directly to ensure that CCF vulnerabilities identified through a D3 assessment have been adequately resolved. Additionally, the report presents the framework of diversity usage tables are presented for capturing practices regarding diversity usage

  2. Response of antioxidant defense system to laser radiation apical meristem of Isatis indigotica seedlings exposed to UV-B.

    Science.gov (United States)

    Chen, Yi-Ping

    2009-07-01

    To determine the response of antioxidant defense system to laser radiation apical meristem of Isatis indigotica seedlings, Isatis indigotica seedlings were subjected to UV-B radiation (10.08 kJ m(-2)) for 8 h day(-1) for 8 days (PAR, 220 micromol m(-2) s(-1)) and then exposed to He-Ne laser radiation (633 nm; 5.23 mW mm(-2); beam diameter: 1.5 mm) for 5 min each day without ambient light radiation. Changes in free radical elimination systems were measured, the results indicate that: (1) UV-B radiation enhanced the concentration of Malondialdahyde (MDA) and decreased the activities of superoxide dismutase (SOD), catalase (CAT) and peroxidase (POD) in seedlings compared with the control. The concentration of MDA was decreased and the activities of SOD, CAT and POD were increased when seedlings were subjected to elevated UV-B damage followed by laser; (2) the concentration of UV absorbing compounds and proline were increased progressively with UV-B irradiation, laser irradiation and He-Ne laser irradiation plus UV-B irradiation compared with the control. These results suggest that laser radiation has an active function in repairing UV-B-induced lesions in seedlings.

  3. Towards a Cyber Defense Framework for SCADA Systems Based on Power Consumption Monitoring

    Energy Technology Data Exchange (ETDEWEB)

    Hernandez Jimenez, Jarilyn M [ORNL; Chen, Qian [Savannah State University; Nichols, Jeff A. {Cyber Sciences} [ORNL; Calhoun, Chelsea [Savannah State University; Sykes, Summer [Savannah State University

    2017-01-01

    Supervisory control and data acquisition (SCADA) is an industrial automation system that remotely monitor, and control critical infrastructures. SCADA systems are major targets for espionage and sabotage attackers. According to the 2015 Dell security annual threat report, the number of cyber-attacks against SCADA systems has doubled in the past year. Cyber-attacks (i.e., buffer overflow, rootkits and code injection) could cause serious financial losses and physical infrastructure damages. Moreover, some specific cyber-attacks against SCADA systems could become a threat to human life. Current commercial off-the-shelf security solutions are insufficient in protecting SCADA systems against sophisticated cyber-attacks. In 2014 a report by Mandiant stated that only 69% of organizations learned about their breaches from third entities, meaning that these companies lack of their own detection system. Furthermore, these breaches are not detected in real-time or fast enough to prevent further damages. The average time between compromise and detection (for those intrusions that were detected) was 205 days. To address this challenge, we propose an Intrusion Detection System (IDS) that detects SCADA-specific cyber-attacks by analyzing the power consumption of a SCADA device. Specifically, to validate the proposed approach, we chose to monitor in real-time the power usage of a a Programmable Logic Controller (PLC). To this end, we configured the hardware of the tetsbed by installing the required sensors to monitor and collect its power consumption. After that two SCADA-specific cyber-attacks were simulated and TracerDAQ Pro was used to collect the power consumption of the PLC under normal and anomalous scenarios. Results showed that is possible to distinguish between the regular power usage of the PLC and when the PLC was under specific cyber-attacks.

  4. In defense of a regulated system of compensation for living donation.

    Science.gov (United States)

    Matas, Arthur J; Hippen, Benjamin; Satel, Sally

    2008-08-01

    The organ shortage is the major problem in kidney transplantation today. Despite aggressive organ procurement efforts, the supply of donated kidneys, living and deceased, has not matched the growing demand; as a consequence, more and more qualified candidates are suffering on dialysis and then dying before being transplanted. Herein, we provide justification for a regulated system of compensation for donation. The main argument in favor of compensation is simple-financial incentives will increase donation, so fewer transplant candidates will suffer and die while waiting. In addition, development of a regulated system of compensation is the most effective means of crippling the core economic support for transplant tourism. Because dialysis is so much more expensive than a transplant, compensated donation could be cost-neutral to the healthcare system. Importantly, opinion polls suggest that the public would support compensation. As uncompensated kidney donation is widely accepted, persuasive arguments against compensation must explain why such a system would be morally distinguishable from uncompensated donation. We suggest that the potential advantages of a regulated system of compensation for donation far outweigh any potential disadvantages. It is time to advocate for a change in the law so that trials can be done.

  5. Individual differences in drivers' cognitive processing of road safety messages.

    Science.gov (United States)

    Kaye, Sherrie-Anne; White, Melanie J; Lewis, Ioni M

    2013-01-01

    Using Gray and McNaughton's (2000) revised reinforcement sensitivity theory (r-RST), we examined the influence of personality on processing of words presented in gain-framed and loss-framed anti-speeding messages and how the processing biases associated with personality influenced message acceptance. The r-RST predicts that the nervous system regulates personality and that behaviour is dependent upon the activation of the behavioural activation system (BAS), activated by reward cues and the fight-flight-freeze system (FFFS), activated by punishment cues. According to r-RST, individuals differ in the sensitivities of their BAS and FFFS (i.e., weak to strong), which in turn leads to stable patterns of behaviour in the presence of rewards and punishments, respectively. It was hypothesised that individual differences in personality (i.e., strength of the BAS and the FFFS) would influence the degree of both message processing (as measured by reaction time to previously viewed message words) and message acceptance (measured three ways by perceived message effectiveness, behavioural intentions, and attitudes). Specifically, it was anticipated that, individuals with a stronger BAS would process the words presented in the gain-frame messages faster than those with a weaker BAS and individuals with a stronger FFFS would process the words presented in the loss-frame messages faster than those with a weaker FFFS. Further, it was expected that greater processing (faster reaction times) would be associated with greater acceptance for that message. Driver licence holding students (N=108) were recruited to view one of four anti-speeding messages (i.e., social gain-frame, social loss-frame, physical gain-frame, and physical loss-frame). A computerised lexical decision task assessed participants' subsequent reaction times to message words, as an indicator of the extent of processing of the previously viewed message. Self-report measures assessed personality and the three message

  6. Economic analysis of the influence of milk market concentration on procurement efficiency in the defense system

    Directory of Open Access Journals (Sweden)

    Mihajlović Milan

    2016-01-01

    Full Text Available Increasing efficiency during realization of procurements in the defence system imposes the requirement to analyze the market, in order to detect all of its characteristics and to make conclusions which would benefit during planning of budgetary assets by one comprehensive process. Procuring milk and milk products represents a significant part of defence system's procurements which represents that a significant segment of the consumer standard of the Serbian Army, which implies the interest of authors to point to the significance of the concentration of the supply branch on the realization of procurements on the example of this market. The aim of this paper is to display the state and actual trends on the market of production and processing of milk, define methodological framework and point to the intensity and terms of competition and their influence on procurement criteria, especially price in the defence system of the Republic of Serbia.

  7. Department of Defense need for a micro-electromechanical systems (MEMS) reliability assessment program

    Science.gov (United States)

    Zunino, James L., III; Skelton, Donald

    2005-01-01

    As the United States (U.S.) Army transforms into a lighter, more lethal, and more agile force, the technologies that support both legacy and emerging weapon systems must decrease in size while increasing in intelligence. Micro-electromechanical systems (MEMS) are one such technology that the Army as well as entire DOD will heavily rely on in achieving these objectives. Current and future military applications of MEMS devices include safety and arming devices, guidance systems, sensors/detectors, inertial measurement units, tracking devices, radio frequency devices, wireless radio frequency identification (RFID), etc. Even though the reliance on MEMS devices has been increasing, there have been no studies performed to determine their reliability and failure mechanisms. Furthermore, no standardized test protocols exist for assessing reliability. Accordingly, the U.S. Army Corrosion Office at Picatinny, NJ has initiated the MEMS Reliability Assessment Program to address this issue.

  8. A Systems Engineering Approach in Providing Air Defense Support to Ground Combat Vehicle Maneuver Forces

    Science.gov (United States)

    2015-03-01

    Characteristics ...20 Table 2. Summary of M6 Linebacker, Pantsir S1 and Stormer Characteristics ............22 Table 3. Mapping of Operational Activities...MAD Systems Examples of tracked oblique-launched MAD systems include the M6 Linebacker (converted back to BFV M2A2 ODS since 2005), Stormer , and...Summa1y ofM6 Linebacker, Pantsir S1 and St01mer Characteristics M6 Linebacker Pantsir Sl Stormer Missile StingerRMP 9M335 Starstreak Ran2e (km) 8

  9. Defense Human Resources Activity > PERSEREC

    Science.gov (United States)

    Skip to main content (Press Enter). Toggle navigation Defense Human Resources Activity Search Search Defense Human Resources Activity: Search Search Defense Human Resources Activity: Search Defense Human Resources Activity U.S. Department of Defense Defense Human Resources Activity Overview

  10. In defense of unified health system: discourses of health professionals, municipal counselors and aldermen

    Directory of Open Access Journals (Sweden)

    Karly Garcia Delamuta

    2015-03-01

    Full Text Available The objective of this study was to evaluate the perceptions of municipal health counselors, primary care professionals and aldermen about the Unified Health System and the Brazilian Primary Care Policy. From these, we intend to analyze their involvement to improve the system and verify participation in projects that foster discussions about the challenges of this issue. The investigation took a qualitative approach, the data being collected through 28 semi-structured interviews conducted between November and December 2010 in Londrina-PR. Between the interviewed groups, it becomes apparent that health professionals have better conceptual approach of public health policies. However, all groups demonstrate misconceptions and distance for the principles and guidelines of the Unified Health System, as well as provisions of the Brazilian Primary Care Policy. The findings pointed indicate focus on disease, prioritization of medical consultations and greater value of hospital structures. Although conceptualized with misconceptions, limitations are noted at the public health services. However, the proposals to change the frame remain with distorted connotations. In these groups no practical actions or projects were found to improve the public health scenario. It is concluded the need for ownership of theoretical knowledge about policies involving health organization, by stakeholders, to change the paradigms of the traditional model to the Primary Health care become valued and understood as form of organization of the system.

  11. Inflammatory Monocytes Mediate Early and Organ-Specific Innate Defense During Systemic Candidiasis

    Science.gov (United States)

    Ngo, Lisa Y.; Kasahara, Shinji; Kumasaka, Debra K.; Knoblaugh, Sue E.; Jhingran, Anupam; Hohl, Tobias M.

    2014-01-01

    Candida albicans is a commensal fungus that can cause systemic disease in patients with breaches in mucosal integrity, indwelling catheters, and defects in phagocyte function. Although circulating human and murine monocytes bind C. albicans and promote inflammation, it remains unclear whether C-C chemokine receptor 2 (CCR2)– and Ly6C-expressing inflammatory monocytes exert a protective or a deleterious function during systemic infection. During murine systemic candidiasis, interruption of CCR2-dependent inflammatory monocyte trafficking into infected kidneys impaired fungal clearance and decreased murine survival. Depletion of CCR2-expressing cells led to uncontrolled fungal growth in the kidneys and brain and demonstrated an essential antifungal role for inflammatory monocytes and their tissue-resident derivatives in the first 48 hours postinfection. Adoptive transfer of purified inflammatory monocytes in depleted hosts reversed the defect in fungal clearance to a substantial extent, indicating a compartmentally and temporally restricted protective function that can be transferred to enhance systemic innate antifungal immunity. PMID:23922372

  12. System Maturity Indices for Decision Support in the Defense Acquisition Process

    Science.gov (United States)

    2008-04-23

    technologies, but was to be used as ontology for contracting support (Sadin, Povinelli , & Rosen, 1989), thus TRL does not address: A complete...via probabilistic solution discovery. Reliability Engineering & System Safety. In press. Sadin, S.R., Povinelli , F.P., & Rosen, R. (1989). The NASA

  13. Deceived, Disgusted, and Defensive: Motivated Processing of Anti-Tobacco Advertisements.

    Science.gov (United States)

    Leshner, Glenn; Clayton, Russell B; Bolls, Paul D; Bhandari, Manu

    2017-08-29

    A 2 × 2 experiment was conducted, where participants watched anti-tobacco messages that varied in deception (content portraying tobacco companies as dishonest) and disgust (negative graphic images) content. Psychophysiological measures, self-report, and a recognition test were used to test hypotheses generated from the motivated cognition framework. The results of this study indicate that messages containing both deception and disgust push viewers into a cascade of defensive responses reflected by increased self-reported unpleasantness, reduced resources allocated to encoding, worsened recognition memory, and dampened emotional responses compared to messages depicting one attribute or neither. Findings from this study demonstrate the value of applying a motivated cognition theoretical framework in research on responses to emotional content in health messages and support previous research on defensive processing and message design of anti-tobacco messages.

  14. Dissertation Defense Computational Fluid Dynamics Uncertainty Analysis for Payload Fairing Spacecraft Environmental Control Systems

    Science.gov (United States)

    Groves, Curtis Edward

    2014-01-01

    Spacecraft thermal protection systems are at risk of being damaged due to airflow produced from Environmental Control Systems. There are inherent uncertainties and errors associated with using Computational Fluid Dynamics to predict the airflow field around a spacecraft from the Environmental Control System. This paper describes an approach to quantify the uncertainty in using Computational Fluid Dynamics to predict airflow speeds around an encapsulated spacecraft without the use of test data. Quantifying the uncertainty in analytical predictions is imperative to the success of any simulation-based product. The method could provide an alternative to traditional "validation by test only" mentality. This method could be extended to other disciplines and has potential to provide uncertainty for any numerical simulation, thus lowering the cost of performing these verifications while increasing the confidence in those predictions. Spacecraft requirements can include a maximum airflow speed to protect delicate instruments during ground processing. Computational Fluid Dynamics can be used to verify these requirements; however, the model must be validated by test data. This research includes the following three objectives and methods. Objective one is develop, model, and perform a Computational Fluid Dynamics analysis of three (3) generic, non-proprietary, environmental control systems and spacecraft configurations. Several commercially available and open source solvers have the capability to model the turbulent, highly three-dimensional, incompressible flow regime. The proposed method uses FLUENT, STARCCM+, and OPENFOAM. Objective two is to perform an uncertainty analysis of the Computational Fluid Dynamics model using the methodology found in "Comprehensive Approach to Verification and Validation of Computational Fluid Dynamics Simulations". This method requires three separate grids and solutions, which quantify the error bars around Computational Fluid Dynamics

  15. Dissertation Defense: Computational Fluid Dynamics Uncertainty Analysis for Payload Fairing Spacecraft Environmental Control Systems

    Science.gov (United States)

    Groves, Curtis Edward

    2014-01-01

    Spacecraft thermal protection systems are at risk of being damaged due to airflow produced from Environmental Control Systems. There are inherent uncertainties and errors associated with using Computational Fluid Dynamics to predict the airflow field around a spacecraft from the Environmental Control System. This paper describes an approach to quantify the uncertainty in using Computational Fluid Dynamics to predict airflow speeds around an encapsulated spacecraft without the use of test data. Quantifying the uncertainty in analytical predictions is imperative to the success of any simulation-based product. The method could provide an alternative to traditional validation by test only mentality. This method could be extended to other disciplines and has potential to provide uncertainty for any numerical simulation, thus lowering the cost of performing these verifications while increasing the confidence in those predictions.Spacecraft requirements can include a maximum airflow speed to protect delicate instruments during ground processing. Computational Fluid Dynamics can be used to verify these requirements; however, the model must be validated by test data. This research includes the following three objectives and methods. Objective one is develop, model, and perform a Computational Fluid Dynamics analysis of three (3) generic, non-proprietary, environmental control systems and spacecraft configurations. Several commercially available and open source solvers have the capability to model the turbulent, highly three-dimensional, incompressible flow regime. The proposed method uses FLUENT, STARCCM+, and OPENFOAM. Objective two is to perform an uncertainty analysis of the Computational Fluid Dynamics model using the methodology found in Comprehensive Approach to Verification and Validation of Computational Fluid Dynamics Simulations. This method requires three separate grids and solutions, which quantify the error bars around Computational Fluid Dynamics predictions

  16. Actors with Multi-Headed Message Receive Patterns

    DEFF Research Database (Denmark)

    Sulzmann, Martin; Lam, Edmund Soon Lee; Van Weert, Peter

    2008-01-01

    style actors with receive clauses containing multi-headed message patterns. Patterns may be non-linear and constrained by guards. We provide a number of examples to show the usefulness of the extension. We also explore the design space for multi-headed message matching semantics, for example first-match......The actor model provides high-level concurrency abstractions to coordinate simultaneous computations by message passing. Languages implementing the actor model such as Erlang commonly only support single-headed pattern matching over received messages. We propose and design an extension of Erlang...... and rule priority-match semantics. The various semantics are inspired by the multi-set constraint matching semantics found in Constraint Handling Rules. This provides us with a formal model to study actors with multi-headed message receive patterns. The system can be implemented efficiently and we have...

  17. A low cost maritime control aircraft-ship-weapons system. [antiship missile defense

    Science.gov (United States)

    Fluk, H.

    1981-01-01

    It is pointed out that the long-range antiship standoff missile is emerging as the foremost threat on the seas. Delivered by high speed bombers, surface ships, and submarines, a missile attack can be mounted against selected targets from any point on the compass. An investigation is conducted regarding the configuration of a system which could most efficiently identify and destroy standoff threats before they launch their weapons. It is found that by using ships for carrying and launching missiles, and employing aircraft with a powerful radar only for search and missile directing operations, aircraft cost and weight can be greatly reduced. The employment of V/STOL aircraft in preference to other types of aircraft makes it possible to use ships of smaller size for carrying the aircraft. However, in order to obtain an all-weather operational capability for the system, ships are selected which are still big enough to display the required stability in heavy seas.

  18. Endangered Butterflies as a Model System for Managing Source Sink Dynamics on Department of Defense Lands

    Science.gov (United States)

    used three species of endangered butterflies as a model system to rigorously investigate the source-sink dynamics of species being managed on military...lands. Butterflies have numerous advantages as models for source-sink dynamics , including rapid generation times and relatively limited dispersal, but...they are subject to the same processes that determine source-sink dynamics of longer-lived, more vagile taxa.1.2 Technical Approach: For two of our

  19. Applications of Human Performance Models to System Design: Defense Research Series. Volume 2

    Science.gov (United States)

    1989-01-01

    Animation of Human Figures ... ........... .. 375 Norman I. Badler SAFEWORK: Software to Analyse and Design Workplaces ... .......... .389 Robert Gilbert...workload estimation is generally associated with Senders’ research on monitoring tasks (e.g., Senders, Elkind, Grignetti, & Smallwood , 1966; Senders...controller’s workload, IEEE Transactions on Systems, Man, and Cybernetics, SMC-8(6) :492-493. Senders, J. W., Elkind, J. I., Grignetti, M. C., and Smallwood , R

  20. Defense Departmental Reporting System-Budgetary Was Not Effectively Implemented for the Army General Fund

    Science.gov (United States)

    2012-05-31

    or events. Unsupported journal vouchers increase the risk of materially misstated balances reported on the AGF financial statements. DFAS...with U.S. generally accepted accounting principles and that the Army automated systems did not support material amounts on the financial statements...files, abnormal balance detection , journal vouchers, and reconciliations between Army and OMB SF 133s and the Statements of Budgetary Resources

  1. Ship Underwater Threat Response System (SUTRS): A Feasibility Study of Organic Mine Point-Defense

    Science.gov (United States)

    2012-09-01

    Landing Zone ~0 ft Anti-Personnel Mines and Obstacle Surf Zone 0 - 10 ft Anti-Tank Mines, Anti-Invasion Mines and Obstacles Very-Shallow Water 10...Platform Reconnaissance and Analysis (COBRA) Associates localization of minefields & obstacles in the surf zone and beach zone prior to an...projectile that penetrates the mine casing to disable or destroy the mine. The system is deployed from a UH-60 helicopter, and because of the danger from

  2. Mogućnosti implementacije savremenih sistema upravljanja saobraćajem u sistem odbrane / Possibilities of implementation of contemporary traffic management systems in the defense system

    Directory of Open Access Journals (Sweden)

    Srđan Ljubojević

    2007-10-01

    Full Text Available Savremeni trendovi u upravljanju saobraćajem okrenuti su ka efikasnijem iskorišćenju postojećih kapaciteta. Ovaj rad je izraz težnje da se sagleda uloga inteligentnih transportnih sistema u takvom pristupu upravljanju saobraćajem, kao i da se ukaže na budućnost sistema odbrane na tom polju. / The latest trends in traffic management focus on more efficient usage of existing capacities. This paper tries to perceive the role of Intelligent Transportation Systems within such an approach to traffic management as well as to point out to the future of the Defense System in this field.

  3. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    Science.gov (United States)

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the…

  4. Lay health supporters aided by a mobile phone messaging system to improve care of villagers with schizophrenia in Liuyang, China: protocol for a randomised control trial.

    Science.gov (United States)

    Xu, Dong Roman; Gong, Wenjie; Caine, Eric D; Xiao, Shuiyuan; Hughes, James P; Ng, Marie; Simoni, Jane; He, Hua; Smith, Kirk L; Brown, Henry Shelton; Gloyd, Stephen

    2016-01-20

    Schizophrenia is a severe, chronic and disabling mental illness. Non-adherence to medication and relapse may lead to poorer patient function. This randomised controlled study, under the acronym LEAN (Lay health supporter, e-platform, award, and iNtegration), is designed to improve medication adherence and high relapse among people with schizophrenia in resource poor settings. The community-based LEAN has four parts: (1) Lay health supporters (LHSs), mostly family members who will help supervise patient medication, monitor relapse and side effects, and facilitate access to care, (2) an E-platform to support two-way mobile text and voice messaging to remind patients to take medication; and alert LHSs when patients are non-adherent, (3) an Award system to motivate patients and strengthen LHS support, and (4) iNtegration of the efforts of patients and LHSs with those of village doctors, township mental health administrators and psychiatrists via the e-platform. A random sample of 258 villagers with schizophrenia will be drawn from the schizophrenic '686' Program registry for the 9 Xiang dialect towns of the Liuyang municipality in China. The sample will be further randomised into a control group and a treatment group of equal sizes, and each group will be followed for 6 months after launch of the intervention. The primary outcome will be medication adherence as measured by pill counts and supplemented by pharmacy records. Other outcomes include symptoms and level of function. Outcomes will be assessed primarily when patients present for medication refill visits scheduled every 2 months over the 6-month follow-up period. Data from the study will be analysed using analysis of covariance for the programme effect and an intent-to-treat approach. University of Washington: 49464 G; Central South University: CTXY-150002-6. Results will be published in peer-reviewed journals with deidentified data made available on FigShare. ChiCTR-ICR-15006053; Pre-results. Published by the

  5. Lay health supporters aided by a mobile phone messaging system to improve care of villagers with schizophrenia in Liuyang, China: protocol for a randomised control trial

    Science.gov (United States)

    Gong, Wenjie; Caine, Eric D; Xiao, Shuiyuan; Hughes, James P; Ng, Marie; Simoni, Jane; He, Hua; Smith, Kirk L; Brown, Henry Shelton; Gloyd, Stephen

    2016-01-01

    Introduction Schizophrenia is a severe, chronic and disabling mental illness. Non-adherence to medication and relapse may lead to poorer patient function. This randomised controlled study, under the acronym LEAN (Lay health supporter, e-platform, award, and iNtegration), is designed to improve medication adherence and high relapse among people with schizophrenia in resource poor settings. Methods/analysis The community-based LEAN has four parts: (1) Lay health supporters (LHSs), mostly family members who will help supervise patient medication, monitor relapse and side effects, and facilitate access to care, (2) an E-platform to support two-way mobile text and voice messaging to remind patients to take medication; and alert LHSs when patients are non-adherent, (3) an Award system to motivate patients and strengthen LHS support, and (4) iNtegration of the efforts of patients and LHSs with those of village doctors, township mental health administrators and psychiatrists via the e-platform. A random sample of 258 villagers with schizophrenia will be drawn from the schizophrenic ‘686’ Program registry for the 9 Xiang dialect towns of the Liuyang municipality in China. The sample will be further randomised into a control group and a treatment group of equal sizes, and each group will be followed for 6 months after launch of the intervention. The primary outcome will be medication adherence as measured by pill counts and supplemented by pharmacy records. Other outcomes include symptoms and level of function. Outcomes will be assessed primarily when patients present for medication refill visits scheduled every 2 months over the 6-month follow-up period. Data from the study will be analysed using analysis of covariance for the programme effect and an intent-to-treat approach. Ethics and dissemination University of Washington: 49464 G; Central South University: CTXY-150002-6. Results will be published in peer-reviewed journals with deidentified data made available on

  6. Changes in Antioxidant Defense System Using Different Lipid Emulsions in Parenteral Nutrition in Children after Hematopoietic Stem Cell Transplantation

    Directory of Open Access Journals (Sweden)

    María Auxiliadora Baena-Gómez

    2015-08-01

    Full Text Available Background: Traditionally, lipids used in parenteral nutrition (PN are based on ω-6 fatty acid-rich vegetable oils, such as soybean oil, with potential adverse effects involving oxidative stress. Methods: We evaluated the antioxidant defense system in children, after hematopoietic stem cell transplantation (HSCT, who were randomized to use a lipid emulsion with fish oil or soybean oil. Blood samples at baseline, at 10 days, and at the end of the PN were taken to analyze plasma retinol, α-tocopherol, β-carotene, coenzyme Q9 and coenzyme Q10 levels, and catalase (CAT, glutathione reductase (GR, glutathione peroxidase (GPOX, and superoxide dismutase (SOD levels in lysed erythrocytes. Results: An increase in plasma α-tocopherol levels in the group of patients receiving the fish oil-containing emulsion (FO compared with the group receiving the soybean emulsion was observed at day 10 of PN. Concurrently, plasma α-tocopherol increased in the FO group and β-carotene decreased in both groups at day 10 compared with baseline levels, being more significant in the group receiving the FO emulsion. Conclusion: FO-containing emulsions in PN could improve the antioxidant profile by increasing levels of α-tocopherol in children after HSCT who are at higher risk of suffering oxidative stress and metabolic disorders.

  7. Boron alleviates the aluminum toxicity in trifoliate orange by regulating antioxidant defense system and reducing root cell injury.

    Science.gov (United States)

    Riaz, Muhammad; Yan, Lei; Wu, Xiuwen; Hussain, Saddam; Aziz, Omar; Wang, Yuhan; Imran, Muhammad; Jiang, Cuncang

    2018-02-15

    Aluminium (Al) toxicity is the most important soil constraint for plant growth and development in acid soils (pH Boron (B) is an essential micronutrient for the growth and development of higher plants. The results of previous studies propose that B might ameliorate Al toxicity; however, none of the studies have been conducted on trifoliate orange to study this effect. Thus, a study was carried out in hydroponics comprising of two different Al concentrations, 0 and 400 μM. For every concentration, two B treatments (0 and 10 μM as H 3 BO 3 ) were applied to investigate the B-induced alleviation of Al toxicity and exploring the underneath mechanisms. The results revealed that Al toxicity under B deficiency severely hampered the root growth and physiology of plant, caused oxidative stress and membrane damage, leading to severe root injury and damage. However, application of B under Al toxicity improved the root elongation and photosynthesis, while reduced Al uptake and mobilization into plant parts. Moreover, B supply regulated the activities of antioxidant enzymes, proline, secondary metabolites (phenylalanine ammonia lyase and polyphenol oxidase) contents, and stabilized integrity of proteins. Our study results imply that B supply promoted root growth as well as defense system by reducing reactive oxygen species (ROS) and Al concentrations in plant parts thus B induced alleviation of Al toxicity; a fact that might be significant for higher productivity of agricultural plants grown in acidic conditions. Copyright © 2017 Elsevier Ltd. All rights reserved.

  8. Microfilament Contraction Promotes Rounding of Tunic Slices: An Integumentary Defense System in the Colonial Ascidian Aplidium yamazii.

    Science.gov (United States)

    Hirose, E; Ishii, T

    1995-08-01

    In Aplidium yamazii, when a slice of a live colony (approximately 0.5 mm thick) was incubated in seawater for 12 h, the slice became a round tunic fragment. This tunic rounding was inhibited by freezing of the slices, incubation with Ca2+-Mg2+ -free seawater, or addition of cytochalasin B. Staining of microfilaments in the slices with phalloidin-FITC showed the existence of a cellular network in the tunic. Contraction of this cellular network probably promotes rounding of the tunic slice. In electron microscopic observations, a new tunic cuticle regenerated at the surface of the round tunic fragments; the tunic cuticle did not regenerate in newly sliced specimens nor in specimens in which rounding was experimentally inhibited. Based on these results, an integumentary defense system is proposed in this species as follows. (1) When the colony is wounded externally, contraction of the cellular network promotes tunic contraction around the wound. (2) The wound is almost closed by tunic contraction. (3) Tunic contraction increases the density of the filamentous components of the tunic at the wound, and it may accelerate the regeneration of tunic cuticle there.

  9. Effects of Dietary Lycopene Supplementation on Plasma Lipid Profile, Lipid Peroxidation and Antioxidant Defense System in Feedlot Bamei Lamb.

    Science.gov (United States)

    Jiang, Hongqin; Wang, Zhenzhen; Ma, Yong; Qu, Yanghua; Lu, Xiaonan; Luo, Hailing

    2015-07-01

    Lycopene, a red non-provitamin A carotenoid, mainly presenting in tomato and tomato byproducts, has the highest antioxidant activity among carotenoids because of its high number of conjugated double bonds. The objective of this study was to investigate the effect of lycopene supplementation in the diet on plasma lipid profile, lipid peroxidation and antioxidant defense system in feedlot lamb. Twenty-eight Bamei male lambs (90 days old) were divided into four groups and fed a basal diet (LP0, 40:60 roughage: concentrate) or the basal diet supplemented with 50, 100, and 200 mg/kg lycopene. After 120 days of feeding, all lambs were slaughtered and sampled. Dietary lycopene supplementation significantly reduced the levels of plasma total cholesterol (p0.05). The levels of TG (pCAT, pCAT (p<0.05, linearly) and SOD (p<0.001, linearly). Therefore, it was concluded that lycopene supplementation improved the antioxidant status of the lamb and optimized the plasma lipid profile, the dosage of 200 mg lycopene/kg feed might be desirable for growing lambs to prevent environment stress and maintain normal physiological metabolism.

  10. Manganese-induced cadmium stress tolerance in rice seedlings: Coordinated action of antioxidant defense, glyoxalase system and nutrient homeostasis.

    Science.gov (United States)

    Rahman, Anisur; Nahar, Kamrun; Hasanuzzaman, Mirza; Fujita, Masayuki

    The accumulation of cadmium (Cd) alters different physiological and biochemical attributes that affect plant growth and yield. In our study, we investigated the regulatory role of supplemental manganese (Mn) on hydroponically grown rice (Oryza sativa L. cv. BRRI dhan29) seedlings under Cd-stress conditions. Exposure of 14-d-old seedlings to 0.3mM CdCl 2 for three days caused growth inhibition, chlorosis, nutrient imbalance, and higher Cd accumulation. Higher Cd uptake caused oxidative stress through lipid peroxidation, loss of plasma membrane integrity, and overproduction of reactive oxygen species (ROS) and methylglyoxal (MG). The exogenous application of 0.3mM MnSO 4 to Cd-treated seedlings partly recovered Cd-induced water loss, chlorosis, growth inhibition, and nutrient imbalance by reducing Cd uptake and its further translocation to the upper part of the plant. Supplemental Mn also reduced Cd-induced oxidative damage and lipid peroxidation by improved antioxidant defense and glyoxalase systems through enhancing ROS and MG detoxification, respectively. Copyright © 2016 Académie des sciences. Published by Elsevier SAS. All rights reserved.

  11. Response of oxidative stress defense systems in rice (Oryza sativa) leaves with supplemental UV-B radiation

    International Nuclear Information System (INIS)

    Dai, Q.; Yan, B.; Huang, S.; Liu, X.; Peng, S.; Miranda, M.L.L.; Chavez, A.Q.; Vergara, B.S.; Olszyk, D.M.

    1997-01-01

    The impact of elevated ultraviolet-B radiation (UV-B, 280–320 nm) on membrane systems and lipid peroxidation, and possible involvement of active oxygen radicals was investigated in leaves of two UV-B susceptible rice cultivars (Oryza sativa L. cvs IR74 and Dular). Rice seedlings were grown in a greenhouse for 10 days and then treated with biologically effective UV-B (UV-B BE ) radiation for 28 days. Oxidative stress effects were evaluated by measuring superoxide anion (O 2 ) generation rate, hydrogen peroxide (H 2 O 2 ) content, malondialdehyde (MDA) concentration and relative electrolyte conductivity (EC) for IR74 and Dular at 0 (control), 6 or 13 kJ m −2 day −1 UV-B BE . Significant increases in these parameters were found in rice plants grown at 13 vs 0 kJ m −2 day −1 UV-B BE after 28 days; indicating that disruption of membrane systems may be an eventual reason for UV-B-induced injury in rice plants. There was a positive correlation between O 2 − generation and increases in EC or MDA in leaves. Activities of enzymatic and nonenzymatic free radical scavengers were measured for IR74 after 7, 14, 21 and 28 days of exposure to 13 or 0 UV-B BE to evaluate dynamics of these responses over time. Activities of catalase and superoxide dismutase (but not ascorbate peroxidase) and concentrations of ascorbic acid and glutathione were enhanced by 13 vs 0 UV-B BE after 14 days of UV-B exposure. Further exposure to 28 days of UV-B was associated with a decline in enzyme activities and ascorbic acid, but not glutathione. It is suggested that UV-B-induced injury may be associated with disturbance of active oxygen metabolism through the destruction and alteration of both enzymatic and nonenzymatic defense systems in rice. (author)

  12. The Regional Dimension of Romania's Participation to the Anti-Missile Defense System

    Directory of Open Access Journals (Sweden)

    Florin Iftode

    2015-08-01

    Full Text Available The current security environment is characterized by a high degree of instability and unpredictability, through the manifestation of new risks and threats, especially those with asymmetrical nature, by redefining the relations between the great powers, and increasing freedom of action of the regional actors (state and non-state. At the international level, the end of the Cold War has led to a fragmentation of efforts in the security field, with direct implications on the need for further efforts of the international community coordination. In this era of profound change and transformation it is not possible the adoption of an isolationist policy of security, but only in a broader context of interdependencies and relationships between general trends, threats or challenges specific to a particular area or geographic areas. Swift operationalization of the anti-missile system will strengthen the national security both directly, through the protection it provides for the entire national territory, and indirectly, as the system will have a deterrent important role, able to mitigate risks of possible attacks by ballistic missiles. The role of deterrence will remove the risk of attack against any Allied territory on which, by virtue of membership in NATO and obligations involved according to article 5 of the Washington Treaty, Romania has also responsibilities.

  13. Two-way text messaging: an interactive mobile learning environment in higher education

    OpenAIRE

    Premadasa, H. K. Salinda; Meegama, R. G. N.

    2016-01-01

    Short messaging service (SMS) is perhaps the most popular mobile technology prevalent among students in higher education due to its ubiquitous nature and the capability of two-way communication. However, a major limitation in two-way text messaging is sending back a part of received data with the reply message. This limitation results in users of a mobile learning environment being unable to reply back to the correct destination. This article presents a two-way text messaging system that can ...

  14. Host-pathogen interactions between the human innate immune system and Candida albicans—understanding and modeling defense and evasion strategies

    Science.gov (United States)

    Dühring, Sybille; Germerodt, Sebastian; Skerka, Christine; Zipfel, Peter F.; Dandekar, Thomas; Schuster, Stefan

    2015-01-01

    The diploid, polymorphic yeast Candida albicans is one of the most important human pathogenic fungi. C. albicans can grow, proliferate and coexist as a commensal on or within the human host for a long time. However, alterations in the host environment can render C. albicans virulent. In this review, we describe the immunological cross-talk between C. albicans and the human innate immune system. We give an overview in form of pairs of human defense strategies including immunological mechanisms as well as general stressors such as nutrient limitation, pH, fever etc. and the corresponding fungal response and evasion mechanisms. Furthermore, Computational Systems Biology approaches to model and investigate these complex interactions are highlighted with a special focus on game-theoretical methods and agent-based models. An outlook on interesting questions to be tackled by Systems Biology regarding entangled defense and evasion mechanisms is given. PMID:26175718

  15. ABC transporters and xenobiotic defense systems in early life stages of rainbow trout (Oncorhynchus mykiss).

    Science.gov (United States)

    Kropf, Christian; Segner, Helmut; Fent, Karl

    2016-01-01

    Embryos of oviparous fish, in contrast to (ovo) viviparous species, develop in the aquatic environment, and therefore need solute transport systems at their body surfaces for maintaining internal homeostasis and defending against potentially harmful substances. We hypothesized that solute transporters undergo changes in tissue distribution from the embryo to the larval stage. We therefore studied the mRNA profiles of eight ABC transporters (abcb1a, abcb1b, abcc1, abcc2, abcc3, abcc4, abcc5, abcg2) and three solute carriers (oatp1d, putative oatp2 putative, mate1) in different body regions (head, yolk sac epithelium, abdominal viscera, skin/muscles) of developing rainbow trout. Additionally, we investigated mRNA levels of phase I (cyp1a, cyp3a) and phase II (gstp, putative ugt1, putative ugt2) biotransformation enzymes. The study covered the developmental period from the eleuthero-embryo stage to the first-feeding larval stage (1-20days post-hatch, dph). At 1dph, transcripts of abcc2, abcc4, abcg2, cyp3a, gstp, putative mate1, and putative oatp2 occurred primarily in the yolk sac epithelium, whereas at later stages expression of these genes was predominantly observed in the abdominal viscera. The functional activity of ABC transporters in fish early life stages was assessed by rhodamine B accumulation assays. Finally, we investigated the potential impact of xenobiotics (clotrimazole, clofibric acid) on the ABC and biotransformation systems of trout early life stages. While clofibric acid had no effect, clotrimazole lead to an increased rhodamine B accumulation. The results provide evidence that the transition from the eleuthero-embryo to the larval stage is accompanied by a major alteration in tissue expression of ABC transporters. Copyright © 2016 Elsevier Inc. All rights reserved.

  16. 32 CFR Appendix A to Part 77 - DD Form 2580, Operation Transition Department of Defense

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false DD Form 2580, Operation Transition Department of Defense A Appendix A to Part 77 National Defense Department of Defense OFFICE OF THE SECRETARY OF DEFENSE... to Part 77—DD Form 2580, Operation Transition Department of Defense Outplacement and Referral System...

  17. DMHRSwhy? The Value of the Defense Medical Human Resource System-Internet (DMHRSi) to the Military Health System (MHS)

    Science.gov (United States)

    2015-02-01

    ABSTRACT The Military Health System (MHS) uses a variety of systems and processes to manage its most important asset ???its people. Chief among the...Health System (MHS) uses a variety of systems and processes to manage its most important asset …its people. Chief among the systems employed to do...enhanced multi-service market FTE full-time equivalent HRM human -resource management LCA labor cost assignment MEPRS Medical Expense

  18. Patient-clinician mobile communication: analyzing text messaging between adolescents with asthma and nurse case managers.

    Science.gov (United States)

    Yoo, Woohyun; Kim, Soo Yun; Hong, Yangsun; Chih, Ming-Yuan; Shah, Dhavan V; Gustafson, David H

    2015-01-01

    With the increasing penetration of digital mobile devices among adolescents, mobile texting messaging is emerging as a new channel for patient-clinician communication for this population. In particular, it can promote active communication between healthcare clinicians and adolescents with asthma. However, little is known about the content of the messages exchanged in medical encounters via mobile text messaging. Therefore, this study explored the content of text messaging between clinicians and adolescents with asthma. We collected a total of 2,953 text messages exchanged between 5 nurse case managers and 131 adolescents with asthma through a personal digital assistant. The text messages were coded using a scheme developed by adapting categories from the Roter Interaction Analysis System. Nurse case managers sent more text messages (n=2,639) than adolescents with asthma. Most messages sent by nurse case managers were targeted messages (n=2,475) directed at all adolescents with asthma, whereas there were relatively few tailored messages (n=164) that were created personally for an individual adolescent. In addition, both targeted and tailored messages emphasized task-focused behaviors over socioemotional behaviors. Likewise, text messages (n=314) sent by adolescents also emphasized task-focused over socioemotional behaviors. Mobile texting messaging has the potential to play an important role in patient-clinician communication. It promotes not only active interaction, but also patient-centered communication with clinicians. In order to achieve this potential, healthcare clinicians may need to focus on socioemotional communication as well as task-oriented communication.

  19. Message Correlation Analysis Tool for NOvA

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    A complex running system, such as the NOvA online data acquisition, consists of a large number of distributed but closely interacting components. This paper describes a generic realtime correlation analysis and event identification engine, named Message Analyzer. Its purpose is to capture run time abnormalities and recognize system failures based on log messages from participating components. The initial design of analysis engine is driven by the DAQ of the NOvA experiment. The Message Analyzer performs filtering and pattern recognition on the log messages and reacts to system failures identified by associated triggering rules. The tool helps the system maintain a healthy running state and to minimize data corruption. This paper also describes a domain specific language that allows the recognition patterns and correlation rules to be specified in a clear and flexible way. In addition, the engine provides a plugin mechanism for users to implement specialized patterns or rules in generic languages such as C++.

  20. Message Correlation Analysis Tool for NOvA

    International Nuclear Information System (INIS)

    Lu Qiming; Biery, Kurt A; Kowalkowski, James B

    2012-01-01

    A complex running system, such as the NOvA online data acquisition, consists of a large number of distributed but closely interacting components. This paper describes a generic real-time correlation analysis and event identification engine, named Message Analyzer. Its purpose is to capture run time abnormalities and recognize system failures based on log messages from participating components. The initial design of analysis engine is driven by the data acquisition (DAQ) of the NOvA experiment. The Message Analyzer performs filtering and pattern recognition on the log messages and reacts to system failures identified by associated triggering rules. The tool helps the system maintain a healthy running state and to minimize data corruption. This paper also describes a domain specific language that allows the recognition patterns and correlation rules to be specified in a clear and flexible way. In addition, the engine provides a plugin mechanism for users to implement specialized patterns or rules in generic languages such as C++.

  1. Message correlation analysis tool for NOvA

    Energy Technology Data Exchange (ETDEWEB)

    Lu, Qiming [Fermilab; Biery, Kurt A. [Fermilab; Kowalkowski, James B. [Fermilab

    2012-01-01

    A complex running system, such as the NOvA online data acquisition, consists of a large number of distributed but closely interacting components. This paper describes a generic real-time correlation analysis and event identification engine, named Message Analyzer. Its purpose is to capture run time abnormalities and recognize system failures based on log messages from participating components. The initial design of analysis engine is driven by the data acquisition (DAQ) of the NOvA experiment. The Message Analyzer performs filtering and pattern recognition on the log messages and reacts to system failures identified by associated triggering rules. The tool helps the system maintain a healthy running state and to minimize data corruption. This paper also describes a domain specific language that allows the recognition patterns and correlation rules to be specified in a clear and flexible way. In addition, the engine provides a plugin mechanism for users to implement specialized patterns or rules in generic languages such as C++.

  2. Immunoreactive serum opsonic alpha 2 sb glycoprotein as a noninvasive index of RES systemic defense after trauma.

    Science.gov (United States)

    Kaplan, J E; Saba, T M

    1979-01-01

    Reticuloendothelial system (RES) depression has been correlated with diminished resistance to trauma, shock, and sepsis in man and animals. Previous studies have related the depression of RES hepatic Kupffer cell phagocytic function after trauma to diminished bioassayable opsonic activity. The present study determined if the loss of biological activity and RES alteration correlated with immunoreactive serum opsonic alpha 2 SB glycoprotein levels after trauma. Serum opsonic activity was measured by liver slice bioassay, and immunoreactive opsonic protein was measured by rocket electroimmunoassay. RE function was determined by colloid clearance over a 24-hour post-trauma period. Anesthetized rats (250-300 gm) subjected to sublethal or severe (greater than LD50) whole-body NCD trauma were the shock models investigated. Immunoreactive levels in 63 rats prior to injury were 518 +/- 24 microgram/ml. Neither biological nor immunoreactive levels were altered over 24 hours in anesthetized sham-traumatized controls. Temporal alteration in the initial decrease and recovery pattern of biologically active and immunoreactive opsonic protein levels significantly correlated following both sublethal and severe injury. Moreover, the patterns of immunoreactive levels of the opsonic protein correlated with the functional phagocytic activity of the RES as determined by vascular clearance of a test dose of blood-borne radiolabeled particulates. This glycoprotein falls after trauma, and the magnitude and duration of the decline increases with severity of injury. Immunoreactive opsonic alpha 2 SB glycoprotein appears to be an accurate measurement of circulating opsonic activity and RE Kupffer cell function after trauma, especially with respect to clearance. Thus, immunoreactive opsonic protein warrants clinical consideration as a noninvasive measure of reticuloendothelial systemic defense in patients after trauma and burn.

  3. Effects of Antifouling Biocides on Molecular and Biochemical Defense System in the Gill of the Pacific Oyster Crassostrea gigas

    Science.gov (United States)

    Park, Mi Seon; Kim, Young Dae; Kim, Bo-Mi; Kim, Youn-Jung; Kim, Jang Kyun; Rhee, Jae-Sung

    2016-01-01

    Antifouling biocides such as organotin compounds and their alternatives are potent toxicants in marine ecosystems. In this study, we employed several molecular and biochemical response systems of the Pacific oyster Crassostrea gigas to understand a potential mode of action of antifouling biocides (i.e. tributyltin (TBT), diuron and irgarol) after exposure to different concentrations (0.01, 0.1, and 1 μg L-1) for 96 h. As a result, all the three antifouling biocides strongly induced the antioxidant defense system. TBT reduced both enzymatic activity and mRNA expression of Na+/K+-ATPase and acetylcholinesterase (AChE). Lower levels of both Na+/K+-ATPase activity and AChE mRNA expression were observed in the diuron-exposed oysters compared to the control, while the irgarol treatment reduced only the transcriptional expression of AChE gene. We also analyzed transcript profile of heat shock protein (Hsp) superfamily in same experimental conditions. All antifouling biocides tested in this study significantly modulated mRNA expression of Hsp superfamily with strong induction of Hsp70 family. Taken together, overall results indicate that representative organotin TBT and alternatives have potential hazardous effects on the gill of C. gigas within relatively short time period. Our results also suggest that analyzing a series of molecular and biochemical parameters can be a way of understanding and uncovering the mode of action of emerging antifouling biocides. In particular, it was revealed that Pacific oysters have different sensitivities depend on the antifouling biocides. PMID:28006823

  4. Effects of Antifouling Biocides on Molecular and Biochemical Defense System in the Gill of the Pacific Oyster Crassostrea gigas.

    Science.gov (United States)

    Park, Mi Seon; Kim, Young Dae; Kim, Bo-Mi; Kim, Youn-Jung; Kim, Jang Kyun; Rhee, Jae-Sung

    2016-01-01

    Antifouling biocides such as organotin compounds and their alternatives are potent toxicants in marine ecosystems. In this study, we employed several molecular and biochemical response systems of the Pacific oyster Crassostrea gigas to understand a potential mode of action of antifouling biocides (i.e. tributyltin (TBT), diuron and irgarol) after exposure to different concentrations (0.01, 0.1, and 1 μg L-1) for 96 h. As a result, all the three antifouling biocides strongly induced the antioxidant defense system. TBT reduced both enzymatic activity and mRNA expression of Na+/K+-ATPase and acetylcholinesterase (AChE). Lower levels of both Na+/K+-ATPase activity and AChE mRNA expression were observed in the diuron-exposed oysters compared to the control, while the irgarol treatment reduced only the transcriptional expression of AChE gene. We also analyzed transcript profile of heat shock protein (Hsp) superfamily in same experimental conditions. All antifouling biocides tested in this study significantly modulated mRNA expression of Hsp superfamily with strong induction of Hsp70 family. Taken together, overall results indicate that representative organotin TBT and alternatives have potential hazardous effects on the gill of C. gigas within relatively short time period. Our results also suggest that analyzing a series of molecular and biochemical parameters can be a way of understanding and uncovering the mode of action of emerging antifouling biocides. In particular, it was revealed that Pacific oysters have different sensitivities depend on the antifouling biocides.

  5. Systems Engineering of Unmanned DoD Systems: Following the Joint Capabilities Integration and Development System/Defense Acquisition System Process to Develop an Unmanned Ground Vehicle System

    Science.gov (United States)

    2015-12-01

    Manual D-A-1). APAs are “Performance attributes of a system not important enough to be considered KPPs or KSAs, but still appropriate to include in...the CDD or CPD are designated as APAs ” (JCIDS Manual D-A-1). The requirements are expressed using Thresholds (T) and Objectives (O). “Performance...NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA SYSTEMS ENGINEERING CAPSTONE PROJECT REPORT Approved for public release; distribution is

  6. Impact of Contract Bundling and Consolidation on Defense Acquisition System and Defense Industrial Base: The Case of the U.S. Department of the Navy

    Science.gov (United States)

    2012-04-27

    or 39% of the value of such contracts. Next, a group of nine firms—EDO Communications and Countermeasures Systems, Lockheed Martin, Sociedad ...49,437,854.00 5.94% SOCIEDAD ESPAIOLA DE MONTAJES INDUSTRIALES SA $60,000,000.00 7.21% LOCKHEED MARTIN CORPORATION $79,342,491.00 9.54% EDO

  7. Annual Systems Engineering Conference (9th): Focusing on Improving Performance of Defense Systems Programs. Volume 3. Wednesday

    Science.gov (United States)

    2006-10-26

    Bubble and Requirements Management by Mr. Jimmy Thai Cost Efficient Risk Management Through Integrated T&E Throughout the Systems Engineering Life-Cycle...ACSG/ Miller Seven Steps of an Effective Lessons Learned Process by Mr. Jimmy Thai Lessons Learned from a Mature DMSMS Program by SQNLDR P.D.Weeding...Aircraft AAR-47 Missile Warning System (MWS) GTRI_B-9 Lessons Learned with System Integration - 9 Theatre Airborne Reconnaissance System (TARS

  8. GPS Ephemeris Message Broadcast Simulation

    National Research Council Canada - National Science Library

    Browne, Nathan J; Light, James J

    2005-01-01

    The warfighter constantly needs increased accuracy from GPS and a means to increasing this accuracy to the decimeter level is a broadcast ephemeris message containing GPS satellite orbit and clock corrections...

  9. GSR is not essential for the maintenance of antioxidant defenses in mouse cochlea: Possible role of the thioredoxin system as a functional backup for GSR.

    Directory of Open Access Journals (Sweden)

    Chul Han

    Full Text Available Glutathione reductase (GSR, a key member of the glutathione antioxidant defense system, converts oxidized glutathione (GSSG to reduced glutathione (GSH and maintains the intracellular glutathione redox state to protect the cells from oxidative damage. Previous reports have shown that Gsr deficiency results in defects in host defense against bacterial infection, while diquat induces renal injury in Gsr hypomorphic mice. In flies, overexpression of GSR extended lifespan under hyperoxia. In the current study, we investigated the roles of GSR in cochlear antioxidant defense using Gsr homozygous knockout mice that were backcrossed onto the CBA/CaJ mouse strain, a normal-hearing strain that does not carry a specific Cdh23 mutation that causes progressive hair cell degeneration and early onset of hearing loss. Gsr-/- mice displayed a significant decrease in GSR activity and GSH/GSSG ratios in the cytosol of the inner ears. However, Gsr deficiency did not affect ABR (auditory brainstem response hearing thresholds, wave I amplitudes or wave I latencies in young mice. No histological abnormalities were observed in the cochlea of Gsr-/- mice. Furthermore, there were no differences in the activities of cytosolic glutathione-related enzymes, including glutathione peroxidase and glutamate-cysteine ligase, or the levels of oxidative damage markers in the inner ears between WT and Gsr-/- mice. In contrast, Gsr deficiency resulted in increased activities of cytosolic thioredoxin and thioredoxin reductase in the inner ears. Therefore, under normal physiological conditions, GSR is not essential for the maintenance of antioxidant defenses in mouse cochlea. Given that the thioredoxin system is known to reduce GSSG to GSH in multiple species, our findings suggest that the thioredoxin system can support GSSG reduction in the mouse peripheral auditory system.

  10. Year 2000 Compliance of Selected Mission Critical Command, Control, and Communications Systems Managed by The Defense Information Systems Agency

    National Research Council Canada - National Science Library

    1999-01-01

    ...) has adequately planned for and managed year 2000 conversion risks to avoid undue disruption to selected mission critical command, control, and communications systems used in support of Unified...

  11. Defensive medicine: No wonder policymakers are confused.

    Science.gov (United States)

    Kapp, Marshall B

    2016-01-01

    Discussions regarding defensive medical practice often result in proposals for public policy actions. Such proposals generally are premised on assumptions about defensive medicine, namely, that it (a) is driven by physicians' legal anxieties, (b) constitutes bad medical practice, (c) drives up health care costs, (d) varies depending on a jurisdiction's particular tort law climate, (e) depends on medical specialty and a physician's own prior experience as a malpractice defendant, and (f) is a rational response to actual legal risks confronting physicians. This article examines a sample of recent literature focusing on defensive medicine and finds that the messages conveyed vary widely, helping to explain the confusion experienced by many policymakers trying to improve the quality and affordability of health care.

  12. Role of garlic oil and selenium as stimulators to some antioxidant defense system in irradiated male rats

    International Nuclear Information System (INIS)

    El-Gawish, M.A.; Abdel-Azeem, M.G.

    2002-01-01

    The increased level of lipid peroxide product; malondialdehyde (MDA) in various tissues of irradiated animals, may play a crucial role in damaging effects of exposure to ionizing radiation mediated by reactive free radicals generation. The protective efficiency of oral administration of garlic oil (500 mg/kg b.wt) three times weekly together with a single intraperitoneal injection of selenium (0.5 mg/kg b.wt) weekly for two weeks was examined on some antioxidant defense system as well as ultrastructural study in rats subjected to fractionated doses of gamma radiation up to a dose level of 6 Gy (1.5 Gy day after day). Exposure to gamma radiation induced a significant elevation in the level of malondialdehyde in plasma and liver and non-significant change was observed in superoxide dismutase activity (SOD). Also a significant increase was occurred in hepatic glutathione (GSH) content and glutathione peroxidase (GSHPx) activity. The pretreatment of irradiated rats with garlic oil and selenium caused a significant decrease in elevated level of MDA and a significant increase in the activity of SOD, GSHPx and GSH contents in both blood and liver. Concerning the ultrastructure studies, liver of irradiated rats showed abnormal shape of nucleus and nucleus membrane, swollen mitochondria with ruptured cristae, rupture of endoplasmic reticulum and vaculated cytoplasm, while intestine of irradiated rats exhibited deformed, shortened and abnormal structure of microvilli, accumulation of nuclear chromatin and dilatation of terminal web layer. In group of rats treated with garlic oil and selenium before exposure to gamma radiation, noticeable amelioration in ultrastructure changes of liver and intestine induced by irradiation was observed indicating a beneficial radioprotective role of both garlic oil and selenium

  13. Molecular and functional roles of 6C CC chemokine 19 in defense system of striped murrel Channa striatus.

    Science.gov (United States)

    Arockiaraj, Jesu; Bhatt, Prasanth; Harikrishnan, Ramasamy; Arasu, Mariadhas Valan; Al-Dhabi, Naif Abdullah

    2015-08-01

    In this study, we have reported the molecular information of chemokine-19 (Chem19) from striped murrel Channa striatus (Cs). CsCC-Chem19 cDNA sequence was 555 base pair (bp) in length which is 68bp 5' untranslated region (UTR), 339bp translated region and 149bp 3' UTR. The translated region is encoded for a polypeptide of 112 amino acids. CsCC-Chem19 peptide contains a signal sequence between 1 and 26 and an interleukin (IL) 8 like domain between 24 and 89. The multiple sequence alignment showed a 'DCCL' motif, an indispensable motif present in all CC chemokines which was conserved throughout the evolution. Phylogenetic tree showed that CsCC-Chem19 formed a cluster with chemokine 19 from fishes. Secondary structure of CsCC-Chem19 revealed that the peptide contains maximum amount of coils (61.6%) compared to α-helices (25.9%%) and β-sheet (12.5%). Further, 3D analysis indicated that the cysteine residues at 33, 34, 59 and 75 making the disulfide bridges as 33 = 59 and 34 = 75. Significantly (P coding region of CsCC-Chem19, recombinant CsCC-Chem19 protein was produced. The recombinant CsCC-Chem19 protein induced the cellular proliferation and respiratory burst activity of C. striatus peripheral blood leukocytes (PBL) in a concentration dependent manner. Moreover, the chemotactic activity showed that the recombinant CsCC-Chem19 significantly (P < 0.05) enhanced the movement of PBL of C. striatus. Conclusively, CsCC-Chem19 is a 6C CC chemokine having an ability to perform both inflammatory and homeostatic functions. However, further research is necessary to understand the potential of 6C CC chemokine 19 of C. striatus, particularly their regulatory ability on different cellular components in the defense system. Copyright © 2015 Elsevier Ltd. All rights reserved.

  14. Beta-carotene reduces oxidative stress, improves glutathione metabolism and modifies antioxidant defense systems in lead-exposed workers

    International Nuclear Information System (INIS)

    Kasperczyk, Sławomir; Dobrakowski, Michał; Kasperczyk, Janusz; Ostałowska, Alina; Zalejska-Fiolka, Jolanta; Birkner, Ewa

    2014-01-01

    The aim of this study was to determine whether beta-carotene administration reduces oxidative stress and influences antioxidant, mainly glutathione-related, defense systems in workers chronically exposed to lead. The population consisted of two randomly divided groups of healthy male volunteers exposed to lead. Workers in the first group (reference group) were not administered any antioxidants, while workers in the second group (CAR group) were treated orally with 10 mg of beta-carotene once a day for 12 weeks. Biochemical analysis included measuring markers of lead-exposure and oxidative stress in addition to the levels and activities of selected antioxidants. After treatment, levels of malondialdehyde, lipid hydroperoxides and lipofuscin significantly decreased compared with the reference group. However, the level of glutathione significantly increased compared with the baseline. Treatment with beta-carotene also resulted in significantly decreased glutathione peroxidase activity compared with the reference group, while the activities of other glutathione-related enzymes and of superoxide dismutase were not significantly changed. However, the activities of glucose-6-phosphate dehydrogenase and catalase, as well as the level of alpha-tocopherol, were significantly higher after treatment compared with the baseline. Despite controversy over the antioxidant properties of beta-carotene in vivo, our findings showed reduced oxidative stress after beta-carotene supplementation in chronic lead poisoning. - Highlights: • Beta-carotene reduces oxidative stress in lead-exposed workers. • Beta-carotene elevates glutathione level in lead-exposed workers. • Beta-carotene administration could be beneficial in lead poisoning

  15. Effects of Dietary Lycopene Supplementation on Plasma Lipid Profile, Lipid Peroxidation and Antioxidant Defense System in Feedlot Bamei Lamb

    Directory of Open Access Journals (Sweden)

    Hongqin Jiang

    2015-07-01

    Full Text Available Lycopene, a red non-provitamin A carotenoid, mainly presenting in tomato and tomato byproducts, has the highest antioxidant activity among carotenoids because of its high number of conjugated double bonds. The objective of this study was to investigate the effect of lycopene supplementation in the diet on plasma lipid profile, lipid peroxidation and antioxidant defense system in feedlot lamb. Twenty-eight Bamei male lambs (90 days old were divided into four groups and fed a basal diet (LP0, 40:60 roughage: concentrate or the basal diet supplemented with 50, 100, and 200 mg/kg lycopene. After 120 days of feeding, all lambs were slaughtered and sampled. Dietary lycopene supplementation significantly reduced the levels of plasma total cholesterol (p0.05. The levels of TG (p<0.001 and LDL-C (p<0.001 were decreased with the feeding time extension, and both showed a linear trend (p<0.01. Malondialdehyde level in plasma and liver decreased linearly with the increase of lycopene inclusion levels (p<0.01. Dietary lycopene intake linearly increased the plasma antioxidant vitamin E level (p<0.001, total antioxidant capacity (T-AOC, p<0.05, and activities of catalase (CAT, p<0.01, glutathione peroxidase (GSH-Px, p<0.05 and superoxide dismutase (SOD, p<0.05. The plasma T-AOC and activities of GSH-Px and SOD decreased with the extension of the feeding time. In liver, dietary lycopene inclusion showed similar antioxidant effects with respect to activities of CAT (p<0.05, linearly and SOD (p<0.001, linearly. Therefore, it was concluded that lycopene supplementation improved the antioxidant status of the lamb and optimized the plasma lipid profile, the dosage of 200 mg lycopene/kg feed might be desirable for growing lambs to prevent environment stress and maintain normal physiological metabolism.

  16. Heat-induced regulation of antioxidant defense system and nutrient accumulation in hexaploid bread wheat (triticum aestivum l.)

    International Nuclear Information System (INIS)

    Zia, M.A.; Ashraf, M.; Akram, A.

    2014-01-01

    Ten cultivars (five registered S-24, Inqlab-91, Saher-2006, Fsd-2008, and Lasani, and five candidate cultivars P.B-18, M.P-65, S.H-20, AARI-10, and G.A-20) of spring wheat (Triticum aestivum L.) were examined for high temperature stress tolerance. Plants were grown in soil filled pots in the Botanical Garden of the Department of Botany University of Agriculture Faisalabad, Pakistan. Three different temperature regimes (30, 40 and 50 degree C) were applied at two different growth stages (tillering and boot) for three temperature durations 30, 60 and 90 min in a growth chamber. The leaf and root samples were collected after two weeks of temperature treatment and then analyzed for enzymatic and non-enzymatic antioxidants as well as inorganic nutrients (N, P, K+, Ca2+). At the end, data obtained were statistically analyzed to distinguish heat tolerant from non-tolerant wheat cultivars. After appraisal of growth, antioxidant defense system and uptake of nutrients it was found that cvs. S-24, Inqlab-91, Saher-2006, Fsd-2008, Lasani and G.A-20 exhibited better thermo-tolerance capabilities than the other wheat cultivars (P.B-18, M.P-65, S.H-20, AARI-10). Among the thermo-tolerant wheat cultivars, G.A-20 and Lasani were superior in maintaining shoot fresh weights and shoot length, high antioxidant activities and better nutrient uptake at both tillering and boot stages. The response of all cultivars to heat stress applied at the tillering stage or boot stage was almost the same. (author)

  17. Beta-carotene reduces oxidative stress, improves glutathione metabolism and modifies antioxidant defense systems in lead-exposed workers

    Energy Technology Data Exchange (ETDEWEB)

    Kasperczyk, Sławomir, E-mail: kaslav@mp.pl [Dept. of Biochemistry, School of Medicine with the Division of Dentistry, Medical University of Silesia, ul. Jordana 19, 41-808 Zabrze (Poland); Dobrakowski, Michał [Dept. of Biochemistry, School of Medicine with the Division of Dentistry, Medical University of Silesia, ul. Jordana 19, 41-808 Zabrze (Poland); Kasperczyk, Janusz [Dept. of Environmental Medicine and Epidemiology, School of Medicine with the Division of Dentistry, Medical University of Silesia, ul. Jordana 19, 41-808 Zabrze (Poland); Ostałowska, Alina; Zalejska-Fiolka, Jolanta; Birkner, Ewa [Dept. of Biochemistry, School of Medicine with the Division of Dentistry, Medical University of Silesia, ul. Jordana 19, 41-808 Zabrze (Poland)

    2014-10-01

    The aim of this study was to determine whether beta-carotene administration reduces oxidative stress and influences antioxidant, mainly glutathione-related, defense systems in workers chronically exposed to lead. The population consisted of two randomly divided groups of healthy male volunteers exposed to lead. Workers in the first group (reference group) were not administered any antioxidants, while workers in the second group (CAR group) were treated orally with 10 mg of beta-carotene once a day for 12 weeks. Biochemical analysis included measuring markers of lead-exposure and oxidative stress in addition to the levels and activities of selected antioxidants. After treatment, levels of malondialdehyde, lipid hydroperoxides and lipofuscin significantly decreased compared with the reference group. However, the level of glutathione significantly increased compared with the baseline. Treatment with beta-carotene also resulted in significantly decreased glutathione peroxidase activity compared with the reference group, while the activities of other glutathione-related enzymes and of superoxide dismutase were not significantly changed. However, the activities of glucose-6-phosphate dehydrogenase and catalase, as well as the level of alpha-tocopherol, were significantly higher after treatment compared with the baseline. Despite controversy over the antioxidant properties of beta-carotene in vivo, our findings showed reduced oxidative stress after beta-carotene supplementation in chronic lead poisoning. - Highlights: • Beta-carotene reduces oxidative stress in lead-exposed workers. • Beta-carotene elevates glutathione level in lead-exposed workers. • Beta-carotene administration could be beneficial in lead poisoning.

  18. Cultivated Sea Lettuce is a Multiorgan Protector from Oxidative and Inflammatory Stress by Enhancing the Endogenous Antioxidant Defense System

    Science.gov (United States)

    Ratnayake, Ranjala; Liu, Yanxia; Paul, Valerie J.; Luesch, Hendrik

    2013-01-01

    The health-promoting effects of seaweeds have been linked to antioxidant activity that may counteract cancer-causing oxidative stress-induced damage and inflammation. While antioxidant activity is commonly associated with direct radical scavenging activity, an alternative way to increase the antioxidant status of a cell is to enhance the endogenous (phase II) defense system consisting of cytoprotective antioxidant enzymes, including NAD(P)H:quinone oxidoreductase 1 (NQO1). These enzymes are transcriptionally regulated by the antioxidant response element (ARE) via the transcription factor Nrf2. Extracts derived from cultivated Ulva sp., a green alga regarded as a marine vegetable (sea lettuce), potently activated the Nrf2-ARE pathway in IMR-32 neuroblastoma and LNCaP prostate cancer cells. RNA interference studies demonstrated that Nrf2 and PI3 kinase are essential for the phase II response in IMR-32 cells. Activity-enriched fractions induced Nrf2 nuclear translocation and target gene transcription, and boosted the cellular glutathione level and therefore antioxidant status. A single-dose gavage feeding of Ulva-derived fractions increased Nqo1 transcript levels in various organs. Nqo1 induction spiked in different tissues, depending on the specific chemical composition of each administered fraction. We purified and characterized four ARE inducers in this extract, including loliolide (1), isololiolide (2), a megastigmen (3), and a novel chlorinated unsaturated aldehyde (4). The ARE-active fractions attenuated lipopolysaccharide-induced iNOS and Cox2 gene expression in macrophagic RAW264.7 cells, decreasing nitric oxide (NO) and prostaglandin E2 (PGE2) production, respectively. Nqo1 activity and NO production were abrogated in nrf2−/− mouse embryonic fibroblasts, providing a direct link between the induction of phase II response and anti-inflammatory activity. PMID:24005795

  19. Strategic Missile Defense & Nuclear Deterrence

    Science.gov (United States)

    Grego, Laura

    The United States has pursued defenses against nuclear-armed long-range ballistic missiles since at least the 1950s. At the same time, concerns that missile defenses could undermine nuclear deterrence and potentially spark an arms race led the United States and Soviet Union to negotiate limits on these systems. The 1972 Anti-Ballistic Missile Treaty constrained strategic missile defenses for thirty years. After abandoning the treaty in 2002, President George W. Bush began fielding the Ground-based Midcourse Defense (GMD) homeland missile defense system on an extremely aggressive schedule, nominally to respond to threats from North Korea and Iran. Today, nearly fifteen years after its initial deployment, the potential and the limits of this homeland missile defense are apparent. Its test record is poor and it has no demonstrated ability to stop an incoming missile under real-world conditions. No credible strategy is in place to solve the issue of discriminating countermeasures. Insufficient oversight has not only exacerbated the GMD system's problems, but has obscured their full extent, which could encourage politicians and military leaders to make decisions that actually increase the risk of a missile attack against the United States. These are not the only costs. Both Russia and China have repeatedly expressed concerns that U.S. missile defenses adversely affect their own strategic capabilities and interests, particularly taken in light of the substantial US nuclear forces. This in turn affects these countries' nuclear modernization priorities. This talk will provide a technical overview of the US strategic missile defense system, and how it relates to deterrence against non-peer adversaries as well as how it affects deterrence with Russia and China and the long-term prospects for nuclear reductions

  20. Large Scale System Defense

    Science.gov (United States)

    2008-10-01

    NUMBER 00 5f. WORK UNIT NUMBER 01 7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES) Columbia University 1700 Broadway New York NY 10019-5905 8...PERFORMING ORGANIZATION REPORT NUMBER 9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES) AFRL/RIGA 525 Brooks Rd. Rome NY 13441-4505...pealing because of the need to modify source code. Since source-level annotations serve as a vestigial policy, we articulated a way to augment self

  1. Role of Nrf2 antioxidant defense in mitigating cadmium-induced oxidative stress in the olfactory system of zebrafish

    Energy Technology Data Exchange (ETDEWEB)

    Wang, Lu; Gallagher, Evan P., E-mail: evang3@uw.edu

    2013-01-15

    Exposure to trace metals can disrupt olfactory function in fish leading to a loss of behaviors critical to survival. Cadmium (Cd) is an olfactory toxicant that elicits cellular oxidative stress as a mechanism of toxicity while also inducing protective cellular antioxidant genes via activation of the nuclear factor (erythroid-derived 2)-like 2 (Nrf2) pathway. However, the molecular mechanisms of Cd-induced olfactory injury have not been characterized. In the present study, we investigated the role of the Nrf2-mediated antioxidant defense pathway in protecting against Cd-induced olfactory injury in zebrafish. A dose-dependent induction of Nrf2-regulated antioxidant genes associated with cellular responses to oxidative stress was observed in the olfactory system of adult zebrafish following 24 h Cd exposure. Zebrafish larvae exposed to Cd for 3 h showed increased glutathione S-transferase pi (gst pi), glutamate–cysteine ligase catalytic subunit (gclc), heme oxygenase 1 (hmox1) and peroxiredoxin 1 (prdx1) mRNA levels indicative of Nrf2 activation, and which were blocked by morpholino-mediated Nrf2 knockdown. The inhibition of antioxidant gene induction in Cd-exposed Nrf2 morphants was associated with disruption of olfactory driven behaviors, increased cell death and loss of olfactory sensory neurons (OSNs). Nrf2 morphants also exhibited a downregulation of OSN-specific genes after Cd exposure. Pre-incubation of embryos with sulforaphane (SFN) partially protected against Cd-induced olfactory tissue damage. Collectively, our results indicate that oxidative stress is an important mechanism of Cd-mediated injury in the zebrafish olfactory system. Moreover, the Nrf2 pathway plays a protective role against cellular oxidative damage and is important in maintaining zebrafish olfactory function. -- Highlights: ► Oxidative stress is an important mechanism of Cd-mediated olfactory injury. ► Cd induces antioxidant gene expression in the zebrafish olfactory system. ► The

  2. 75 FR 60264 - Federal Acquisition Regulation; Encouraging Contractor Policies To Ban Text Messaging While Driving

    Science.gov (United States)

    2010-09-29

    ... other outreach to employees about the safety risks associated with texting while driving. (d... Driving AGENCIES: Department of Defense (DoD), General Services Administration (GSA), and National... 13513, issued on October 1, 2009, entitled ``Federal Leadership on Reducing Text Messaging while Driving...

  3. Mobile text messaging solutions for obesity prevention

    Science.gov (United States)

    Akopian, David; Jayaram, Varun; Aaleswara, Lakshmipathi; Esfahanian, Moosa; Mojica, Cynthia; Parra-Medina, Deborah; Kaghyan, Sahak

    2011-02-01

    Cellular telephony has become a bright example of co-evolution of human society and information technology. This trend has also been reflected in health care and health promotion projects which included cell phones in data collection and communication chain. While many successful projects have been realized, the review of phone-based data collection techniques reveals that the existing technologies do not completely address health promotion research needs. The paper presents approaches which close this gap by extending existing versatile platforms. The messaging systems are designed for a health-promotion research to prevent obesity and obesity-related health disparities among low-income Latino adolescent girls. Messaging and polling mechanisms are used to communicate and automatically process response data for the target constituency. Preliminary survey data provide an insight on phone availability and technology perception for the study group.

  4. An Attitudinal Explanation of Biases in the Criminal Justice System: An Empirical Testing of Defensive Attribution Theory

    Science.gov (United States)

    Herzog, Sergio

    2008-01-01

    Theoretical perspectives, supported by empirical evidence, have consistently argued that the judicial treatment of offenders by criminal justice agents is sometimes biased by extralegal factors, such as offenders' sociodemographic characteristics. According to defensive attribution theory, individuals tend to protect themselves against unfortunate…

  5. Program Manager: Journal of the Defense Systems Management College. Volume 22, Number 3, May-June 1993

    Science.gov (United States)

    1993-06-01

    lr __________ r onM eth S()4 Greg Caruth _________________ William J. Perry, Typography and Design DEPSECDEF 43 Paula Croisetlere 3 Program Manager...the DSMC Press to be such a link to the govern- for publication consideration in either the brand ment and private sector defense acquisition com- new

  6. Activity of the Antioxidant Defense System in a Typical Bioinsecticide-and Synthetic Insecticide-treated Cowpea Storage Beetle F. (Coleoptera: Chrysomelidae

    Directory of Open Access Journals (Sweden)

    Ayodele O. Kolawole

    2014-01-01

    Full Text Available The non-enzymatic and enzymatic antioxidant defense systems play a major role in detoxification of pro-oxidant endobiotics and xenobiotics. The possible involvement of beetle non-enzymatic [α-tocopherol, glutathione (GSH, and ascorbic acid] and enzymatic [catalase (CAT, superoxide dismutase (SOD, peroxidase (POX, and polyphenol oxidase (PPO] antioxidant defense system on the insecticidal activity of synthetic insecticides (cypermethrin, 2,2-dicholorovinyl dimethyl phosphate, and λ-cyhalothrin and ethanolic plant extracts of Tithonia diversifolia, Cyperus rotundus, Hyptis suaveolens leaves , and Jatropha Curcas seeds was investigated. 2,2-Dicholorovinyl dimethyl phosphate (DDVP; 200 ppm, LC 50 = 13.24 ppm and T. diversifolia (20,000 ppm resulted in 100% beetle mortality at 96-hour post-treatment. The post-treatments significantly increased the beetle α-tocopherol and GSH contents. Activities of CAT, SOD, POX, and PPO were modulated by the synthetic insecticides and bioinsecticides to diminish the adverse effect of the chemical stresses. Quantitative and qualitative allelochemical compositions of bioinsecticides and chemical structure of synthetic insecticides possibly account and for modulation of their respective enzyme activities. Altogether, oxidative stress was enormous enough to cause maladaptation in insects. This study established that oxidative imbalance created could be the molecular basis of the efficacy of both insecticides and bio-insecticides. Two, there was development of functional but inadequate antioxidant defense mechanism in the beetle.

  7. Home - Defense Technology Security Administration

    Science.gov (United States)

    by @dtsamil Defense Technology Security Administration Mission, Culture, and History Executive Official seal of Defense Technology Security Administration Official seal of Defense Technology Security Administration OFFICE of the SECRETARY of DEFENSE Defense Technology Security Administration

  8. Field Test of Slow Moving Traffic Alerting System on Freeways in Las Vegas, Nevada : Assessment of the Effectiveness of the Dynamic Message Signs on the Freeways in Las Vegas, Nevada.

    Science.gov (United States)

    2015-10-17

    It has been perceived that the travelers do not respond to the incident messages on the dynamic message signs in the Las Vegas area in Nevada. The objective of the study is to evaluate whether dynamic message signs (DMS) in the Las Vegas freeway syst...

  9. Ballistic missile defense effectiveness

    Science.gov (United States)

    Lewis, George N.

    2017-11-01

    The potential effectiveness of ballistic missile defenses today remains a subject of debate. After a brief discussion of terminal and boost phase defenses, this chapter will focus on long-range midcourse defenses. The problems posed by potential countermeasures to such midcourse defenses are discussed as are the sensor capabilities a defense might have available to attempt to discriminate the actual missile warhead in a countermeasures environment. The role of flight testing in assessing ballistic missile defense effectiveness is discussed. Arguments made about effectiveness by missile defense supporters and critics are summarized.

  10. Perancangan dan Implementasi Sistem Informasi Layanan Short Messaging Service (SMS)

    OpenAIRE

    Rossy W, Cahyo; Wellem, Theophilus; Utomo, Wiranto Herry

    2006-01-01

    Development progress of Communication technology increase in a line with the people demand of the technology, such as Wireless communication technology, especially, Global System for Mobile Communication (GSM), which known as a digital mobile phone. Mobile phone used to send and receive short message in GSM network known as Short Messaging Service (SMS), besides communicate with another person by voice. In recent years, SMS is not just used for text-based communication tool between mobile pho...

  11. Optimizing Active Cyber Defense

    OpenAIRE

    Lu, Wenlian; Xu, Shouhuai; Yi, Xinlei

    2016-01-01

    Active cyber defense is one important defensive method for combating cyber attacks. Unlike traditional defensive methods such as firewall-based filtering and anti-malware tools, active cyber defense is based on spreading "white" or "benign" worms to combat against the attackers' malwares (i.e., malicious worms) that also spread over the network. In this paper, we initiate the study of {\\em optimal} active cyber defense in the setting of strategic attackers and/or strategic defenders. Specific...

  12. A Versatile System for the In-Field Non-Destructive Characterization of Radioactive Waste Packages and of Objects in the Defense against Nuclear Threats

    International Nuclear Information System (INIS)

    Buecherl, T.; Gostomski, Ch.-Lierse-von

    2013-06-01

    In-filed non-destructive characterization of radioactive waste packages and of objects in the defense of nuclear threats requires purpose-built but similar equipment. Based on commercially available measuring devices like dose-rate and gamma detectors, X-ray and gamma-transmission sources etc. a versatile and mobile mechanical positioning system for these devices is designed, assembled and operated facilitating basic to even complex measuring procedures. Several in-field measuring campaigns resulted in its further optimization. Today an highly mobile and flexible mechanical manipulator system is available supporting nearly all types of required measuring devices thus rising to nearly all occasions. (authors)

  13. Encoding and decoding messages with chaotic lasers

    International Nuclear Information System (INIS)

    Alsing, P.M.; Gavrielides, A.; Kovanis, V.; Roy, R.; Thornburg, K.S. Jr.

    1997-01-01

    We investigate the structure of the strange attractor of a chaotic loss-modulated solid-state laser utilizing return maps based on a combination of intensity maxima and interspike intervals, as opposed to those utilizing Poincare sections defined by the intensity maxima of the laser (I=0,Ie<0) alone. We find both experimentally and numerically that a simple, intrinsic relationship exists between an intensity maximum and the pair of preceding and succeeding interspike intervals. In addition, we numerically investigate encoding messages on the output of a chaotic transmitter laser and its subsequent decoding by a similar receiver laser. By exploiting the relationship between the intensity maxima and the interspike intervals, we demonstrate that the method utilized to encode the message is vital to the system close-quote s ability to hide the signal from unwanted deciphering. In this work alternative methods are studied in order to encode messages by modulating the magnitude of pumping of the transmitter laser and also by driving its loss modulation with more than one frequency. copyright 1997 The American Physical Society

  14. ZeroMQ messaging for many applications

    CERN Document Server

    Hintjens, Pieter

    2013-01-01

    Dive into ØMQ (aka ZeroMQ), the smart socket library that gives you fast, easy, message-based concurrency for your applications. With this quick-paced guide, you’ll learn hands-on how to use this scalable, lightweight, and highly flexible networking tool for exchanging messages among clusters, the cloud, and other multi-system environments. ØMQ maintainer Pieter Hintjens takes you on a tour of real-world applications, using extended examples in C to help you work with ØMQ’s API, sockets, and patterns. Learn how to use specific ØMQ programming techniques, build multithreaded applications, and create your own messaging architectures. You’ll discover how ØMQ works with several programming languages and most operating systems—with little or no cost. Learn ØMQ’s main patterns: request-reply, publish-subscribe, and pipeline Work with ØMQ sockets and patterns by building several small applications Explore advanced uses of ØMQ’s request-reply pattern through working examples Build reliable request...

  15. ZeroMQ: Messaging Made Simple

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Since its inception in 2007, ZeroMQ has defined a new product category of thin, fast, open source message transports. This little library has now grown into a large, vibrant community of projects tied together with standard protocols and APIs. Applications, written in any language, talk to each other over TCP, multicast, or inproc transports, using a single socket-based API, and a set of "patterns" (pub-sub, request-reply, dealer-router, pipeline). ZeroMQ handles message framing, batching, and I/O, but ignores aspects like serialization and persistence. By focussing on the essentials, and acting as a toolkit rather than a pre-packaged solution, ZeroMQ turns the complex problem of distributed computing into a relatively simple recipe. About the speaker Pieter Hintjens is a writer, programmer, and public speaker who has spent decades building large software systems, organizations, and businesses. He designed the Advanced Message Queuing Protocol (AMQP) in 2006 for JPMorganChase and left ...

  16. Future-based Static Analysis of Message Passing Programs

    Directory of Open Access Journals (Sweden)

    Wytse Oortwijn

    2016-06-01

    Full Text Available Message passing is widely used in industry to develop programs consisting of several distributed communicating components. Developing functionally correct message passing software is very challenging due to the concurrent nature of message exchanges. Nonetheless, many safety-critical applications rely on the message passing paradigm, including air traffic control systems and emergency services, which makes proving their correctness crucial. We focus on the modular verification of MPI programs by statically verifying concrete Java code. We use separation logic to reason about local correctness and define abstractions of the communication protocol in the process algebra used by mCRL2. We call these abstractions futures as they predict how components will interact during program execution. We establish a provable link between futures and program code and analyse the abstract futures via model checking to prove global correctness. Finally, we verify a leader election protocol to demonstrate our approach.

  17. Program Manager: Journal of the Defense Systems Management College. Volume 18, Number 3, May-June 1989

    Science.gov (United States)

    1989-06-01

    default. Slavery to a cost-discount rate options and, therefore, his ability to project F would cost $109.99 in year 2. can well lead a decision-maker to a...at hand. of recent allegations allegations and indictments for Symbiotic interaction of "knowing" unethical and unlawful individual con- professionals...contractor crease productivity substantially in unethical and managers. defense acquisition jobs and tasks. Productive acquisition management Background

  18. Sequencing the threat and recommendation components of persuasive messages differentially improves the effectiveness of high- and low-distressing imagery in an anti-alcohol message in students.

    Science.gov (United States)

    Brown, Stephen L; West, Charlotte

    2015-05-01

    Distressing imagery is often used to improve the persuasiveness of mass-reach health promotion messages, but its effectiveness may be limited because audiences avoid attending to content. Prior self-affirmation or self-efficacy inductions have been shown to reduce avoidance and improve audience responsiveness to distressing messages, but these are difficult to introduce into a mass-reach context. Reasoning that a behavioural recommendation may have a similar effect, we reversed the traditional threat-behavioural recommendation health promotion message sequence. 2 × 2 experimental design: Factor 1, high- and low-distress images; Factor 2, threat-recommendation and recommendation-threat sequences. Ninety-one students were exposed to an identical text message accompanied by high- or low-distress imagery presented in threat-recommendation and recommendation-threat sequences. For the high-distress message, greater persuasion was observed for the recommendation-threat than the threat-recommendation sequence. This was partially mediated by participants' greater self-exposure to the threat component of the message, which we attribute to the effect of sequence in reducing attentional avoidance. For the low-distress message, greater persuasion was observed for the threat-recommendation sequence, which was not mediated by reading time allocated to the threat. Tailoring message sequence to suit the degree of distress that message developers wish to induce provides a tool that could improve persuasive messages. These findings provide a first step in this process and discuss further steps needed to consolidate and expand these findings. Statement of contribution What is already known on this subject? Health promotion messages accompanied by distressing imagery might, under some circumstances, persuade individuals to engage in healthier behaviour. Audiences can respond defensively to distressing imagery, but may be less inclined to do so when an easily followed behavioural

  19. Systems Concepts for Integrated Air Defense of Multinational Mobile Crisis Reaction Forces (Concepts de systemes pour la defense aerienne integree de forces internationales mobiles d’intervention en situation de crise)

    Science.gov (United States)

    2001-03-01

    characteristics shown in Table 1 are based upon a conventional armoured formation, and implicitly at divisional level or above, they could also apply at lower...widely dispersed Ease of Physical big/hot mid-size/cool small/cold targeting Camouflage scrimmed draped visual full/thermal EMCON 4 3 2 1 Visibility...line of sight occulting/obscured non line of sight Contact static FLOT fluid confused melée Armour soft semi-hard hard defensive aids Protection

  20. Message network simulation

    OpenAIRE

    Shih, Kuo-Tung

    1990-01-01

    Approved for public release, distribution is unlimited This thesis presents a computer simulation of a multinode data communication network using a virtual network model to determine the effects of various system parameters on overall network performance. Lieutenant Commander, Republic of China (Taiwan) Navy