WorldWideScience

Sample records for defense message system

  1. The Defense Messaging System (DMS) in the Navy Regional Enterprise Messaging System (NREMS) Environment: Evidence that Size Does Matter in DoD Business Process Engineering

    Science.gov (United States)

    2007-06-01

    data repository that will create a metadata card for each message for use by the federated search catalog as a reference. c. Joint DMS Core Product...yet. Once resolved, NREMS can move forward afloat. The AMHS in concert with NCES will be updated with the federated search capability. AMHS

  2. Launch Control System Message Reduction

    Science.gov (United States)

    Nguyen, Uyen

    2014-01-01

    System Monitoring and Control (SMC) message browsers receive many messages daily that operators do not need to see. My job is to reduce the number of messages so that warning and emergency messages can be seen easily and therefore, responded to promptly. There are two methods to reduce messages: duplicate and state-based message correlations. With duplicate message correlation, SMC display the message the first time it shows up. The next times it occurs, a duplicate number will count the number of times the message appears. State-based message correlation is a process in which more informative messages acknowledge less useful ones and send them to history. I also work on correcting the severity level and text formats of messages. I follow two SMC message filtering tenets as I'm working on this project. Firstly, before filtering an offending message, a non-conformance (NC) must be created in order to attempt fixing that message through hardware or software. Only after the NC assessment states that it cannot fix an offending message, it can be filtered by SMC. Secondly, per Launch Control System (LCS) Coding Standards, SMC does not send information messages to the active message browser unless it's a response to an operator action.

  3. MessageSpace: a messaging system for health research

    Science.gov (United States)

    Escobar, Rodrigo D.; Akopian, David; Parra-Medina, Deborah; Esparza, Laura

    2013-03-01

    Mobile Health (mHealth) has emerged as a promising direction for delivery of healthcare services via mobile communication devices such as cell phones. Examples include texting-based interventions for chronic disease monitoring, diabetes management, control of hypertension, smoking cessation, monitoring medication adherence, appointment keeping and medical test result delivery; as well as improving patient-provider communication, health information communication, data collection and access to health records. While existing messaging systems very well support bulk messaging and some polling applications, they are not designed for data collection and processing of health research oriented studies. For that reason known studies based on text-messaging campaigns have been constrained in participant numbers. In order to empower healthcare promotion and education research, this paper presents a system dedicated for healthcare research. It is designed for convenient communication with various study groups, feedback collection and automated processing.

  4. Distributed parallel messaging for multiprocessor systems

    Science.gov (United States)

    Chen, Dong; Heidelberger, Philip; Salapura, Valentina; Senger, Robert M; Steinmacher-Burrow, Burhard; Sugawara, Yutaka

    2013-06-04

    A method and apparatus for distributed parallel messaging in a parallel computing system. The apparatus includes, at each node of a multiprocessor network, multiple injection messaging engine units and reception messaging engine units, each implementing a DMA engine and each supporting both multiple packet injection into and multiple reception from a network, in parallel. The reception side of the messaging unit (MU) includes a switch interface enabling writing of data of a packet received from the network to the memory system. The transmission side of the messaging unit, includes switch interface for reading from the memory system when injecting packets into the network.

  5. Upgrading messaging system on faculty systems

    OpenAIRE

    Farkaš, Aleš

    2014-01-01

    The graduation thesis provides a solution for the transition a part of mail servers of University of Ljubljana. The transition was carried out from the Microsoft Exchange Server 2003 to Microsoft Exchange Server 2010. Next to upgrade of messaging system, the upgrade of the Active Directory carriers has been needed. For this purpose the upgrade to Windows Server 2008 R2 has been performed. In the first part of the work, the overview of the process of the MS Exchange server and Outlook clie...

  6. The Message Reporting System in the ATLAS DAQ System

    Science.gov (United States)

    Caprini, M.; Fedorko, I.; Kolos, S.

    2008-06-01

    The Message Reporting System (MRS) in the ATLAS data acquisition system (DAQ) is one package of the Online Software which acts as a glue of various elements of DAQ, High Level Trigger (HLT) and Detector Control System (DCS). The aim of the MRS is to provide a facility which allows all software components in ATLAS to report messages to other components of the distributed DAQ system. The processes requiring a MRS are on one hand applications that report error conditions or information and on the other hand message processors that receive reported messages. A message reporting application can inject one or more messages into the MRS at any time. An application wishing to receive messages can subscribe to a message group according to defined criteria. The application receives messages that fulfill the subscription criteria when they are reported to MRS. The receiver message processing can consist of anything from simply logging the messages in a file/terminal to performing message analysis. The inter-process communication is achieved using the CORBA technology. The design, architecture and the used technology of MRS are reviewed in this paper.

  7. The Message Reporting System of the ATLAS DAQ System

    CERN Document Server

    Caprini, M; Kolos, S; 10th ICATPP Conference on Astroparticle, Particle, Space Physics, Detectors and Medical Physics Applications

    2008-01-01

    The Message Reporting System (MRS) in the ATLAS data acquisition system (DAQ) is one package of the Online Software which acts as a glue of various elements of DAQ, High Level Trigger (HLT) and Detector Control System (DCS). The aim of the MRS is to provide a facility which allows all software components in ATLAS to report messages to other components of the distributed DAQ system. The processes requiring a MRS are on one hand applications that report error conditions or information and on the other hand message processors that receive reported messages. A message reporting application can inject one or more messages into the MRS at any time. An application wishing to receive messages can subscribe to a message group according to defined criteria. The application receives messages that fulfill the subscription criteria when they are reported to MRS. The receiver message processing can consist of anything from simply logging the messages in a file/terminal to performing message analysis. The inter-process comm...

  8. Message composition and its application to event- driven system construction

    Directory of Open Access Journals (Sweden)

    A. Colesnicov

    1995-11-01

    Full Text Available Due to the object-oriented technology of event-driven system construction, the message composition may be used. Rules of message composition are alike those of program statement composition. The interpreting message queue is described which produces primitive messages from compound ones. The proposed conception lets to include the information on message dependence to compound messages themselves, which permits to simplify programs.

  9. Instant Apache Camel messaging system

    CERN Document Server

    Sharapov, Evgeniy

    2013-01-01

    Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks. A beginner's guide to Apache Camel that walks you through basic operations like installation and setup right through to developing simple applications.This book is a good starting point for Java developers who have to work on an application dealing with various systems and interfaces but who haven't yet started using Enterprise System Buses or Java Business Integration frameworks.

  10. Ballistic Missile Defense System (BMDS)

    Science.gov (United States)

    2015-12-01

    Estimate RDT&E - Research , Development, Test, and Evaluation SAR - Selected Acquisition Report SCP - Service Cost Position TBD - To Be Determined TY - Then...all ranges and in all phases of flight. Following guidance from the President, the Secretary of Defense approved the Ballistic Missile Defense (BMD...based Midcourse Defense (GMD) system to enhance our capability against Intercontinental Ballistic Missiles. We are currently sustaining 30

  11. Using Publish-Subscribe Messaging for System Status and Automation

    Science.gov (United States)

    Smith, Danford S.

    2015-01-01

    The NASA Goddard Mission Services Evolution Center (GMSEC) system is a message-based plug-and-play open system architecture used in many of NASA mission operations centers. This presentation will focus on the use of GMSEC standard messages to report and analyze the status of a system and enable the automation of the system's components. In GMSEC systems, each component reports its status using a keep-alive message and also publishes status and activities as log messages. In addition, the components can accept functional directive messages from the GMSEC message bus. Over the past several years, development teams have found ways to utilize these messages to create innovative display pages and increasingly sophisticated approaches to automation. This presentation will show the flexibility and value of the message-based approach to system awareness and automation.

  12. The message processing and distribution system development

    Science.gov (United States)

    Whitten, K. L.

    1981-06-01

    A historical approach is used in presenting the life cycle development of the Navy's message processing and distribution system beginning with the planning phase and ending with the integrated logistic support phase. Several maintenance problems which occurred after the system was accepted for fleet use were examined to determine if they resulted from errors in the acquisition process. The critical decision points of the acquisition process are examined and constructive recommendations are made for avoiding the problems which hindered the successful development of this system.

  13. Systemic defense signaling in tomato

    Institute of Scientific and Technical Information of China (English)

    LI Changbao; SUN Jiaqiang; JIANG Hongling; WU Xiaoyan; LI Chuanyou

    2005-01-01

    The wound-inducible expression of proteinase inhibitors (PIs) genes in tomato provides a powerful model system to elucidate the signal transduction pathway of sys- temic defense response. An increasing body of evidence indi- cates that systemin and jasmonic acid (JA) work in the same signaling pathway to activate the expression of PIs and other defense-related genes. However, little is known about how systemin and JA interact to regulate cell to cell communica- tion over long distances. Genetic analysis of the systemin/JA signaling pathway in tomato plants provides a unique opportunity to dissect the mechanism by which peptide and oxylipin signals interact to coordinate systemic expression of defense-related genes. Previously, it has been proposed that systemin is the long-distance mobile signal for systemic expression of defense related genes. However, recent genetic approach provided new evidence that jasmonic acid, rather than systemin, functions as the systemic wound signal, and that the peptide systemin works to regulate the biosynthesis of JA.

  14. Computer network defense system

    Science.gov (United States)

    Urias, Vincent; Stout, William M. S.; Loverro, Caleb

    2017-08-22

    A method and apparatus for protecting virtual machines. A computer system creates a copy of a group of the virtual machines in an operating network in a deception network to form a group of cloned virtual machines in the deception network when the group of the virtual machines is accessed by an adversary. The computer system creates an emulation of components from the operating network in the deception network. The components are accessible by the group of the cloned virtual machines as if the group of the cloned virtual machines was in the operating network. The computer system moves network connections for the group of the virtual machines in the operating network used by the adversary from the group of the virtual machines in the operating network to the group of the cloned virtual machines, enabling protecting the group of the virtual machines from actions performed by the adversary.

  15. Study of Defense Mechanism for Message Forwarding Based on DHT Model%基于DHT的消息转发防御机制研究

    Institute of Scientific and Technical Information of China (English)

    王建; 陈兴蜀; 冯伟森; 杨邓奇

    2011-01-01

    Distributed Hash Tables(DHT) is the key technology for structured P2P system to make resources organized and positioned efficiently.The security threats and the corresponding solving methods existing in the message forwarding process of DHT system were analyzed.Based on multi-path method,a defense mechanism with mixed routing was proposed to optimize the forwarding efficiency and safety.Firstly,a mixed routing combined the advantages of iterative and recursive routing was described in detail,which can efficiently forward the message with fewer messages overhead.Secondly,the message reliability and source authentication mechanism were improved to ensure message security in the forwarding process.In addition,the defense mechanism with mixed routing was tested in Sichuan University campus network.The simulation results showed that it has obvious effect on reducing the number of queries and increasing the success rate of forwarding message,which has a better defense effect against the attack in the forward phase.%DHT(Distributed Hash Tables)是结构化P2P(Peer to Peer)系统实现资源高效组织和定位的关键技术。对DTH系统中消息转发过程中的安全威胁及其解决方法进行了分析。以多路径算法为基础,对消息转发效率和安全性进行优化,提出了一种混合路由防御机制。首先结合迭代路由与递归路由的优点,设计了混合路由方式,保证了消息的转发效率并降低消息开销。然后改进了消息转发过程中的可靠性和消息源鉴别机制。最后,在四川大学校园网内进行了测试。仿真试验结果表明,采用混合路由下的防御机制在减少消息数量的同时提高了查询成功率,对于消息转发过程中的攻击有着较好的防御效果。

  16. Implementing message systems in multilevel secure environments: Problems and approaches

    Science.gov (United States)

    Martins, G. R.; Gaines, R. S.

    1982-07-01

    A study of the problems of building multilevel secure message systems. The need for such systems in the government and commercial sectors is growing. Designs are strongly affected by (1) the granularity of security protection (at the level of folders, messages, paragraphs, or words) and (2) planned departures from the Bell-LaPadula security model, for user convenience. A Taxonomy of design alternatives is defined, and 16 specific approaches are described and compared.

  17. NASIS data base management system - IBM 360/370 OS MVT implementation. 6: NASIS message file

    Science.gov (United States)

    1973-01-01

    The message file for the NASA Aerospace Safety Information System (NASIS) is discussed. The message file contains all the message and term explanations for the system. The data contained in the file can be broken down into three separate sections: (1) global terms, (2) local terms, and (3) system messages. The various terms are defined and their use within the system is explained.

  18. NASIS data base management system: IBM 360 TSS implementation. Volume 6: NASIS message file

    Science.gov (United States)

    1973-01-01

    The message file for the NASA Aerospace Safety Information System (NASIS) is discussed. The message file contains all the message and term explanations for the system. The data contained in the file can be broken down into three separate sections: (1) global terms, (2) local terms, and (3) system messages. The various terms are defined and their use within the system is explained.

  19. Risk Management Programs for Defense Acquisition Systems

    Science.gov (United States)

    2007-11-02

    The audit objective was to evaluate the effectiveness of risk management programs for Defense acquisition systems. Specifically, we determined whether DoD risk management policies and procedures for Defense acquisition systems were effectively implemented and what impact risk management programs bad on reducing program risks and costs. We also reviewed management controls as they applied to the audit objectives.

  20. MMS: An electronic message management system for emergency response

    DEFF Research Database (Denmark)

    Andersen, H.B.; Garde, H.; Andersen, V.

    1998-01-01

    This paper outlines the main features of an electronic communication system, MMS, designed to support coordination and exchange of information in connection with emergency management (EM) efforts, The design. of the MMS has been motivated by interviews with EM decision makers and reviews...... of communication and coordination problems observed during EM efforts and exercises, The system involves the use of a small set of message types designed to match the main categories of acts of communication in the domain of EM. Message tokens related to a sequence of message transactions fan he linked, and links......, Thus, users are able to define filters that capture, for instance, "unanswered requests sent out by me today" or "requests from me that have not been answered by an unconditional 'OK.'" Last, ne describe an associated preparedness plan module, which contains, for a given Ehl organization, its...

  1. Design and Implementation of a Wireless Message Display System

    Directory of Open Access Journals (Sweden)

    M. U. M. Bakura

    2016-08-01

    Full Text Available The technology of displaying message is an important part of communication and advertisement. In recent times, Wireless communication has announced its arrival on big stage and the world is going with Smartphone technology. This work describes the design and implementation of a microcontroller based messaging display system. The messaging display system will be interfaced with an android application which will then be used to display information from the comfort of one‘s phone to an LCD screen using the Bluetooth application interface. The work employs the use of an ATMEGA328p Microcontroller mounted on an Arduino board, a Bluetooth Module (HC-06 and an LCD screen. Most of these electronic display systems were using wired cable connections, the Bluetooth technology used in this work is aimed at solving the problem of wired cable connections.The microcontroller provides all the functionality of the display notices and wireless control. A desired text message from a mobile phone is sent via android mobile application to the Bluetooth module located at the receiving end. The Mobile Application was created using online software called App Inventor. When the entire system was connected and tested, it functioned as designed without any noticeable problems. The Bluetooth module responded to commands being sent from the android application appropriately and in a timely manner. The system was able to display 80 characters on the 4 x 20 LCD within the range of 10m as designated by the Bluetooth datasheet.

  2. User’s Manual for the Secure Military Message System M2 Prototype.

    Science.gov (United States)

    1986-03-28

    Franklin’s inbox . Listed here are the mesefe entries for messages currently in this measqe fi/l. The message entry shows the message’s sender , subject, type...Logout ....................................................... 2 Reading and Filing Mail ................................................... 2 Composing...concepts basic ___--___ to the system: the entity hierarchy, the elec- tronic mail functions, and the security Messages are sent and received in a

  3. Online Scheduling in Distributed Message Converter Systems

    NARCIS (Netherlands)

    Risse, Thomas; Wombacher, Andreas; Surridge, Mike; Taylor, Steve; Aberer, Karl

    2001-01-01

    The optimal distribution of jobs among hosts in distributed environments is an important factor to achieve high performance. The optimal strategy depends on the application. In this paper we present a new online scheduling strategy for distributed EDI converter system. The strategy is based on the B

  4. Online Scheduling in Distributed Message Converter Systems

    NARCIS (Netherlands)

    Risse, Thomas; Wombacher, Andreas; Surridge, Mike; Taylor, Steve; Aberer, Karl

    2001-01-01

    The optimal distribution of jobs among hosts in distributed environments is an important factor to achieve high performance. The optimal strategy depends on the application. In this paper we present a new online scheduling strategy for distributed EDI converter system. The strategy is based on the B

  5. Online Scheduling in Distributed Message Converter Systems

    NARCIS (Netherlands)

    Risse, Thomas; Wombacher, Andreas; Surridge, Mike; Taylor, Steve; Aberer, Karl

    The optimal distribution of jobs among hosts in distributed environments is an important factor to achieve high performance. The optimal strategy depends on the application. In this paper we present a new online scheduling strategy for distributed EDI converter system. The strategy is based on the

  6. Remote Monitoring System for Communication Base Based on Short Message

    Directory of Open Access Journals (Sweden)

    Han Yu Fu

    2013-07-01

    Full Text Available This paper presents design and development of an automatic monitoring system of communication base which is an important means to realize modernization of mobile communication base station management. Firstly, this paper proposes the architecture of the monitoring system. The proposed system consists of mocrocontrollers, sensors, GSM module and MFRC500 etc. The value of parameters is measured in the system including terminal is studied and designed, including hardware design based on embedded system and software design. Finally, communication module is discussed. The monitoring system which is designed  based on GSM SMS(short message service can improve the integrity, reliability, flexibility and intellectuality of monitoring system.

  7. Simple Messaging and Collaboration System for Heterogeneous Organizations Operating in Disaster Environments

    Science.gov (United States)

    2011-09-01

    visualization tools (such as mapping and GIS ), blogs, social networks, and sites that enable messaging over web and SMS such as Twitter and GroupMe...Mobile Phones Figure 2. System Components and Path of Messages. When a text message is sent from the phone, the message is geocoded to the users...representative then has an easy way to address the issue: Forward the geocoded message to a military representative who is also physically sitting nearby in

  8. The Defense Message System (DMS) Target Architecture and Implementation Strategy

    Science.gov (United States)

    1990-10-01

    upon and interact closely with the Directory and other network management entities. A primary objective is to manimize automation of the MGMT functions...other management considerations. The accreditation statement affixes security responsibility with the DAA and shows that due care has been taken for

  9. Running a Reliable Messaging Infrastructure for CERN's Control System

    CERN Document Server

    Ehm, F

    2011-01-01

    The current middleware for CERN’s Controls System is based on two implementations: CORBA-based Controls MiddleWare (CMW) and Java Messaging Service (JMS). The JMS service is realized using the open source messaging product ActiveMQ and had became an increasing vital part of beam operations as data need to be transported reliably for various areas such as the beam protection system, post mortem analysis, beam commissioning or the alarm system. The current JMS service is made of 18 brokers running either in clusters or as single nodes. The main service is deployed as a two node cluster providing failover and load balancing capabilities for high availability. Non-critical applications running on virtual machines or desktop machines read data via a third broker to decouple the load from the operational main cluster. This scenario has been introduced last year and the statistics showed an uptime of 99.998% and an average data serving rate of 1.6GByte per minute represented by around 150 messages per second. Depl...

  10. System and Method for Providing a Real Time Audible Message to a Pilot

    Science.gov (United States)

    Johnson, Walter W. (Inventor); Lachter, Joel B. (Inventor); Battiste, Vernol (Inventor); Koteskey, Robert W. (Inventor)

    2016-01-01

    A system and method for providing information to a crew of the aircraft while in-flight. The system includes a module having: a receiver for receiving a message while in-flight; a filter having a set of screening parameters and operative to filter the message based on the set of screening parameters; and a converter for converting the message into an audible message. The message includes a pilot report having at least one of weather information, separation information, congestion information, flight deviation information and destination information. The message is sent to the aircraft by another aircraft or an air traffic controller.

  11. Technical Evaluation Report 6: Chat and Instant Messaging Systems

    Directory of Open Access Journals (Sweden)

    Jennifer Stein

    2002-04-01

    Full Text Available Text-based conferencing can be both asynchronous (i.e., participants log into the conference at separate times, and synchronous (i.e., interaction takes place in real time. It is thus subject to the same wide variation as the online audio- and video-conferencing methods (see the earlier Reports in this series. Synchronous text-based approaches (e.g., online chat groups and instant messaging systems are highly popular among online users generally owing to their ability to bring together special-interest groups from around the world without cost. In distance education (DE, however, synchronous chat methods are less widely used, owing in part to the problems of arranging for working adults in different time zones to join a discussion group simultaneously. Instant text messaging is more popular among DE users in view of the choice it provides between responding to a message immediately (synchronous communication or after a delay (asynchronous. The different synchronous and asynchronous approaches are likely to become more widely used in parallel with one another, as they are integrated in individual product packages.

  12. Fault-tolerant Agreement in Synchronous Message-passing Systems

    CERN Document Server

    Raynal, Michel

    2010-01-01

    The present book focuses on the way to cope with the uncertainty created by process failures (crash, omission failures and Byzantine behavior) in synchronous message-passing systems (i.e., systems whose progress is governed by the passage of time). To that end, the book considers fundamental problems that distributed synchronous processes have to solve. These fundamental problems concern agreement among processes (if processes are unable to agree in one way or another in presence of failures, no non-trivial problem can be solved). They are consensus, interactive consistency, k-set agreement an

  13. Department of Defense Healthcare Management System Modernization (DHMSM)

    Science.gov (United States)

    2016-03-01

    2016 Major Automated Information System Annual Report Department of Defense Healthcare Management System Modernization (DHMSM) Defense...Secretary of Defense PB - President’s Budget RDT&E - Research, Development, Test, and Evaluation SAE - Service Acquisition Executive TBD - To Be...DSN Fax: Date Assigned: November 16, 2015 Program Information Program Name Department of Defense Healthcare Management System Modernization

  14. Intelligent systems for strategic power infrastructure defense

    Science.gov (United States)

    Jung, Ju-Hwan

    A fault or disturbance in a power system can be severe due to the sources of vulnerability such as human errors, protection and control system failures, a failure of communication networks to deliver critical control signals, and market and load uncertainties. There have been several catastrophic failures resulting from disturbances involving the sources of vulnerability while power systems are designed to withstand disturbances or faults. To avoid catastrophic failures or minimize the impact of a disturbance(s), the state of the power system has to be analyzed correctly and preventive or corrective self-healing control actions have to be deployed. This dissertation addresses two aspects of power systems: Defense system and diagnosis, both concerned with the power system analysis and operation during events involving faults or disturbances. This study is intended to develop a defense system that is able to assess power system vulnerability and to perform self-healing control actions based on the system-wide analysis. In order to meet the requirements of the system-wide analysis, the defense system is designed with multi-agent system technologies. Since power systems are dynamic and uncertain the self-healing control actions need to be adaptive. This study applies the reinforcement learning technique to provide a theoretical basis for adaptation. One of the important issues in adaptation is the convergence of the learning algorithm. An appropriate convergence criterion is derived and an application with a load-shedding scheme is demonstrated in this study. This dissertation also demonstrates the feasibility of the defense system and self-healing control actions through multi-agent system technologies. The other subject of this research is to investigate the methodology for on-line fault diagnosis using the information from Sequence-of-Events Recorders (SER). The proposed multiple-hypothesis analysis generates one or more hypothetical fault scenarios to interpret the

  15. Analysis and Design of Instant Message System Based on P2P

    Institute of Scientific and Technical Information of China (English)

    Shen Zhiwei; Ma Shaowu

    2008-01-01

    By analyzing current development conditions of mainstream Instant Message technologies and services, some detailed discussion about technical solution and formal operation deployment strategies of P2P Instant Message Services based on Interact is made. Several crucial problems of P2P Instant Message System about services management, interconnection with other instant message, security and profit-making mode are analyzed,, and how to develop P2P IM Services is proposed.

  16. Error message recording and reporting in the SLC control system

    Energy Technology Data Exchange (ETDEWEB)

    Spencer, N.; Bogart, J.; Phinney, N.; Thompson, K.

    1985-04-01

    Error or information messages that are signaled by control software either in the VAX host computer or the local microprocessor clusters are handled by a dedicated VAX process (PARANOIA). Messages are recorded on disk for further analysis and displayed at the appropriate console. Another VAX process (ERRLOG) can be used to sort, list and histogram various categories of messages. The functions performed by these processes and the algorithms used are discussed.

  17. Error message recording and reporting in the SLC control system

    Energy Technology Data Exchange (ETDEWEB)

    Spencer, N.; Bogart, J.; Phinney, N.; Thompson, K.

    1985-10-01

    Error or information messages that are signaled by control software either in the VAX host computer or the local microprocessor clusters are handled by a dedicated VAX process (PARANOIA). Messages are recorded on disk for further analysis and displayed at the appropriate console. Another VAX process (ERRLOG) can be used to sort, list and histogram various categories of messages. The functions performed by these processes and the algorithms used are discussed.

  18. Extracting messages masked by chaotic signals of time-delay systems.

    Science.gov (United States)

    Zhou, C; Lai, C H

    1999-07-01

    We show how to extract messages masked by a chaotic signal of a time-delay system with very high dimensions and many positive Lyapunov exponents. Using a special embedding coordinate, the infinite-dimensional phase space of the time-delay system is projected onto a special three-dimensional space, which enables us to identify the time delay of the system from the transmitted signal and reconstruct the chaotic dynamics to unmask the hidden message successfully. The message extraction procedure is illustrated by simulations with the Mackey-Glass time-delay system for two types of masking schemes and different kinds of messages.

  19. Real-time mobile customer short message system design and implementation

    Science.gov (United States)

    Han, Qirui; Sun, Fang

    To expand the current mobile phone short message service, and to make the contact between schools, teachers, parents and feedback of the modern school office system more timely and conveniently, designed and developed the Short Message System based on the Linux platform. The state-of-the-art principles and designed proposals in the Short Message System based on the Linux platform are introduced. Finally we propose an optimized secure access authentication method. At present, many schools,vbusinesses and research institutions ratify the promotion and application the messaging system gradually, which has shown benign market prospects.

  20. Driver performance while text messaging using handheld and in-vehicle systems.

    Science.gov (United States)

    Owens, Justin M; McLaughlin, Shane B; Sudweeks, Jeremy

    2011-05-01

    This study presents an evaluation of driver performance while text messaging via handheld mobile phones and an in-vehicle texting system. Participants sent and received text messages while driving with an experimenter on a closed-road course, using their personal mobile phones and the vehicle's system. The test vehicle was an instrumented 2010 Mercury Mariner equipped with an OEM in-vehicle system that supports text messaging and voice control of mobile devices via Bluetooth, which was modified to allow text message sending during driving. Twenty participants were tested, 11 younger (19-34) and 9 older (39-51). All participants were regular users of the in-vehicle system, although none had experience with the texting functions. Results indicated that handheld text message sending and receiving resulted in higher mental demand, more frequent and longer glances away from the roadway, and degraded steering measures compared to baseline. Using the in-vehicle system to send messages showed less performance degradation, but still had more task-related interior glance time and higher mental demand than baseline; using the system's text-to-speech functionality for incoming messages showed no differences from baseline. These findings suggest that using handheld phones to send and receive text messages may interfere with drivers' visual and steering behaviors; the in-vehicle system showed improvement, but performance was not at baseline levels during message sending.

  1. Characterizing Computation-Communication Overlap in Message-Passing Systems

    Energy Technology Data Exchange (ETDEWEB)

    David E. Bernholdt; Jarek Nieplocha; P. Sadayappan; Aniruddha G. Shet; Vinod Tipparaju

    2008-01-31

    Effective overlap of computation and communication is a well understood technique for latency hiding and can yield significant performance gains for applications on high-end computers. In this report, we describe an instrumentation framework developed for message-passing systems to characterize the degree of overlap of communication with computation in the execution of parallel applications. The inability to obtain precise time-stamps for pertinent communication events is a significant problem, and is addressed by generation of minimum and maximum bounds on achieved overlap. The overlap measures can aid application developers and system designers in investigating scalability issues. The approach has been used to instrument two MPI implementations as well as the ARMCI system. The implementation resides entirely within the communication library and thus integrates well with existing approaches that operate outside the library. The utility of the framework is demonstrated by analyzing communication-computation overlap for micro-benchmarks and the NAS benchmarks, and the insights obtained are used to modify the NAS SP benchmark, resulting in improved overlap.

  2. Characteristics of electronic patient-provider messaging system utilisation in an urban health care organisation

    Directory of Open Access Journals (Sweden)

    Sean Patrick Mikles

    2014-12-01

    Full Text Available Introduction Research suggests that electronic messaging can improve patient engagement. Studies indicate that a ‘digital divide’ may exist, where certain patient populations may be using electronic messaging less frequently. This study aims to determine which patient characteristics are associated with different levels of usage of an electronic patient-provider messaging system in a diverse urban population.Methods Cross-sectional electronic health record data were extracted for patients 10 years of age or older who live in New York City and who visited a set of clinics between 1 July 2011 and 30 June 2012. Regression analyses determined which participant characteristics were associated with the sending of electronic messages.Results Older, female, English-speaking participants of white race who received more messages, had any diagnoses, more office visits and a provider who sent messages were more likely to send more messages. Non-Millennial, non-white participants who received fewer messages, had more office visits, any diagnoses, a provider who saw fewer patients with patient portal accounts, lived in a low socioeconomic status neighbourhood, and did not have private insurance were more likely to send zero messages.Conclusion This study found significant differences in electronic messaging usage based on demographic, socioeconomic and health-related patient characteristics. Future studies are needed to support these results and determine the causes of observed associations.

  3. Issues in defense training systems immersive displays

    Science.gov (United States)

    Gaylord, Philip

    2006-05-01

    Display technology for DOD immersive projector-based flight training systems are at a crossroads as CRT technology slowly disappears from the market place. From the DOD perspective, emerging technologies arrive poorly matched to satisfy training needs. The DOD represents a minority voice in the marketplace. Current issues include: Satisfying requirements for black level, brightness and contrast ratio, Establishing standard metrics for resolution, system performance and reliability, Obtaining maintainability and self-calibration in multi-channel arrays, Reducing screen cross-reflection in wrap-around immersive display arrays. Laser, DLP, and LCOS projector systems are compared for their current acceptance and problems in defense flight training systems. General requirements of visual display systems are discussed and contrasted for flight trainers for low flyers (helicopters) high flyers (tactical aircraft) in real-time immersive, networked systems. FLIR and NVG simulation techniques are described.

  4. HL7 Messaging Engine with Customizable Translation System

    Directory of Open Access Journals (Sweden)

    PRODAN, R.

    2010-05-01

    Full Text Available This paper introduces a new client-server messaging engine used to exchange clinical data between various medical software applications. Our portal uses the HL7 (Health Level Seven messaging standard to provide translated clinical data to HL7 and non-HL7 client applications. We used HL7 because this standard is worldwide used to facilitate the communication between clinical applications.

  5. Evaluating User Experiences of the Secure Messaging Tool on the Veterans Affairs’ Patient Portal System

    Science.gov (United States)

    Lind, Jason D; Shimada, Stephanie L; Martin, Tracey L; Gosline, Robert M; Antinori, Nicole; Stewart, Max; Simon, Steven R

    2014-01-01

    Background The United States Department of Veterans Affairs has implemented an electronic asynchronous “Secure Messaging” tool within a Web-based patient portal (ie, My HealtheVet) to support patient-provider communication. This electronic resource promotes continuous and coordinated patient-centered care, but to date little research has evaluated patients’ experiences and preferences for using Secure Messaging. Objective The objectives of this mixed-methods study were to (1) characterize veterans’ experiences using Secure Messaging in the My HealtheVet portal over a 3-month period, including system usability, (2) identify barriers to and facilitators of use, and (3) describe strategies to support veterans’ use of Secure Messaging. Methods We recruited 33 veterans who had access to and had previously used the portal’s Secure Messaging tool. We used a combination of in-depth interviews, face-to-face user-testing, review of transmitted secure messages between veterans and staff, and telephone interviews three months following initial contact. We assessed participants’ computer and health literacy during initial and follow-up interviews. We used a content-analysis approach to identify dominant themes in the qualitative data. We compared inferences from each of the data sources (interviews, user-testing, and message review) to identify convergent and divergent data trends. Results The majority of veterans (27/33, 82%) reported being satisfied with Secure Messaging at initial interview; satisfaction ratings increased to 97% (31/32, 1 missing) during follow-up interviews. Veterans noted Secure Messaging to be useful for communicating with their primary care team to manage health care needs (eg, health-related questions, test requests and results, medication refills and questions, managing appointments). Four domains emerged from interviews: (1) perceived benefits of using Secure Messaging, (2) barriers to using Secure Messaging, (3) facilitators for using

  6. A social-based cyber-physical system for distributed message transmission

    Science.gov (United States)

    Chen, Kang; Shen, Haiying

    2014-06-01

    The explosive increase of the availability of personal mobile devices has brought about a significant amount of peer-to-peer communication opportunities upon their encountering, which can be exploited to realize distributed message transmission among mobile devices. However, the opportunistic encountering among mobile devices, which is determined by the mobility of their holders, has introduced great difficulties on efficiently transmitting a message to its designated destination. Actually, people usually present a certain pattern on daily mobility. Further, device holders often belong to a certain social network community. Therefore, in this paper, we propose a social- based cyber-physical system for distributed message transmission, namely SocMessaging, by integrating both the mobility pattern and the social network of device holders. When selecting an encountered node for message relay, in addition to the node's historical encountering records with the destination node, SocMessaging also considers its social closeness with the destination node. Then, the message is always transmitted to the node that is most likely to meet its destination. As a result, SocMessaging closely connects the cyber world (i.e., network), physical world (i.e., people) and social network (i.e., social connection). Finally, our experimental results demonstrate the efficiency of the proposed system in message transmission between device holders.

  7. Mobile Messaging Services-Based Personal Electrocardiogram Monitoring System

    Directory of Open Access Journals (Sweden)

    Ashraf A. Tahat

    2009-01-01

    Full Text Available A mobile monitoring system utilizing Bluetooth and mobile messaging services (MMS/SMSs with low-cost hardware equipment is proposed. A proof of concept prototype has been developed and implemented to enable transmission of an Electrocardiogram (ECG signal and body temperature of a patient, which can be expanded to include other vital signs. Communication between a mobile smart-phone and the ECG and temperature acquisition apparatus is implemented using the popular personal area network standard specification Bluetooth. When utilizing MMS for transmission, the mobile phone plots the received ECG signal and displays the temperature using special application software running on the client mobile phone itself, where the plot can be captured and saved as an image before transmission. Alternatively, SMS can be selected as a transmission means, where in this scenario, dedicated application software is required at the receiving device. The experimental setup can be operated for monitoring from anywhere in the globe covered by a cellular network that offers data services.

  8. Mobile messaging services-based personal electrocardiogram monitoring system.

    Science.gov (United States)

    Tahat, Ashraf A

    2009-01-01

    A mobile monitoring system utilizing Bluetooth and mobile messaging services (MMS/SMSs) with low-cost hardware equipment is proposed. A proof of concept prototype has been developed and implemented to enable transmission of an Electrocardiogram (ECG) signal and body temperature of a patient, which can be expanded to include other vital signs. Communication between a mobile smart-phone and the ECG and temperature acquisition apparatus is implemented using the popular personal area network standard specification Bluetooth. When utilizing MMS for transmission, the mobile phone plots the received ECG signal and displays the temperature using special application software running on the client mobile phone itself, where the plot can be captured and saved as an image before transmission. Alternatively, SMS can be selected as a transmission means, where in this scenario, dedicated application software is required at the receiving device. The experimental setup can be operated for monitoring from anywhere in the globe covered by a cellular network that offers data services.

  9. Using Instant Messaging Systems as a Platform for Electronic Voting

    Science.gov (United States)

    Meletiadou, Anastasia; Grimm, Rüdiger

    Many Instant Messaging (IM) systems like Skype or Spark offer ex tended services such as file sharing, VoIP, or a shared whiteboard. As the name suggests, IM applications are predominantly used for spontaneous text-based communication for private or business purposes. In this paper we explore their potential to serve as platforms for secure collaborative applications like electronic contract negotiation, e-payment or electronic voting. Such applications have to deal with challenges like time constraints (“instant” com munication is desired), integration of media channels and the absence of one uni fying “sphere of control” covering all participants. In this paper, we address these challenges by discussing one particular secure collaborative application: secure decision processes for small groups. We provide the following contribu tions: (1) we define three varying scenarios and corresponding security require ments (2) we present an IM-based architecture implementing these scenarios, in cluding a Video-based authentication mechanism, and (3) we discuss poten tial attack patterns.

  10. Mobile Messaging Services-Based Personal Electrocardiogram Monitoring System

    Science.gov (United States)

    Tahat, Ashraf A.

    2009-01-01

    A mobile monitoring system utilizing Bluetooth and mobile messaging services (MMS/SMSs) with low-cost hardware equipment is proposed. A proof of concept prototype has been developed and implemented to enable transmission of an Electrocardiogram (ECG) signal and body temperature of a patient, which can be expanded to include other vital signs. Communication between a mobile smart-phone and the ECG and temperature acquisition apparatus is implemented using the popular personal area network standard specification Bluetooth. When utilizing MMS for transmission, the mobile phone plots the received ECG signal and displays the temperature using special application software running on the client mobile phone itself, where the plot can be captured and saved as an image before transmission. Alternatively, SMS can be selected as a transmission means, where in this scenario, dedicated application software is required at the receiving device. The experimental setup can be operated for monitoring from anywhere in the globe covered by a cellular network that offers data services. PMID:19707531

  11. A Scalable and Reliable Message Transport Service for the ATLAS Trigger and Data Acquisition System

    CERN Document Server

    Kazarov, A; The ATLAS collaboration; Kolos, S; Lehmann Miotto, G; Soloviev, I

    2014-01-01

    The ATLAS Trigger and Data Acquisition (TDAQ) is a large distributed computing system composed of several thousands of interconnected computers and tens of thousands applications. During a run, TDAQ applications produce a lot of control and information messages with variable rates, addressed to TDAQ operators or to other applications. Reliable, fast and accurate delivery of the messages is important for the functioning of the whole TDAQ system. The Message Transport Service (MTS) provides facilities for the reliable transport, the filtering and the routing of the messages, basing on publish-subscribe-notify communication pattern with content-based message filtering. During the ongoing LHC shutdown, the MTS was re-implemented, taking into account important requirements like reliability, scalability and performance, handling of slow subscribers case and also simplicity of the design and the implementation. MTS uses CORBA middleware, a common layer for TDAQ infrastructure, and provides sending/subscribing APIs i...

  12. Emergency Message Dissemination System for Smartphones During Natural Disasters

    NARCIS (Netherlands)

    Wu, Xian; Mazurowski, Maciej; Chen, Zhen; Meratnia, Nirvana

    This paper revolves around the concept of utilizing the modern smartphone communication capabilities to transmit messages through an ad hoc network during a disaster, which renders the traditional cellular base station inaccessible. Due to dynamic and decentralized nature of the considered

  13. Verification of Faulty Message Passing Systems with Continuous State Space in PVS

    Science.gov (United States)

    Pilotto, Concetta; White, Jerome

    2010-01-01

    We present a library of Prototype Verification System (PVS) meta-theories that verifies a class of distributed systems in which agent commu nication is through message-passing. The theoretic work, outlined in, consists of iterative schemes for solving systems of linear equations , such as message-passing extensions of the Gauss and Gauss-Seidel me thods. We briefly review that work and discuss the challenges in formally verifying it.

  14. Free radicals, antioxidant defense systems, and schizophrenia.

    Science.gov (United States)

    Wu, Jing Qin; Kosten, Thomas R; Zhang, Xiang Yang

    2013-10-01

    The etiopathogenic mechanisms of schizophrenia are to date unknown, although several hypotheses have been suggested. Accumulating evidence suggests that excessive free radical production or oxidative stress may be involved in the pathophysiology of schizophrenia as evidenced by increased production of reactive oxygen or decreased antioxidant protection in schizophrenic patients. This review aims to summarize the basic molecular mechanisms of free radical metabolism, the impaired antioxidant defense system and membrane pathology in schizophrenia, their interrelationships with the characteristic clinical symptoms and the implications for antipsychotic treatments. In schizophrenia, there is accumulating evidence of altered antioxidant enzyme activities and increased levels of lipid peroxidation, as well as altered levels of plasma antioxidants. Moreover, free radical-mediated abnormalities may contribute to specific aspects of schizophrenic symptomatology and complications of its treatment with antipsychotic drugs, as well as the development of tardive dyskinesia (TD). Finally, the potential therapeutic strategies implicated by the accumulating data on oxidative stress mechanisms for the treatment of schizophrenia are discussed.

  15. THE DEFENSE PLANNING SYSTEMS AND THEIR IMPLICATIONS

    Directory of Open Access Journals (Sweden)

    Laszlo STICZ

    2010-01-01

    Full Text Available Defense planning in the Alliance is a fundamental element of the arrangements which enable its member countries to enjoy the crucial political, military and resource advantages of collective defense and other common military efforts to enhance security and stability. In this respect, the aim of this paper is to outline the role of the Armed Forces and the specific processes aiming to achieve the ultimate goal of a nation regarding national security, with focus on defense planning and the PDPS.

  16. Towards Preserving the Confidentiality of Information in a Local Area Network (LAN Messaging System

    Directory of Open Access Journals (Sweden)

    Aderonke Favour-Bethy THOMPSON

    2013-01-01

    Full Text Available Messaging system remains preeminent as themedium of official communication. The fear of confidentialitybeing breached has led many organizations in developingvarious ways in checking the excesses of unwanted users. In themessaging system designed, users are allowed to send andreceive messages with the options of either encrypting the dataor not. The Substitution Permutation Network (SPN, an AESencryption algorithm, implemented in the messaging systemmakes information sent over the network ‘useless’ whencompromised so as to reduce the damage done wheneversensitive and classified information gets to the wrong hands. Theapplication was implemented and tested and was found to be effective.

  17. Deception used for Cyber Defense of Control Systems

    Energy Technology Data Exchange (ETDEWEB)

    Wayne F. Boyer; Miles A. McQueen

    2009-05-01

    Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

  18. Defense Globalization: Impacts on the United States Defense Acquisition System

    Science.gov (United States)

    2007-12-01

    munitions and sub-systems to fit these U.S. platforms. One such case involved Rafael developing the Popeye missile to be used on the Israeli...version of the McDonnell Douglas F-4E. In the late 1980s, the USAF viewed the Popeye as a short- term solution to its requirement for smart munitions and...purchased the Popeye directly “off the shelf” from Rafael. The USAF then went on to partner with Rafael in modifying and marketing the munitions to

  19. Minimizing the Message Waiting Time in Single-Hop Multichannel Systems

    OpenAIRE

    Martelli, Francesca; Bonuccelli, Maurizio

    2010-01-01

    In this paper, we examine the problem of packet scheduling in a single-hop multichannel systems, with the goal of minimizing the average message waiting time. Such an objective function represents the delay incurred by the users before receiving the desired data. We show that the problem of finding a schedule with minimum message waiting time, is NP-complete, by means of polynomial time reduction of the time table design problem to our problem. We present also several heuristics which result ...

  20. A Message Exchange Protocol in Command and Control Systems Integration, using the JC3IEDM

    Science.gov (United States)

    2014-06-01

    19TH International Command and Control Research and Technology Symposium C2 Agility: Lessons Learned from Research and Operations. A Message...overhead during packets reading. The service-oriented architecture (SOA) with the use of Web Services technology was chosen because of ease of learning ... Enviroments . IEEE Communications Magazine (Feb. 1997), 46-55. A Message Exchange Protocol in Command and Control Systems Integration, using the

  1. Design of Instant Messaging System of Multi-language E-commerce Platform

    Science.gov (United States)

    Yang, Heng; Chen, Xinyi; Li, Jiajia; Cao, Yaru

    2017-09-01

    This paper aims at researching the message system in the instant messaging system based on the multi-language e-commerce platform in order to design the instant messaging system in multi-language environment and exhibit the national characteristics based information as well as applying national languages to e-commerce. In order to develop beautiful and friendly system interface for the front end of the message system and reduce the development cost, the mature jQuery framework is adopted in this paper. The high-performance server Tomcat is adopted at the back end to process user requests, and MySQL database is adopted for data storage to persistently store user data, and meanwhile Oracle database is adopted as the message buffer for system optimization. Moreover, AJAX technology is adopted for the client to actively pull the newest data from the server at the specified time. In practical application, the system has strong reliability, good expansibility, short response time, high system throughput capacity and high user concurrency.

  2. Multiparty Quantum Secret Sharing of Classical Message using Cavity Quantum Electrodynamic System

    Institute of Scientific and Technical Information of China (English)

    HAN Lian-Fang; LIU Yi-Min; ZHANG Zhan-Jun

    2006-01-01

    @@ An experimental feasible scheme of multiparty secret sharing of classical messages is proposed, based on a cavity quantum electrodynamic system. The secret messages are imposed on atomic Bell states initially in the sender's possession by local unitary operations. By swapping quantum entanglement of atomic Bell states, the secret messages are split into several parts and each part is distributed to a separate party. In this case, any subset of the entire party group can not read out the secret message but the entirety via mutual cooperations. In this scheme, to discriminate atomic Bell states, additional classical fields are employed besides the same highly-detuned single-mode cavities used to prepare atomic Bell states. This scheme is insensitive to the cavity decay and the thermal field, and usual joint Bell-state measurements are unnecessary.

  3. Propositional Dynamic Logic for Message-Passing Systems

    CERN Document Server

    Bollig, Benedikt; Meinecke, Ingmar

    2010-01-01

    We examine a bidirectional propositional dynamic logic (PDL) for finite and infinite message sequence charts (MSCs) extending LTL and TLC$^{-}$. By this kind of multi-modal logic we can express properties both in the entire future and in the past of an event. Path expressions strengthen the classical until operator of temporal logic. For every formula defining an MSC language, we construct a communicating finite-state machine (CFM) accepting the same language. The CFM obtained has size exponential in the size of the formula. This synthesis problem is solved in full generality, i.e., also for MSCs with unbounded channels. The model checking problem for CFMs and HMSCs turns out to be in PSPACE for existentially bounded MSCs. Finally, we show that, for PDL with intersection, the semantics of a formula cannot be captured by a CFM anymore.

  4. Multiple node remote messaging

    Energy Technology Data Exchange (ETDEWEB)

    Blumrich, Matthias A. (Ridgefield, CT); Chen, Dong (Croton on Hudson, NY); Gara, Alan G. (Mount Kisco, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Ohmacht, Martin (Yorktown Heights, NY); Salapura, Valentina (Chappaqua, NY); Steinmacher-Burow, Burkhard (Esslingen, DE); Vranas, Pavlos (Danville, CA)

    2010-08-31

    A method for passing remote messages in a parallel computer system formed as a network of interconnected compute nodes includes that a first compute node (A) sends a single remote message to a remote second compute node (B) in order to control the remote second compute node (B) to send at least one remote message. The method includes various steps including controlling a DMA engine at first compute node (A) to prepare the single remote message to include a first message descriptor and at least one remote message descriptor for controlling the remote second compute node (B) to send at least one remote message, including putting the first message descriptor into an injection FIFO at the first compute node (A) and sending the single remote message and the at least one remote message descriptor to the second compute node (B).

  5. Effectiveness of a Mobile Short-Message-Service-Based Disease Outbreak Alert System in Kenya.

    Science.gov (United States)

    Toda, Mitsuru; Njeru, Ian; Zurovac, Dejan; O-Tipo, Shikanga; Kareko, David; Mwau, Matilu; Morita, Kouichi

    2016-04-01

    We conducted a randomized, controlled trial to test the effectiveness of a text-messaging system used for notification of disease outbreaks in Kenya. Health facilities that used the system had more timely notifications than those that did not (19.2% vs. 2.6%), indicating that technology can enhance disease surveillance in resource-limited settings.

  6. [mSalUV: a new mobile messaging system for diabetes control in Mexico].

    Science.gov (United States)

    Cabrera Mendoza, Néstor Iván; Castro Enriquez, Pedro Pablo; Demeneghi Marini, Verónica Patricia; Fernández Luque, Luis; Morales Romero, Jaime; Sainz Vazquez, Luis; Ortiz León, María Cristina

    2014-01-01

    Design and develop a mobile messaging system called mSalUV, which reminds patients with type 2 diabetes about taking their medication and attending appointments and promotes healthy lifestyles, and explore patient opinion regarding use of the system. The study had three stages: 1) design and development of mSalUV; 2) design and development of text messages; and 3) exploration of patient opinion regarding use of mSalUV. The mSalUV system was created and around 40 text messages were designed. A total of 1 850 messages were sent during the 45 day intervention. Patients thought that mSalUV helped them to treat their disease and that it was easy to use, they were inclined to continue using the system in the future, and people close to them (family members and support networks) supported them using it. Furthermore, they perceived the system as "someone that cared about them." The results suggest that a system such as mSalUV would be well accepted by its potential users; in this case, people with type 2 diabetes. This presents a very interesting scenario that will enable taking advantage of new technologies for health. Further research is needed to evaluate the system's efficiency and effectiveness.

  7. Multi-Modal Intelligent Traffic Signal Systems Basic Safety Message

    Data.gov (United States)

    Department of Transportation — Data were collected during the Multi-Modal Intelligent Transportation Signal Systems (MMITSS) study. MMITSS is a next-generation traffic signal system that seeks to...

  8. Modeling message sequences for intrusion detection in industrial control systems

    NARCIS (Netherlands)

    Caselli, Marco; Zambon, Emmanuele; Petit, Jonathan; Kargl, Frank; Rice, Mason; Shenoi, Sujeet

    2015-01-01

    Compared with standard information technology systems, industrial control systems show more consistent and regular communications patterns. This characteristic contributes to the stability of controlled processes in critical infrastructures such as power plants, electric grids and water treatment fa

  9. Technical Evaluation Report 14: Chat and Instant Messaging Systems (synchronous): Report 2/ 3

    OpenAIRE

    Ellen Kinsel; Merv Roy; Hartley Waldman; Donna (M. M.) Woloschuk; Patrick J. Fahy

    2002-01-01

    This study extends the earlier review of online chat systems (Report 6), by reviewing a further seven products that provide text-based instant messaging (IM). The functionality of these products in distance education contexts is stressed in relation to their comparative costs, complexity, control, clarity, technical framework, and other functional options.

  10. Technical Evaluation Report 14: Chat and Instant Messaging Systems (synchronous: Report 2/ 3

    Directory of Open Access Journals (Sweden)

    Ellen Kinsel

    2002-10-01

    Full Text Available This study extends the earlier review of online chat systems (Report 6, by reviewing a further seven products that provide text-based instant messaging (IM. The functionality of these products in distance education contexts is stressed in relation to their comparative costs, complexity, control, clarity, technical framework, and other functional options.

  11. A critical analysis of the X.400 model of message handling systems

    NARCIS (Netherlands)

    van Sinderen, Marten J.; Dorregeest, Evert

    1988-01-01

    The CCITT X.400 model of store and forward Message Handling Systems (MHS) serves as a common basis for the definition of electronic mail services and protocols both within CCITT and ISO. This paper presents an analysis of this model and its related recommendations from two perspectives. First the

  12. A critial anaysis of the X.400 model of message handling systems

    NARCIS (Netherlands)

    van Sinderen, Marten J.; Dorregeest, E.

    1988-01-01

    The CTIT X.400 model of store and forward Message Handling Systems (MHS) serves as a common basis for the definition of electronic mail services and protocols both within CTIT and ISO. This paper presents an analysis of this model and its related recommendations from two perspectives. First the

  13. A privacy protection for an mHealth messaging system

    Science.gov (United States)

    Aaleswara, Lakshmipathi; Akopian, David; Chronopoulos, Anthony T.

    2015-03-01

    In this paper, we propose a new software system that employs features that help the organization to comply with USA HIPAA regulations. The system uses SMS as the primary way of communication to transfer information. Lack of knowledge about some diseases is still a major reason for some harmful diseases spreading. The developed system includes different features that may help to communicate amongst low income people who don't even have access to the internet. Since the software system deals with Personal Health Information (PHI) it is equipped with an access control authentication system mechanism to protect privacy. The system is analyzed for performance to identify how much overhead the privacy rules impose.

  14. The Synthesis Method of Automated System of Operational Planning in Low-Space Communication System Messaging

    Directory of Open Access Journals (Sweden)

    Serhii Kovbasiuk

    2017-04-01

    Full Text Available One of the reasons for the decrease of efficiency in low-speed communication systems, satellite communication, which are based on nanoplatform is a high degree of operational planning centralisation. To overcome this problem the method which carries out the distribution of tasks of communications operational planning minimizing the exchange of information between spatially remote sites, and takes into account the computing performance of software and hardware was developed. The technique is based on the use of methods of structural and parametric synthesis, simulation and statistical analysis of the results. Its use allows to obtain the optimal structure of the automated system of operational planning in low-space communication system messaging evaluation of efficiency in terms of fixed communication of information load.

  15. Configuration of Distributed Message Converter Systems using Performance Modeling

    NARCIS (Netherlands)

    Aberer, Karl; Risse, Thomas; Wombacher, Andreas

    2001-01-01

    To find a configuration of a distributed system satisfying performance goals is a complex search problem that involves many design parameters, like hardware selection, job distribution and process configuration. Performance models are a powerful tools to analyse potential system configurations, howe

  16. Design and implementation of modular home security system with short messaging system

    Directory of Open Access Journals (Sweden)

    Budijono Santoso

    2014-03-01

    Full Text Available Today we are living in 21st century where crime become increasing and everyone wants to secure they asset at their home. In that situation user must have system with advance technology so person do not worry when getting away from his home. It is therefore the purpose of this design to provide home security device, which send fast information to user GSM (Global System for Mobile mobile device using SMS (Short Messaging System and also activate - deactivate system by SMS. The Modular design of this Home Security System make expandable their capability by add more sensors on that system. Hardware of this system has been designed using microcontroller AT Mega 328, PIR (Passive Infra Red motion sensor as the primary sensor for motion detection, camera for capturing images, GSM module for sending and receiving SMS and buzzer for alarm. For software this system using Arduino IDE for Arduino and Putty for testing connection programming in GSM module. This Home Security System can monitor home area that surrounding by PIR sensor and sending SMS, save images capture by camera, and make people panic by turn on the buzzer when trespassing surrounding area that detected by PIR sensor. The Modular Home Security System has been tested and succeed detect human movement.

  17. Design and implementation of modular home security system with short messaging system

    Science.gov (United States)

    Budijono, Santoso; Andrianto, Jeffri; Axis Novradin Noor, Muhammad

    2014-03-01

    Today we are living in 21st century where crime become increasing and everyone wants to secure they asset at their home. In that situation user must have system with advance technology so person do not worry when getting away from his home. It is therefore the purpose of this design to provide home security device, which send fast information to user GSM (Global System for Mobile) mobile device using SMS (Short Messaging System) and also activate - deactivate system by SMS. The Modular design of this Home Security System make expandable their capability by add more sensors on that system. Hardware of this system has been designed using microcontroller AT Mega 328, PIR (Passive Infra Red) motion sensor as the primary sensor for motion detection, camera for capturing images, GSM module for sending and receiving SMS and buzzer for alarm. For software this system using Arduino IDE for Arduino and Putty for testing connection programming in GSM module. This Home Security System can monitor home area that surrounding by PIR sensor and sending SMS, save images capture by camera, and make people panic by turn on the buzzer when trespassing surrounding area that detected by PIR sensor. The Modular Home Security System has been tested and succeed detect human movement.

  18. Sharing Memory Robustly in Message-Passing Systems

    Science.gov (United States)

    1990-02-16

    ust: a very restricted form of communication. Chor and Moscovici ([20]) present a hierarchy of resiliency for problems in shared-memory systems and...1985. [20] B. Chor, and L. Moscovici , Solvability in Asynchronous Environments, Proc. 30th Syrup. on Foun- * dations of Comp. Sc~en ce, pp. 422-427, 1989

  19. Endlessly Circulating Messages in IEEE 1588-2008 Systems

    Science.gov (United States)

    2014-05-13

    National Science Foundation, NSF awards #0720882 ( CSR -EHS: PRET) and #0931843 (ActionWebs), the Naval Research Laboratory (NRL #N0013-12- 1-G015), and...Software Systems (CHESS) at UC Berkeley (supported by the National Science Founda- tion, NSF awards #0720882 ( CSR -EHS: PRET) and #0931843 (ActionWebs), the...IV-B the following observations can be made on the disconnect models shown: • There are definitely conditions that spawn rogue mes- sages. For the

  20. Characterizing Computation-Communication Overlap in Message-Passing Systems

    Energy Technology Data Exchange (ETDEWEB)

    David E. Bernholdt; Jarek Nieplocha; P. Sadayappan; Aniruddha G. Shet; Vinod Tipparaju

    2008-01-31

    Effective overlap of computation and communication is a well understood technique for latency hiding and can yield significant performance gains for applications on high-end computers. In this report, we describe an instrumentation framework developed for messagepassing systems to characterize the degree of overlap of communication with computation in the execution of parallel applications. The inability to obtain precise time-stamps for pertinent communication events is a significant problem, and is addressed by generation of minimum and maximum bounds on achieved overlap. The overlap measures can aid application developers and system designers in investigating scalability issues. The approach has been used to instrument two MPI implementations as well as the ARMCI system. The implementation resides entirely within the communication library and thus integrates well with existing approaches that operate outside the library. The utility of the framework is demonstrated by analyzing communication-computation overlap for micro-benchmarks and the NAS benchmarks, and the insights obtained are used to modify the NAS SP benchmark, resulting in improved overlap.

  1. Multiple operating system rotation environment moving target defense

    Science.gov (United States)

    Evans, Nathaniel; Thompson, Michael

    2016-03-22

    Systems and methods for providing a multiple operating system rotation environment ("MORE") moving target defense ("MTD") computing system are described. The MORE-MTD system provides enhanced computer system security through a rotation of multiple operating systems. The MORE-MTD system increases attacker uncertainty, increases the cost of attacking the system, reduces the likelihood of an attacker locating a vulnerability, and reduces the exposure time of any located vulnerability. The MORE-MTD environment is effectuated by rotation of the operating systems at a given interval. The rotating operating systems create a consistently changing attack surface for remote attackers.

  2. Secure Data Network System (SDNS) network, transport, and message security protocols

    Science.gov (United States)

    Dinkel, C.

    1990-03-01

    The Secure Data Network System (SDNS) project, implements computer to computer communications security for distributed applications. The internationally accepted Open Systems Interconnection (OSI) computer networking architecture provides the framework for SDNS. SDNS uses the layering principles of OSI to implement secure data transfers between computer nodes of local area and wide area networks. Four security protocol documents developed by the National Security Agency (NSA) as output from the SDNS project are included. SDN.301 provides the framework for security at layer 3 of the OSI Model. Cryptographic techniques to provide data protection for transport connections or for connectionless-mode transmission are described in SDN.401. Specifications for message security service and protocol are contained in SDN.701. Directory System Specifications for Message Security Protocol are covered in SDN.702.

  3. Technical Evaluation Reports 15. Chat and Instant Messaging Systems (synchronous: Report 3/ 3

    Directory of Open Access Journals (Sweden)

    Brian Ludwig

    2002-10-01

    Full Text Available [Previous reviews of chat and IM systems are presented in Reports 6 and 14 in this series.]A further set of four text-based instant messaging (IM products was evaluated: AT&T Anywhere, Parachat, Sonork, and Yahoo Messenger, all available at no cost. Yahoo Messenger was judged to be the most effective of the three products for use by distance education (DE teachers and students, being compatible with most common operating systems and accommodating up to 50 chat room participants. Yahoo Messenger also possesses integrated audio and video capabilities. AT&T Anywhere is an efficient product, which supports Windows-based operating systems only. Parachat (Basic version is a basic, browser accessed chat board without instant messaging (IM capabilities.

  4. Information Management Principles Applied to the Ballistic Missile Defense System

    Science.gov (United States)

    2007-03-01

    of a BMDS. From this, the Army produced the Nike- Zeus system comprised of four radars, the Zeus missile, and a computer fire control system (General...made the Nike- Zeus our first National Missile Defense (NMD) system named Sentinel. The architecture was to cover 14 locations, 10 of which were...fostered the database system and representation of data in a hierarchy (Galliers & Leidner, 2003). Soon the limits of hierarchies were identified and

  5. Virtual file system on NoSQL for processing high volumes of HL7 messages.

    Science.gov (United States)

    Kimura, Eizen; Ishihara, Ken

    2015-01-01

    The Standardized Structured Medical Information Exchange (SS-MIX) is intended to be the standard repository for HL7 messages that depend on a local file system. However, its scalability is limited. We implemented a virtual file system using NoSQL to incorporate modern computing technology into SS-MIX and allow the system to integrate local patient IDs from different healthcare systems into a universal system. We discuss its implementation using the database MongoDB and describe its performance in a case study.

  6. A Mobile Message Scheduling and Delivery System using m-Learning framework

    CERN Document Server

    Majumder, Moumita

    2010-01-01

    Wireless data communications in form of Short Message Service (SMS) and Wireless Access Protocols (WAP) browsers have gained global popularity, yet, not much has been done to extend the usage of these devices in electronic learning (e-learning) and information sharing. This project explores the extension of e learning into wireless/ handheld (W/H) computing devices with the help of a mobile learning (m-learning) framework. This framework provides the requirements to develop m-learning application that can be used to share academic and administrative information among people within the university campus. A prototype application has been developed to demonstrate the important functionality of the proposed system in simulated environment. This system is supposed to work both in bulk SMS and interactive SMS delivery mode. Here we have combined both Short Message Service (SMS) and Wireless Access Protocols (WAP) browsers. SMS is used for Short and in time information delivery and WAP is used for detailed informati...

  7. Ontology-Driven Instant Messaging-Based Dialogue System for Device Control

    KAUST Repository

    Noguera-Arnaldos, José Ángel

    2015-10-14

    The im4Things platform aims to develop a communication interface for devices in the Internet of the Things (IoT) through intelligent dialogue based on written natural language over instant messaging services. This type of communication can be established in different ways such as order sending and, status querying. Also, the devices themselves are responsible for alerting users when a change has been produced in the device’s sensors. The system has been validated and it has obtained promising results.

  8. REQUIREMENTS FOR SYSTEMS DEVELOPMENT LIFE CYCLE MODELS FOR LARGE-SCALE DEFENSE SYSTEMS

    Directory of Open Access Journals (Sweden)

    Kadir Alpaslan DEMIR

    2015-10-01

    Full Text Available TLarge-scale defense system projects are strategic for maintaining and increasing the national defense capability. Therefore, governments spend billions of dollars in the acquisition and development of large-scale defense systems. The scale of defense systems is always increasing and the costs to build them are skyrocketing. Today, defense systems are software intensive and they are either a system of systems or a part of it. Historically, the project performances observed in the development of these systems have been signifi cantly poor when compared to other types of projects. It is obvious that the currently used systems development life cycle models are insuffi cient to address today’s challenges of building these systems. Using a systems development life cycle model that is specifi cally designed for largescale defense system developments and is effective in dealing with today’s and near-future challenges will help to improve project performances. The fi rst step in the development a large-scale defense systems development life cycle model is the identifi cation of requirements for such a model. This paper contributes to the body of literature in the fi eld by providing a set of requirements for system development life cycle models for large-scale defense systems. Furthermore, a research agenda is proposed.

  9. Usage of Message Queueing Technologies in the ATLAS Distributed Data Management System

    Science.gov (United States)

    Calfayan, Philippe; Dongsong, Zang; Garonne, Vincent

    2011-12-01

    The ATLAS Distributed Data Management system is composed of semi-autonomous, heterogeneous, and independently designed subsystems. To achieve successful operation of such a system, the activities of the agents controlling the subsystems have to be coordinated. In addition, external applications can require to synchronize on events relative to data availability. A common way to proceed is to implement polling strategies within the distributed components, which leads to an increase of the load in the overall system. We describe an alternative based on notifications using standard message queuing. The application of this technology in the distributed system has been exercised.

  10. Flood risk and economically optimal safety targets for coastal flood defense systems

    NARCIS (Netherlands)

    Dupuits, E.J.C.; Schweckendiek, T.

    2015-01-01

    A front defense can improve the reliability of a rear defense in a coastal flood defense system. The influence of this interdependency on the accompanying economically optimal safety targets of both front and rear defense is investigated. The results preliminary suggest that the optimal safety level

  11. A Message-Passing Hardware/Software Cosimulation Environment for Reconfigurable Computing Systems

    Directory of Open Access Journals (Sweden)

    Manuel Saldaña

    2009-01-01

    Full Text Available High-performance reconfigurable computers (HPRCs provide a mix of standard processors and FPGAs to collectively accelerate applications. This introduces new design challenges, such as the need for portable programming models across HPRCs and system-level verification tools. To address the need for cosimulating a complete heterogeneous application using both software and hardware in an HPRC, we have created a tool called the Message-passing Simulation Framework (MSF. We have used it to simulate and develop an interface enabling an MPI-based approach to exchange data between X86 processors and hardware engines inside FPGAs. The MSF can also be used as an application development tool that enables multiple FPGAs in simulation to exchange messages amongst themselves and with X86 processors. As an example, we simulate a LINPACK benchmark hardware core using an Intel-FSB-Xilinx-FPGA platform to quickly prototype the hardware, to test the communications. and to verify the benchmark results.

  12. Message Structures: a modelling technique for information systems analysis and design

    CERN Document Server

    España, Sergio; Pastor, Óscar; Ruiz, Marcela

    2011-01-01

    Despite the increasing maturity of model-driven software development (MDD), some research challenges remain open in the field of information systems (IS). For instance, there is a need to improve modelling techniques so that they cover several development stages in an integrated way, and they facilitate the transition from analysis to design. This paper presents Message Structures, a technique for the specification of communicative interactions between the IS and organisational actors. This technique can be used both in the analysis stage and in the design stage. During analysis, it allows abstracting from the technology that will support the IS, and to complement business process diagramming techniques with the specification of the communicational needs of the organisation. During design, Message Structures serves two purposes: (i) it allows to systematically derive a specification of the IS memory (e.g. a UML class diagram), (ii) and it allows to reason the user interface design using abstract patterns. Thi...

  13. Blue Rose perimeter defense and security system

    Science.gov (United States)

    Blackmon, F.; Pollock, J.

    2006-05-01

    An in-ground perimeter security system has been developed by the Naval Undersea Warfare Center Division Newport based upon fiber optic sensor technology. The system, called Blue Rose, exploits the physical phenomenon of Rayleigh optical scattering, which occurs naturally in optical fibers used traditionally for Optical Time Domain Reflectometry techniques to detect sound and vibration transmitted by intruders such as people walking or running and moving vehicles near the sensor. The actual sensor is a single-mode optical fiber with an elastomeric coating that is buried in the ground. A long coherence length laser is used to transmit encoded light down the fiber. Minute changes in the fiber in response to the intrusion produce phase changes to the returning backscattered light signal. The return light signal contains both the actual intrusion sound and the location information of where along the fiber the intrusion has occurred. A digital, in-ground, Blue Rose system has been built and is now operational at NUWC. Due to the low cost of the optical fiber sensor and unique benefits of the system, the Blue Rose system provides an advantage in long perimeter or border security applications and also reduces security manning requirements and therefore overall cost for security.

  14. The effect of mobile phone short messaging system on healthy food choices among Iranian postmenopausal women

    Directory of Open Access Journals (Sweden)

    Mahdis Vakili

    2015-01-01

    Full Text Available Introduction: Central adiposity and metabolic syndrome are quite common among postmenopausal women. Dietary diversity and healthy food choices have essential role in health and also in prevention of obesity. The main objective of this study was to evaluate the impact of mobile phone short messaging system on healthy food choices among Iranian postmenopausal women. Materials and Methods: This was a randomized controlled trial in which 100 postmenopausal women aged 40-60 years were recruited and assigned to two groups (50 each in the intervention and control groups. Food frequency consumption was measured using a questionnaire. A total of 16 text messages including information about modification of food selection (healthy choices, benefits, methods, etc., were sent to participants in the intervention group during 4 months follow-up (1/week. The Chi-square and independent t-test used for data analysis. Ninety-two women completed the study. Results: The consumption of Vitamin A rich fruits and vegetables significantly increased in the intervention group compared to the control group (P < 0.001. More women in the intervention group consumed fish after intervention (P = 0.02. The consumption of green leafy vegetables showed a nonsignificant increase in the intervention group. Conclusion: Using mobile phone short messaging system can improve the healthy food choices regarding Vitamin A rich fruits and vegetables and fish among postmenopausal women.

  15. The clinical usefulness of a web-based messaging system between patients with Crohn disease and their physicians.

    Science.gov (United States)

    Jeong, Da Eun; Kim, Kyeong Ok; Jang, Byung Ik; Kim, Eun Young; Jung, Jin Tae; Jeon, Seong Woo; Lee, Hyun Seok; Kim, Eun Soo; Park, Kyung Sik; Cho, Kwang Bum

    2016-06-01

    To avoid missing events associated with clinical activity, the authors previously developed a novel, web-based, self-reporting Crohn disease (CD) symptom diary. However, although this diary provided a means of self-checking based on responses to set questions based on Harvey-Bradshaw index scores, it was limited in terms of describing other specific symptoms. Thus, the authors added a space to the questionnaire, which allows patients to send clinicians questions or a description of unpredictable events. The aim of the present study was to assess the clinical usefulness of this messaging system by analyzing patients' messages.The messaging system between patients and their doctors was included in a webpage created for recording patients' symptom diaries (www.cdsd.or.kr). Using this system, patients can send messages easily at any time and doctors can read and respond to these messages immediately using a smart phone or computer. In the present study, the authors retrospectively reviewed 686 messages sent by 152 patients from July 2012 to July 2014 and patient medical records.Mean patient age was 29.0 ± 11.6 years and the male-to-female ratio was 99:53. Most messages regarded symptoms (381 messages, 55.5%), which was followed by self-reports about general condition (195 messages, 28.4%) and questions about treatment (71 messages, 10.3%). With respect to symptoms, abdominal pain was most common (145 cases, 21.1%) followed by hematochezia (36 cases, 5.2%). Problems about medication were the most frequently associated with treatment (65, 91.5%). Patients above 40 years showed a greater tendency to focus on symptoms and treatment (P = 0.025). The doctor answer rate was 56.3% (n = 386), and based on these responses, an early visit was needed in 28 cases (7.3%).Using this web-based messaging system, patients were able to obtain proper advice from their physicians without visiting clinics or searching the Internet, and in addition, 7.3% of messages prompted an early

  16. A SECURE MESSAGE TRANSMISSION SYSTEM ARCHITECTURE FOR COMPUTER NETWORKS EMPLOYING SMART CARDS

    Directory of Open Access Journals (Sweden)

    Geylani KARDAŞ

    2008-01-01

    Full Text Available In this study, we introduce a mobile system architecture which employs smart cards for secure message transmission in computer networks. The use of smart card provides two security services as authentication and confidentiality in our design. The security of the system is provided by asymmetric encryption. Hence, smart cards are used to store personal account information as well as private key of each user for encryption / decryption operations. This offers further security, authentication and mobility to the system architecture. A real implementation of the proposed architecture which utilizes the JavaCard technology is also discussed in this study.

  17. Performance of the Defense Acquisition System. 2014 Annual Report

    Science.gov (United States)

    2014-06-13

    contractors to “win the franchise ” to become the sole-source producer of a system. Contractors are often willing to accept lower development...margins to win this production franchise . 86 Performance of the Defense Acquisition System, 2014 Figure 3-1. Final Margin on MDAP Development and...profits if the contractors determine the longer-term benefits from “winning the franchise ” form a good investment. Both types of sole-source contracts

  18. Impact of a Collective Intelligence Tailored Messaging System on Smoking Cessation: The Perspect Randomized Experiment.

    Science.gov (United States)

    Sadasivam, Rajani Shankar; Borglund, Erin M; Adams, Roy; Marlin, Benjamin M; Houston, Thomas K

    2016-11-08

    Outside health care, content tailoring is driven algorithmically using machine learning compared to the rule-based approach used in current implementations of computer-tailored health communication (CTHC) systems. A special class of machine learning systems ("recommender systems") are used to select messages by combining the collective intelligence of their users (ie, the observed and inferred preferences of users as they interact with the system) and their user profiles. However, this approach has not been adequately tested for CTHC. Our aim was to compare, in a randomized experiment, a standard, evidence-based, rule-based CTHC (standard CTHC) to a novel machine learning CTHC: Patient Experience Recommender System for Persuasive Communication Tailoring (PERSPeCT). We hypothesized that PERSPeCT will select messages of higher influence than our standard CTHC system. This standard CTHC was proven effective in motivating smoking cessation in a prior randomized trial of 900 smokers (OR 1.70, 95% CI 1.03-2.81). PERSPeCT is an innovative hybrid machine learning recommender system that selects and sends motivational messages using algorithms that learn from message ratings from 846 previous participants (explicit feedback), and the prior explicit ratings of each individual participant. Current smokers (N=120) aged 18 years or older, English speaking, with Internet access were eligible to participate. These smokers were randomized to receive either PERSPeCT (intervention, n=74) or standard CTHC tailored messages (n=46). The study was conducted between October 2014 and January 2015. By randomization, we compared daily message ratings (mean of smoker ratings each day). At 30 days, we assessed the intervention's perceived influence, 30-day cessation, and changes in readiness to quit from baseline. The proportion of days when smokers agreed/strongly agreed (daily rating ≥4) that the messages influenced them to quit was significantly higher for PERSPeCT (73%, 23/30) than

  19. The Defense Systems Acquisition and Review Council

    Science.gov (United States)

    1976-09-15

    competition; and (i) Validity of contractor proposals. (3) For systems proposed for initial produccion : (a) Feasibility of production, Including "evaluation...Industrial Preparedness ASD(I&L) DoD Instruction Production Planning 4005.3 Procedures Industrial Preparedness ASD(I&L) DoD �.3M Planning Manual ...Guidance Manual ," July 1, 1971 authorized by DoD Instruction 7110-.1, August 23, 1968 I, PURPOSE This Instruction establishes policy and instruction

  20. Design Skills and Prototyping for Defense Systems

    Science.gov (United States)

    2015-04-30

    Abrams tank. New variants are being ordered to maintain the single production plant in Lima , Ohio, even though the Army has sufficient quantities to...References Arena, M. V., Leonard, R. S., Murray, S. E., & Younossi, O. (2006). Historical cost growth of completed weapon system programs. Santa Monica, CA...development (R- 4161-ACQ). Santa Monica, CA: RAND. Drezner, J. A., & Huang, M. (2009). On prototyping: Lessons from RAND research. Santa Monica

  1. Strategic Defense System; Integrated Logistics Support Plan.

    Science.gov (United States)

    2007-11-02

    WEAPONS SBI SBL GBL NPB iiiwiiiii BSTS SSTS AOS CC/SOIF NTB :-.’-’\\.;v::v-X’X:.’:^v::v:.-:vS...Validation of test methods C. Evaluate test results IV. Simulation and Modelling A. Methodology B. Requirements C. Validation D. National Test Bed n...equipment and the systems they support; - On-the-job training capabilities incorporated in the prime equipment design as a method of reducing the need

  2. System Earned Readiness Management for Defense Acquisition

    Science.gov (United States)

    2009-01-01

    Pugh  1991),  Kasser’s  ( Kasser  2004)  First  Requirements   Elucidator  Demonstration  (FRED),  Integrated  Design  Model...Council  on  Systems   Engineering  (NCOSE),  Seattle,  Washington.   Kasser ,  J.  E.  (2004).  "The  first  requirements

  3. Protokol Interchangeable Data pada VMeS (Vessel Messaging System dan AIS (Automatic Identification System

    Directory of Open Access Journals (Sweden)

    Farid Andhika

    2012-09-01

    Full Text Available VMeS (Vessel Messaging System merupakan komunikasi berbasis radio untuk mengirimkan pesan antara VMeS terminal kapal di laut dengan VMeS gateway di darat. Dalam perkembangan sistem monitoring kapal di laut umumnya menggunakan AIS (Automatic Identification System yang telah digunakan di seluruh pelabuhan untuk memantau kondisi kapal dan mencegah tabrakan antar kapal. Dalam penelitian ini akan dirancang format data yang sesuai untuk VMeS agar bisa dilakukan proses interchangeable ke AIS sehingga bisa dibaca oleh AIS receiver yang ditujukan untuk kapal dengan ukuran dibawah 30 GT (Gross Tonnage. Format data VmeS dirancang dalam tiga jenis yaitu data posisi, data informasi kapal dan data pesan pendek yang akan dilakukan interchangeable dengan AIS tipe 1,4 dan 8. Pengujian kinerja sistem interchangeable menunjukkan bahwa dengan peningkatan periode pengiriman pesan maka lama delay total meningkat tetapi packet loss menurun. Pada pengiriman pesan setiap 5 detik dengan kecepatan 0-40 km/jam, 96,67 % data dapat diterima dengan baik. Data akan mengalami packet loss jika level daya terima dibawah -112 dBm . Jarak terjauh yang dapat dijangkau modem dengan kondisi bergerak yaitu informatika ITS dengan jarak 530 meter terhadap Laboratorium B406 dengan level daya terima -110 dBm.

  4. System justification and the defense of committed relationship ideology.

    Science.gov (United States)

    Day, Martin V; Kay, Aaron C; Holmes, John G; Napier, Jaime L

    2011-08-01

    A consequential ideology in Western society is the uncontested belief that a committed relationship is the most important adult relationship and that almost all people want to marry or seriously couple (DePaulo & Morris, 2005). In the present article, we investigated the extent to which the system justification motive may contribute to the adoption of this ideology. In Studies 1 and 2, we examined whether a heightened motive to maintain the status quo would increase defense of committed relationship values. In Study 3, we examined the reverse association, that is, whether a threat to committed relationship ideology would also affect sociopolitical system endorsement. As past research has found that the justification of political systems depends upon how much these systems are perceived as controlling, in Study 4 we tested whether the defense of the system of committed relationships would also increase when framed as controlling. Results from Studies 1-4 were consistent with our hypotheses, but only for men. In Study 5, using cross-cultural data, we sought to replicate these findings correlationally and probe for a cause of the gender effect. Results from more than 33,000 respondents indicated a relationship (for men) between defense of the sociopolitical system and defense of marriage in countries where the traditional advantages of men over women were most threatened. In Studies 6 and 7, we investigated when this gender difference disappears. Results revealed that when we measured (Study 6) or manipulated (Study 7) personal relationship identity rather than relationship ideology, effects also emerge for women.

  5. Patient-to-physician messaging: volume nearly tripled as more patients joined system, but per capita rate plateaued.

    Science.gov (United States)

    Crotty, Bradley H; Tamrat, Yonas; Mostaghimi, Arash; Safran, Charles; Landon, Bruce E

    2014-10-01

    Patients want to be able to communicate with their physicians by e-mail. However, physicians are often concerned about the impact that such communications will have on their time, productivity, and reimbursement. Typically, physicians are not reimbursed for time spent communicating with patients electronically. But under federal meaningful-use criteria for information technology, physicians can receive a modest incentive for such communications. Little is known about trends in secure e-mail messaging between physicians and patients. To understand these trends, we analyzed the volume of messages in a large academic health system's patient portal in the period 2001-10. At the end of 2010, 49,778 patients (22.7 percent of all patients seen within the system) had enrolled in the portal, and 36.9 percent of enrolled patients (8.4 percent of all patients) had sent at least one message to a physician. Physicians in the aggregate saw a near tripling of e-mail messages during the study period. However, the number of messages per hundred patients per month stabilized between 2005 and 2010, at an average of 18.9 messages. As physician reimbursement moves toward global payments, physicians' and patients' participation in secure messaging will likely increase, and electronic communication should be considered part of physicians' job descriptions.

  6. Passive automatic anti-piracy defense system of ships

    Science.gov (United States)

    Szustakowski, M.; Życzkowski, M.; Ciurapiński, W.; Karol, M.; Kastek, M.; Stachowiak, R.; Markowski, P.

    2013-10-01

    The article describes the technological solution for ship self-defense against pirate attacks. The paper presents the design solutions in the field of direct physical protection. All the solutions are connected with the latest optoelectronic and microwave systems and sensors to detect, recognize and the threat posed by pirates. In particular, tests of effectiveness and the detection-range of technology demonstrator developed by a team of authors were carried out.

  7. Pop-up messages in order communication systems can increase awareness of osteoporosis among physicians and improve osteoporosis treatment.

    Science.gov (United States)

    Kim, Joon Yub; Yoo, Jeong Hyun; Kim, Ji Wan; Sung, Gwang Young; Jung, Jae Hong; Cho, Yohan; Park, Jai Hyung

    2016-12-01

    The purpose of this study was to verify the effect of pop-up messages (regarding a history of dual-energy X-ray absorptiometry [DXA]) on the identification and management of osteoporosis after osteoporotic hip or spine fractures. We hypothesized that these pop-up messages would increase the awareness and management of osteoporosis among clinicians and patients. We introduced pop-up messages regarding a history of DXA in our Order Communication System (March 2012) and evaluated the records of 404 patients who were treated between January 2011 and December 2012. The patients were categorized as being treated without the pop-up messages (Group I, before March 2012) or with the pop-up messages (Group II, after March 2012). We compared their rates of DXA prescription, osteoporosis medication, exercise, mortality and subsequent refractures during a 2-year follow-up. After introducing the pop-up messages, the DXA prescription rate increased from 35.1 to 57.1% (P pop-up messages positively affected the behaviours of orthopaedic surgeons and were associated with increased rates of prescription of DXA, osteoporosis medication, and might affect the behaviour of patient, increased exercise rate. Therefore, we recommend using this simple and effective method to improve physicians' awareness of osteoporosis. © 2016 John Wiley & Sons, Ltd.

  8. Patient-To-Physician Messaging: Volume Nearly Tripled As More Patients Joined System, But Per Capita Rate Plateaued

    Science.gov (United States)

    Crotty, Bradley H.; Tamrat, Yonas; Mostaghimi, Arash; Safran, Charles; Landon, Bruce E.

    2015-01-01

    Patients want to be able to communicate with their physicians by e-mail. However, physicians are often concerned about the impact that such communications will have on their time, productivity, and reimbursement. Typically, physicians are not reimbursed for time spent communicating with patients electronically. But under federal meaningful-use criteria for information technology, physicians can receive a modest incentive for such communications. Little is known about trends in secure e-mail messaging between physicians and patients. To understand these trends, we analyzed the volume of messages in a large academic health care system’s patient portal in the period 2001–10. At the end of 2010, 49,778 patients (22.7 percent of all patients seen within the system) had enrolled in the portal, and 36.9 percent of enrolled patients (8.4 percent of all patients) had sent at least one message to a physician. Physicians in the aggregate saw a near tripling of e-mail messages during the study period. However, the number of messages per hundred patients per month stabilized between 2005 and 2010, at an average of 18.9 messages. As physician reimbursement moves toward global payments, physicians’ and patients’ participation in secure messaging will likely increase, and electronic communication should be considered part of physicians’ job descriptions. PMID:25288428

  9. Defense Enterprise Accounting and Management System-Increment 1 (DEAMS Inc 1)

    Science.gov (United States)

    2016-03-01

    2016 Major Automated Information System Annual Report Defense Enterprise Accounting and Management System-Increment 1 (DEAMS Inc 1) Defense...Phone: 937-257-2714 Fax: DSN Phone: 787-2714 DSN Fax: Date Assigned: August 17, 2015 Program Information Program Name Defense Enterprise Accounting ...UNCLASSIFIED 4 Program Description The Defense Enterprise Accounting and Management System (DEAMS) is a key part of the United States Air Force (USAF

  10. Reproduction and love: strategies of the organism's cellular defense system?

    Science.gov (United States)

    De Loof, A; Huybrechts, R; Kotanen, S

    1998-08-01

    A novel view is presented which states that primordial germ cells and their descendants can be regarded as 'cancerous cells' which emit signals that activate a whole array of cellular defensive mechanisms by the somatoplasm. These cells have become unrestrained in response to the lack of typical cell adhesion properties of epithelial cells. From this point of view: (1) the encapsulation of oocytes by follicle cells, vitelline membrane and egg shell; (2) the suppression of gonadal development in larval life; (3) the production of sex steroid hormones and of vitellogenin; and (4) the expulsion of the gametes from the body fit into a general framework for a defense strategy of the somatoplasm against germ line cells. Accordingly, the origin of sexual reproduction appears to be a story of failure and intercellular hostility rather than a 'romantic' and altruistic event. Yet, it has resulted in evolutionary success for the system in which it has evolved; probably through realizing feelings of 'pleasure' associated with reproduction.

  11. Active infrared systems: possible roles in ballistic missile defense?

    Science.gov (United States)

    Paleologue, A.

    2006-05-01

    Active Infra-Red (IR) systems developed in the past ten years are now available for missile defense applications. The main purpose of this paper is to describe the advantages an active IR system could offer to a ballistic missile defense (BMD). The active IR system considered in this paper is a LIDAR (LIght Detection And Ranging) system. Historically, the Lincoln Laboratory in the USA began using lasers in the early 1960's. The initial applications included the development of a LIDAR system enabling the measurement of the distance between the earth and the moon in 1962. Satellite tracking using LIDAR began early in 1973. Today, technological developments, with the miniaturization of systems and increased performance levels, have enabled new ambitious projects such as the Discrimination Interceptor Technology Program (DITP) program started in 1998 and the use of LIDAR to help in the discrimination of future exo-atmospheric interceptors within the framework of BMD. The first part of this paper presents the possible contribution of LIDAR to BMD: the main roles, objectives, and strategic advantages. The second part gives a brief overview of the technological features of a generic LIDAR instrument, rapidly addressing laser sources, detectors, optics and electronics. Finally, a modeling of an IR LIDAR system, limited solely to direct detection, and an estimation of performance levels will be presented. A list of possible IR active discriminators will be then presented on the basis of the previous analysis and proposed as new constraints in the design of discrete objects.

  12. Evolution of System Safety at NASA as Related to Defense-in-Depth

    Science.gov (United States)

    Dezfuli, Homayoon

    2015-01-01

    Presentation given at the Defense-in-Depth Inter-Agency Workshop on August 26, 2015 in Rockville, MD by Homayoon Dezfuli. The presentation addresses the evolution of system safety at NASA as related to Defense-in-Depth.

  13. Control Systems Cyber Security:Defense in Depth Strategies

    Energy Technology Data Exchange (ETDEWEB)

    David Kuipers; Mark Fabro

    2006-05-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  14. Control Systems Cyber Security:Defense in Depth Strategies

    Energy Technology Data Exchange (ETDEWEB)

    David Kuipers; Mark Fabro

    2006-05-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  15. Mobile Agents - Smart Messages

    OpenAIRE

    Hurst, Leon; Cunningham, Padraig

    1997-01-01

    Wireless communication with Mobile Computing devices is known to be problematic. It is very different in character from conventional communication over wired networks. Since many distributed applications make assumptions about network characteristics, they may not be used in a hostile mobile environment. We are proposing a new kind of messaging system which incorporates adaptive behaviour into the messages themselves. We call these `Smart Messages?, and implement them using ...

  16. Redesigning the Structure of Republic Indonesian Defense System; An Analysis of Systems Thinking

    Directory of Open Access Journals (Sweden)

    Ade Muhammad

    2013-09-01

    Full Text Available The phenomenon of Shrinking Defense Capabilities is only the tip of the iceberg of Indonesian Defense System’s problem. The root of the problem that lies beneath and outside is keep untouched. This journal is the part of the efforts to reveal the phenomenon’s structure that binding as a system. The present structure is a cause of that phenomenon and the basis of the current organization responsible for Republic Indonesia Defense sector. With the Systems thinking analysis, the research has revealed the structure that become the problem cause and give a holistic solution trough redesigning new structure based on two theories namely the Strategic-Operational Management with Vision Dissemination of Prof. Dr. Jürgen Strohhecker and the Defense System Generic Dr. Ir. Muhammad Tasrif, M.Eng and Ir. Ade Muhammad, M.Han. The logical consequences would also changing of formation of Indonesian Defense Organization. Keywords : Design, Redesigning, Defense System, System, Defense, Holistic

  17. Monitoring polio supplementary immunization activities using an automated short text messaging system in Karachi, Pakistan

    Science.gov (United States)

    Murtaza, A; Khoja, S; Zaidi, AK; Ali, SA

    2014-01-01

    Abstract Problem Polio remains endemic in many areas of Pakistan, including large urban centres such as Karachi. Approach During each of seven supplementary immunization activities against polio in Karachi, mobile phone numbers of the caregivers of a random sample of eligible children were obtained. A computer-based system was developed to send two questions – as short message service (SMS) texts – automatically to each number after the immunization activity: “Did the vaccinator visit your house?” and “Did the enrolled child in your household receive oral polio vaccine?” Persistent non-responders were phoned directly by an investigator. Local setting A cluster sampling technique was used to select representative samples of the caregivers of young children in Karachi in general and of such caregivers in three of the six “high-risk” districts of the city where polio cases were detected in 2011. Relevant changes In most of the supplementary immunization activities investigated, vaccine coverages estimated using the SMS system were very similar to those estimated by interviewing by phone those caregivers who never responded to the SMS messages. In the high-risk districts investigated, coverages estimated using the SMS system were also similar to those recorded – using lot quality assurance sampling – by the World Health Organization. Lessons learnt For the monitoring of coverage in supplementary immunization activities, automated SMS-based systems appear to be an attractive and relatively inexpensive option. Further research is needed to determine if coverage data collected by SMS-based systems provide estimates that are sufficiently accurate. Such systems may be useful in other large-scale immunization campaigns. PMID:24700982

  18. Pineal Proteins Upregulate Specific Antioxidant Defense Systems in the Brain

    Directory of Open Access Journals (Sweden)

    Vijay K. Bharti

    2009-01-01

    Full Text Available The neuroendocrine functions of the pineal affect a wide variety of glandular and nervous system processes. Beside melatonin (MEL, the pineal gland secretes and expresses certain proteins essential for various physiological functions. It has been suggested that the pineal gland may also have an antioxidant role due to secretory product other than MEL. Therefore, the present study was designed to study the effect of buffalo (Bubalus bubalis pineal proteins (PP on the antioxidant defense system in the brain of female rats. The twenty-four rats were taken in present study and were divided into four groups: control (0 day, control (28 day, vehicle control and buffalo PP. The PP was injected 100 µg/kg BW intraperitoneal (i.p. daily for 28 days. The activities of superoxide dismutase (SOD, glutathione peroxidase (GPx, catalase (CAT, glutathione reductase (GR and reduced glutathione (GSH concentration and the levels of lipid peroxidation (LPO in the brain tissue were measured to assess the antioxidant systems. These enzymes protect from adverse effects of free radicals and help in amelioration of oxidative stress. Buffalo pineal proteins administration did not cause any effect on brain LPO, whereas GPx, GR and GSH were significantly (p < 0.05 decreased. However, SOD and CAT activities were increased to significant levels than the control in PP treated rats. Our study herein suggested that buffalo (Bubalus bubalis pineal proteins upregulates specific antioxidant defense systems and can be useful in control of various oxidative stress-induced neuronal diseases.

  19. a GIS of SARDINIA'S Coastal Defense System (xvi - XVIII Century)

    Science.gov (United States)

    Deidda, M.; Musa, C.; Vacca, G.

    2015-06-01

    The use of GIS as a tool for archival, analysis and representation of geographic information has become significantly popular in many scientific fields that are directly concerned with the "territory" as their object of study. The field of application of GIS, however, has expanded also in other areas, such as those related to humanities and architecture, in which the territory is studied in an "indirect" mode because it constitutes a kind of substrate on which to develop a specific spatial analysis for particular purposes. Among these areas are to be included certainly archeology and restoration, fields in which the GIS has become a useful tool for historical studies. In this work we present a GIS developed for the study of the historical and territorial coastal defense system of Sardinia (16th - 18th century), in order to respond to the need to store, analyze and efficiently manage the information regarding cultural heritage and landscape heritage such as that consisting of the coastal defensive towers of Sardinia. This defensive system, in fact, was composed by over 100 towers positioned around the entire coastal perimeter of Sardinia, of which more than 90 still exist today. Their position was planned on the basis of the following criteria: - Warning the neighboring towers about the sighting of enemy ships - Protecting coasts located near the towns - Monitoring the water sources near the coast - Allowing for the full visibility of the coasts of any morphology With this study we also verified, through the use of high resolution and high accuracy DTM (LiDAR) and the topographic databases, whether the positioning criteria specified in the design of the system were respected and effective.

  20. Efficient Messaging through Cluster Coordinators in Decentralized Controlled Material Flow Systems

    Directory of Open Access Journals (Sweden)

    Lieberoth-Leden Christian

    2016-01-01

    Full Text Available The modularization of the hard- and software is one approach handling the demand for increasing flexibility and changeability of automated material flow systems. A control that is distributed across several different hardware controllers leads to a great demand for coordination between the modules while planning for example transports, especially if there is a mutual dependency between the modules on the executing tasks. Short-term changes in planning often initiate a rescheduling chain reaction, which causes a high communication load in the system. In the presented approach, module clusters with a centralized coordinator are automatically formed out of multiple modules and substitutional take over the surrounding communication for the modules. As a result, they minimize exchanged messages by focusing on the essential information.

  1. GSM短信选课系统%Elective system based on GSM message

    Institute of Scientific and Technical Information of China (English)

    刘凤秋; 赵有以; 刘昊; 王建民

    2012-01-01

    The elective system is sometimes inefficient since it heavily depends on internet network. This paper proposes a scheme of elective system based on GSM message, and formulates the hardware and software design of the system. The hardware consists of micro-processor STM32103, GSM module, and some peripherals. The software is designed based on idea of finite state machine, which can receive/decode/store the GSM message and communicate with host computer. The test results show that the proposed system can perform the course election function effectively.%针对高校网络选课系统对网络资源的依赖所造成的选课效率较低的现象,提出一种基于GSM网络的短信选课系统设计方案,并完成系统的软硬件设计。该系统硬件部分主要由STM32103微处理器、GSM短信收发模块以及辅助外设组成。软件部分采用状态机思想进行设计,实现用户选课短消息的接收、解码、存储以及与上位机通信等功能。测试结果表明,该系统能够有效实现选课功能,达到设计预期要求。

  2. Information System Of Student Score SMA Negeri 1 Tegal Based On Short Message Service (SMS Gateway

    Directory of Open Access Journals (Sweden)

    Zaenul Arif

    2016-06-01

    Full Text Available Student Score at the agency school is one measure of the success of students in learning the material presented. In the old system the parents have not been getting the value directly from the school except at the end of each semester, making them difficult to know the value of their children's development during school. To provide score transparency to students and parents needed an information system score subjects in an easy and fast data access. By identifying the problem is analyzing the old system to identify the weaknesses of the system. Thus the new system will increase. Analysis of the weakness of the old system using PIECES categories (Performance, Information, Economy, Control, Eficiency, and Service. In fulfilling these conditions, build up lesson student score information system of Short Message Service (SMS Gateway Based. The system is built using Gammu software and using the programming language PHP. By using SMS to obtain the score of the data is expected to provide convenience for parents to monitor learning outcomes of their children’s in school.

  3. Plant mating system transitions drive the macroevolution of defense strategies.

    Science.gov (United States)

    Campbell, Stuart A; Kessler, André

    2013-03-05

    Understanding the factors that shape macroevolutionary patterns in functional traits is a central goal of evolutionary biology. Alternative strategies of sexual reproduction (inbreeding vs. outcrossing) have divergent effects on population genetic structure and could thereby broadly influence trait evolution. However, the broader evolutionary consequences of mating system transitions remain poorly understood, with the exception of traits related to reproduction itself (e.g., pollination). Across a phylogeny of 56 wild species of Solanaceae (nightshades), we show here that the repeated, unidirectional transition from ancestral self-incompatibility (obligate outcrossing) to self-compatibility (increased inbreeding) leads to the evolution of an inducible (vs. constitutive) strategy of plant resistance to herbivores. We demonstrate that inducible and constitutive defense strategies represent evolutionary alternatives and that the magnitude of the resulting macroevolutionary tradeoff is dependent on the mating system. Loss of self-incompatibility is also associated with the evolution of increased specificity in induced plant resistance. We conclude that the evolution of sexual reproductive variation may have profound effects on plant-herbivore interactions, suggesting a new hypothesis for the evolution of two primary strategies of plant defense.

  4. A grid-enabled MPI : message passing in heterogeneous distributed computing systems.

    Energy Technology Data Exchange (ETDEWEB)

    Foster, I.; Karonis, N. T.

    2000-11-30

    Application development for high-performance distributed computing systems, or computational grids as they are sometimes called, requires grid-enabled tools that hide mundate aspects of the heterogeneous grid environment without compromising performance. As part of an investigation of these issues, they have developed MPICH-G, a grid-enabled implementation of the Message Passing Interface (MPI) that allows a user to run MPI programs across multiple computers at different sites using the same commands that would be used on a parallel computer. This library extends the Argonne MPICH implementation of MPI to use services provided by the globus grid toolkit. In this paper, they describe the MPICH-G implementation and present preliminary performance results.

  5. Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Message waiting indication supplementary service

    CERN Document Server

    International Organization for Standardization. Geneva

    2003-01-01

    Information technology - Telecommunications and information exchange between systems - Private integrated services network - Inter-exchange signalling protocol - Message waiting indication supplementary service

  6. Missile Defense: DOD’s Report Provides Limited Insight on Testing Options for the Ground-based Midcourse Defense System

    Science.gov (United States)

    2014-04-30

    Cochran Ranking Member Subcommittee on Defense Committee on Appropriations United States Senate The Honorable Howard P. " Buck " McKeon Chairman The...System Component Mission Location Ground Based Interceptor (GBI) The interceptor consists of a silo-based, three-stage booster stack and a “hit-to

  7. Depth perception and defensive system activation in a 3-D environment

    Directory of Open Access Journals (Sweden)

    Emmanuelle eCombe

    2011-08-01

    Full Text Available To survive, animals must be able to react appropriately (in temporal and behavioral terms when facing a threat. One of the essential parameters considered by the defensive system is the distance of the threat, the defensive distance. In this study, we investigate the visual depth cues that could be considered as an alarm cue for the activation of the defensive system. For this purpose, we performed an active-escape pain task in a virtual three-dimensional environment. In two experiments, we manipulated the nature and consistency of different depth cues: vergence, linear perspective, and angular size. By measuring skin conductance responses, we characterized the situations that activated the defensive system. We show that the angular size of the predator was sufficient information to trigger responses from the defensive system, but we also demonstrate that vergence, which can delay the emotional response in inconsistent situations, is also a highly reliable cue for the activation of the defensive system.

  8. Control Systems Cyber Security: Defense-in-Depth Strategies

    Energy Technology Data Exchange (ETDEWEB)

    Mark Fabro

    2007-10-01

    Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: • Maintenance of various field devices, telemetry collection, and/or industrial-level process systems • Access to facilities via remote data link or modem • Public facing services for customer or corporate operations • A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

  9. Study on combat effectiveness of air defense missile weapon system based on queuing theory

    Science.gov (United States)

    Zhao, Z. Q.; Hao, J. X.; Li, L. J.

    2017-01-01

    Queuing Theory is a method to analyze the combat effectiveness of air defense missile weapon system. The model of service probability based on the queuing theory was constructed, and applied to analyzing the combat effectiveness of "Sidewinder" and "Tor-M1" air defense missile weapon system. Finally aimed at different targets densities, the combat effectiveness of different combat units of two types' defense missile weapon system is calculated. This method can be used to analyze the usefulness of air defense missile weapon system.

  10. 76 FR 44293 - Defense Acquisition Regulations System; Defense Federal Acquisition Regulation Supplement; Only...

    Science.gov (United States)

    2011-07-25

    ... presented by the Under Secretary of Defense for Acquisition, Technology, & Logistics in a memorandum dated... offered price. These provisions must also be used in acquisitions of commercial items conducted using part...--ACQUISITION OF COMMERCIAL ITEMS 4. Add new section 212.205 to read as follows: 212.205 Offers. (c) When...

  11. Implication of auto-generated message reminders system (software and rate of absenteeism in orthodontic clinic: A randomized controlled trial

    Directory of Open Access Journals (Sweden)

    Siddharth Sonwane

    2017-01-01

    Full Text Available Context: Absenteeism is a routine pattern of nonattendance from duty of responsibilities, nonattending to given appointment may have deleterious effect on treatment outcome and revenue generation. Very few studies have been done to know the effect of absenteeism on revenue generation and treatment outcome with the help of postcard, telephone, and text messages as reminder; however, these studies have concluded that there was statistically significant difference found in treatment outcome and revenue generation. Furthermore, our study is the almost first to present with the use of current available reminder tool (software reminder system. Aims: The aim of this study to implicate and evaluate effects of auto-generated message reminder (easy dental software application and previous visit reminder system. Materials and Methods: The sum of 180 patients was selected and divided 90 patients in each group. (1 Study group (Auto-generated message reminder system, (2 control group (previous visit remainder. Auto-generated messages were sent to the study group. No formal information given to control group. Statistical Analysis Used: Student's t-tests were used to compare two groups, and logistic regression was obtained 0.044. Results: In control group, 20% of total sample found to be absent whereas only 10% found to be absent in study group. Student's t-test and logistic regression were seen (P = 0.044. Conclusion: The use of auto-generated message reminder system (easy dental software, reduces the rate of absenteeism and increases clinic economy, proper results with stipulated period, and protect both clinician and patients from unwanted complications.

  12. Evaluation of Simple Causal Message Logging for Large-Scale Fault Tolerant HPC Systems

    Energy Technology Data Exchange (ETDEWEB)

    Bronevetsky, G; Meneses, E; Kale, L V

    2011-02-25

    The era of petascale computing brought machines with hundreds of thousands of processors. The next generation of exascale supercomputers will make available clusters with millions of processors. In those machines, mean time between failures will range from a few minutes to few tens of minutes, making the crash of a processor the common case, instead of a rarity. Parallel applications running on those large machines will need to simultaneously survive crashes and maintain high productivity. To achieve that, fault tolerance techniques will have to go beyond checkpoint/restart, which requires all processors to roll back in case of a failure. Incorporating some form of message logging will provide a framework where only a subset of processors are rolled back after a crash. In this paper, we discuss why a simple causal message logging protocol seems a promising alternative to provide fault tolerance in large supercomputers. As opposed to pessimistic message logging, it has low latency overhead, especially in collective communication operations. Besides, it saves messages when more than one thread is running per processor. Finally, we demonstrate that a simple causal message logging protocol has a faster recovery and a low performance penalty when compared to checkpoint/restart. Running NAS Parallel Benchmarks (CG, MG and BT) on 1024 processors, simple causal message logging has a latency overhead below 5%.

  13. Defense Nuclear Material Stewardship Integrated Inventory Information Management System (IIIMS).

    Energy Technology Data Exchange (ETDEWEB)

    Aas, Christopher A.; Lenhart, James E.; Bray, Olin H.; Witcher, Christina Jenkin

    2004-11-01

    Sandia National Laboratories was tasked with developing the Defense Nuclear Material Stewardship Integrated Inventory Information Management System (IIIMS) with the sponsorship of NA-125.3 and the concurrence of DOE/NNSA field and area offices. The purpose of IIIMS was to modernize nuclear materials management information systems at the enterprise level. Projects over the course of several years attempted to spearhead this modernization. The scope of IIIMS was broken into broad enterprise-oriented materials management and materials forecasting. The IIIMS prototype was developed to allow multiple participating user groups to explore nuclear material requirements and needs in detail. The purpose of material forecasting was to determine nuclear material availability over a 10 to 15 year period in light of the dynamic nature of nuclear materials management. Formal DOE Directives (requirements) were needed to direct IIIMS efforts but were never issued and the project has been halted. When restarted, duplicating or re-engineering the activities from 1999 to 2003 is unnecessary, and in fact future initiatives can build on previous work. IIIMS requirements should be structured to provide high confidence that discrepancies are detected, and classified information is not divulged. Enterprise-wide materials management systems maintained by the military can be used as overall models to base IIIMS implementation concepts upon.

  14. 75 FR 65439 - Defense Federal Acquisition Regulation Supplement; Electronic Subcontracting Reporting System

    Science.gov (United States)

    2010-10-25

    ...-602-0350. Mail: Defense Acquisition Regulations System, Attn: Ms. Cassandra R. Freeman, OUSD (AT&L... be posted to http://www.regulations.gov . FOR FURTHER INFORMATION CONTACT: Ms. Cassandra R. Freeman... procurement. Clare M. Zebrowski, Editor, Defense Acquisition Regulations System. 0 Therefore, 48 CFR parts 219...

  15. Trial of real-time locating and messaging system with Bluetooth low energy.

    Science.gov (United States)

    Arisaka, Naoya; Mamorita, Noritaka; Isonaka, Risa; Kawakami, Tadashi; Takeuchi, Akihiro

    2016-09-14

    Hospital real-time location systems (RTLS) are increasing efficiency and reducing operational costs, but room access tags are necessary. We developed three iPhone 5 applications for an RTLS and communications using Bluetooth low energy (BLE). The applications were: Peripheral device tags, Central beacons, and a Monitor. A Peripheral communicated with a Central using BLE. The Central communicated with a Monitor using sockets on TCP/IP (Transmission Control Protocol/Internet Protocol) via a WLAN (wireless local area network). To determine a BLE threshold level for the received signal strength indicator (RSSI), relationships between signal strength and distance were measured in our laboratory and on the terrace. The BLE RSSI threshold was set at -70 dB, about 10 m. While an individual with a Peripheral moved around in a concrete building, the Peripheral was captured in a few 10-sec units at about 10 m from a Central. The Central and Monitor showed and saved the approach events, location, and Peripheral's nickname sequentially in real time. Remote Centrals also interactively communicate with Peripherals by intermediating through Monitors that found the nickname in the event database. Trial applications using BLE on iPhones worked well for patient tracking, and messaging in indoor environments.

  16. Analysis of Parking Reliability Guidance of Urban Parking Variable Message Sign System

    Directory of Open Access Journals (Sweden)

    Zhenyu Mei

    2012-01-01

    Full Text Available Operators of parking guidance and information systems (PGIS often encounter difficulty in determining when and how to provide reliable car park availability information to drivers. Reliability has become a key factor to ensure the benefits of urban PGIS. The present paper is the first to define the guiding parking reliability of urban parking variable message signs (VMSs. By analyzing the parking choice under guiding and optional parking lots, a guiding parking reliability model was constructed. A mathematical program was formulated to determine the guiding parking reliability of VMS. The procedures were applied to a numerical example, and the factors that affect guiding reliability were analyzed. The quantitative changes of the parking berths and the display conditions of VMS were found to be the most important factors influencing guiding reliability. The parking guiding VMS achieved the best benefit when the parking supply was close to or was less than the demand. The combination of a guiding parking reliability model and parking choice behavior offers potential for PGIS operators to reduce traffic congestion in central city areas.

  17. Defense Information Systems Agency Management of Trouble Tickets for Electronic Commerce/Electronic Data Interchange

    Science.gov (United States)

    2007-11-02

    received, 15 were requests for quotes. The causes were break down of modems, and failure of computer equipment and software at the Columbus and Ogden...transaction identified on the trouble ticket? Yes 15 No 115 7. Do you have access to the trouble ticket resolution diary at Ogden NEP? Yes 10 No 120 8...Information Systems Agency, Arlington, VA Defense Megacenter Columbus , OH Defense Megacenter Mechanicsburg, PA Defense Megacenter Ogden, UT Non

  18. Defense Science Board Task Force Report on Next-Generation Unmanned Undersea Systems

    Science.gov (United States)

    2016-10-01

    STUDY ON Next-Generation Unmanned Undersea Systems October 2016 Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics ...MEMORANDUM FOR THE UNDER SECRETARY OF DEFENSE FOR ACQUISITION, TECHNOLOGY & LOGISTICS SUBJECT: Final Report of the Defense Science Board (DSB) Task Force on...numbers of low- cost assets. As the report explains, in the undersea domain, quantity has a quality all its own. Furthermore, this report recommends

  19. Improving the Defense Acquisition System and Reducing System Costs

    Science.gov (United States)

    1981-03-30

    DDTE NAVMATO 421 HQ U3AF/ LEYE PA&E DSB/OP-098R NAVAIR (Air-41) CSD/PA&E . ASA (R, D, A) CSD (MRA&L) DA/DSLOG CSD (Ccmpt) Proj 72...a layered and collateral management structure created by the need to control different " colors " of money. This can all result in total system cost

  20. Error Correction Coding Meets Cyber-Physical Systems: Message-Passing Analysis of Self-Healing Interdependent Networks

    CERN Document Server

    Behfarnia, Ali

    2016-01-01

    Coupling cyber and physical systems gives rise to numerous engineering challenges and opportunities. An important challenge is the contagion of failure from one system to another, which can lead to large-scale cascading failures. However, the \\textit{self-healing} ability emerges as a valuable opportunity where the overlaying cyber network can cure failures in the underlying physical network. To capture both self-healing and contagion, this paper considers a graphical model representation of an interdependent cyber-physical system, in which nodes represent various cyber or physical functionalities, and edges capture the interactions between the nodes. A message-passing algorithm used in low-density parity-check codes is extended to this representation to study the dynamics of failure propagation and healing. By applying a density evolution analysis to this algorithm, network reaction to initial disruptions is investigated. It is proved that as the number of message-passing iterations increases, the network re...

  1. THE PLANNING, PROGRAMING, BUDGETING SYSTEM AND ITS IMPLEMENTATION IN THE SERBIAN MINISTRY OF DEFENSE

    Directory of Open Access Journals (Sweden)

    Sasa RADUSKI

    2010-01-01

    Full Text Available The main purpose of introducing the PPBES to the Serbian Ministry of Defense and the Serbian Armed Forces is to provide a rational management of resources and to maintain and build capacity of the Ministry and the Serbian Armed Forces in order to achieve their goals, objectives and missions.Expected results of implementation of the PPBES are reflected in increasing the efficiency and rationalization of the defense planning to a higher level, ensuring compatibility with defense planning and budgeting system of the state and developing a foundation for the effective management of defense resources.

  2. Piezomechatronic-based systems in aircraft, space, and defense applications

    Science.gov (United States)

    Maillard, T.; Claeyssen, F.; LeLetty, R.; Sosnicki, O.; Pages, A.; Vazquez Carazo, A.

    2009-05-01

    In Space & Defense fields, there is a trend for miniaturisation in active optics, fine instruments, robotic missions, microsatellites, UAVs, MAVs which directly impact on the design of actuators. A new generation of small and smart actuators such like piezoelectric (piezo) actuators, are responding to this trend, thanks to their capacity to offer high energy density and to support both extreme and various requirements. In Space vehicles, UAVs, missiles, military vehicles, etc., onboard place and available electric power can be very limited. For instance, a micro satellite often must operate all its instruments with less than 100W of power. As a result, allocated electric power per actuator is typically between 0.1 to 10W. This is also the case in small UAVs and in MAVs. Because of the high cost of embedded mass, space & military actuators need also to offer high output energy to mass ratio. One of the main difficulties is often the ability to withstand launching vibrations and shocks. Space environments add other constrains. A clear example is the vacuum conditions, which can induce difficulties to release the heat out off the actuator or for out gassing near optics. Other critical spacerelated environmental conditions include the thermal operation range required as well as the radiation-resistant requirements. In other situations, actuator strength to humidity is often an issue, especially for piezoelectric ceramics. Thus, the success of the application relies not only on design issues but also on material reliability. Specific actions at this level are needed to be undertaken to secure space projects. To cope with these issues and to illustrate the trend, the piezo actuators and mechanisms from Cedrat are presented. They have been initially developed and qualified to meet space requirements but logically found also applications in defense and micro aerial vehicle fields, for various micromechatronic functions. The paper presents typical applications and piezo

  3. Broadcasting a message in a parallel computer

    Energy Technology Data Exchange (ETDEWEB)

    Archer, Charles J; Faraj, Daniel A

    2014-11-18

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer that includes: transmitting, by the logical root to all of the nodes directly connected to the logical root, a message; and for each node except the logical root: receiving the message; if that node is the physical root, then transmitting the message to all of the child nodes except the child node from which the message was received; if that node received the message from a parent node and if that node is not a leaf node, then transmitting the message to all of the child nodes; and if that node received the message from a child node and if that node is not the physical root, then transmitting the message to all of the child nodes except the child node from which the message was received and transmitting the message to the parent node.

  4. Digital communication of two-dimensional messages in a chaotic optical system

    Institute of Scientific and Technical Information of China (English)

    Zhou Yun; Wu Liang; Zhu Shi-Qun

    2005-01-01

    The digital communication of two-dimensional messages is investigated when two solid state multi-mode chaotic lasers are employed in a master-slave configuration. By introducing the time derivative of intensity difference between the receiver (carrier) and the transmittal (carrier plus signal), several signals can be encoded into a single pulse. If one signal contains several binary bits, two-dimensional messages in the form of a matrix can be encoded and transmitted on a single pulse. With these improvements in secure communications using chaotic multi-mode lasers, not only the transmission rate can be increased but also the privacy can be enhanced greatly.

  5. Subtle Messages.

    Science.gov (United States)

    Tamplin de Poinsot, Nan

    1999-01-01

    Describes a self-portrait assignment inspired by the work of Frida Kahlo. Discusses Frida Kahlo's artwork and use of surrealist and symbolist views. States that each student had to incorporate personal symbolism in the portrait to convey a message about him or herself in a subtle manner. (CMK)

  6. Subtle Messages.

    Science.gov (United States)

    Tamplin de Poinsot, Nan

    1999-01-01

    Describes a self-portrait assignment inspired by the work of Frida Kahlo. Discusses Frida Kahlo's artwork and use of surrealist and symbolist views. States that each student had to incorporate personal symbolism in the portrait to convey a message about him or herself in a subtle manner. (CMK)

  7. Oxidative and antioxidative defense system in testicular torsion/detorsion

    Directory of Open Access Journals (Sweden)

    F A Elshaari

    2011-01-01

    Full Text Available Aim: The present study was aimed to assess the early effects of ischemia/reperfusion injury on the oxidants and anti-oxidant defense status in rat testicular tissue by measuring MDA, glucose-6-phosphte dehydrogenase activity and reduced glutathione levels in a designated time frame sequel to reperfusion. Animals were divided randomly into six groups (12 animals per group in the following order: Group I: Sham-operated control group (Cso without the application of the torsion. Group 2: Torsion-induced ischemia group (T30 m: Ischemia was induced through the torsion of spermatic cord for a period of 30 min. Group 3: One hour reperfusion group after detorsion (T30 mR1 h. Group 4: Twenty-four hour reperfusion group after detorsion (T30 mR24 h. Group 5: Forty-eight hours reperfusion group after detorsion (T30mR48h. Group 6: One week reperfusion group after detorsion (T30mR1wk. Results and Discussion: The oxidant-antioxidant system of the testicular tissue is altered during torsion as well as detorsion which results in the altered activities involved in the key enzyme of hexose monophosphate shunt pathway, glucose 6 phosphate dehydrogenase activity along with a reduction of glutathione (G.SH content. The increase in G6PDH activity during torsion and followed by an increase in detorsion indicates the tissue′s response to counter the oxidant stress caused by reduced blood supply. Continued exposure to such oxidant stressed physiological state of a tissue may lead to decreased capacity of the tissue to perform its physiological function such as testicular steroidogenesis and spermiogenesis shown in the present study.

  8. Analysis of System Training Impact for Major Defense Acquisition Programs (MDAPs): Training Systems Acquisition

    Science.gov (United States)

    2012-07-01

    evidenced in our other case studies. However, with the rapid production and deployment of the vehicles in 2007–2008, the operators began to experience...Background The Patriot system began because of the need to replace an aging and limited air defense system in the 1970s, the Nike -Hercules, and...The program sponsors of the Patriot also desired to take advantage of technological innovation and information superiority to enhance overall

  9. Strategic Planning and Management in Defense Systems Acquisition

    Science.gov (United States)

    2014-04-30

    between top and working levels, coupled with micromanagement and multilevel approvals in both defense and nondefense organizations. In both types of...national security, not profit- or market -driven considerations. In fact, respondents noted that sometimes performance must be achieved at all costs

  10. Advanced Messaging Concept Development Basic Safety Message

    Data.gov (United States)

    Department of Transportation — Contains all Basic Safety Messages (BSMs) collected during the Advanced Messaging Concept Development (AMCD) field testing program. For this project, all of the Part...

  11. Performance of the Defense Acquisition System, 2015 Annual report

    Science.gov (United States)

    2015-09-16

    performance measure has its strengths and weaknesses , so we use multiple measures (e.g., at both the program and contract level) and subsequent analysis to...could have led to program success or problems. Defense acquisition is complex, and each measure has its strengths and weaknesses , so attributing...Program Contract Costs Related to Targets Proportions of (Non-FFP) Contracts At or Below Cost Targets for Currently Active MDAPs (controlling for

  12. Defense Systems Management Review. Volume I, Number 4. Autumn 1977

    Science.gov (United States)

    1977-10-03

    LEAD SERVICE DETERMINATION AND JSOR GENERATION The Department of Defense has become increasingly involved with reducing prolifera- tion of...development of a joint requirement. • Required the generation of a joint serv- ice operational requirement ( JSOR ) within 60 working days. *Air Munitions...prepara- tion and coordination of the JSOR . • Authorized both service-advanced de- velopment efforts to continue through fiscal year 1974. The

  13. Evaluating Defense Architecture Frameworks for C4I System Using Analytic Hierarchy Process

    Directory of Open Access Journals (Sweden)

    Abdullah S. Alghamdi

    2009-01-01

    Full Text Available Problem statement: The Command, Control, Communications, Computers and Intelligence (C4I Systems provided situational awareness about operational environment and supported in decision making and directed to operative environment. These systems had been used by various agencies like defense, police, investigation, road, rail, airports, oil and gas related department. However, the increase use of C4I system had made it more important and attractive. Consequently interest in design and development of C4I system had increased among the researchers. Many defense industry frameworks were available but the problem was a suitable selection of a framework in design and development of C4I system. Approach: This study described the concepts, tool and methodology being used for evaluation analysis of different frameworks by Analytic Hierarchy Process (AHP. Results: We had compared different defense industry frameworks like Department of Defense Architecture Framework (DODAF, Ministry of Defense Architecture Framework (MODAF and NATO Architecture Framework (NAF and found that AHP is fairly good tool in terms of analysis. Conclusion: Different defense industry frameworks such as DODAF, MODAF and NAF had been evaluated and compared using AHP.

  14. Making sense of ballistic missile defense: an assessment of concepts and systems for U.S. boost-phase missile defense in comparison to other alternatives

    National Research Council Canada - National Science Library

    Division on Engineering and Physical Sciences; National Research Council; Naval Studies Board

    2012-01-01

    "The Committee on an Assessment of Concepts and Systems for U.S. Boost-Phase Missile Defense in Comparison to Other Alternatives set forth to provide an assessment of the feasibility, practicality, and affordability of U.S...

  15. The potential impact of intelligent systems for mobile health self-management support: Monte Carlo simulations of text message support for medication adherence.

    Science.gov (United States)

    Piette, John D; Farris, Karen B; Newman, Sean; An, Larry; Sussman, Jeremy; Singh, Satinder

    2015-02-01

    Mobile health (mHealth) services cannot easily adapt to users' unique needs. We used simulations of text messaging (SMS) for improving medication adherence to demonstrate benefits of interventions using reinforcement learning (RL). We used Monte Carlo simulations to estimate the relative impact of an intervention using RL to adapt SMS adherence support messages in order to more effectively address each non-adherent patient's adherence barriers, e.g., forgetfulness versus side effect concerns. SMS messages were assumed to improve adherence only when they matched the barriers for that patient. Baseline adherence and the impact of matching messages were estimated from literature review. RL-SMS was compared in common scenarios to simple reminders, random messages, and standard tailoring. RL could produce a 5-14% absolute improvement in adherence compared to current approaches. When adherence barriers are not accurately reported, RL can recognize which barriers are relevant for which patients. When barriers change, RL can adjust message targeting. RL can detect when messages are sent too frequently causing burnout. RL systems could make mHealth services more effective.

  16. Linear systems analysis of activating processes of complement system as a defense mechanism.

    Science.gov (United States)

    Hirayama, H; Yoshii, K; Ojima, H; Kawai, N; Gotoh, S; Fukuyama, Y

    1996-01-01

    The complement system is an important element of the host defense mechanism, although its kinetics and characteristics as a system are still unclear. We have investigated its temporal changes and system properties from the view point of system engineering. The temporal changes of sequential activating processes of the system were expressed by 26 non-linear differential equations using reported values of rate constants and serum concentration for each component. The intermediate products in the activating processes increased parabolically while the membrane attack component as the final product, increased linearly. The little change in inactive precursors afforded validity for system linearization. Linear systems analysis revealed that the system which was insensitive to the changes in rate constants was unstable. The system became stable when the feed-back input from the final product was set to operate on the first step of the activating processes. Seven uncontrollable variables were insensitive to changes in rate constants or system optimization that minimized the changes in concentrations of components in the complement system. The singular values of the complement system were reduced and the impulse responses of the system were improved when the system was optimized. When stronger minimization was imposed on the changes of concentration of the components in the complement system, the singular values were reduced more, the magnitude of the impulse responses was depressed further and the responses terminated earlier than those when the elements in the weighting matrix of concentration of the components were set to be unity. By this potent minimization, the influences of changes in rate constants on the singular values were diminished. The present theoretical analysis is presented to evaluate the ability of defense mechanism of complement system.

  17. Defense Acquisitions: How DOD Acquires Weapon Systems and Recent Efforts to Reform the Process

    Science.gov (United States)

    2013-01-02

    Weapon Systems and Recent Efforts to Reform the Process 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER 6. AUTHOR(S) 5d. PROJECT ...oversee and mange acquisition programs. At each milestone, a program must meet specific statutory and regulatory requirements before the program can...the FY2007 defense authorization bill stated Simply put, the Department of Defense (DOD) acquisition process is broken. The ability of the

  18. Program Manager: Journal of the Defense Systems Management College. Volume 19. Number 3

    Science.gov (United States)

    1990-06-01

    years. Fayol , Henri . General and Industrial Seatl, Washin"tn. He isa 1989groduate The current effort-the Defense Management. Toronto, Canada: Sir of...Institute, noted and Acquisition Costs," (Abellera); General Charles Henry , USA; and there are many congressional "Exchange Rates and Product Cost," Major...has been a Defense Systems Management College tions. Each Service has professional deterioration since 1986. The crucial were Mr. Henry Alberts, Dr

  19. Annual Systems Engineering Conference: Focusing on Improving Performance of Defense Systems Programs (10th). Volume 3. Thursday Presentations

    Science.gov (United States)

    2007-10-25

    Pattern ( ERP ) & Enterprise Service Bus (ESB) • ERP standardizes access to any C2 domain object (APIs) • ESB publishes messages based on an event...and off-the-shelf systems • Compare with Software as a Service ( SaaS ) 10th Annual Systems Engineering Conference 19 Effective Governance Components

  20. Reactions to threatening health messages

    Directory of Open Access Journals (Sweden)

    ten Hoor Gill A

    2012-11-01

    Full Text Available Abstract Background Threatening health messages that focus on severity are popular, but frequently have no effect or even a counterproductive effect on behavior change. This paradox (i.e. wide application despite low effectiveness may be partly explained by the intuitive appeal of threatening communication: it may be hard to predict the defensive reactions occurring in response to fear appeals. We examine this hypothesis by using two studies by Brown and colleagues, which provide evidence that threatening health messages in the form of distressing imagery in anti-smoking and anti-alcohol campaigns cause defensive reactions. Methods We simulated both Brown et al. experiments, asking participants to estimate the reactions of the original study subjects to the threatening health information (n = 93. Afterwards, we presented the actual original study outcomes. One week later, we assessed whether this knowledge of the actual study outcomes helped participants to more successfully estimate the effectiveness of the threatening health information (n = 72. Results Results showed that participants were initially convinced of the effectiveness of threatening health messages and were unable to anticipate the defensive reactions that in fact occurred. Furthermore, these estimates did not improve after participants had been explained the dynamics of threatening communication as well as what the effects of the threatening communication had been in reality. Conclusions These findings are consistent with the hypothesis that the effectiveness of threatening health messages is intuitively appealing. What is more, providing empirical evidence against the use of threatening health messages has very little effect on this intuitive appeal.

  1. Convergence of Health Level Seven Version 2 Messages to Semantic Web Technologies for Software-Intensive Systems in Telemedicine Trauma Care.

    Science.gov (United States)

    Menezes, Pedro Monteiro; Cook, Timothy Wayne; Cavalini, Luciana Tricai

    2016-01-01

    To present the technical background and the development of a procedure that enriches the semantics of Health Level Seven version 2 (HL7v2) messages for software-intensive systems in telemedicine trauma care. This study followed a multilevel model-driven approach for the development of semantically interoperable health information systems. The Pre-Hospital Trauma Life Support (PHTLS) ABCDE protocol was adopted as the use case. A prototype application embedded the semantics into an HL7v2 message as an eXtensible Markup Language (XML) file, which was validated against an XML schema that defines constraints on a common reference model. This message was exchanged with a second prototype application, developed on the Mirth middleware, which was also used to parse and validate both the original and the hybrid messages. Both versions of the data instance (one pure XML, one embedded in the HL7v2 message) were equally validated and the RDF-based semantics recovered by the receiving side of the prototype from the shared XML schema. This study demonstrated the semantic enrichment of HL7v2 messages for intensive-software telemedicine systems for trauma care, by validating components of extracts generated in various computing environments. The adoption of the method proposed in this study ensures the compliance of the HL7v2 standard in Semantic Web technologies.

  2. New insights of an old defense system: structure, function, and clinical relevance of the complement system.

    Science.gov (United States)

    Ehrnthaller, Christian; Ignatius, Anita; Gebhard, Florian; Huber-Lang, Markus

    2011-01-01

    The complement system was discovered a century ago as a potent defense cascade of innate immunity. After its first description, continuous experimental and clinical research was performed, and three canonical pathways of activation were established. Upon activation by traumatic or surgical tissue damage, complement reveals beneficial functions of pathogen and danger defense by sensing and clearing injured cells. However, the latest research efforts have provided a more distinct insight into the complement system and its clinical subsequences. Complement has been shown to play a significant role in the pathogenesis of various inflammatory processes such as sepsis, multiorgan dysfunction, ischemia/reperfusion, cardiovascular diseases and many others. The three well-known activation pathways of the complement system have been challenged by newer findings that demonstrate direct production of central complement effectors (for example, C5a) by serine proteases of the coagulation cascade. In particular, thrombin is capable of producing C5a, which not only plays a decisive role on pathogens and infected/damaged tissues, but also acts systemically. In the case of uncontrolled complement activation, "friendly fire" is generated, resulting in the destruction of healthy host tissue. Therefore, the traditional research that focuses on a mainly positive-acting cascade has now shifted to the negative effects and how tissue damage originated by the activation of the complement can be contained. In a translational approach including structure-function relations of this ancient defense system, this review provides new insights of complement-mediated clinical relevant diseases and the development of complement modulation strategies and current research aspects.

  3. A two-level formal specification of a defense communications system

    Energy Technology Data Exchange (ETDEWEB)

    Chisholm, G.H. [Argonne National Lab., IL (United States). Decision and Information Sciences Div.; Kemmerer, R.A. [Univ. of California, Santa Barbara, CA (United States). Reliable Software Group

    1994-04-01

    Computer systems are being used in critical situations with sensitive data, which makes it very important to ensure that these systems perform as desired. The defense communications system contains particularly sensitive data. A two-level ASLAN formal specification of a defense communications system is presented. The ASLAN model is designed to enhance the understanding of critical requirements and demands of the defense communications system. For the top-level (high-level) specifications, the structural details of the actual network are actual network are abstracted to allow more time for examining the interactions between the sites and the network. At this level, DataGrams move through the network, although the actual routing decisions are not specified. More details are added in the second-level specification. At this level, structure is added to the network.

  4. 77 FR 11355 - Defense Federal Acquisition Regulation Supplement; Business Systems-Definition and Administration...

    Science.gov (United States)

    2012-02-24

    ... Defense Federal Acquisition Regulation Supplement; Business Systems--Definition and Administration (DFARS... proposed rule for Business Systems-- Definition and Administration (DFARS Case 2009-D038) in the Federal... contractor business systems, DoD has clarified the definition and administration of contractor...

  5. 78 FR 28756 - Defense Federal Acquisition Regulation Supplement: System for Award Management Name Changes...

    Science.gov (United States)

    2013-05-16

    ... 0750-AH87 Defense Federal Acquisition Regulation Supplement: System for Award Management Name Changes... System (EPLS) databases into the System for Award Management (SAM) database. DATES: Effective Date: May... effort to improve the management and promotion of electronic Government services and processes. The Act...

  6. Development of the Defense Documentation Center Remote On-Line Retrieval System - Past, Present and Future.

    Science.gov (United States)

    Bennertz, Richard K.

    The document highlights in nontechnical language the development of the Defense Documentation Center (DDC) Remote On-Line Retrieval System from its inception in 1967 to what is planned. It describes in detail the current operating system, equipment configuration and associated costs, user training and system evaluation and may be of value to other…

  7. XMPP Protocol in the Android Instant Messaging System%XMPP协议在Android即时通讯系统中的应用

    Institute of Scientific and Technical Information of China (English)

    李新路

    2013-01-01

    即时通讯是一种基于互联网的网络应用,目前很多即时通讯系统,如MSN,QQ等,但由于使用了不同的协议,各个系统之间不能互联。可扩展消息与存在协议(XMPP)是即时通讯系统通信协议的标准,该文提出一种基于XMPP协议的即时通讯系统方案,并基于Android平台设计实现了即时通讯客户端,有效的解决了即时通讯系统中通信不畅的问题,并为其他类型智能平台间的即时通信提出一种可参考的解决方案。%Instant messaging is an Internet-based network applications,Many instant messaging system,such as MSN,QQ,Can-not be interconnected between the various systems because of using different protocol. Extensible Messaging and Presence Proto-col(XMPP)is the standard of the instant messaging protocol. A XMPP Instant Messaging protocol based on open source was de-signed. Finally, the Android system of the instant messaging client were designed ,effectively solution to the problem of poor communication in the instant messaging system,and provide a Reference solution for real time communication between other types of intelligent platform.

  8. 75 FR 71560 - Defense Federal Acquisition Regulation Supplement; Cost and Software Data Reporting System (DFARS...

    Science.gov (United States)

    2010-11-24

    ... is provided for contractors with accounting software that does not accommodate the additional data... Acquisition Regulation Supplement; Cost and Software Data Reporting System (DFARS Case 2008-D027) AGENCY... Cost and Software Data Reporting system requirements for Major Defense Acquisition Programs and...

  9. Network attack detection and defense: securing industrial control systems for critical infrastructures (Dagstuhl Seminar 14292)

    NARCIS (Netherlands)

    Dacer, Marc; Kargl, Frank; König, Hartmut; Valdes, Alfonso

    2014-01-01

    This report documents the program and the outcomes of Dagstuhl Seminar 14292 “Network Attack Detection and Defense: Securing Industrial Control Systems for Critical Infrastructures”. The main objective of the seminar was to discuss new approaches and ideas for securing industrial control systems. It

  10. Defense Acquisitions: Update on DOD’s Efforts to Implement a Common Contractor Manpower Data System

    Science.gov (United States)

    2014-05-19

    inventory, such as the funding source and contracting organization, the Army relied on the Army Contract Business Intelligence System (ACBIS) and...Generation (FPDS- NG), Army Contract Business Intelligence System (ACBIS) FPDS-NG ACBIS, FPDS-NG Funding activity Funding source Defense Finance and

  11. Checkout and start-up of the integrated DWPF (Defense Waste Processing Facility) melter system

    Energy Technology Data Exchange (ETDEWEB)

    Smith, M.E.; Hutson, N.D.; Miller, D.H.; Morrison, J.; Shah, H.; Shuford, J.A.; Glascock, J.; Wurzinger, F.H.; Zamecnik, J.R.

    1989-11-11

    The Integrated DWPF Melter System (IDMS) is a one-ninth-scale demonstration of the Defense Waste Processing Facility (DWPF) feed preparation, melter, and off-gas systems. The IDMS will be the first engineering-scale melter system at SRL to process mercury and flowsheet levels of halides and sulfates. This report includes a summary of the IDMS program objectives, system and equipment descriptions, and detailed discussions of the system checkout and start-up. 10 refs., 44 figs., 20 tabs.

  12. Main-Branch Structure Iterative Detection Using Approximate Message Passing for Uplink Large-Scale Multiuser MIMO Systems

    Directory of Open Access Journals (Sweden)

    Qifeng Zou

    2016-01-01

    Full Text Available The emerging large-scale/massive multi-input multioutput (MIMO system combined with orthogonal frequency division multiplexing (OFDM is considered a key technology for its advantage of improving the spectral efficiency. In this paper, we introduce an iterative detection algorithm for uplink large-scale multiuser MIMO-OFDM communication systems. We design a Main-Branch structure iterative turbo detector using the Approximate Message Passing algorithm simplified by linear approximation (AMP-LA and using the Mean Square Error (MSE criterion to calculate the correlation coefficients between main detector and branch detector for the given iteration. The complexity of our method is compared with other detection algorithms. The simulation results show that our scheme can achieve better performance than the conventional detection methods and have the acceptable complexity.

  13. Management and Archiving e-mail Messages in Governmental Organization

    Directory of Open Access Journals (Sweden)

    Ashraf Mohamed A.Mohsen

    2006-06-01

    Full Text Available The study deals great issue of digital preservation that is e-mail archiving, it covered all aspects of the topic; it discuss: e-mail system, components of e-mail message, advantages and disadvantages of e-mail, official e-mail messages, management of e-mail messages, organizing and arrangement of e-mail messages, keeping and deleting messages, archiving e-mail messages, and some related issues like: privacy and security.

  14. Management and Archiving e-mail Messages in Governmental Organization

    OpenAIRE

    Ashraf Mohamed A.Mohsen

    2006-01-01

    The study deals great issue of digital preservation that is e-mail archiving, it covered all aspects of the topic; it discuss: e-mail system, components of e-mail message, advantages and disadvantages of e-mail, official e-mail messages, management of e-mail messages, organizing and arrangement of e-mail messages, keeping and deleting messages, archiving e-mail messages, and some related issues like: privacy and security.

  15. Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    Energy Technology Data Exchange (ETDEWEB)

    Durling, R L; Price, D E; Spero, K K

    2005-06-06

    For over ten years, the Counterproliferation Analysis and Planning System (CAPS) at Lawrence Livermore National Laboratory (LLNL) has been a planning tool used by U.S. combatant commands for mission support planning against foreign programs engaged in the manufacture of weapons of mass destruction (WMD). CAPS is endorsed by the Secretary of Defense as the preferred counterproliferation tool to be used by the nation's armed services. A sister system, the Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging CAPS expertise designed to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented.

  16. Vulnerability And Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    Energy Technology Data Exchange (ETDEWEB)

    Durling, Jr., R L; Price, D E; Spero, K K

    2005-01-03

    For over ten years, the Counterproliferation Analysis and Planning System (CAPS) at Lawrence Livermore National Laboratory (LLNL) has been a planning tool used by U.S. combatant commands for mission support planning against foreign programs engaged in the manufacture of weapons of mass destruction (WMD). CAPS is endorsed by the Secretary of Defense as the preferred counterproliferation tool to be used by the nation's armed services. A sister system, the Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging CAPS expertise designed to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities is presented.

  17. Network Randomization and Dynamic Defense for Critical Infrastructure Systems

    Energy Technology Data Exchange (ETDEWEB)

    Chavez, Adrian R. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Martin, Mitchell Tyler [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Hamlet, Jason [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Stout, William M.S. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Lee, Erik [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2015-04-01

    Critical Infrastructure control systems continue to foster predictable communication paths, static configurations, and unpatched systems that allow easy access to our nation's most critical assets. This makes them attractive targets for cyber intrusion. We seek to address these attack vectors by automatically randomizing network settings, randomizing applications on the end devices themselves, and dynamically defending these systems against active attacks. Applying these protective measures will convert control systems into moving targets that proactively defend themselves against attack. Sandia National Laboratories has led this effort by gathering operational and technical requirements from Tennessee Valley Authority (TVA) and performing research and development to create a proof-of-concept solution. Our proof-of-concept has been tested in a laboratory environment with over 300 nodes. The vision of this project is to enhance control system security by converting existing control systems into moving targets and building these security measures into future systems while meeting the unique constraints that control systems face.

  18. Second Line of Defense Virtual Private Network Guidance for Deployed and New CAS Systems

    Energy Technology Data Exchange (ETDEWEB)

    Singh, Surya V.; Thronas, Aaron I.

    2010-01-01

    This paper discusses the importance of remote access via virtual private network (VPN) for the Second Line of Defense (SLD) Central Alarm System (CAS) sites, the requirements for maintaining secure channels while using VPN and implementation requirements for current and future sites.

  19. 75 FR 25165 - Defense Federal Acquisition Regulation Supplement; Cost and Software Data Reporting System

    Science.gov (United States)

    2010-05-07

    ... reporting requirements that are essential for the DoD to estimate the cost of current and future weapon... and not cost allocations. The description will also show how the data from the offeror's accounting... Regulation Supplement; Cost and Software Data Reporting System AGENCY: Defense Acquisition Regulations...

  20. BASICS OF INTEGRAL APPROACH TO IMPROVEMENT OF INNOVATION SYSTEM IN DEFENSE INDUSTRY COMPLEX OF RUSSIA

    OpenAIRE

    Анатолий Андреевич Чудин

    2014-01-01

    The author develops integral approach to improvement of innovation system as exemplified by defense industry complex (DIC) of Russia. Integral approach includes the elements of 3 approaches: system, synergetic and geotrion. This approach contains conceptual, modeling-projecting and realizing parts and the principles, mechanisms and technologies aimed for improvement of management of innovation system in Russia. DIC of Russia is an earth object – it is complex of complexes which is supposed to...

  1. Defense strategies for infrastructures with multiple systems of components

    Energy Technology Data Exchange (ETDEWEB)

    Rao, Nageswara S [ORNL; Ma, Chris Y. T. [Purdue University; Hausken, K. [University of Stavanger; Zhuang, Jun [University at Buffalo (SUNY); He, Fei [University at Buffalo (SUNY); Yao, David K. Y. [Purdue University

    2016-01-01

    In several critical infrastructures correlations between the constituent systems represent certain vulnerabilities: disruptions to one may propagate to others and possibly to the entire infrastructure. The correlations between the systems are characterized in two ways in this paper: (i) the aggregate failure correlation function specifies the conditional failure probability of the infrastructure given the failure of an individual system, and (ii) the pairwise correlation function between two systems specifies the failure probability of one system given the failure of the other. The survival probabilities of individual systems satisfy firstorder differential conditions that generalize the contest success functions and statistical independence conditions. We formulate a problem of ensuring the resilience of an infrastructure as a game between the provider and attacker; their utility functions are sums of infrastructure survival probability terms and cost terms, both expressed in terms of the numbers of system components attacked and reinforced. We derive Nash Equilibrium conditions and sensitivity functions that highlight the dependence of infrastructure resilience on the cost terms, correlation functions, and individual system survival probabilities. We apply these results to models of distributed cloud computing and energy grid infrastructures.

  2. Applicability of Unmanned Aerial Systems to Homeland Defense Missions

    Science.gov (United States)

    2006-12-01

    criticism after bungled and untimely responses to Hurricane Hugo in 1988 and the Loma Prieta earthquake in 1989. However, a 1991 GAO study...1 A. EFFECTIVE USE OF UNMANNED AERIAL SYSTEMS ........................1 B. HISTORY OF UNMANNED AERIAL SYSTEMS AND...assistance was invaluable. xiv THIS PAGE INTENTIONALLY LEFT BLANK 1 I. INTRODUCTION A. EFFECTIVE USE OF

  3. Reforming the Defense Acquisition System: This Time Must Be Different!

    Science.gov (United States)

    2015-05-13

    acqusition processes and regulations  1981:Acquisition Improvement Plan: decentralized approach  Increased role for the Services in PPBS  Promoted...or development  Developing system-of-systems compounds the mangement challenges; but makes sense to plan for (vs. sole focus on individual

  4. Towards an integrated defense system for cyber security situation awareness experiment

    Science.gov (United States)

    Zhang, Hanlin; Wei, Sixiao; Ge, Linqiang; Shen, Dan; Yu, Wei; Blasch, Erik P.; Pham, Khanh D.; Chen, Genshe

    2015-05-01

    In this paper, an implemented defense system is demonstrated to carry out cyber security situation awareness. The developed system consists of distributed passive and active network sensors designed to effectively capture suspicious information associated with cyber threats, effective detection schemes to accurately distinguish attacks, and network actors to rapidly mitigate attacks. Based on the collected data from network sensors, image-based and signals-based detection schemes are implemented to detect attacks. To further mitigate attacks, deployed dynamic firewalls on hosts dynamically update detection information reported from the detection schemes and block attacks. The experimental results show the effectiveness of the proposed system. A future plan to design an effective defense system is also discussed based on system theory.

  5. Design and Implementation of Secret Message Monitoring and Analysis System for Android Mobile Phone%面向android手机的涉密短信监控与分析系统的设计与实现

    Institute of Scientific and Technical Information of China (English)

    石子言; 赵国林; 刘剑豪

    2014-01-01

    In today's mobile phone short message not only brought convenience, but also brings security risks, the main security problems reflected in the mobile phone user security awareness is not strong, the message content relates to security sensitive in⁃formation, such as the internal information of enterprise, government and other confidential information. This paper mainly intro⁃duces the design and implementation of a Android oriented mobile phone secret SMS monitoring and analysis system, the system adopts a proactive defense thought, constructed by the secret message monitoring short message security monitoring subsystem and the server of the mobile phone client and analysis subsystem SMS monitoring and analysis platform for effective monitoring and management how to send SMS to achieve efficient access, is the focus of this research.%当今手机短信不仅给人们带来了方便,同时也带来了安全隐患,主要安全问题体现在手机使用者安全防范意识不强,短信内容涉及一些安全敏感信息,如企业内部资料信息,政府保密资料等。该文主要介绍了一个面向android手机的涉密短信监控与分析系统的设计与实现,该系统采用了一种积极主动的防御思想,构建了由手机客户端的短信安全监测子系统和服务端的涉密短信监控与分析子系统构成的短信监控和分析平台,如何对手机短信的发送情况进行有效的监控和管理,实现高效访问是本文的研究重点。

  6. Bacteriophage exclusion, a new defense system

    Science.gov (United States)

    Barrangou, Rodolphe; van der Oost, John

    2015-01-01

    The ability to withstand viral predation is critical for survival of most microbes. Accordingly, a plethora of phage resistance systems has been identified in bacterial genomes (Labrie et al, 2010), including restriction-modification systems (R-M) (Tock & Dryden, 2005), abortive infection (Abi) (Chopin et al, 2005), Argonaute-based interference (Swarts et al, 2014), as well as clustered regularly interspaced short palindromic repeats (CRISPR) and associated protein (Cas) adaptive immune system (CRISPR-Cas) (Barrangou & Marraffini, 2014; Van der Oost et al, 2014). Predictably, the dark matter of bacterial genomes contains a wealth of genetic gold. A study published in this issue of The EMBO Journal by Goldfarb et al (2015) unveils bacteriophage exclusion (BREX) as a novel, widespread bacteriophage resistance system that provides innate immunity against virulent and temperate phage in bacteria. PMID:25502457

  7. A Recommender System in the Cyber Defense Domain

    Science.gov (United States)

    2014-03-27

    Constraint-based recommender systems: technologies and research issues”. Proceedings of the 10th international conference on Electronic commerce , ICEC... Electronic Commerce ”. In Knowledge-Based Electronic Markets, Papers from the AAAI Workshop, 78–83, 2000. [28] Walker-Brown, Andrew. “The art of the...systems have been studied for decades, but only in their original domain of retail customer suggestions. The same algorithms and techniques could have

  8. Department of Defense Air Traffic Control and Airspace Management Systems

    Science.gov (United States)

    1989-08-08

    Electronic Tabular Display System ( ETABS ) under development by the FAA. The FACTS-3200, an advanced 32 bit digital processor, is being added to the system... software compatible with FDIO. 2.1.1.4.2 Radar Facility Communications In general, military radar facilities employ or share the twenty-series family of...program is providing incremental changes to the existing radios by adding more frequencies, computer memory and software improvements, and equipment

  9. A Service Oriented Architecture to Integrate Short Message Service (SMS Notification in Road Traffic Volume Control System

    Directory of Open Access Journals (Sweden)

    Zahi Abu Sarhan

    2013-02-01

    Full Text Available The traffic volume becomes one of the top problems in the world, the volume of traffic spends many time and much money, the traffic volume grows daily, and there is not effective and suitable solutions for grows problem. This paper will present and describe an effective approach to integrate the Service Oriented Architecture with mobile devices and services agents in Traffic Management Systems (TMS. The Traffic Volume Control System (TVCS should enable mobile short message service (SMS notifications. Unfortunately, cellular SMS notification based on services that are not aspect of the TVCS.Developing altered exterior systems and services, to be virtually aspect of TVCS, are one of the most incorporation difficulties. In this paper, a Service Oriented Architecture (SOA approach to includecellular SMS alerts in TVCS is presented. Suggested Structure includes two layers: Service layer and Interface layer. The Service layer includes all the system software. The service layer consists of three sub layers: Orchestration, Application Services, and Agents sub-layers. While the Interface layer interrelates with speed detectors and users via sites, and with exterior organization services via Web services.

  10. Modular Open System Architecture for Reducing Contamination Risk in the Space and Missile Defense Supply Chain

    Science.gov (United States)

    Seasly, Elaine

    2015-01-01

    To combat contamination of physical assets and provide reliable data to decision makers in the space and missile defense community, a modular open system architecture for creation of contamination models and standards is proposed. Predictive tools for quantifying the effects of contamination can be calibrated from NASA data of long-term orbiting assets. This data can then be extrapolated to missile defense predictive models. By utilizing a modular open system architecture, sensitive data can be de-coupled and protected while benefitting from open source data of calibrated models. This system architecture will include modules that will allow the designer to trade the effects of baseline performance against the lifecycle degradation due to contamination while modeling the lifecycle costs of alternative designs. In this way, each member of the supply chain becomes an informed and active participant in managing contamination risk early in the system lifecycle.

  11. Performance of the Defense Acquisition System, 2016 Annual Report

    Science.gov (United States)

    2016-10-24

    3 Contractual Spending by Product Service Code Portfolios ...were seen—but not everywhere. Outliers required further analysis given their distorting effects on the portfolio in certain metrics and on the...comparison) so that the effects solely from the acquisition system are revealed. Listen to feedback from the DoD’s professional acquisition leadership

  12. Department of Defense Systems Acquisition Management: Congressional Criticism and Concern

    Science.gov (United States)

    1974-05-01

    preparation period. Finally I want to thank my wife, Dolores , for her tolerance of my aca- demic preoccupation in I96O-61, 1966-67, and throughout the...policy: man on firing line adjusts to actual situation Washington finds out only occasionally, acci- dentally ; need dependable system to insure

  13. Motivational cues predict the defensive system in team handball: A model based on regulatory focus theory.

    Science.gov (United States)

    Debanne, T; Laffaye, G

    2015-08-01

    This study was based on the naturalistic decision-making paradigm and regulatory focus theory. Its aim was to model coaches' decision-making processes for handball teams' defensive systems based on relevant cues of the reward structure, and to determine the weight of each of these cues. We collected raw data by video-recording 41 games that were selected using a simple random method. We considered the defensive strategy (DEF: aligned or staged) to be the dependent variable, and the three independent variables were (a) numerical difference between the teams; (b) score difference between the teams; and (c) game periods. We used a logistic regression design (logit model) and a multivariate logistic model to explain the link between DEF and the three category independent variables. Each factor was weighted differently during the decision-making process to select the defensive system, and combining these variables increased the impact on this process; for instance, a staged defense is 43 times more likely to be chosen during the final period in an unfavorable situation and in a man advantage. Finally, this shows that the coach's decision-making process could be based on a simple match or could require a diagnosis of the situation based on the relevant cues.

  14. Risk Assessment and Management for Interconnected and Interactive Critical Flood Defense Systems

    OpenAIRE

    Hamedifar, Hamed

    2012-01-01

    The current State-of-the-Practice relies heavily in the deterministic characterization and assessment of performance of civil engineering infrastructure. In particular, flood defense systems, such as levees, have been evaluated within the context of Factor of Safety where the capacity of the system is compared with the expected demand. Uncertainty associated with the capacity and demand render deterministic modeling inaccurate. In particular, two structures with the same Factor of Safety can ...

  15. Department of Defense Gateway Information System (DGIS) Users’ Guide

    Science.gov (United States)

    1993-10-01

    WELCOME TO T711 DoD QATEWAY INFO•MATION SYSTEM >~~»~1?W flXAIONTRANSFERn MODULES i directory D01S Directory of Resources 2 comunicate Connect to...Deuce ?hb-aom~ology. Economics , ilak Wedical Weseaerb,- , ducatlon Literature ’Consumer Realth) - ,istory Musaic, L ibrary ’Theater, * ~ Psychology ...for the selected database. Paitt" -t’ TOnact I Introduction to C~ona.Comand Langtuage West o INFO topics 𔃽 ,. IERS In National tecnical . Informaion

  16. 2014 Assessment of the Ballistic Missile Defense System (BMDS)

    Science.gov (United States)

    2015-03-23

    and necessary training aids and devices are not currently available and are not scheduled to become available for several years. Analyses of data...and Evaluation ( IOT &E) flight tests for the Aegis BMD 4.0 system and SM-3 Block IB missile. Outcome. INTERCEPT. The ship detected, tracked...missiles in a raid scenario. FTX-18 was the last of the three IOT &E test missions. Outcome. THREE SIMULATED INTERCEPTS. The ship detected, tracked

  17. 2015 Assessment of the Ballistic Missile Defense System (BMDS)

    Science.gov (United States)

    2016-04-01

    performance and test adequacy of the BMDS, its four autonomous BMDS systems, and its sensor/command and control architecture . The four autonomous BMDS...Patriot. The Command and Control, Battle Management, and Communications (C2BMC) element anchors the sensor/command and control architecture . This...distributed ground testing in USPACOM in support of the second AN/TPY-2 (FBM) radar fielding to Japan in 2014. Flight testing with C2BMC control

  18. Planning for a Department of Defense Mail Service Pharmacy System

    Science.gov (United States)

    1991-12-01

    USERS UNCLASSIFIED 22a NAME OF RESPONSrBE INDIVIDUAL 22b TELEPHONE (include Area Code) 22( OFFICE SYMBOL Dr. Keebom Kant (408) 646-3106 AS/Kk DD Form...number of prescriptions to be filled by a MSP system shows an Increase of 6.8% over FY 1991 demand. 30 The de-and fo: ind- vidu phaarm a- etica ! Z...c

  19. Ginsan activated the antioxidant defense systems in irradiated mice

    Energy Technology Data Exchange (ETDEWEB)

    Song, Jie Young; Son, Soo Jung; Ahn, Ji Yeon; Shim, Ji Young; Han, Young Soo; Jung, In Sung; Yun, Yeon Sook [KIRMS Daegu (Korea, Republic of)

    2003-07-01

    Ginsan, a polysaccharide extracted from Panax ginseng, has hematopoietic activity and is also known as a good biological-response modifier. In this investigation, we studied the effects of ginsan on the {gamma}-radiation induced alterations of some antioxidant systems in spleen of Balb/c mice. There are many data that irradiation induces Reactive Oxygen Species (ROS), which plays an important causative role in radiation damage of cell. The level of ROS in cells is regulated by enzymatic and nonenzymatic antioxidant systems. The most powerful ones among them are superoxide dismutases (SODs) catalyzing the dismutation of superoxide anion radical o{sub 2} to H{sub 2}O{sub 2}, catalase deactivating h-2O{sub 2} and reduced glutathion (GSH) detoxifying H{sub 2}O{sub 2} and other ROS> At the 5{sub th} day after sublethal whole body irradiation, splenocytes of irradiated mice expressed only marginally increased levels of Mn-SOD, however, Cu/Zn-SOD, catalase, thioredoxine reductase (TR) and thioredoxine (TRX) mRNA (135% increase compared to control), however, the combination of irradiation with ginsan increased the SODs and GPX production more effectively. In addition to the above results, we obtained the similar data of protein expression. The enzyme activities of SOD, catalase, and GPX of ginsan-treated and irradiated mice were significantly enhanced by 140, 115, 126% respectively, compared with those of irradiated mice. Based on these results, we propose that the induction of antioxidant enzymes of ginsan is at least in part due to its capacity to protect against radiation.

  20. Transportni sistem u funkciji odbrane zemlje / The transportation system in function of defense of country

    Directory of Open Access Journals (Sweden)

    Radomir Jovanović

    2005-11-01

    Full Text Available Transportni sistem zemlje postoji i funkcioniše u miru, a od izuzetnog značaja je za odbranu zemlje. Uticaj ovog sistema na odbranu nije samo direktan, nego i indirektan, jer skoro svi sistemi uključeni u ovaj proces zavise od njega. U odnosu na mirnodopsko stanje, osnovna karakteristika funkcionisanja transportnog sistema u ratuje izvršavanje zadataka u uslovima razaranja infrastrukture, višestrukog povećanja transportnih zahteva i neprekidna izloženost udarima svih elemenata sistema. Zato su pripreme za funkcionisanje u takvim uslovima od izuzetnog značaja. / The transportation system of a country exists and functions in peace and it is very important for the defense of the country. The transportation system has not only direct but also indirect influence on defense, because almost all systems included in defense are dependent on it. When compared to peace, the basic characteristics of its functioning in war is carrying out the tasks in conditions of infrastructure destruction, multiplied transportation demands and continuous blow of all elements of the system. For all these reasons the preparations for transportation system functioning in those conditions are of exceptional importance.

  1. Message-Passing Receiver for OFDM Systems over Highly Delay-Dispersive Channels

    DEFF Research Database (Denmark)

    Barbu, Oana-Elena; Manchón, Carles Navarro; Rom, Christian

    2017-01-01

    Propagation channels with maximum excess delay exceeding the duration of the cyclic prefix (CP) in OFDM systems cause intercarrier and intersymbol interference which, unless accounted for, degrade the receiver performance. Using tools from Bayesian inference and sparse signal reconstruction, we...... and future wireless communications systems. By enabling the OFDM receiver experiencing these harsh conditions to locally cancel the interference, our design circumvents the spectral efficiency loss incurred by extending the CP duration, otherwise a straightforward solution. Furthermore, it sets the premises...

  2. Department of Defense Enterprise Architecture Transition Strategy, Version 2.0

    Science.gov (United States)

    2008-02-29

    organization, training, materials , leadership and education, personnel, and facilities (DOTMLPF) implications for making information available on a...processes such as the Systems Development Lifecycle (http://akss.dau.mil/dag/) and Information Resources Management (DoD IRM Plan) have also occurred...Enterprise Information Decision Support (EIDS) investment: risks to medical and dental readiness and medical surveillance  Defense Message

  3. Use of the Homeland-Defense Operational Planning System (HOPS) for Emergency Management

    Energy Technology Data Exchange (ETDEWEB)

    Durling, Jr., R L; Price, D E

    2005-12-16

    The Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging Lawrence Livermore National Laboratory's expertise in weapons systems and in sparse information analysis to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented.

  4. Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)

    Energy Technology Data Exchange (ETDEWEB)

    Price, D E; Durling, R L

    2005-10-10

    The Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging Lawrence Livermore National Laboratory's expertise in weapons systems and in sparse information analysis to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented.

  5. A Systems Evaluation of a Purposive Message: The "Mulligan Stew" ETV Project.

    Science.gov (United States)

    Olien, C. N.; And Others

    The Mulligan Stew television series on nutritional principles for elementary school students was evaluated using a systems model. The study included student responses in eight schools and evaluation of responses from nutrition specialists, information specialists, television station personnel, and teachers. Agricultural college information…

  6. Avoiding Message-Dependent Deadlock in Network-Based Systems on Chip

    NARCIS (Netherlands)

    Hansson, A.; Goossens, K.; Rãdulescu, A.

    2007-01-01

    Networks on chip (NoCs) are an essential component of systems on chip (SoCs) and much research is devoted to deadlock avoidance in NoCs. Prior work focuses on the router network while protocol interactions between NoC and intellectual property (IP) modules are not considered. These interactions intr

  7. A Scheme for the Application of Smart Message Language in a Wireless Meter Reading System

    Directory of Open Access Journals (Sweden)

    O. Homa Keshav

    2012-05-01

    Full Text Available The use of wireless automation in almost all the fields of power, gas and water generation, distribution and billing has come of age. Here with the inclusion of wireless communication with the automation may lead to paradigm change in the current trend. The design presents a new methodology for avoiding the high construction and maintenance costs in the existing meter reading technology. Apart the use of wireless meter reading with network technologies has become need of the day. The designed system avoids the human intervention in Power Management. The Consumer has to pay the bill in time, if couldn’t, the power connection may be disconnected automatically from the remote server. It displays the corresponding billing information on LCD and data is sent to the server through the GSM Module. The ARM7 based hardware system consists of a processor core board and the peripheral board. The entire programming for microcontroller operation is based on Embedded C Language. This system provides efficient meter reading, avoiding the billing error and reduces the maintenance cost. This paper also addresses advantages of implementing the GSM communication module and design detail and discusses the advanced security of the data communications.

  8. The antioxidant defense system of Varroa destructor mites facilitates the infestation of Apis mellifera

    Directory of Open Access Journals (Sweden)

    Dmochowska-Ślęzak Kamila

    2016-06-01

    Full Text Available Varroa destructor is a parasitic mite of the Western honey bee. The activity of five antioxidant enzymes of V. destructor were analysed. Glutathione content and total antioxidant status was also evaluated. Our results suggest that antioxidant enzymes constitute the main line of defense against ROS in V. destructor, whereas low-molecular-weight antioxidants play a limited role in the antioxidant system of mites.

  9. MLDS: Multi-Layer Defense System for Preventing Advanced Persistent Threats

    Directory of Open Access Journals (Sweden)

    Daesung Moon

    2014-12-01

    Full Text Available Here we report on the issue of Advanced Persistent Threats (APT, which use malware for the purpose of leaking the data of large corporations and government agencies. APT attacks target systems continuously by utilizing intelligent and complex technologies. To overthrow the elaborate security network of target systems, it conducts an attack after undergoing a pre-reconnaissance phase. An APT attack causes financial loss, information leakage, etc. They can easily bypass the antivirus system of a target system. In this paper, we propose a Multi-Layer Defense System (MLDS that can defend against APT. This system applies a reinforced defense system by collecting and analyzing log information and various information from devices, by installing the agent on the network appliance, server and end-user. It also discusses how to detect an APT attack when one cannot block the initial intrusion while continuing to conduct other activities. Thus, this system is able to minimize the possibility of initial intrusion and damages of the system by promptly responding through rapid detection of an attack when the target system is attacked.

  10. EMI Messaging Guidelines

    CERN Document Server

    Cons, L.

    2011-01-01

    Guidelines for potential users of messaging within EMI. The goal is to provide enough practical information so that EMI product teams can start investigating whether using messaging in their products can be beneficial or not.

  11. Message survival and decision dynamics in a class of reactive complex systems subject to external fields

    Science.gov (United States)

    Rodriguez Lucatero, C.; Schaum, A.; Alarcon Ramos, L.; Bernal-Jaquez, R.

    2014-07-01

    In this study, the dynamics of decisions in complex networks subject to external fields are studied within a Markov process framework using nonlinear dynamical systems theory. A mathematical discrete-time model is derived using a set of basic assumptions regarding the convincement mechanisms associated with two competing opinions. The model is analyzed with respect to the multiplicity of critical points and the stability of extinction states. Sufficient conditions for extinction are derived in terms of the convincement probabilities and the maximum eigenvalues of the associated connectivity matrices. The influences of exogenous (e.g., mass media-based) effects on decision behavior are analyzed qualitatively. The current analysis predicts: (i) the presence of fixed-point multiplicity (with a maximum number of four different fixed points), multi-stability, and sensitivity with respect to the process parameters; and (ii) the bounded but significant impact of exogenous perturbations on the decision behavior. These predictions were verified using a set of numerical simulations based on a scale-free network topology.

  12. Prospect: A Picture Exchange Communication System (PECS)-based Instant Messaging Application for Autism Spectrum Condition

    Science.gov (United States)

    Raja, Pravind; Zainuri Saringat, Mohd; Mustapha, Aida; Zainal, Abidah

    2017-08-01

    Autism Spectrum Disorder (ASC) has widely gained the common attention from the public especially autistic communities. Individuals with ASC are said to have poor verbal skills and this affects them in carrying out their daily basis which they are afraid to expose themselves to the world due to their problems. ASC is diagnosed among children ranging from ages 5-12 years old and they suffer from the abnormal functioning of the brain which in turn causes lack of development activities. Thus, studies have shown that diagrammatic approaches help children with ASC to overcome their issues and improvise their visual and verbal skills. Picture Exchange Communication System or PECS consists of a series of illustrated cards and each cards has its own illustration with a caption on it. These children will understand the cards and they can compile several other cards to form sentences. This paper presents a mobile application called the Prospect, which has been developed using the agile development model for digital representation of PECS. The application is hoped to enhance the learning process and a better yielding results.

  13. Joint Damage in ANCA-Associated Systemic Vasculitis Message I. Microscopic Polyangiitis

    Directory of Open Access Journals (Sweden)

    D.V. Pomazan

    2016-08-01

    Full Text Available Articular syndrome is one of the main signs of the microscopic polyangiitis (MPA, which in some regions of the Earth accounts for over 90 % of all systemic vasculitis (SV, associated with antineutrophil cytoplasmic antibodies (ANCA. It was found that 5 years after the manifestation of MPA, a progressive reduction of the para-articular (epiphyseal bone mineral density and destruction of the joints begin to form. Many questions related to the nature of the course of joint pathology in specific ANCA-SV require further study. Objective: to evaluate joint damage in patients with MPA and the relationship with extra-articular pathology. Material and methods. We study involved 89 patients with MPA aged 18–78 years old, among which there were 44 % men and 56 % women. The duration of the disease from the first signs of manifestation was 7 years. Acute or subacute course of MPA has been registered in 27 % of cases, and in the rest — chronic one; I degree of the activity of pathological process has been detected in 10 % of cases, II —in 32 %, III — is 58 %. Results. The joint involvement is observed in 60 % of patients with MPA, in 40 % of cases it occurs in the form of oligoarthritis, depends on the presence of pathology in skeletal muscles, pneumopathy or peripheral neuropathy. Clinical, radiological and sonographic signs of articular pathology in MPA are closely associated with patients’ age, disease duration, lesions of the heart, kidneys and skin. In the pathogenetic structures of arthropathy in patients with MPA, C-reactive protein (CRP and circulating immune complexes (CIC are involved, and the nature of ANCA (antibodies to myeloperoxidase and proteinase-3 is of small value, while the high blood levels of rheumatoid factor (RF have certain prognosis-negative significance in terms of the severity of joint pathology. Conclusion. Unfavorable prognostic criteria for the development of joint pathology in patients with MPA are indicators in the

  14. CHAIRMAN'S WELCOME MESSAGE Chairman's message

    Science.gov (United States)

    Oldham, Mark

    2010-11-01

    Every clinical physicist I have asked readily acknowledges the great desirability of a 3D dosimetry system for the verification of advanced radiation therapy treatments. An accurate and practical 3D dosimetry system would greatly strengthen the foundation of quality assurance in radiation therapy by enabling a rigorous and comprehensive whole system test. Such systems are now emerging, and the innovations and progress that led to them are remarkably captured in the proceedings of five prior DOSGEL conferences, the last three of which are freely available in the Journal of Physics: Conference Series. These meetings included a focus on the technical challenges of various approaches to 3D dosimetry. When considering plans for the present 6th meeting, the scientific committee recognized that the field has matured, and a broader focus was desirable, including a strengthening of the clinical and applications component, while preserving a strong technical component. There was also the desire to embrace a variety of other semi-3D techniques which have also recently emerged to implementation in the clinic. In accordance with these sentiments, the committee approved changing the name of the conference from the International Conference on Radiotherapy Gel Dosimetry (DOSGEL) to the International Conference on 3D Radiation Dosimetry (IC3DDose) and to the following objectives - Conference Objectives: 1. To provide a forum to discuss the latest research and developments in 3D and advanced radiation dosimetry. 2. To elevate the quality of radiation therapy treatments (quality assurance QA) through improved clinical dosimetry. 3. To explore the dosimetric challenges posed by modern radiation treatment techniques 4. To energize and diversify dosimetry research and clinical practice by encouraging interaction and synergy between advanced, 3D, and semi-3D dosimetry techniques The scientific program of the IC3DDose2010 meeting has been crafted to meet the objectives listed above, and

  15. A Process Model for Deployment Planning of Ground-based Air Defense System Against Asymmetric Homeland Threat

    Science.gov (United States)

    2009-01-01

    A Process Model for Deployment Planning of Ground-based Air Defense System Against Asymmetric Homeland Threat Ronald L. Cypert Scientific...units, along with coordination at the state and federal agency level, a dynamic process modeling capability was chosen to chart the myriad...COVERED 00-00-2009 to 00-00-2009 4. TITLE AND SUBTITLE A Process Model for Deployment Planning of Ground-based Air Defense System Against

  16. A role for the antioxidant defense system in preventing the transmission of HIV.

    Science.gov (United States)

    Foster, Harold D

    2007-01-01

    Twenty-five years of experience with the human immunodeficiency virus (HIV) have established that it is relatively difficult to transmit. The chance of medical personnel acquiring this virus by needlestick injury is only 0.3%. Similarly, the odds of an HIV-positive male infecting a female partner during one unprotected sexual encounter is 9 in 10,000. Furthermore, the per-act risk of infection from penal-anal intercourse with an HIV-positive male partner is established at 82 in 10,000. Since those who are not infected by such exposures do not develop antibodies against HIV, there must be an earlier line of defense. The global diffusion pattern of HIV/AIDS is strongly suggestive of a protective role for the trace element selenium. It is hypothesized here that the body's antioxidant defense system, especially the selenoenzyme glutathione peroxidase, acts as an initial defense against viral infection, preceding the formation of antibodies. For this reason, HIV is having its greatest difficulty in infecting those with diets elevated in amino acids and the trace element selenium which, when eaten together, stimulate the body's production of glutathione peroxidase.

  17. Audio/Video Processing Technology in Instant Messaging System%即时通信系统中的音视频处理技术

    Institute of Scientific and Technical Information of China (English)

    苏育挺; 金富玉; 张承乾

    2012-01-01

    Taking the case of Gstreamer/Farsight framework and Jingle/XMPP protocol, the audio and video communications framework and relevant protocols in instant messaging system is described in detail. Finally, implementation of audio/video processing framework is introduced in the instant messaging system with Pidgin as an example. Effective solution is provided to developers who are developing Audio/Video processing in instant messaging system.%围绕即时通信系统中的音视频处理技术,以Gstreamer/Farsight框架和Jingle/XMPP通信协议为重点,阐述了即时通信中多媒体音视频通信框架及相关协议.最后以Pidgin软件为例介绍音视频处理框架在即时通信客户端中的实现方法,为即时通信系统中音视频处理功能的开发提供了有效的解决方案.

  18. 基于数据流聚类的手机短信监管系统%Monitoring system of short message based on data steam clustering

    Institute of Scientific and Technical Information of China (English)

    綦科; 谢冬青

    2011-01-01

    To solve the problem of personalized needs and source tracking of the short message monitoring, a scheme of monitoring system for short message based on data steam clustering is proposed in which two-layer monitoring model based on receiver and SMS center is designed. By the side of SMS center, the short message is segmented with Chinese lexical analysis system and data stream mining and Bayes classification algorithm are used to realize short message monitoring and source tracking. By the side of receiver, the personalized features library is established and Bayes classification algorithm is used to meet the personalized classification. The experimental results show that the scheme can accurately realize short message monitoring and source tracking in SMS center, and can meet the personalized monitoring needs of short message receiver.%为解决手机短信监管的个性化需求和源头追踪问题,提出了一种基于数据流聚类的手机短信实时监管系统的设计方案,设计了短信客户端和短信中心端互动的二层监管模型:在短信中心端应用中文分词算法对短信文本进行分词,采用数据流聚类算法和Bayes分类算法,利用短信中心可以集中监控发送者的优势,在实现短信的个性化监管和源头跟踪;在短信客户端建立个性化短信特征库,通过对接收的短信文本进行分词和Bayes分类,实现客户端个性化短信分类判别.实验结果表明,该方案可以较为精确的在短信中心端实现集中式短信监管和源头跟踪,同时在客户端可以满足短信接收者的个性化分类需求.

  19. Ethernet-based integrated surveillance system for homeland security and homeland defense

    Science.gov (United States)

    Schooley, Michael G.; Thompson, Dean

    2004-09-01

    This report documents the results of an internal DRS effort to develop an Ethernet based integrated defense system to improve defense of cities, harbors, airports, power production, energy supplies, bridges, monuments, dams and so forth. Results of the integration of multiple SCOUT LPI radars and multiple Electro-optical targeting systems will be provided, illustrating the benefits of interfacing surveillance radars with imaging sensors to confirm detection and provide visual recognition and identification. An analysis of the handover errors will be provided including errors due to; sensor platforms location and orientation uncertainty, target location measurement errors, data latency and motion prediction errors, which contribute to target handoff and the re-acquisition timeline. These predictions will be compared to measured results. The system architecture will be defined including; security, support for both stationary and moving sensor platforms, remote control of sensor systems and distribution of imagery through the network and remote diagnostics, maintenance and software upgrades. Growth capabilities include secure wireless communication to/from moving platforms, integration with sonar and seismic sensors, cooperative location of friendly forces and acoustic detection and triangulation of gunshots with automated cueing of sensors and security forces to the shooters most probable location. The use of ad hoc multi-hopping wireless networking supplements hardwire networks, augments disaster response capabilities, provides high-speed communications for moving platforms and supplements GPS outage areas.

  20. Research and Implementation of Quick Message System for Enterprise%企业快信系统研究与实现

    Institute of Scientific and Technical Information of China (English)

    顾懿爽; 景慎艳

    2015-01-01

    Enterprise short message system to effectively solve the communication problem between enterprises,between enterprises,between enterprises and users of communication become simple and efficient.In the enterprise short message system,enterprise users can on the customer's business card management,on information library information management,provide the user group SMS,e-mail group sending service to the outside of the enterprises,and has sent internal instant message function.%企业快信系统有效地解决企业之间的沟通问题,使企业之间、企业与用户之间的沟通变得简单高效。在企业快信系统中,企业用户可以对客户的名片进行管理、对信息库信息管理,向外部企业用户提供群发短信、群发邮件服务,并具有发送内部即时消息功能。

  1. Eliminating livelock by assigning the same priority state to each message that is input into a flushable routing system during N time intervals

    Science.gov (United States)

    Faber, V.

    1994-11-29

    Livelock-free message routing is provided in a network of interconnected nodes that is flushable in time T. An input message processor generates sequences of at least N time intervals, each of duration T. An input register provides for receiving and holding each input message, where the message is assigned a priority state p during an nth one of the N time intervals. At each of the network nodes a message processor reads the assigned priority state and awards priority to messages with priority state (p-1) during an nth time interval and to messages with priority state p during an (n+1) th time interval. The messages that are awarded priority are output on an output path toward the addressed output message processor. Thus, no message remains in the network for a time longer than T. 4 figures.

  2. 集中管理式公用电话计费系统%Centralized manageable message accounting system of public telephone

    Institute of Scientific and Technical Information of China (English)

    闫晓明; 杨秀华; 程荣

    2000-01-01

    简要介绍了集中管理式公用电话计费系统的组成及功能。系统由公用电话集中管理中心与集中管理式电话计费器组成。集中管理中心与集中管理式电话计费器之间可通过公众电话网以拨号方式建立双向通信链路,从而实现对集中管理式电话计费器的远程管理。文中对集中管理式公用电话计费器的硬件设计作了系统的描述。自己设计了电话计费器与电话线的独特接口电路。对计费器软件的重点,即摘、挂机及拨号脉冲识别程序的设计,提出了一套完整的理论依据。%This paper introduces simply the composition and function of the centralized manageable message accounting system of public telephone. The system consists of the centralized management center and the centralized manageable message accounting devices. Between the center and the devices, the duplex communication links are created through the public switched telephone network, thus the remote management for the devices is realized. It describes the structure of the message accounting device. We design the special interface circuit between the message accounting device and the telephone wire. A piece of completely theoretical basis is presented in order to resolve the software design emphasis of the accounting device, such as the procedure design of off-hook and on-hook and dialing pulse recognition.

  3. Defense Industry Clusters in Turkey

    Directory of Open Access Journals (Sweden)

    Kadir Alpaslan Demir

    2016-06-01

    Full Text Available All countries strive for a capable national defense supported by a strong national defense industry. Supporting national defense with imported defense systems has many limitations and risks because the terms of arms trade agreements between countries may easily be influenced by the political climate of the signatories. As a result, establishing an independent national defense requires a strong national defense industry. Furthermore, exporting defense systems may be an important source of national income. National defense industries mostly consist of large-scale defense firms that have the resources required for big defense contracts. However, small to medium enterprises (SMEs do not have the necessary resources, therefore they are at a disadvantage. To overcome this handicap and be part of the business, defense industry clusters mostly consisting of SMEs are being established. Provided that there is good national planning and support in this area, defense clusters consisting of SMEs may play a significant role in industry. SMEs have a chance to offer specialized services, special or customized products when needed. As a result, large defense firms subcontract certain portions of defense projects to SMEs. Since 2010, Turkey has shown signs of continuous improvement in defense industry clustering. In parallel with these developments, this study discusses the importance of clustering in the defense industry, briefly presents the state of the Turkish defense industry as highlighted by national statistics, and presents the current status of defense clusters in Turkey. The novelty of this article consists in its assessment of Turkish defense clusters.

  4. DMPD: Toll-like receptors and the host defense against microbial pathogens: bringingspecificity to the innate-immune system. [Dynamic Macrophage Pathway CSML Database

    Lifescience Database Archive (English)

    Full Text Available 15075354 Toll-like receptors and the host defense against microbial pathogens: brin... the host defense against microbial pathogens: bringingspecificity to the innate-...immune system. PubmedID 15075354 Title Toll-like receptors and the host defense against microbial pathogens:

  5. Functional anatomy of the explosive defensive system of bombardier beetles (Coleoptera, Carabidae, Brachininae).

    Science.gov (United States)

    Di Giulio, Andrea; Muzzi, Maurizio; Romani, Roberto

    2015-09-01

    This paper provides the first comparative anatomical study of the explosive pygidial defensive system of bombardier beetles in species classified in three brachinine subtribes: Brachinus (Brachinina), Pheropsophus (Pheropsophina) and Aptinus (Aptinina). We investigated the morphology and ultrastructure of this system using optical, fluorescence, and focused ion beam (FIB/SEM) microscopy. In doing so, we characterized and comparatively discussed: (1) the ultrastructure of the gland tissues producing hydroquinones and hydrogen peroxide (secretory lobes), and those producing catalases and peroxidases (accessory glands); (2) the complex anatomy of the collecting duct; (3) the arrangement of the muscular bundles and the folding of the cuticle of the reservoir, suggesting a functional division of this chamber (dynamic part and storage part); (4) the great structural diversity of sculpticles inside the reaction chamber, where we could recognize six main types of microsculpture located in specific districts of the chamber. Additionally, using fluorescence microscopy, we highlighted the presence of resilin in two structures strongly subjected to mechanical stress during the discharge, the valve and the turrets of the reaction chamber. The results of this paper give a solid anatomic overview of the most popular beetle defensive system, contributing to the debate on its evolution within the Carabidae.

  6. 基于XMPP协议的Android即时通信系统设计%Design of Android Instant Messaging system based on XMPP agreement

    Institute of Scientific and Technical Information of China (English)

    黄伟敏

    2011-01-01

    即时通信通过互联网给人们提供了便捷的通信手段,针对手机覆盖区域和效果的不断提升,提出一种在流行的Android手机操作系统上,实现客户端与客户端之间的即时通信的设计方案.设计基于开源的XMPP即时通信协议,采用C/S体系结构,通过GPRS无线网络用TCP协议连接到服务器,以架设开源的Openfire服务器作为即时通讯平台,极大地方便了互联网通信不畅的用户.%Instant Messaging over the Intemet to provide a convenient means of communication, aiming at constant rise of mobile coverage area and the effects, on the pop Android mobile operating system, a design scheme was presented to achieve instant communication between the client and the client program. A XMPP Instant Messaging protocol based on open source was designed, it used C/S architectureand TCP protocol to connect to the server via GPRS wireless network, to set up Openfire server as open source instant messaging platform, which greatly facilitated the user whose Intemet communication is not smooth.

  7. Coordinated Actions of Glyoxalase and Antioxidant Defense Systems in Conferring Abiotic Stress Tolerance in Plants

    Science.gov (United States)

    Hasanuzzaman, Mirza; Nahar, Kamrun; Hossain, Md. Shahadat; Mahmud, Jubayer Al; Rahman, Anisur; Inafuku, Masashi; Oku, Hirosuke; Fujita, Masayuki

    2017-01-01

    Being sessile organisms, plants are frequently exposed to various environmental stresses that cause several physiological disorders and even death. Oxidative stress is one of the common consequences of abiotic stress in plants, which is caused by excess generation of reactive oxygen species (ROS). Sometimes ROS production exceeds the capacity of antioxidant defense systems, which leads to oxidative stress. In line with ROS, plants also produce a high amount of methylglyoxal (MG), which is an α-oxoaldehyde compound, highly reactive, cytotoxic, and produced via different enzymatic and non-enzymatic reactions. This MG can impair cells or cell components and can even destroy DNA or cause mutation. Under stress conditions, MG concentration in plants can be increased 2- to 6-fold compared with normal conditions depending on the plant species. However, plants have a system developed to detoxify this MG consisting of two major enzymes: glyoxalase I (Gly I) and glyoxalase II (Gly II), and hence known as the glyoxalase system. Recently, a novel glyoxalase enzyme, named glyoxalase III (Gly III), has been detected in plants, providing a shorter pathway for MG detoxification, which is also a signpost in the research of abiotic stress tolerance. Glutathione (GSH) acts as a co-factor for this system. Therefore, this system not only detoxifies MG but also plays a role in maintaining GSH homeostasis and subsequent ROS detoxification. Upregulation of both Gly I and Gly II as well as their overexpression in plant species showed enhanced tolerance to various abiotic stresses including salinity, drought, metal toxicity, and extreme temperature. In the past few decades, a considerable amount of reports have indicated that both antioxidant defense and glyoxalase systems have strong interactions in conferring abiotic stress tolerance in plants through the detoxification of ROS and MG. In this review, we will focus on the mechanisms of these interactions and the coordinated action of

  8. Coordinated Actions of Glyoxalase and Antioxidant Defense Systems in Conferring Abiotic Stress Tolerance in Plants

    Directory of Open Access Journals (Sweden)

    Mirza Hasanuzzaman

    2017-01-01

    Full Text Available Being sessile organisms, plants are frequently exposed to various environmental stresses that cause several physiological disorders and even death. Oxidative stress is one of the common consequences of abiotic stress in plants, which is caused by excess generation of reactive oxygen species (ROS. Sometimes ROS production exceeds the capacity of antioxidant defense systems, which leads to oxidative stress. In line with ROS, plants also produce a high amount of methylglyoxal (MG, which is an α-oxoaldehyde compound, highly reactive, cytotoxic, and produced via different enzymatic and non-enzymatic reactions. This MG can impair cells or cell components and can even destroy DNA or cause mutation. Under stress conditions, MG concentration in plants can be increased 2- to 6-fold compared with normal conditions depending on the plant species. However, plants have a system developed to detoxify this MG consisting of two major enzymes: glyoxalase I (Gly I and glyoxalase II (Gly II, and hence known as the glyoxalase system. Recently, a novel glyoxalase enzyme, named glyoxalase III (Gly III, has been detected in plants, providing a shorter pathway for MG detoxification, which is also a signpost in the research of abiotic stress tolerance. Glutathione (GSH acts as a co-factor for this system. Therefore, this system not only detoxifies MG but also plays a role in maintaining GSH homeostasis and subsequent ROS detoxification. Upregulation of both Gly I and Gly II as well as their overexpression in plant species showed enhanced tolerance to various abiotic stresses including salinity, drought, metal toxicity, and extreme temperature. In the past few decades, a considerable amount of reports have indicated that both antioxidant defense and glyoxalase systems have strong interactions in conferring abiotic stress tolerance in plants through the detoxification of ROS and MG. In this review, we will focus on the mechanisms of these interactions and the coordinated

  9. 32 CFR 37.1025 - Must I report information to the Defense Assistance Awards Data System?

    Science.gov (United States)

    2010-07-01

    ... SECRETARY OF DEFENSE DoD GRANT AND AGREEMENT REGULATIONS TECHNOLOGY INVESTMENT AGREEMENTS Executing the Award Reporting Information About the Award § 37.1025 Must I report information to the Defense... 32 National Defense 1 2010-07-01 2010-07-01 false Must I report information to the...

  10. Configuration of Risk Monitor System by PLant Defense-In.Depth Monitor and Relability Monitor

    DEFF Research Database (Denmark)

    Yoshikawa, Hidekazu; Lind, Morten; Yang, Ming;

    2012-01-01

    A new method of risk monitor system of a nuclear power plant has been proposed from the aspect by what degree of safety functions incorporated in the plant system is maintained by multiple barriers of defense-in-depth (DiD). Wherein, the central idea is plant DiD risk monitor and reliability...... monitor derived from the four aspects of (i) design principle of nuclear safety to realize DiD concept, (ii) definition of risk and risk to be monitored, (iii) severe accident phenomena as major risk, (iv) scheme of risk ranking, and (v) dynamic risk display. In this paper, the overall frame...... of the proposed frame on risk monitor system is summarized and the detailed discussion is made on the definitions of major terminologies of risk, risk ranking, anatomy of fault occurrence, two-layer configuration of risk monitor, how to configure individual elements of plant DiD risk monitor and its example...

  11. Bifurcation and complex dynamics of a discrete-time predator-prey system involving group defense

    Directory of Open Access Journals (Sweden)

    S. M. Sohel Rana

    2015-09-01

    Full Text Available In this paper, we investigate the dynamics of a discrete-time predator-prey system involving group defense. The existence and local stability of positive fixed point of the discrete dynamical system is analyzed algebraically. It is shown that the system undergoes a flip bifurcation and a Neimark-Sacker bifurcation in the interior of R+2 by using bifurcation theory. Numerical simulation results not only show the consistence with the theoretical analysis but also display the new and interesting dynamical behaviors, including phase portraits, period-7, 20-orbits, attracting invariant circle, cascade of period-doubling bifurcation from period-20 leading to chaos, quasi-periodic orbits, and sudden disappearance of the chaotic dynamics and attracting chaotic set. The Lyapunov exponents are numerically computed to characterize the complexity of the dynamical behaviors.

  12. What's in a Message?

    CERN Document Server

    Afantenos, Stergos D

    2009-01-01

    In this paper we present the first step in a larger series of experiments for the induction of predicate/argument structures. The structures that we are inducing are very similar to the conceptual structures that are used in Frame Semantics (such as FrameNet). Those structures are called messages and they were previously used in the context of a multi-document summarization system of evolving events. The series of experiments that we are proposing are essentially composed from two stages. In the first stage we are trying to extract a representative vocabulary of words. This vocabulary is later used in the second stage, during which we apply to it various clustering approaches in order to identify the clusters of predicates and arguments--or frames and semantic roles, to use the jargon of Frame Semantics. This paper presents in detail and evaluates the first stage.

  13. Nicotine impact on melanogenesis and antioxidant defense system in HEMn-DP melanocytes.

    Science.gov (United States)

    Delijewski, Marcin; Wrześniok, Dorota; Otręba, Michał; Beberok, Artur; Rok, Jakub; Buszman, Ewa

    2014-10-01

    Nicotine is a compound of tobacco plants and is responsible for addictive properties of tobacco which is used by about one billion of smokers all over the world. Recently, nicotine has drawn even more attention due to its presumed neuroprotective and antioxidant features as far as common use in various forms of smoking cessation therapies. It is suggested that nicotine may be accumulated in human tissues containing melanin. This may in turn influence biochemical processes in human cells producing melanin. The aim of this study was to examine the impact of nicotine on melanogenesis and antioxidant defense system in cultured normal human melanocytes (HEMn-DP). Nicotine induced concentration-dependent loss in melanocytes viability. The value of EC50 was determined to be 2.52 mM. Nicotine modulated melanin biosynthesis in normal human melanocytes. Significant changes in hydrogen peroxide content and cellular antioxidant enzymes: SOD, CAT, and GPx activities were stated in melanocytes exposed to nicotine, which indicates alterations of antioxidant defense system. The results obtained in vitro may explain a potential influence of nicotine on biochemical processes in melanocytes in vivo during long-term exposition to nicotine.

  14. Catalase prevents maternal diabetes-induced perinatal programming via the Nrf2-HO-1 defense system.

    Science.gov (United States)

    Chang, Shiao-Ying; Chen, Yun-Wen; Zhao, Xin-Ping; Chenier, Isabelle; Tran, Stella; Sauvé, Alexandre; Ingelfinger, Julie R; Zhang, Shao-Ling

    2012-10-01

    We investigated whether overexpression of catalase (CAT) in renal proximal tubular cells (RPTCs) could prevent the programming of hypertension and kidney disease in the offspring of dams with maternal diabetes. Male offspring of nondiabetic and diabetic dams from two transgenic (Tg) lines (Hoxb7-green fluorescent protein [GFP]-Tg [controls] and Hoxb7/CAT-GFP-Tg, which overexpress CAT in RPTCs) were studied from the prenatal period into adulthood. Nephrogenesis, systolic blood pressure, renal hyperfiltration, kidney injury, and reactive oxygen species (ROS) generation were assessed. Gene expression of transforming growth factor-β1 (TGF-β1), nuclear factor erythroid 2p45-related factor-2 (Nrf2), and heme oxygenase-1 (HO-1) was tested in both in vitro and in vivo studies. Renal dysmorphogenesis was observed in offspring of Hoxb7-GFP-Tg dams with severe maternal diabetes; the affected male offspring displayed higher renal ROS generation and developed hypertension and renal hyperfiltration as well as renal injury with heightened TGF-β1 expression in adulthood. These changes were ameliorated in male offspring of diabetic Hoxb7/CAT-GFP-Tg dams via the Nrf2-HO-1 defense system. CAT promoted Nrf2 nuclear translocation and HO-1 gene expression, seen in both in vitro and in vivo studies. In conclusion, CAT overexpression in the RPTCs ameliorated maternal diabetes-induced perinatal programming, mediated, at least in part, by triggering the Nrf2-HO-1 defense system.

  15. A glutathione-based system for defense against carbonyl stress in Haemophilus influenzae

    Directory of Open Access Journals (Sweden)

    Kidd Stephen P

    2012-07-01

    Full Text Available Abstract Background adhC from Haemophilus influenzae encodes a glutathione-dependent alcohol dehydrogenase that has previously been shown to be required for protection against killing by S-nitrosoglutathione (GSNO. This group of enzymes is known in other systems to be able to utilize substrates that form adducts with glutathione, such as aldehydes. Results Here, we show that expression of adhC is maximally induced under conditions of high oxygen tension as well as specifically with glucose as a carbon source. adhC could also be induced in response to formaldehyde but not GSNO. An adhC mutant was more susceptible than wild-type Haemophilus influenzae Rd KW20 to killing by various short chain aliphatic aldehydes, all of which can be generated endogenously during cell metabolism but are also produced by the host as part of the innate immune response. Conclusions These results indicate that AdhC plays a role in defense against endogenously generated reactive carbonyl electrophiles in Haemophilus influenzae and may also play a role in defense against the host innate immune system.

  16. Host Active Defense Responses Occur within 24 Hours after Pathogen Inoculation in the Rice Blast System

    Institute of Scientific and Technical Information of China (English)

    WANG Zhong-hua; JIA Yu-lin; LIN Hui; Adair INTERN; Barbara VALENT; J. Neil RUTGER

    2007-01-01

    Phenotypical, cytological and molecular responses of rice to the fungus Magnaporthe grisea were studied using rice cultivars and lesion mimic plants. The cultivar Katy was susceptible to several virulent M. grisea isolates, and a Sekiguchi like-lesion mimic mutant of Katy (LmmKaty) showed enhanced resistance to these isolates. Lesion mimic phenotype of LmmKaty was rapidly induced by virulent M. grisea isolates or by avirulent ones only at high levels of inoculum.Autofluorescence (a sign of an active defense response) was visible under ultraviolet light 24 h after localized inoculation in the incompatible interaction, whereas, not evident in the compatible interaction. Autofluorescence was also observed in LmmKaty 20 h after pathogen inoculation, indicating that rapid cell death is a mechanism of LmmKaty to restrict pathogen invasion. Rapid accumulations of defense related (DR) gene transcripts, phenylalanine ammonia lyase and β-glucanase,were observed beginning at 6 h and were obvious at 16 h and 24 h after inoculation in an incompatible interaction. Rapid transcript accumulations of PR-1 and chitinase had occurred by 24 h after inoculation in an incompatible interaction.Accumulations of these transcripts were delayed in the compatible interaction. These results indicate that host active defense responses occur 24 h after pathogen inoculation and that LmmKaty exhibits enhanced resistance to M. grisea. It is suggested that the autofluorescence and expression of the DR genes after heavy inoculation are important cytological and molecular markers respectively for early determination of the host response to M. grisea in the rice blast system.

  17. Evolution of RNA- and DNA-guided antivirus defense systems in prokaryotes and eukaryotes: common ancestry vs convergence.

    Science.gov (United States)

    Koonin, Eugene V

    2017-02-10

    Complementarity between nucleic acid molecules is central to biological information transfer processes. Apart from the basal processes of replication, transcription and translation, complementarity is also employed by multiple defense and regulatory systems. All cellular life forms possess defense systems against viruses and mobile genetic elements, and in most of them some of the defense mechanisms involve small guide RNAs or DNAs that recognize parasite genomes and trigger their inactivation. The nucleic acid-guided defense systems include prokaryotic Argonaute (pAgo)-centered innate immunity and CRISPR-Cas adaptive immunity as well as diverse branches of RNA interference (RNAi) in eukaryotes. The archaeal pAgo machinery is the direct ancestor of eukaryotic RNAi that, however, acquired additional components, such as Dicer, and enormously diversified through multiple duplications. In contrast, eukaryotes lack any heritage of the CRISPR-Cas systems, conceivably, due to the cellular toxicity of some Cas proteins that would get activated as a result of operon disruption in eukaryotes. The adaptive immunity function in eukaryotes is taken over partly by the PIWI RNA branch of RNAi and partly by protein-based immunity. In this review, I briefly discuss the interplay between homology and analogy in the evolution of RNA- and DNA-guided immunity, and attempt to formulate some general evolutionary principles for this ancient class of defense systems.

  18. Auctioning Bulk Mobile Messages

    NARCIS (Netherlands)

    S. Meij (Simon); L-F. Pau (Louis-François); H.W.G.M. van Heck (Eric)

    2003-01-01

    textabstractThe search for enablers of continued growth of SMS traffic, as well as the take-off of the more diversified MMS message contents, open up for enterprises the potential of bulk use of mobile messaging , instead of essentially one-by-one use. In parallel, such enterprises or value added

  19. Message in a molecule.

    Science.gov (United States)

    Sarkar, Tanmay; Selvakumar, Karuthapandi; Motiei, Leila; Margulies, David

    2016-05-03

    Since ancient times, steganography, the art of concealing information, has largely relied on secret inks as a tool for hiding messages. However, as the methods for detecting these inks improved, the use of simple and accessible chemicals as a means to secure communication was practically abolished. Here, we describe a method that enables one to conceal multiple different messages within the emission spectra of a unimolecular fluorescent sensor. Similar to secret inks, this molecular-scale messaging sensor (m-SMS) can be hidden on regular paper and the messages can be encoded or decoded within seconds using common chemicals, including commercial ingredients that can be obtained in grocery stores or pharmacies. Unlike with invisible inks, however, uncovering these messages by an unauthorized user is almost impossible because they are protected by three different defence mechanisms: steganography, cryptography and by entering a password, which are used to hide, encrypt or prevent access to the information, respectively.

  20. Message in a molecule

    Science.gov (United States)

    Sarkar, Tanmay; Selvakumar, Karuthapandi; Motiei, Leila; Margulies, David

    2016-01-01

    Since ancient times, steganography, the art of concealing information, has largely relied on secret inks as a tool for hiding messages. However, as the methods for detecting these inks improved, the use of simple and accessible chemicals as a means to secure communication was practically abolished. Here, we describe a method that enables one to conceal multiple different messages within the emission spectra of a unimolecular fluorescent sensor. Similar to secret inks, this molecular-scale messaging sensor (m-SMS) can be hidden on regular paper and the messages can be encoded or decoded within seconds using common chemicals, including commercial ingredients that can be obtained in grocery stores or pharmacies. Unlike with invisible inks, however, uncovering these messages by an unauthorized user is almost impossible because they are protected by three different defence mechanisms: steganography, cryptography and by entering a password, which are used to hide, encrypt or prevent access to the information, respectively. PMID:27138465

  1. Motion Detection Notification System by Short Messaging Service Using Network Camera and Global System for Mobile Modem

    CERN Document Server

    Mohd, Mohd Norzali Haji; Ariffin, Siti Khairulnisa

    2010-01-01

    As the technology rapidly grows, the trend is clear that the use of mobile devices is gain an attention nowadays, thus designing a system by integrating it with notification feature is becoming an important aspect especially in tracking and monitoring system. Conventional security surveillance systems require the constant attention from the user, to monitor the location concurrently. In order to reduce the cost of computing power and advance technology of mobile phone in widespread acceptance of the Internet as a viable communication medium, this paper is aimed to design a low cost web-based system as a platform to view the image captured. When the network camera detects any movement from the intruders, it automatically captures the image and sends it to the database of the web-based directly by the network through File Transfer Protocol (FTP). The camera is attached through an Ethernet connection and power source. Therefore, the camera can be viewed from either standard Web browser or cell phone. Nowadays, w...

  2. The Sinorhizobium (Ensifer) fredii HH103 Type 3 Secretion System Suppresses Early Defense Responses to Effectively Nodulate Soybean.

    Science.gov (United States)

    Jiménez-Guerrero, Irene; Pérez-Montaño, Francisco; Monreal, José Antonio; Preston, Gail M; Fones, Helen; Vioque, Blanca; Ollero, Francisco Javier; López-Baena, Francisco Javier

    2015-07-01

    Plants that interact with pathogenic bacteria in their natural environments have developed barriers to block or contain the infection. Phytopathogenic bacteria have evolved mechanisms to subvert these defenses and promote infection. Thus, the type 3 secretion system (T3SS) delivers bacterial effectors directly into the plant cells to alter host signaling and suppress defenses, providing an appropriate environment for bacterial multiplication. Some rhizobial strains possess a symbiotic T3SS that seems to be involved in the suppression of host defenses to promote nodulation and determine the host range. In this work, we show that the inactivation of the Sinorhizobium (Ensifer) fredii HH103 T3SS negatively affects soybean nodulation in the early stages of the symbiotic process, which is associated with a reduction of the expression of early nodulation genes. This symbiotic phenotype could be the consequence of the bacterial triggering of soybean defense responses associated with the production of salicylic acid (SA) and the impairment of the T3SS mutant to suppress these responses. Interestingly, the early induction of the transcription of GmMPK4, which negatively regulates SA accumulation and defense responses in soybean via WRKY33, could be associated with the differential defense responses induced by the parental and the T3SS mutant strain.

  3. Self-regulating Message Throughput in Enterprise Messaging Servers – A Feedback Control Solution

    Directory of Open Access Journals (Sweden)

    Ravi Kumar G

    2012-01-01

    Full Text Available Enterprise Messaging is a very popular message exchange concept in asynchronous distributed computing environments. The Enterprise Messaging Servers are heavily used in building business critical Enterprise applications such as Internet based Order processing systems, pricing distribution of B2B, geographically dispersed enterprise applications. It is always desirable that Messaging Servers exhibit high performance to meet the Service Level Agreements (SLAs. There are investigations in this area of managing the performance of the distributed computing systems in different ways such as the IT administrators configuring and tuning the Messaging Servers parameters, implement complex conditional programming to handle the workload dynamics. But in practice it is extremely difficult to handle such dynamics of changing workloads in order to meet the performance requirements. Additionally it is challenging to cater to the future resource requirements based on the future workloads. Though there have been attempts to self-regulate the performance of Enterprise Messaging Servers, there is a limited investigation done in exploring feedback control systems theory in managing the Messaging Servers performance. We propose an adaptive control based solution to not only manage the performance of the servers to meet SLAs but also to pro-actively self-regulate the performance such that the Messaging Servers are capable to meet the current and future workloads. We implemented and evaluated our solution and observed that the control theory based solution will improve the performance of Enterprise Messaging Servers significantly.

  4. Digital Array Radar for Ballistic Missile Defense and Counter-Stealth Systems Analysis and Parameter Tradeoff Study

    Science.gov (United States)

    2006-09-14

    Missile BMD Ballistic Missile Defense CAS Computer Algebra System CDD Capability Development Document CONOPS Concept of Operations CONUS Continental...this section. Analysis and calculations described in this section were conducted using Waterloo Maple® 7 Computer Algebra System (CAS). Initially...When two or more electromagnetic waves combine, their electric fields are integrated vectorially at each point in space for any

  5. Message passing with a limited number of DMA byte counters

    Energy Technology Data Exchange (ETDEWEB)

    Blocksome, Michael (Rochester, MN); Chen, Dong (Croton on Hudson, NY); Giampapa, Mark E. (Irvington, NY); Heidelberger, Philip (Cortlandt Manor, NY); Kumar, Sameer (White Plains, NY); Parker, Jeffrey J. (Rochester, MN)

    2011-10-04

    A method for passing messages in a parallel computer system constructed as a plurality of compute nodes interconnected as a network where each compute node includes a DMA engine but includes only a limited number of byte counters for tracking a number of bytes that are sent or received by the DMA engine, where the byte counters may be used in shared counter or exclusive counter modes of operation. The method includes using rendezvous protocol, a source compute node deterministically sending a request to send (RTS) message with a single RTS descriptor using an exclusive injection counter to track both the RTS message and message data to be sent in association with the RTS message, to a destination compute node such that the RTS descriptor indicates to the destination compute node that the message data will be adaptively routed to the destination node. Using one DMA FIFO at the source compute node, the RTS descriptors are maintained for rendezvous messages destined for the destination compute node to ensure proper message data ordering thereat. Using a reception counter at a DMA engine, the destination compute node tracks reception of the RTS and associated message data and sends a clear to send (CTS) message to the source node in a rendezvous protocol form of a remote get to accept the RTS message and message data and processing the remote get (CTS) by the source compute node DMA engine to provide the message data to be sent.

  6. Impaired antioxidant defense system in the kidney tissues from rabbits treated with cyclosporine. Protective effects of vitamins E and C.

    Science.gov (United States)

    Durak, I; Karabacak, H I; Büyükkoçak, S; Cimen, M Y; Kaçmaz, M; Omeroglu, E; Oztürk, H S

    1998-01-01

    Enzymatic antioxidant defense system and antioxidant defense potential (AOP) were studied in kidney tissue from rabbits treated with cyclosporine (CsA, 25 mg/kg/day), antioxidant vitamins (E, 100 mg/kg/day plus C, 200 mg/ kg/day), and CsA plus antioxidant vitamins, and in kidney tissue from control animals. Although no change was observed in superoxide dismutase (SOD) activity, glutathione peroxidase (GSH-Px) and catalase (CAT) activities were found decreased in kidney tissue exposed to CsA for 10 days compared with control tissue. The level of thiobarbituric acid-reagent substances (TBARS) was higher and antioxidant defense potential (AOP) lower in the CsA-treated group compared with the other groups. Histopathological examination reveals important subcellular damage in the renal tissue from the animals treated with CsA. Antioxidant vitamin therapy caused full improvement in the enzyme activities, TBARS levels and AOP, but the subcellular damage was partly ameliorated in the CsA plus vitamin group. Results suggest that CsA impairs the antioxidant defense system and reduces the antioxidant defense potential in the renal tissue. Antioxidant vitamin treatment protects the tissue in part against toxic effects of the drug.

  7. Engineered cell-cell communication via DNA messaging

    Directory of Open Access Journals (Sweden)

    Ortiz Monica E

    2012-09-01

    Full Text Available Abstract Background Evolution has selected for organisms that benefit from genetically encoded cell-cell communication. Engineers have begun to repurpose elements of natural communication systems to realize programmed pattern formation and coordinate other population-level behaviors. However, existing engineered systems rely on system-specific small molecules to send molecular messages among cells. Thus, the information transmission capacity of current engineered biological communication systems is physically limited by specific biomolecules that are capable of sending only a single message, typically “regulate transcription.” Results We have engineered a cell-cell communication platform using bacteriophage M13 gene products to autonomously package and deliver heterologous DNA messages of varying lengths and encoded functions. We demonstrate the decoupling of messages from a common communication channel via the autonomous transmission of various arbitrary genetic messages. Further, we increase the range of engineered DNA messaging across semisolid media by linking message transmission or receipt to active cellular chemotaxis. Conclusions We demonstrate decoupling of a communication channel from message transmission within engineered biological systems via the autonomous targeted transduction of user-specified heterologous DNA messages. We also demonstrate that bacteriophage M13 particle production and message transduction occurs among chemotactic bacteria. We use chemotaxis to improve the range of DNA messaging, increasing both transmission distance and communication bit rates relative to existing small molecule-based communication systems. We postulate that integration of different engineered cell-cell communication platforms will allow for more complex spatial programming of dynamic cellular consortia.

  8. Syndromic classification of Twitter messages

    CERN Document Server

    Collier, Nigel

    2011-01-01

    Recent studies have shown strong correlation between social networking data and national influenza rates. We expanded upon this success to develop an automated text mining system that classifies Twitter messages in real time into six syndromic categories based on key terms from a public health ontology. 10-fold cross validation tests were used to compare Naive Bayes (NB) and Support Vector Machine (SVM) models on a corpus of 7431 Twitter messages. SVM performed better than NB on 4 out of 6 syndromes. The best performing classifiers showed moderately strong F1 scores: respiratory = 86.2 (NB); gastrointestinal = 85.4 (SVM polynomial kernel degree 2); neurological = 88.6 (SVM polynomial kernel degree 1); rash = 86.0 (SVM polynomial kernel degree 1); constitutional = 89.3 (SVM polynomial kernel degree 1); hemorrhagic = 89.9 (NB). The resulting classifiers were deployed together with an EARS C2 aberration detection algorithm in an experimental online system.

  9. School Health Message

    Science.gov (United States)

    Califano, Joseph A., Jr.

    1977-01-01

    This article presents the message delivered to the National School Health Association Conference by the Secretary of the Department of Health, Education, and Welfare in May 1977 and the response of the participants in the conference. (JD)

  10. Design of Message Receiving/Sending Program in Smart Home System%智能家居系统中的短信收发程序设计

    Institute of Scientific and Technical Information of China (English)

    冯金超; 张秀娟

    2012-01-01

    Aiming at the demands including real-time receiving/sending of security alarm information and home appliance remote control in Smart Home system, a solution is put forward to receive/send message using 3G module, and a software architecture is designed to realize message receiving/sending at the same time. Experimental results show the design is simple and practical, and it can meet the requirements of Smart Home system.%针对智能家居系统中安防报警信息实时收发及家电远程控制的需求,提出使用3G模块收发短信的方法,并设计了实现短信同时收发功能的软件架构。实验结果表明,该方法简单实用,能够满足智能家居系统的要求。

  11. BASICS OF INTEGRAL APPROACH TO IMPROVEMENT OF INNOVATION SYSTEM IN DEFENSE INDUSTRY COMPLEX OF RUSSIA

    Directory of Open Access Journals (Sweden)

    Анатолий Андреевич Чудин

    2014-04-01

    Full Text Available The author develops integral approach to improvement of innovation system as exemplified by defense industry complex (DIC of Russia. Integral approach includes the elements of 3 approaches: system, synergetic and geotrion. This approach contains conceptual, modeling-projecting and realizing parts and the principles, mechanisms and technologies aimed for improvement of management of innovation system in Russia. DIC of Russia is an earth object – it is complex of complexes which is supposed to be established not only with the use of technological structure which is mainly referred to industrial society. The elements of new technological structures must be added to integral approach: knowledge economy and harmonization of society. The second, synergetic approach, is predominantly referred to post-industrial society. The third, geotrion approach, which is only being formed, is mainly referred to the society of sustainable harmonic development. Such objects were called geotrions by Russian scientist N. D. Matrusov [5], they consist of people, economy and environment (nature, territory, external opposed and interacting systems. The method of geotrion management is called integral approach. Knowledge economy can not be realized in Russia without harmonization of the country.DOI: http://dx.doi.org/10.12731/2218-7405-2014-2-13

  12. Ballistic Missile Defense System Transition and Transfer Process from Missile Defense Agency to the Army - Innovative or Dysfunctional?

    Science.gov (United States)

    2010-04-14

    initiating development of the nuclear-capable Nike Zeus ABM interceptor, intended to destroy an incoming enemy warhead with an airborne nuclear explosion. The...intercept an incoming warhead using the nuclear-tipped Nike Zeus missile. Although DoD cancelled the Nike Zeus system due to technical and operational...budgeting, and initiate issue resolution through the Army/MDA Board of Directors to ensure adequate representation of the Service’s interests

  13. Autophagy is redundant for the host defense against systemic Candida albicans infections

    NARCIS (Netherlands)

    Smeekens, S.P.; Malireddi, R.K.; Plantinga, T.S.; Buffen, K.; Oosting, M.; Joosten, L.A.B.; Kullberg, B.J.; Perfect, J.R.; Scott, W.K.; Veerdonk, F.L. van de; Xavier, R.J.; Vosse, E. van de; Kanneganti, T.D.; Johnson, M.D.; Netea, M.G.

    2014-01-01

    Autophagy has been demonstrated to play an important role in the immunity against intracellular pathogens, but very little is known about its role in the host defense against fungal pathogens such as Candida albicans. Therefore, the role of autophagy for the host defense against C. albicans was asse

  14. Silicon induced systemic defense responses in perennial ryegrass against Magnaporthe oryzae infection

    Science.gov (United States)

    Sustainable integrated disease management for gray leaf spot of perennial ryegrass may involve use of plant defense elicitors with compatible traditional fungicides to reduce disease incidence and severity. Silicon (Si) is a potential inducer or modulator of plant defenses against different pathogen...

  15. 32 CFR 21.200 - What is the Defense Grant and Agreement Regulatory System (DGARS)?

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 1 2010-07-01 2010-07-01 false What is the Defense Grant and Agreement... Washington Headquarters Services Internet site http://www.dtic.mil/whs/directives. Paper copies may be obtained, at cost, from the National Technical Information Service, 5285 Port Royal Road, Springfield,...

  16. 75 FR 13262 - Reporting on Offsets Agreements in Sales of Weapon Systems or Defense-Related Items to Foreign...

    Science.gov (United States)

    2010-03-19

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF COMMERCE Bureau of Industry and Security Reporting on Offsets Agreements in Sales of Weapon Systems or Defense-Related Items to Foreign Countries or Foreign Firms for Calendar Year 2009 AGENCY: Bureau of Industry and...

  17. Joint-Service Integration: An Organizational Culture Study of the United States Department of Defense Voluntary Education System

    Science.gov (United States)

    Benson, Martin K.

    2010-01-01

    The purpose of the descriptive case study with a multiple case framework was to (a) describe the organizational cultures of education programs and leaders in the United States (U.S.) Department of Defense (DoD) voluntary education system on Oahu, Hawaii; (b) determine if an overlapping common organizational culture exists; and (c) assess the…

  18. Teaching Clinical (and Nonclinical) Psychology through Applications to the Legal System: Violence Risk Assessment and the Insanity Defense

    Science.gov (United States)

    Costanzo, Marina L.; Costanzo, Mark A.

    2013-01-01

    The prediction of dangerousness and the insanity defense are two areas where psychologists provide research-based expertise to the courts. Teachers of psychology can use these topics to capture the attention of students and to show how psychological research and theory can inform and influence the legal system. Specifically, teachers can use the…

  19. Teaching Clinical (and Nonclinical) Psychology through Applications to the Legal System: Violence Risk Assessment and the Insanity Defense

    Science.gov (United States)

    Costanzo, Marina L.; Costanzo, Mark A.

    2013-01-01

    The prediction of dangerousness and the insanity defense are two areas where psychologists provide research-based expertise to the courts. Teachers of psychology can use these topics to capture the attention of students and to show how psychological research and theory can inform and influence the legal system. Specifically, teachers can use the…

  20. Analysis of the NATO Fleet Air-Defense System%北约舰队防空体系分析

    Institute of Scientific and Technical Information of China (English)

    齐强; 王瑞麒

    2001-01-01

    介绍了以美国为首的北约舰队防空体系的构成、任务和主要防御对象。对北约舰队防空体系的最新发展动向进行了分析。针对目前北约舰队防空体系中的薄弱环节,提出了突防的具体构想。%This paper introduces the construction, tasks ,targets and analyzed the future developing tendency of the fleet air-defense system of NATO led by U.S.. According to the weak links of the defense system,this paper presents a idea to break through the defense net.

  1. The biocontrol endophytic bacterium Pseudomonas fluorescens PICF7 induces systemic defense responses in aerial tissues upon colonization of olive roots

    Directory of Open Access Journals (Sweden)

    Carmen eGómez-Lama Cabanás

    2014-09-01

    Full Text Available Pseudomonas fluorescens PICF7, a native olive root endophyte and effective biocontrol agent (BCA against Verticillium wilt of olive, is able to trigger a broad range of defense responses in root tissues of this woody plant. In order to elucidate whether strain PICF7 also induces systemic defense responses in above-ground organs, aerial tissues of olive plants grown under non-gnotobiotic conditions were collected at different time points after root bacterization with this endophytic BCA. A suppression subtractive hybridization (SSH cDNA library, enriched in up-regulated genes, was generated. This strategy enabled the identification of 376 ESTs (99 contigs and 277 singlets, many of them related to response to different stresses. Five ESTs, involved in defense responses, were selected to carry out time-course quantitative real-time PCR (qRT-PCR experiments aiming to: (i validate the induction of these genes, and (ii shed light on their expression pattern along time (from 1 to 15 days. Induction of olive genes potentially coding for lypoxigenase 2, catalase, 1-aminocyclopropane-1-carboxylate oxidase and phenylananine ammonia-lyase was thus confirmed at some time points. Computational analysis also revealed that different transcription factors were up-regulated in olive aerial tissues (i.e. jerf, bHLH, WRKYs, as previously reported for roots. Results confirmed that root colonization by this endophytic bacterium does not only trigger defense responses in this organ but also mount a wide array of systemic defense responses in distant tissues (stems, leaves. This sheds light on how olive plants respond to the ‘non-hostile’ colonization by a bacterial endophyte and how induced defense response can contribute to the biocontrol activity of strain PICF7.

  2. Multi-message Voice Record and Playback System Based on MOU%单片机的多段语音组合录放系统设计

    Institute of Scientific and Technical Information of China (English)

    温洪昌; 黄应强; 傅贵兴

    2011-01-01

    A kind of multi-message voice record and playback system is designed based on MCUSTC89C52RC and voice chip ISD1730, The paper introduces the process realization, including voice circuits design, multi-message voice recording, locating, editing and cornbi nation outputting. Also, a temperature measuring instrument with voice output function is produced. Experiments indicate that this in strument is easier to operate and use.%介绍一种基于单片机STC89C52RC、语音芯片ISD1730组成的多段语音录放系统设计方案。描述了语音电路设计、语音分段录入、语音段定位、语音段剪辑、多段语音组合输出等的实现方法;并制作了一个具有语音输出功能的温度测量仪。实验表明,具有语音输出功能的温度测量仪器更便于操作和使用。

  3. Moving Target Defense

    CERN Document Server

    Jajodia, Sushil; Swarup, Vipin; Wang, Cliff; Wang, X Sean

    2011-01-01

    Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instr

  4. Quantum interactive proofs with short messages

    CERN Document Server

    Beigi, Salman; Watrous, John

    2010-01-01

    This paper considers three variants of quantum interactive proof systems in which short (meaning logarithmic-length) messages are exchanged between the prover and verifier. The first variant is one in which the verifier sends a short message to the prover, and the prover responds with an ordinary, or polynomial-length, message; the second variant is one in which any number of messages can be exchanged, but where the combined length of all the messages is logarithmic; and the third variant is one in which the verifier sends polynomially many random bits to the prover, who responds with a short quantum message. We prove that in all of these cases the short messages can be eliminated without changing the power of the model, so the first variant has the expressive power of QMA and the second and third variants have the expressive power of BQP. These facts are proved through the use of quantum state tomography, along with the finite quantum de Finetti theorem for the first variant.

  5. Oral messages improve visual search

    CERN Document Server

    Kieffer, Suzanne

    2007-01-01

    Input multimodality combining speech and hand gestures has motivated numerous usability studies. Contrastingly, issues relating to the design and ergonomic evaluation of multimodal output messages combining speech with visual modalities have not yet been addressed extensively. The experimental study presented here addresses one of these issues. Its aim is to assess the actual efficiency and usability of oral system messages including brief spatial information for helping users to locate objects on crowded displays rapidly. Target presentation mode, scene spatial structure and task difficulty were chosen as independent variables. Two conditions were defined: the visual target presentation mode (VP condition) and the multimodal target presentation mode (MP condition). Each participant carried out two blocks of visual search tasks (120 tasks per block, and one block per condition). Scene target presentation mode, scene structure and task difficulty were found to be significant factors. Multimodal target presenta...

  6. Immune multi-agent model using vaccine for cooperative air-defense system of systems for surface warship formation based on danger theory

    Institute of Scientific and Technical Information of China (English)

    Jun Wang; Xiaozhe Zhao; Beiping Xu; Wei Wang; Zhiyong Niu

    2013-01-01

    Aiming at the problem on cooperative air-defense of surface warship formation, this paper maps the cooperative air-defense system of systems (SoS) for surface warship formation (CASoSSWF) to the biological immune system (BIS) according to the similarity of the defense mechanism and characteristics be-tween the CASoSSWF and the BIS, and then designs the mo-dels of components and the architecture for a monitoring agent, a regulating agent, a kil er agent, a pre-warning agent and a com-municating agent by making use of the theories and methods of the artificial immune system, the multi-agent system (MAS), the vaccine and the danger theory (DT). Moreover a new immune multi-agent model using vaccine based on DT (IMMUVBDT) for the cooperative air-defense SoS is advanced. The immune response and immune mechanism of the CASoSSWF are analyzed. The model has a capability of memory, evolution, commendable dy-namic environment adaptability and self-learning, and embodies adequately the cooperative air-defense mechanism for the CA-SoSSWF. Therefore it shows a novel idea for the CASoSSWF which can provide conception models for a surface warship forma-tion operation simulation system.

  7. Ferulic acid chronic treatment exerts antidepressant-like effect: role of antioxidant defense system.

    Science.gov (United States)

    Lenzi, Juliana; Rodrigues, Andre Felipe; Rós, Adriana de Sousa; de Castro, Amanda Blanski; de Castro, Bianca Blanski; de Lima, Daniela Delwing; Magro, Débora Delwing Dal; Zeni, Ana Lúcia Bertarello

    2015-12-01

    Oxidative stress has been claimed a place in pathophysiology of depression; however, the details of the neurobiology of this condition remains incompletely understood. Recently, treatments employing antioxidants have been thoroughly researched. Ferulic acid (FA) is a phenolic compound with antioxidant and antidepressant-like effects. Herein, we investigated the involvement of the antioxidant activity of chronic oral FA treatment in its antidepressant-like effect using the tail suspension test (TST) and the forced swimming test (FST) in mice. The modulation of antioxidant system in blood, hippocampus and cerebral cortex was assessed after stress induction through TST and FST. Our results show that FA at the dose of 1 mg/kg has antidepressant-like effect without affecting locomotor activity. The stress induced by despair tests was able to decrease significantly the activities of superoxide dismutase (SOD) in the blood, catalase (CAT) in the blood and cerebral cortex and glutathione peroxidase (GSH-Px) in the cerebral cortex. Thiobarbituric acid-reactive substances (TBA-RS) levels were increased significantly in the cerebral cortex. Furthermore, the results show that FA was capable to increase SOD, CAT and GSH-Px activities and decrease TBA-RS levels in the blood, hippocampus and cerebral cortex. These findings demonstrated that FA treatment in low doses is capable to exert antidepressant-like effect with the involvement of the antioxidant defense system modulation.

  8. Effects of magnetic field on the antioxidant defense system of recirculation-cultured Chlorella vulgaris.

    Science.gov (United States)

    Wang, Hai-Ying; Zeng, Xiao-Bo; Guo, Si-Yuan; Li, Zong-Tao

    2008-01-01

    Little is known about the influence of magnetic fields (MF) on growth of microalgae such as Chlorella vulgaris, which has been consumed as health food for various nutritional and pharmacological effects. This preliminary study investigated whether static MF can modulate the antioxidant system in C. vulgaris by exposing the cells to static MF generated by dual yoke electromagnets with magnetic flux density of 10-50 mT for 12 h. After exposure to 10-35 mT for 12 h, the activity of superoxide dismutases and peroxidase increased significantly compared to control cells. However, a remarkable increase of catalase activity occurred at 45 and 50 mT. The lipid peroxidation of algae cells determined by production of thiobarbituric acid-reactive substances was much increased when exposed to 35, 45, and 50 mT of MF. The scavenging ability of 2,2-diphenyl-1-picrylhydrazyl radical was decreased markedly while there was no variation of total carotenoids content in C. vulgaris cells. Assay of specific growth rate in 72 h cultivation after MF exposure was also conducted. In groups after exposure to 10-35 mT of MF, specific growth rate was significantly increased. These results suggest that 10-35 mT of static MF exposure could promote the growth of C. vulgaris and regulate its antioxidant defense system to protect cells efficiently, which could possibly enhance the growth of C. vulgaris in industrialized cultivation by MF.

  9. Role of glutathione metabolism and glutathione-related antioxidant defense systems in hypertension.

    Science.gov (United States)

    Robaczewska, J; Kedziora-Kornatowska, K; Kozakiewicz, M; Zary-Sikorska, E; Pawluk, H; Pawliszak, W; Kedziora, J

    2016-06-01

    The risk of developing chronic hypertension increases with age. Among others factors, increased oxidative stress is a well-recognized etiological factor for the development of hypertension. The co-occurrence of oxidative stress and hypertension may occur as a consequence of a decrease in antioxidant defense system activity or elevated reactive oxygen species generation. Glutathione is a major intracellular thiol-disulfide redox buffer that serves as a cofactor for many antioxidant enzymes. Glutathione-related parameters are altered in hypertension, suggesting that there is an association between the glutathione-related redox system and hypertension. In this review, we provide mechanistic explanations for how glutathione maintains blood pressure. More specifically, we discuss glutathione's role in combating oxidative stress and maintaining nitric oxide bioavailability via the formation of nitrosothiols and nitrosohemoglobin. Although impaired vasodilator responses are observed in S-nitrosothiol-deficient red blood cells, this potential hypertensive mechanism is currently overlooked in the literature. Here we fill in this gap by discussing the role of glutathione in nitric oxide metabolism and controlling blood pressure. We conclude that disturbances in glutathione metabolism might explain age-dependent increases in blood pressure.

  10. Report of the Defense Science Board task force on military system applications of superconductors

    Science.gov (United States)

    1988-10-01

    The Task Force found a number of superconductivity applications that could result in significant new military capabilities, including electronics and high power applications. In particular, superconducting materials could enable significant military improvements in: Magnetic Field Sensors with greatly increased sensitivity for improved detection and identification capability; Passive Microwave and Millimeter-wave Components enabling increased detection range and discrimination in clutter; Staring Infrared Focal Plane Array sensors incorporating superconducting electronics permitting significant range and sensitivity increases over current scanning IR sensors; Wideband Analog and Ultra-Fast Digital Signal Processing for radar and optical sensors; High Power Motors and Generators for ship and aircraft propulsion leading to: decreased displacement; drive system flexibility; increased range; or longer endurance on station; Magnets/Energy Storage for high power microwave, millimeter-wave or optical generators (e.g., free electron laser); capability for powering quiet propulsion systems; Electro-Magnetic Launchers capable of launching hypervelocity projectiles for antiarmor weapons and close-in ship defense weapons; and Magnetohydrodynamic (MHD) Propulsion enabling ultra quiet drives for submarines, torpedoes, and surface ships.

  11. Human multidrug resistance ABCB and ABCG transporters: participation in a chemoimmunity defense system.

    Science.gov (United States)

    Sarkadi, Balázs; Homolya, László; Szakács, Gergely; Váradi, András

    2006-10-01

    In this review we give an overview of the physiological functions of a group of ATP binding cassette (ABC) transporter proteins, which were discovered, and still referred to, as multidrug resistance (MDR) transporters. Although they indeed play an important role in cancer drug resistance, their major physiological function is to provide general protection against hydrophobic xenobiotics. With a highly conserved structure, membrane topology, and mechanism of action, these essential transporters are preserved throughout all living systems, from bacteria to human. We describe the general structural and mechanistic features of the human MDR-ABC transporters and introduce some of the basic methods that can be applied for the analysis of their expression, function, regulation, and modulation. We treat in detail the biochemistry, cell biology, and physiology of the ABCB1 (MDR1/P-glycoprotein) and the ABCG2 (MXR/BCRP) proteins and describe emerging information related to additional ABCB- and ABCG-type transporters with a potential role in drug and xenobiotic resistance. Throughout this review we demonstrate and emphasize the general network characteristics of the MDR-ABC transporters, functioning at the cellular and physiological tissue barriers. In addition, we suggest that multidrug transporters are essential parts of an innate defense system, the "chemoimmunity" network, which has a number of features reminiscent of classical immunology.

  12. The persuasive effects of personalization through : name mentioning in a smoking cessation message

    NARCIS (Netherlands)

    Dijkstra, Arie

    2014-01-01

    Mentioning the recipient's name in a persuasive message is one way to personalize messages in an attempt to increase persuasion. However, this type of personalization may lead to a self-threat that activates defensive reactions and to a subsequent decrease in persuasion. A self-affirmation procedure

  13. Aversive picture processing: effects of a concurrent task on sustained defensive system engagement.

    Science.gov (United States)

    Wangelin, Bethany C; Löw, Andreas; McTeague, Lisa M; Bradley, Margaret M; Lang, Peter J

    2011-01-01

    Viewing a series of aversive pictures prompts emotional reactivity reflecting sustained defensive engagement. The present study examined the effects of a concurrent visual task on autonomic, somatic, electrocortical, and facial components of this defensive state. Results indicated that emotional activation was largely preserved despite continuous visual distraction, although evidence of attenuation was observed in startle reflex and electrocortical measures. Concurrent task-specific reactivity was also apparent, suggesting that motivational circuits can be simultaneously activated by stimuli with intrinsic survival significance and instructed task significance and that these processes interact differently across the separate components of defensive engagement.

  14. 基于数字身份认证系统的即时通讯系统应用探讨%Application of Instant Messaging System Based on Digital Identity Authentication System

    Institute of Scientific and Technical Information of China (English)

    黄锐; 张洋; 刘福春

    2014-01-01

    This article introduces the technical framework of instant messaging system and digital identity authentication system of Haihe River Water Conservancy Commission (HWCC). From the perspectives of theory, methods, steps, workload, system security and user acceptance, it gives a detail analysis on two solutions:one is a combination of the instant messaging system with the universal user management system by log in username/password, and another is to log in with a UKEY on the basis of a deep integration of the instant messaging system and the CA system. In the end, the solution of logging in by inputting username/password on the basis of a combination of the instant messaging system and a third-party universal user management system is chosen to upgrade the instant messaging system of HWCC. The upgraded system improved the function of the offline file handling stability and organization flexibility. It greatly guarantees the safety and no leak of users’ personal information and working file.%介绍海河水利委员会即时通讯、数字身份认证等系统的技术架构,对即时通讯系统升级的2种方案:即时通讯系统与统一用户管理系统结合通过用户名/密码方式进行登录,和即时通讯系统与认证系统深度集成通过USB Key 登录的方案,从原理、实现方法、实施步骤、开发工作量、系统安全性、用户接受程度等方面进行详细分析,最终选择即时通讯系统与第三方统一用户管理系统结合,通过用户名/密码方式进行登录的方案对海河水利委员会即时通讯系统进行升级改造,升级后的系统完善了离线文件处理稳定性、组织机构排序灵活性等功能,极大地保障用户个人信息及工作文件的安全与不外泄。

  15. Crafting a Real-Time Information Aggregator for Mobile Messaging

    Directory of Open Access Journals (Sweden)

    Jenq-Shiou Leu

    2010-01-01

    Full Text Available Mobile messaging is evolving beyond SMS (Short Message Service text messaging with the introduction of MMS (Multimedia Messaging Service. In the past, such a scheme is used for peer-to-peer communication. Messages are generally displayed on a cellular phone with a limited-sized screen. However, such a visualizing process is not suitable to broadcast real-time SMS/MMS messages to people in public. To facilitate the instancy and publicity, we develop a real-time information aggregator—Visualizing SMS and MMS Messages System (VSMMS—to realize the concept by integrating SMS and MMS messaging over GSM/GPRS/UMTS onto a remote display device. The device exhibits messages on a larger display device in public. VSMMS features a revolutionized variation of mass media broadcasting. In this paper, we practically illustrate how to design and implement VSMMS and use a M/M/1 model to conduct a theoretical analysis about the message delay in the system queue. Meanwhile, we make an empirical performance evaluation about the message transmission time over different networks.

  16. 基于MQTT协议的移动IM系统设计与实现%Design and Implementation of Mobile Instant Messaging System Based on MQTT Protocol

    Institute of Scientific and Technical Information of China (English)

    崔东欢; 郭立君; 张荣; 周丰平

    2016-01-01

    为降低移动即时通讯应用的功耗和流量消耗,设计并实现了一个基于MQTT协议的移动即时通讯系统。在保持MQTT标准控制报文结构的基础上,扩展PUBLISH控制报文的有效载荷,设计了即时通讯协议MQTT-IM,通过设计主题订阅,对MQTT的开源实现Moquette进行扩展,增加Moquette-IM模块实现了通讯录、即时通信、状态呈现等系统核心功能。通过数据对比显示,该系统可有效降低功耗和流量消耗,具有很高的实用价值。%A system based on MQTT protocol was designed and implemented to reduce the power consumption and data trafifc for mobile instant messaging applications. The MQTT-IM protocol was designed through expending the payload of the PUBLISH control packet and maintaining the MQTT standard control packet at the same time. The critical functions of the system including the address book, instant messaging and the state presentation were implemented through topics subscription design and extension of Moquette, an open source implementation of MQTT, and adding Moquette-IM module. Comparison experiments showed that the proposed system can effectively reduce the power consumption and data trafifc and has a high practical value.

  17. The lactoperoxidase system links anion transport to host defense in cystic fibrosis.

    Science.gov (United States)

    Conner, Gregory E; Wijkstrom-Frei, Corinne; Randell, Scott H; Fernandez, Vania E; Salathe, Matthias

    2007-01-23

    Chronic respiratory infections in cystic fibrosis result from CFTR channel mutations but how these impair antibacterial defense is less clear. Airway host defense depends on lactoperoxidase (LPO) that requires thiocyanate (SCN-) to function and epithelia use CFTR to concentrate SCN- at the apical surface. To test whether CFTR mutations result in impaired LPO-mediated host defense, CF epithelial SCN- transport was measured. CF epithelia had significantly lower transport rates and did not accumulate SCN- in the apical compartment. The lower CF [SCN-] did not support LPO antibacterial activity. Modeling of airway LPO activity suggested that reduced transport impairs LPO-mediated defense and cannot be compensated by LPO or H2O2 upregulation.

  18. Mining Opinion in Online Messages

    Directory of Open Access Journals (Sweden)

    Norlela Samsudin

    2013-09-01

    Full Text Available The number of messages that can be mined from online entries increases as the number of online application users increases. In Malaysia, online messages are written in mixed languages known as ‘Bahasa Rojak’. Therefore, mining opinion using natural language processing activities is difficult. This study introduces a Malay Mixed Text Normalization Approach (MyTNA and a feature selection technique based on Immune Network System (FS-INS in the opinion mining process using machine learning approach. The purpose of MyTNA is to normalize noisy texts in online messages. In addition, FS-INS will automatically select relevant features for the opinion mining process. Several experiments involving 1000 positive movies feedback and 1000 negative movies feedback have been conducted. The results show that accuracy values of opinion mining using Naïve Bayes (NB, k-Nearest Neighbor (kNN and Sequential Minimal Optimization (SMO increase after the introduction of MyTNA and FS-INS.

  19. Making your message competitive

    Energy Technology Data Exchange (ETDEWEB)

    Burns, D.B.; Ulick, B.D.; Bradford, D.M. [SAIC, Las Vegas, NV (United States)

    1994-12-31

    Even in the best of situations, effective communication can be difficult to achieve. For those working in fields that are highly controversial and technical, where an ability to communicate effectively with the general public is fundamental to the success of a project or program, this task can be particularly onerous. This is especially true for communicators working in the nuclear arena, such as the US Department of Energy`s Yucca Mountain Site Characterization Project (YMP). Although these difficulties exist as a part of daily communications, numerous lessons have been learned that may be applicable for others in the field. A variety of factors can influence the effectiveness of communications. These include a message`s relative complexity, its salience, competing messages, verbal and nonverbal cues, and, perhaps most importantly, the role played by the news media. To communicate effectively with one`s audience, it is essential that each of these factors be considered and used to advantage.

  20. Entropy Message Passing Algorithm

    CERN Document Server

    Ilic, Velimir M; Branimir, Todorovic T

    2009-01-01

    Message passing over factor graph can be considered as generalization of many well known algorithms for efficient marginalization of multivariate function. A specific instance of the algorithm is obtained by choosing an appropriate commutative semiring for the range of the function to be marginalized. Some examples are Viterbi algorithm, obtained on max-product semiring and forward-backward algorithm obtained on sum-product semiring. In this paper, Entropy Message Passing algorithm (EMP) is developed. It operates over entropy semiring, previously introduced in automata theory. It is shown how EMP extends the use of message passing over factor graphs to probabilistic model algorithms such as Expectation Maximization algorithm, gradient methods and computation of model entropy, unifying the work of different authors.

  1. A message to school girls.

    Science.gov (United States)

    Akinwande, A

    1993-06-01

    Information, education, and communication (IEC) programs need to be strengthened to appeal to adolescents, who are increasingly contributing to unwanted pregnancy and are using abortion as a means of birth control. Successful IEC programs have the following characteristics: 1) established communication theories that guide development of materials; 2) a multimedia and a mass media approach to information dissemination, and 3) emphasis on visual displays. The primary emphasis should be on presentation of a concise, clear message with the appropriate visual medium. Many communication specialists in developing countries, however, lack the training to design and use effective IEC software. Designing effective messages involves a process of integrating scientific ideas with artistic appeal. The aim is to stimulate the target audience to change its behavior of life style. The message must be convincing and contain practical and useful information. The IEC Software Design Cycle focuses on analysis and diagnosis, design production, pretesting and modification, and distribution and evaluation. Each of these processes are described. Necessary before any attempt is made is obtaining data on historical, sociocultural, and demographic characteristics, economic activities, health and social services, communication infrastructure, marriage and family life patterns, and decision making systems. Focus group discussions may be used to collect information about the target group. An example is given of the process of development, in a course through the Center or African Family Studies, of a poster about premarital sex directed to 11-16 year olds. On the basis of focus group discussions, it was decided that the message would be to encourage girls to talk with their mothers about family life and premarital sex. The poster was produced with 2 school girls talking in front of the school. The evaluation yielded modifications such as including a school building that resembled actual

  2. Patriot/Medium Extended Air Defense System Combined Aggregate Program (Patriot/MEADS CAP)

    Science.gov (United States)

    2013-12-01

    FUE - First Unit Equipped IOT &E - Initial Operational Test and Evaluation Missile Milestones SAR Baseline Dev Est Current APB Development...Acquisition Management Information Retrieval Dev Est - Development Estimate DoD - Department of Defense DSN - Defense Switched Network Econ...Milestone c FUE IOT &E Start Complete Full Rate Production Deci... AcQuisition Increment 2 Milestone C Lightweight Launcher FUE IOT &E Start

  3. The Impact of Civilian Control on Contemporary Defense Planning Systems: Challenges for South East Europe

    Science.gov (United States)

    2011-03-01

    NATO – Decisive Test for the Government of the Republic of Moldova,” Folder: Pros and Cos of NATO, November 13, 2009, http://prisa.md/eng... Barany , Zoltan. Defense Academy Publication Series. Vienna: National Defense Experience. Comparative Politics, Vol. 30, No. 1 (October 1997): 21...and Military Effectiveness: Romania. Mija, Valeriu. “Implementation of IPAP RM-NATO – Decisive Test for the Government of the Republic of Moldova

  4. Message passing for quantified Boolean formulas

    CERN Document Server

    Zhang, Pan; Zdeborová, Lenka; Zecchina, Riccardo

    2012-01-01

    We introduce two types of message passing algorithms for quantified Boolean formulas (QBF). The first type is a message passing based heuristics that can prove unsatisfiability of the QBF by assigning the universal variables in such a way that the remaining formula is unsatisfiable. In the second type, we use message passing to guide branching heuristics of a Davis-Putnam Logemann-Loveland (DPLL) complete solver. Numerical experiments show that on random QBFs our branching heuristics gives robust exponential efficiency gain with respect to the state-of-art solvers. We also manage to solve some previously unsolved benchmarks from the QBFLIB library. Apart from this our study sheds light on using message passing in small systems and as subroutines in complete solvers.

  5. Plant natriuretic peptides: Systemic regulators of plant homeostasis and defense that can affect cardiomyoblasts

    KAUST Repository

    Gehring, Christoph A.

    2010-09-01

    Immunologic evidence has suggested the presence of biologically active natriuretic peptide (NPs) hormones in plants because antiatrial NP antibodies affinity purify biologically active plant NPs (PNP). In the model plant, an Arabidopsis thaliana PNP (AtPNP-A) has been identified and characterized. AtPNP-A belongs to a novel class of molecules that share some similarity with the cell wall loosening expansins but do not contain the carbohydrate-binding wall anchor thus suggesting that PNPs and atrial natriuretic peptides are heterologs. AtPNP-A acts systemically, and this is consistent with its localization in the apoplastic extracellular space and the conductive tissue. Furthermore, AtPNP-A signals via the second messenger cyclic guanosine 3′,5′-monophosphate and modulates ion and water transport and homeostasis. It also plays a critical role in host defense against pathogens. AtPNP-A can be classified as novel paracrine plant hormone because it is secreted into the apoplastic space in response to stress and can enhance its own expression. Interestingly, purified recombinant PNP induces apo-ptosis in a dose-dependent manner and was most effective on cardiac myoblast cell lines. Because PNP is mimicking the effect of ANP in some instances, PNP may prove to provide useful leads for development of novel therapeutic NPs. Copyright © 2013 by The American Federation for Medical Research.

  6. Low levels of graphene and graphene oxide inhibit cellular xenobiotic defense system mediated by efflux transporters.

    Science.gov (United States)

    Liu, Su; Jiang, Wei; Wu, Bing; Yu, Jing; Yu, Haiyan; Zhang, Xu-Xiang; Torres-Duarte, Cristina; Cherr, Gary N

    2016-01-01

    Low levels of graphene and graphene oxide (GO) are considered to be environmentally safe. In this study, we analyzed the potential effects of graphene and GO at relatively low concentrations on cellular xenobiotic defense system mediated by efflux transporters. The results showed that graphene (graphene and GO at the nontoxic concentrations could increase calcein-AM (CAM, an indicator of membrane ATP-binding cassette (ABC) transporter) activity) accumulation, indicating inhibition of ABC transporters' efflux capabilities. This inhibition was observed even at 0.005 μg/mL graphene and 0.05 μg/mL GO, which are 100 times and 400 times lower than their lowest toxic concentration from cytotoxicity experiments, respectively. The inhibition of ABC transporters significantly increased the toxicity of paraquat and arsenic, known substrates of ABC transporters. The inhibition of ABC transporters was found to be based on graphene and GO damaging the plasma membrane structure and fluidity, thus altering functions of transmembrane ABC transporters. This study demonstrates that low levels of graphene and GO are not environmentally safe since they can significantly make cell more susceptible to other xenobiotics, and this chemosensitizing activity should be considered in the risk assessment of graphene and GO.

  7. Biotransformation and nitroglycerin-induced effects on antioxidative defense system in rat erythrocytes and reticulocytes.

    Science.gov (United States)

    Marković, Snežana D; Dorđević, Nataša Z; Curčić, Milena G; Stajn, Andraš S; Spasić, Mihajlo B

    2014-01-01

    The effects of nitroglycerin (glyceryl trinitrate - GTN) are mediated by liberated nitric oxide (NO) and formed reactive nitrogen species, which induces oxidative stress during biotransformation in red blood cells (RBCs). The aim of this study was to evaluate effects of GTN on antioxidative defense system (AOS) in rat erythrocytes (without) and reticulocytes (with functional mitochondria). Rat erythrocyte and reticulocyte-rich RBC suspensions were aerobically incubated (2 h, 37°C) without (control) or in the presence of different concentrations of GTN (0.1-1.5 mM). After incubation, concentrations of non-enzymatic components of AOS, activities of antioxidative enzymes and oxidative pentose phosphate (OPP) pathway activity were followed in RBC suspensions. In rat reticulocytes, GTN decreased the activity of mitochondrial MnSOD and increased the activity of CuZnSOD. In rat RBCs, GTN induced increase of Vit E concentration (at high doses), but decreased glutathione content and activities of all glutathione-dependent antioxidative enzymes; the OPP pathway activity significantly increased. GTN biotransformation and induction of oxidative stress were followed by general disbalance of antioxidative capacities in both kinds of RBCs. We suggest that oxidative stress, MnSOD inhibition and depletion of glutathione pool in response to GTN treatment lead to decreased bioavailability of NO after GTN biotransformation in rat reticulocytes.

  8. Melanogenesis and antioxidant defense system in normal human melanocytes cultured in the presence of chlorpromazine.

    Science.gov (United States)

    Otreba, Michał; Wrześniok, Dorota; Beberok, Artur; Rok, Jakub; Buszman, Ewa

    2015-02-01

    Chlorpromazine is used in the treatment of schizophrenia and psychotic disorders and belongs to phenothiazine class of neuroleptic drugs. It shows severe side effects such as extrapyramidal symptoms as well as ocular and skin disorders, but the mechanism is still not fully established. The aim of this study was to examine the effect of chlorpromazine on cell viability, melanogenesis and antioxidant defense system in normal human melanocytes. It has been demonstrated that chlorpromazine induces concentration dependent loss in cell viability. The value of EC(50) was calculated to be 2.53 μM. Chlorpromazine in lower concentrations (0.0001, 0.001 and 0.01 μM) increased the melanin and microphthalmia-associated transcription factor (MITF) content and tyrosinase activity, while changes of antioxidant enzymes activity were not observed. It suggests that long-term chlorpromazine therapy, even with low drug doses, may lead to hyperpigmentation disorders in skin and/or eye. The use of the analyzed drug in higher concentrations (0.1 and 1.0 μM) caused significant alterations of antioxidant enzymes activity in normal melanocytes, what may explain a potential role of chlorpromazine in the depletion of cellular antioxidant status leading to other adverse effects associated with the high-dose and/or long-term therapy.

  9. Juglans mandshurica leaf extract protects skin fibroblasts from damage by regulating the oxidative defense system.

    Science.gov (United States)

    Park, Gunhyuk; Jang, Dae Sik; Oh, Myung Sook

    2012-05-01

    Skin is mainly damaged by genetic and environmental factors such as ultraviolet light, xenobiotics, hormonal changes, heat, and smoking. ROS production is commonly involved in the pathogenesis of skin damage induced by these factors, causing skin aging, including wrinkling, by activating the metalloproteinases (MMP-1) that break down type I collagen (COL1A1). The walnut tree Juglans mandshurica MAX. (JM) is found in China, Siberia and Korea. JM has been reported to have various pharmacological activities, such as anti-tumor, anti-oxidative, and anti-bacterial effects. In the present study, we investigated the protective effect of JM leaf extract (JME) against oxidative stress in HS68 human skin fibroblasts. JME significantly and dose-dependently protected HS68 cells against H₂O₂-induced damage, as assessed by 3-(4,5-dimethylthiazol-2-yl)-2,5-diphenyltetrazolium bromide and lactate dehydrogenase assay. Other assays demonstrated that JME protected HS68 cells by regulating ROS production and increasing levels of glutathione, heme oxygenase-1, and activated NF-E2-related factor 2. JME additionally prevented the elevation of MMP-1 and reduction of COL1A1 induced by H₂O₂. It also inhibited H₂O₂-induced phosphorylation of ERK, p38, and JNK. These results indicate that JME protects human skin fibroblasts from H₂O₂-induced damage by regulating the oxidative defense system.

  10. Intracellular Oxidant Activity, Antioxidant Enzyme Defense System, and Cell Senescence in Fibroblasts with Trisomy 21

    Directory of Open Access Journals (Sweden)

    Víctor Rodríguez-Sureda

    2015-01-01

    Full Text Available Down’s syndrome (DS is characterized by a complex phenotype associated with chronic oxidative stress and mitochondrial dysfunction. Overexpression of genes on chromosome-21 is thought to underlie the pathogenesis of the major phenotypic features of DS, such as premature aging. Using cultured fibroblasts with trisomy 21 (T21F, this study aimed to ascertain whether an imbalance exists in activities, mRNA, and protein expression of the antioxidant enzymes SOD1, SOD2, glutathione-peroxidase, and catalase during the cell replication process in vitro. T21F had high SOD1 expression and activity which led to an interenzymatic imbalance in the antioxidant defense system, accentuated with replicative senescence. Intracellular ROS production and oxidized protein levels were significantly higher in T21F compared with control cells; furthermore, a significant decline in intracellular ATP content was detected in T21F. Cell senescence was found to appear prematurely in DS cells as shown by SA-β-Gal assay and p21 assessment, though not apoptosis, as neither p53 nor the proapoptotic proteins cytochrome c and caspase 9 were altered in T21F. These novel findings would point to a deleterious role of oxidatively modified molecules in early cell senescence of T21F, thereby linking replicative and stress-induced senescence in cultured cells to premature aging in DS.

  11. Imbalanced free radicals and antioxidant defense systems in schizophrenia: A comparative study

    Institute of Scientific and Technical Information of China (English)

    LI Hui-chun; CHEN Qiao-zhen; MA Ying; ZHOU Jun-fu

    2006-01-01

    Objective: To examine changes of blood oxidative-antiovidative level in schizophrenic patients and its relationship with clinical symptoms. Methods: Forty-six Chinese patients met DSM-Ⅳ (Diagnostic and Statistical Manual of Mental Disorders-Ⅳ) criteria for schizophrenia and fifty age- and sex-matched healthy controls were enrolled in the present study. Baseline psychiatric symptom severity was assessed with brief psychiatric rating scale, positive and negative syndrome scale on the blood draw day. Fresh blood samples were collected to measure levels of nitric oxide and lipid peroxide in plasma as well as activities of superoxide dismutase, catalase and glutathione peroxidase in red blood cells by spectrophotometric assays simultaneously. Results:Comparison of the biochemical parameters indicated that the level of nitric oxide and lipid peroxide increased in patient group,which represented a positive correlation with positive scale scores; while the activities of three critical enzymes decreased and showed a negative linear correlation. Conclusion: This study showed that there are dysregulation of free radical metabolism and poor activities of the antioxidant defense systems in schizophrenic patients. Excess free radicals formation may play a critical role in the etiology of schizophrenia. Using antioxidants might be an effective therapeutic approach to partially alleviate or prevent the symptoms of schizophrenia.

  12. Brassinosteroids Denigrate the Seasonal Stress through Antioxidant Defense System in Seedlings of Brassica juncea L.

    Directory of Open Access Journals (Sweden)

    Sandeep Kumar

    2014-05-01

    Full Text Available The present work has been undertaken to study the effect of exogenously application of 24-epiBL and 28-homoBL on soluble protein, proline contents and antioxidant defense system of Brassica juncea L. RLM 619 under the influence of seasonal stress. It was observed that 24-epiBL and 28-homoBL treatment enhance the soluble protein, dry weight and shoot length of B. juncea seedlings under seasonal stress. If seeds treated with the different concentrations (10-6, 10-8 and 10-10 M of 24-epiBL and 28-homoBL revealed batter growth, protein and proline contents as compare to untreated seedlings. Similarly the activities of antioxidant enzymes SOD, CAT, APOX, DHAR, PPO and Auxinases were enhanced by the application of different concentration of both brassinosteroids, whereas MDA content was decrease with both brassinosteroids treatments. Then we have concluded that both brassinolides have the seasonal stress ameliorative properties in B. juncea seedlings grown under the influence of seasonal stress. This study culminates to the role of brassinolides as an anti-stress property for protection of plant from various types of stresses.

  13. Contemporary strategic management approach in the defense system by U.S. methodology concept

    Directory of Open Access Journals (Sweden)

    Veselin I. Mrdak

    2013-12-01

    Full Text Available The paper wants to emphasize the importance of contemporary strategic management approachs in the defense system. Displays the work of American author Leslie Lewis and C. Robert Roll "Strategy-to- tasks: a methodology for resource allocation and management". It were used by parts of the discussion above, in order to describe the strategy-to-tasks methodology for planning, programming and budgeting system (PPBS. In developed Western countries adopted some elements of strategic management to determine and monitor the execution of strategic plans in the defense system. This trend is spreading to other countries as a result of the necessity of obeying certain methodological and technological achievements. The uncritical acceptance of a strategic management approach can cause great confusion and problems, and the terminology and scientific explanation for this trend is of great importance. Introduction PPBS is a resource management framework based on force planning concept. It was developed at the lRand Company during the late eighties and is adapted to the special needs of several DoD organization. The planning, programming and budgeting system (PPBS PPBS is DoD`ş primary system for planning and managing defense resources. It links the overall U.S. national security strategy to specific programs. It was designed to facilitate fiscally-constrained planning, programming and budgeting in terms of complete programs (i.e. forces and systems rather than through artificial budget categories. The goal is to determine forces, systems and program costs. Strategy-to-tasks and the PPBS The Strategy-To-Tasks methodology, regardless of its application, it must be consistent and supportive of each phase of the PPBS. This section describes the basics frameworks of which are adapted to resource allocation and management activities for the Special Operations Command (USSOCOM. The authors have used it during the various phases of the PPBS. The National Security

  14. SMS Messaging Applications

    CERN Document Server

    Pero, Nicola

    2009-01-01

    Cell phones are the most common communication device on the planet, and Short Message Service (SMS) is the chief channel for companies to offer services, accept requests, report news, and download binary files over cell phones. This guide describes the protocols and best practices (things that ensure you won't get sued or lose your right to offer a service) you need to know to make SMS messaging part of an organizational service. Issues such as character sets, differences among vendors, common practices in Europe and North America, and API choices are covered.

  15. Avian host defense peptides

    NARCIS (Netherlands)

    Cuperus, Tryntsje; Coorens, M.; van Dijk, A.; Haagsman, H.P.

    2013-01-01

    Host defense peptides (HDPs) are important effector molecules of the innate immune system of vertebrates. These antimicrobial peptides are also present in invertebrates, plants and fungi. HDPs display broad-spectrum antimicrobial activities and fulfill an important role in the first line of defense

  16. A survey of COTS wireless transceiver solutions for unmanned/unattended homeland defense systems

    Science.gov (United States)

    Wurth, Timothy J.; Wells, Jeffrey S.; Trimble, Michael L.

    2004-08-01

    As the war on terrorism continues abroad, the need to maintain security at home remains a major concern. Every aspect of the security effort can benefit from rapid information transfer. Advances in Commercial-Off-the-Shelf (COTS) radios make them valuable in applications ranging from deployed sensors on unsecured borders, to organizing an emergency response team. Additionally, the reduced cost and availability of these transceivers make them a viable alternative to custom developments. As an example, COTS radios can serve as the communication element in Unattended Ground Sensor (UGS) and munitions systems. Other applications include networked sonobuoys and networked RFID tracking. An additional advantage of COTS solutions is that they are available in a small form factor. They have extremely small mechanical outlines and are easily installed in systems requiring miniature designs and light payloads such as man-pack emplaced radios for the Army"s Future Combat System (FCS), as well as missions carried out by Unmanned Aerial Vehicles (UAV). The availability of the COTS radios result in a low-cost alternative for communication links that are applicable to military and Homeland Defense projects. They provide an easily obtainable, low-cost radio alternative enabling quick design cycles to meet mission timeliness. COTS solutions eliminate months from a typical design cycle and have many features already implemented such as ad-hoc routing and encryption. This enables robust hardware to be fielded quickly when a new need arises. The focus of this paper is to identify different COTS modules that can efficiently and cost effectively be applied to these and other various applications.

  17. Complex Dynamical Behaviors in a Predator-Prey System with Generalized Group Defense and Impulsive Control Strategy

    Directory of Open Access Journals (Sweden)

    Shunyi Li

    2013-01-01

    Full Text Available A predator-prey system with generalized group defense and impulsive control strategy is investigated. By using Floquet theorem and small amplitude perturbation skills, a local asymptotically stable prey-eradication periodic solution is obtained when the impulsive period is less than some critical value. Otherwise, the system is permanent if the impulsive period is larger than the critical value. By using bifurcation theory, we show the existence and stability of positive periodic solution when the pest eradication lost its stability. Numerical examples show that the system considered has more complicated dynamics, including (1 high-order quasiperiodic and periodic oscillation, (2 period-doubling and halving bifurcation, (3 nonunique dynamics (meaning that several attractors coexist, and (4 chaos and attractor crisis. Further, the importance of the impulsive period, the released amount of mature predators and the degree of group defense effect are discussed. Finally, the biological implications of the results and the impulsive control strategy are discussed.

  18. Short Message Service using SMS Gateway

    Directory of Open Access Journals (Sweden)

    Veena K.Katankar

    2010-08-01

    Full Text Available Short message service (SMS will play a very vital role in the future business areas whose are popularly known as mobile banking, organizational marketing system etc. For this future, SMS could make a mobile device in a business tool as it has the availability and the effectiveness. This thesis is about software development that is based on short messaging service (SMS system for delivering messages through SMS gateway. Main goal of proposed system is to provide multi level local authentication to the SMS gateway service. This service can be implemented in any multi departmental organization whereSMS service is used for notification system and marketing purpose. Proposed system has web interface and the encryption method for providing service.

  19. Photosynthesis and antioxidant defense system of Gynura Bicolor DC grown at different elevated CO2 levels

    Science.gov (United States)

    Wang, Minjuan; Liu, Hong; Fu, Yuming

    Atmospheric carbon dioxide concentration [CO _{2}] will increase in the future and will affect global climate and ecosystem productivity. However, this is not clearly an area that requires further study on the most appropriate [CO _{2}] selection for plant growth and quality in a closed, controlled environment. The aim of this study was to determine the variation of photosynthetic characteristics and antioxidant status under five CO _{2} concentration (400, 800, 1200, 2000 and 3000 umol mol (-1) ) on the leaf of Gynura bicolor DC. Here the results show that net photosynthetic rate(Pn), Chl content, edible biomass(EB), leaf blade width(LBW), root weight(RW), fructose(Fru) and sucrose(Suc) of Gynura bicolor DC increased under elevated [CO _{2}] of 800 umol mol (-1) , 1200 umol mol (-1) and 2000 umol mol (-1) . On the contrary, photosynthesis and biomass production declined significantly at 3000 umol mol (-1) CO _{2}, While Lipid peroxidation (LPO), malondialdehyde (MDA) and hydrogen peroxide (H _{2}O _{2}) achieved the highest levels. Furthermore, the contents of glutathione (GSH), vitamin C (VC), and vitamin E (VE), and total antioxidant capacity (T-AOC), the activity of superoxide dismutase (SOD), catalase (CAT) and peroxidase (POD) reached the highest level at 2000 umol mol ({-1) }CO _{2}. Results imply that a significant increase in growth and antioxidant defense system of Gynura bicolor DC occurred under 800-2000 umol mol (-1) of CO _{2} concentration provided a theoretical basis for the application for plants selection in Bioregeneration Life Support System (BLSS) and a closed controlled environment.

  20. Medium is the message

    NARCIS (Netherlands)

    Kuipers, G.; Ritzer, G.

    2012-01-01

    "The medium is the message" is a phrase coined by Canadian media theorist Marshall McLuhan (1911-1980), in his book Understanding Media: The Extensions of Man (1964). In this book, McLuhan examines the impact of media on societies and human relations, arguing for the primacy of the medium -

  1. Understanding Telex Messages.

    Science.gov (United States)

    Kitto, Michael

    1984-01-01

    Examines the problems of writing grammatical rules for the writing of telexes and makes some suggestions as to how to teach comprehension of telex messages. Emphasizes the inconsistency in style, length, and form of telexes, and the impact this has had on international correspondence, which involves many nonnative speakers of English. (SL)

  2. Grounding in Instant Messaging

    Science.gov (United States)

    Fox Tree, Jean E.; Mayer, Sarah A.; Betts, Teresa E.

    2011-01-01

    In two experiments, we investigated predictions of the "collaborative theory of language use" (Clark, 1996) as applied to instant messaging (IM). This theory describes how the presence and absence of different grounding constraints causes people to interact differently across different communicative media (Clark & Brennan, 1991). In Study 1, we…

  3. Medium is the message

    NARCIS (Netherlands)

    Kuipers, G.; Ritzer, G.

    2012-01-01

    "The medium is the message" is a phrase coined by Canadian media theorist Marshall McLuhan (1911-1980), in his book Understanding Media: The Extensions of Man (1964). In this book, McLuhan examines the impact of media on societies and human relations, arguing for the primacy of the medium - understo

  4. The Message from Boston

    Institute of Scientific and Technical Information of China (English)

    Wang Wenfeng

    2004-01-01

    @@ The election program entitled "A Strong Nation Respected in the World " came out in Boston at the July 26-29 Democratic National Convention along with the nomination of John Kerry and John Edwards as the presidential and vice presidential candidates of the party. What message do the Democrats want to convey from Boston?

  5. The Prodiguer Messaging Platform

    Science.gov (United States)

    Denvil, S.; Greenslade, M. A.; Carenton, N.; Levavasseur, G.; Raciazek, J.

    2015-12-01

    CONVERGENCE is a French multi-partner national project designed to gather HPC and informatics expertise to innovate in the context of running French global climate models with differing grids and at differing resolutions. Efficient and reliable execution of these models and the management and dissemination of model output are some of the complexities that CONVERGENCE aims to resolve.At any one moment in time, researchers affiliated with the Institut Pierre Simon Laplace (IPSL) climate modeling group, are running hundreds of global climate simulations. These simulations execute upon a heterogeneous set of French High Performance Computing (HPC) environments. The IPSL's simulation execution runtime libIGCM (library for IPSL Global Climate Modeling group) has recently been enhanced so as to support hitherto impossible realtime use cases such as simulation monitoring, data publication, metrics collection, simulation control, visualizations … etc. At the core of this enhancement is Prodiguer: an AMQP (Advanced Message Queue Protocol) based event driven asynchronous distributed messaging platform. libIGCM now dispatches copious amounts of information, in the form of messages, to the platform for remote processing by Prodiguer software agents at IPSL servers in Paris. Such processing takes several forms: Persisting message content to database(s); Launching rollback jobs upon simulation failure; Notifying downstream applications; Automation of visualization pipelines; We will describe and/or demonstrate the platform's: Technical implementation; Inherent ease of scalability; Inherent adaptiveness in respect to supervising simulations; Web portal receiving simulation notifications in realtime.

  6. Brassinosteroids make plant life easier under abiotic stresses mainly by modulating major components of antioxidant defense system

    Directory of Open Access Journals (Sweden)

    Bojjam V. Vardhini

    2015-01-01

    Full Text Available Various abiotic stress factors significantly contribute to major worldwide-losses in crop productivity by mainly impacting plant’s stress tolerance/adaptive capacity. The latter is largely governed by the efficiency of antioxidant defense system for the metabolism of elevated reactive oxygen species (ROS, caused by different abiotic stresses. Plant antioxidant defense system includes both enzymatic (such as superoxide dismutase, SOD, E.C. 1.15.1.1; catalase, CAT, E.C. 1.11.1.6; glutathione reductase, GR, E.C. 1.6.4.2; peroxidase, POD, E.C. 1.11.1.7; ascorbate peroxidase, APX, E.C. 1.11.1.11; guaiacol peroxidase, GPX, E.C. 1.11.1.7 and non-enzymatic (such as ascorbic acid, AsA; glutathione, GSH; tocopherols; phenolics, proline etc. components. Research reports on the status of various abiotic stresses and their impact on plant growth, development and productivity are extensive. However, least information is available on sustainable strategies for the mitigation of abiotic stress-mediated major consequences in plants. Brassinosteroids (BRs are a novel group of phytohormones with significant growth promoting nature. BRs are considered as growth regulators with pleiotropic effects, as they influence diverse physiological processes like growth, germination of seeds, rhizogenesis, senescence etc. and also confer abiotic stress resistance in plants. In the light of recent reports this paper: (a overviews major abiotic stresses and plant antioxidant defense system, (b introduces BRs and highlights their significance in general plant growth and development, and (c appraises recent literature available on BRs mediated modulation of various components of antioxidant defense system in plants under major abiotic stresses including metals/metalloids, drought, salinity, and temperature regimes. The outcome can be significant in devising future research in the current direction.

  7. The relationship between yield and the antioxidant defense system in tomatoes grown under heat stress.

    Science.gov (United States)

    Rainwater, D T; Gossett, D R; Millhollon, E P; Hanna, H Y; Banks, S W; Lucas, M C

    1996-11-01

    Four putative heat-tolerant tomato (Lycopersicum esculentum) cultivars (Tamasabro, Heat Wave, LHT-24, and Solar Set) and one putative heat-sensitive tomato cultivar (Floradade) were grown in the field under non-stress (average daily temperature of 26 degrees C) and heat-stress (average daily temperature of 34 degrees C) conditions. At anthesis, approximately five weeks after being transplanted to the field, leaf samples were collected for antioxidant analyses. Yield was determined by harvesting ripe fruit seven weeks after the collection of leaf samples. Heat stress resulted in a 79.1% decrease in yield for the heat-sensitive Floradade, while the fruit yield in the heat-tolerant cultivars Heat Wave, LHT-24, Solar Set, and Tamasabro was reduced 51.5%, 22.1%, 43.8%, and 34.8% respectively. When grown under heat stress, antioxidant activities were also greater in the heat-tolerant cultivars. Superoxide dismutase (SOD) activity increased up to 9-fold in the heat-tolerant cultivars but decreased 83.1% in the heat-sensitive Floradade. Catalase, peroxidase, and ascorbate peroxidase activity increased significantly in all cultivars. Only Heat Wave showed a significant increase in glutathione reductase in response to heat stress but all heat-tolerant cultivars exhibited significantly lower oxidized ascorbate/reduced ascorbate ratios, greater reduced glutathione/oxidized glutathione rations, and greater alpha-tocopherol concentrations compared to the heat-sensitive cultivar Floridade. These data indicate that the more heat-tolerant cultivars had an enhanced capacity for scavenging active oxygen species and a more active ascorbate-glutathione cycle and suggest a strong correlation between the ability to up-regulate the antioxidant defense system and the ability of tomatoes to produce greater yields when grown under heat stress.

  8. Toll-like receptors are part of the innate immune defense system of sponges (demospongiae: Porifera).

    Science.gov (United States)

    Wiens, Matthias; Korzhev, Michael; Perovic-Ottstadt, Sanja; Luthringer, Bérengère; Brandt, David; Klein, Stefanie; Müller, Werner E G

    2007-03-01

    host-defense system of Metazoa.

  9. Research and application of high-reliability instant messaging system in mobile network%移动网络下高可靠即时通信系统的研究与应用

    Institute of Scientific and Technical Information of China (English)

    莫足琴

    2016-01-01

    随着移动互联网时代的到来,出现了大量优秀的即时通信软件,其中成熟的即时通信技术都不公开,而开源的即时通信框架存在较多问题,容易出现丢包、消息延迟。针对上述问题,设计了移动网络下高可靠即时通信系统,弥补了开源通信框架设计中的不足,并提出对通用即时通信技术的改进方法。首先提出了高性能通信长链接和时间片轮转算法,采用了消息握手协议和消息加密的方法,同时改进了通信链接状态检测算法,并提出双服务权限认证方法,保证了即时通信系统的安全性。实验中测试系统包含了设计的即时通信框架,实验结果证明了系统的即时性和高可靠性。%With the advent of the mobile Internet era,a lot of excellent instant messaging softwares appear. Since the ma⁃ture instant messaging technology is unopened,and the instant messaging framework with open source exists many problems, the communication system is prone to appear packet loss and message delay. In view of the above problems,a high⁃reliability in⁃stant communication system in mobile network was designed to make up the deficiency of open⁃source communication framework design. The improved method of general instant communication technology is put forward,in which the high⁃performance commu⁃nication long link and time slice round algorithm are proposed,the message handshake protocol and message encryption method are adopted,and the communication link state detection algorithm is improved. The double service authentication method is pro⁃posed to ensure the safety of instant messaging system. The test system in the experiment includes the designed instant messaging framework. The experimental results can prove the instantaneity and high reliability of the systemy.

  10. Hotline Allegations Regarding Defense Contract Management Agency Contracting Officer Actions on Several Business System Audit Reports

    Science.gov (United States)

    2014-06-20

    2 0 , 2 0 1 4 Report No. DODIG-2014-084 Hotline Allegations Regarding Defense Contract Management Agency Contracting Officer Actions on...control number. 1. REPORT DATE 20 JUN 2014 2. REPORT TYPE 3. DATES COVERED 00-00-2014 to 00-00-2014 4. TITLE AND SUBTITLE Hotline Allegations...i l / h o t l i n e HOTLINE Department of Defense F r a u d , W a s t e , & A b u s e Mission Our mission is to provide independent, relevant, and

  11. Defense Travel System: An Analysis of the System’s Reservation Module

    Science.gov (United States)

    2008-03-01

    Weekly, 63(6), 20-20. Retrieved October 19, 2007, from EBSCOhost Research database . Margasak, Larry. (2006, November). Pentagon Travel System...was supposed to capture all flights information in the database . The problem with this process is that it is not reliable. The commercial product...arrival/departure times, flight routes, airports, connecting flights, etc.). 4 Travel database that contains applicable flight and airfare information

  12. 服装企业协调管理系统的体系结构研究%Architecture research of garments enterprise message management system

    Institute of Scientific and Technical Information of China (English)

    赵钢

    2012-01-01

    为了解决服装企业各职能部门问的协同工作,本论文提出了基于Web Service技术的解决方案来实现服装企业异地职能部门之间的信息集成,并实现了服装企业信息管理系统,文章详细的介绍了该系统的体系模型、框架结构、软件系统等内容,对于实际的应用有较高的参考价值。%In order to solve the interoperability between the various functional departments of the garment enterprises, this paper proposed information integration based on Web Service technology solutions to the garment enterprises in different places between the functional departments, and clothing Garments Enterprise Message Management System, the article described in detail system model, framework, software and other content of the system, for the practical application of high reference value.

  13. Role of Dectin-2 for Host Defense against Systemic Infection with Candida glabrata

    NARCIS (Netherlands)

    Ifrim, D.C.; Bain, J.M.; Reid, D.M.; Oosting, M.; Verschueren, I.; Gow, N.A.; Krieken, J.H.J.M. van; Brown, G.D.; Kullberg, B.J.; Joosten, L.A.B.; Meer, J.W.M. van der; Koentgen, F.; Erwig, L.P.; Quintin, J.; Netea, M.G.

    2014-01-01

    Although Candida glabrata is an important pathogenic Candida species, relatively little is known about its innate immune recognition. Here, we explore the potential role of Dectin-2 for host defense against C. glabrata. Dectin-2-deficient (Dectin-2(-/-)) mice were found to be more susceptible to C.

  14. An analytical approach to air defense: cost, effectiveness and SWOT analysis of employing fighter aircraft and modern SAM systems

    Science.gov (United States)

    Kus, Orcun; Kocaman, Ibrahim; Topcu, Yucel; Karaca, Volkan

    2012-05-01

    The problem of defending a specific airspace is among the main issues a military commander to solve. Proper protection of own airspace is crucial for mission success at the battlefield. The military doctrines of most world armed forces involve two main options of defending the airspace. One of them is utilizing formations of fighter aircraft, which is a flexible choice. The second option is deploying modern SAM (Surface to Air Missile) systems, which is more expansive. On the other hand the decision makers are to cope with miscellaneous restrictions such as the budgeting problems. This study defines air defense concept according to modern air warfare doctrine. It considers an air defense scenario over an arbitrary airspace and compares the performance and cost-effectiveness of employing fighter aircraft and SAM systems. It also presents SWOT (Strenghts - Weakness - Opportunities - Threats) analyses of air defense by fighter aircraft and by modern SAMs and tries to point out whichever option is better. We conclude that deploying SAMs has important advantages over using fighter aircraft by means of interception capacity within a given time period and is cost-effective.

  15. Thiamine primed defense provides reliable alternative to systemic fungicide carbendazim against sheath blight disease in rice (Oryza sativa L.).

    Science.gov (United States)

    Bahuguna, Rajeev Nayan; Joshi, Rohit; Shukla, Alok; Pandey, Mayank; Kumar, J

    2012-08-01

    A novel pathogen defense strategy by thiamine priming was evaluated for its efficacy against sheath blight pathogen, Rhizoctonia solani AG-1A, of rice and compared with that of systemic fungicide, carbendazim (BCM). Seeds of semidwarf, high yielding, basmati rice variety Vasumati were treated with thiamine (50 mM) and BCM (4 mM). The pot cultured plants were challenge inoculated with R. solani after 40 days of sowing and effect of thiamine and BCM on rice growth and yield traits was examined. Higher hydrogen peroxide content, total phenolics accumulation, phenylalanine ammonia lyase (PAL) activity and superoxide dismutase (SOD) activity under thiamine treatment displayed elevated level of systemic resistance, which was further augmented under challenging pathogen infection. High transcript level of phenylalanine ammonia lyase (PAL) and manganese superoxide dismutase (MnSOD) validated mode of thiamine primed defense. Though minimum disease severity was observed under BCM treatment, thiamine produced comparable results, with 18.12 per cent lower efficacy. Along with fortifying defense components and minor influence on photosynthetic pigments and nitrate reductase (NR) activity, thiamine treatment significantly reduced pathogen-induced loss in photosynthesis, stomatal conductance, chlorophyll fluorescence, NR activity and NR transcript level. Physiological traits affected under pathogen infection were found signatory for characterizing plant's response under disease and were detectable at early stage of infection. These findings provide a novel paradigm for developing alternative, environmentally safe strategies to control plant diseases.

  16. Message from Fermilab Director

    CERN Multimedia

    2009-01-01

    With this issue’s message, Fermilab Director Pier Oddone opens a new series of occasional exchanges between CERN and other laboratories world-wide. As part of this exchange, CERN Director-General Rolf Heuer, wrote a message in Tuesday’s edition of Fermilab TodayPerspectivesNothing is more important for our worldwide particle physics community than successfully turning on the LHC later this year. The promise for great discoveries is huge, and many of the plans for our future depend on LHC results. Those of us planning national programmes in anticipation of data from the LHC face formidable challenges to develop future facilities that are complementary to the LHC, whatever the physics discoveries may be. At Fermilab, this has led us to move forcefully with a programme at the intensity frontier, where experiments with neutrinos and rare decays open a complementary window into nature. Our ultimate goal for a unified picture of nat...

  17. Rethinking Defensive Information Warfare

    Science.gov (United States)

    2004-06-01

    electronic warfare, and special information operations. Defensive information operations ensure timely, accurate, and relevant information access...information and information systems. IA, physical security, OPSEC, counter-deception, counter-psyops, CI, EW, and special information operations. Ensure

  18. 47 CFR 11.44 - EAS message priorities.

    Science.gov (United States)

    2010-10-01

    ... Messages; second, State Messages; and third, National Information Center (NIC) Messages. (c) Key EAS... distribution of Presidential Messages. NIC messages received from national networks which are not broadcast...

  19. The Puerto Rico Seismic Network Broadcast System: A user friendly GUI to broadcast earthquake messages, to generate shakemaps and to update catalogues

    Science.gov (United States)

    Velez, J.; Huerfano, V.; von Hillebrandt, C.

    2007-12-01

    The Puerto Rico Seismic Network (PRSN) has historically provided locations and magnitudes for earthquakes in the Puerto Rico and Virgin Islands (PRVI) region. PRSN is the reporting authority for the region bounded by latitudes 17.0N to 20.0N, and longitudes 63.5W to 69.0W. The main objective of the PRSN is to record, process, analyze, provide information and research local, regional and teleseismic earthquakes, providing high quality data and information to be able to respond to the needs of the emergency management, academic and research communities, and the general public. The PRSN runs Earthworm software (Johnson et al, 1995) to acquire and write waveforms to disk for permanent archival. Automatic locations and alerts are generated for events in Puerto Rico, the Intra America Seas, and the Atlantic by the EarlyBird system (Whitmore and Sokolowski, 2002), which monitors PRSN stations as well as some 40 additional stations run by networks operating in North, Central and South America and other sites in the Caribbean. PRDANIS (Puerto Rico Data Analysis and Information System) software, developed by PRSN, supports manual locations and analyst review of automatic locations of events within the PRSN area of responsibility (AOR), using all the broadband, strong-motion and short-period waveforms Rapidly available information regarding the geographic distribution of ground shaking in relation to the population and infrastructure at risk can assist emergency response communities in efficient and optimized allocation of resources following a large earthquake. The ShakeMap system developed by the USGS provides near real-time maps of instrumental ground motions and shaking intensity and has proven effective in rapid assessment of the extent of shaking and potential damage after significant earthquakes (Wald, 2004). In Northern and Southern California, the Pacific Northwest, and the states of Utah and Nevada, ShakeMaps are used for emergency planning and response, loss

  20. Quantum Message Distribution

    Institute of Scientific and Technical Information of China (English)

    LUO Ming-Xing; CHEN Xiu-Bo; DENG Yun; Yang Yi-Xian

    2013-01-01

    The semiquantum techniques have been explored recently to bridge the classical communications and the quantum communications.In this paper,we present one scheme to distribute the messages from one quantum participate to one weak quantum participate who can only measure the quantum states.It is proved to be robust by combining the classical coding encryption,quantum coding and other quantum techniques.

  1. Solving a System of Nonlinear Algebraic Equations You Only Get Error Messages--What to Do Next?

    Science.gov (United States)

    Shacham, Mordechai; Brauner, Neima

    2017-01-01

    Chemical engineering problems often involve the solution of systems of nonlinear algebraic equations (NLE). There are several software packages that can be used for solving NLE systems, but they may occasionally fail, especially in cases where the mathematical model contains discontinuities and/or regions where some of the functions are undefined.…

  2. International Students, University Health Centers, and Memorable Messages about Health

    Science.gov (United States)

    Carmack, Heather J.; Bedi, Shireen; Heiss, Sarah N.

    2016-01-01

    International students entering US universities often experience a variety of important socialization messages. One important message is learning about and using the US health system. International students often first encounter the US health system through their experiences with university health centers. The authors explore the memorable…

  3. ELR chemokine signaling in host defense and disease in a viral model of central nervous system disease

    Directory of Open Access Journals (Sweden)

    Martin P Hosking

    2014-06-01

    Full Text Available Intracranial infection of the neurotropic JHM strain of mouse hepatitis virus (JHMV into the central nervous system (CNS of susceptible strains of mice results in an acute encephalomyelitis, accompanied by viral replication in glial cells and robust infiltration of virus-specific T cells that contribute to host defense through cytokine secretion and cytolytic activity. Mice that survive the acute stage of disease develop an immune-mediated demyelinating diseases characterized by viral persistence in white matter tracts and a chronic neuroinflammatory response dominated by T cells and macrophages. Early following JHMV infection, there is a dynamic expression of chemokines and chemokine receptors that contribute to neuroinflammation by regulating innate and adaptive immune responses as well influencing glial biology. In response to JHMV infection, we have shown that signaling through the chemokine receptor CXCR2 contributes to host defense through recruitment of polymorphonuclear cells (PMNs to the CNS that enhance permeability of the blood-brain-barrier (BBB and facilitating entry of virus-specific T cells into the parenchyma. Further, CXCR2 promotes the protection of oligodendroglia from cytokine-induced apoptosis and restricts the severity of demyelination. This review covers aspects related to the role of CXCR2 in host defense and disease in response to JHMV infection.

  4. The Information Ecology of Personal Health Record Systems: Secure Messaging as Catalyst and Its Evolving Impact on Use and Consequences

    Science.gov (United States)

    Nazi, Kim M.

    2012-01-01

    Personal Health Records (PHRs) and PHR systems have been designed as consumer-oriented tools to empower patients and improve health care. Despite significant consumer interest and anticipated benefits, adoption remains low. Understanding the consumer perspective is necessary, but insufficient by itself. Consumer PHR use also has broad implications…

  5. Impact of the Defense Critical Technologies Plan on Weapon Systems Test and Evaluation

    Science.gov (United States)

    1990-12-01

    middle of the 1980’s several factors led to the realization that DoD’s T&E capabilities were approaching a crisis situation. These factors included...techologies most critica to saing the long-term quai.- tative superiority of United States wampon syvtme. The number of such technologie identified in any...United States, The Defense Technology Base, Introduction and Overview, U.S. Government Printing Office, March 1988. Pastine, John, D. Dr., "A Crisis

  6. Application of System and Integration Readiness Levels to Department of Defense Research and Development

    Science.gov (United States)

    2016-07-01

    structural support (Struct), atmospheric propagation (Atmos), target, target acquisition, tracking, pointing ( ATP ), and battle management and...involve building the target, but the atmosphere and ATP form an interface with the target so an IRL is associated with the target, but no TRL. 264 Defense...Table 5, if most effort had been placed into developing the laser, beam director, ATP algorithms; and target infor- mation, but not much effort

  7. A Systems Engineering Approach in Providing Air Defense Support to Ground Combat Vehicle Maneuver Forces

    Science.gov (United States)

    2015-03-01

    http://www.strategypage.com/dls/ articles /SLAMRAAM-Dies-From-Loneliness-2- 5-2011.asp. Federation of American Scientists . 2000. “M6 Bradley Linebacker...MANPADS-under-armor (MUA) concept was adopted to provide mobile air defense to maneuver forces (Federation of American Scientists 2000). This involved... swim in water. The functional hierarchy for the Move function is shown in Figure 17. 39 Figure 17. Functional Hierarchy for F.3 Move d

  8. Noise Parameters of CW Radar Sensors Used in Active Defense Systems

    OpenAIRE

    2012-01-01

    Active defense represents an innovative way of protecting military vehicles. It is based on the employment of a set of radar sensors which detect an approaching threat missile and activate a suitable counter-measure. Since the radar sensors are supposed to detect flying missiles very fast and, at the same time, distinguish them from stationary or slow-moving objects, CW Doppler radar sensors can be employed with a benefit. The submitted article deals with a complex noise analysis of this type...

  9. United States Department of Defense Research in Robotic Unmanned Systems for Combat Casualty Care

    Science.gov (United States)

    2010-01-01

    first responder combat casualty care, and patient evacuation under hostile fire have compounded combat losses throughout history. Force protection of military first responders is complicated by current international and coalition troop deployments for peacekeeping operations, counter terrorism, and humanitarian assistance missions that involve highly visible, politically sensitive low intensity combat in urban terrain. The United States Department of Defense (DoD) has significantly invested in autonomous vehicles, and other robots to support its Future Force. By leveraging

  10. Defense Business Transformation

    Science.gov (United States)

    2009-12-01

    other. SCM and ERP systems both contribute to the overall distribution and coordination of resources. Just as an ERP enhances information flow...inventory management system (Thureen 2008). It combines the Army’s disparate wholesale and retail inventories, into one combined system (Sparacino 2002...Studies.............................................................................. 73 1. Defense Integrated Military Human Resource System

  11. Glutathione-dependent induction of local and systemic defense against oxidative stress by exogenous melatonin in cucumber (Cucumis sativus L.).

    Science.gov (United States)

    Li, Hao; He, Jie; Yang, Xiaozhen; Li, Xin; Luo, Dan; Wei, Chunhua; Ma, Jianxiang; Zhang, Yong; Yang, Jianqiang; Zhang, Xian

    2016-03-01

    Melatonin is involved in defending against oxidative stress caused by various environmental stresses in plants. In this study, the roles of exogenous melatonin in regulating local and systemic defense against photooxidative stress in cucumber (Cucumis sativus) and the involvement of redox signaling were examined. Foliar or rhizospheric treatment with melatonin enhanced tolerance to photooxidative stress in both melatonin-treated leaves and untreated systemic leaves. Increased melatonin levels are capable of increasing glutathione (reduced glutathione [GSH]) redox status. Application of H2 O2 and GSH also induced tolerance to photooxidative stress, while inhibition of H2 O2 accumulation and GSH synthesis compromised melatonin-induced local and systemic tolerance to photooxidative stress. H2 O2 treatment increased the GSH/oxidized glutathione (GSSG) ratio, while inhibition of H2 O2 accumulation prevented a melatonin-induced increase in the GSH/GSSG ratio. Additionally, inhibition of GSH synthesis blocked H2 O2 -induced photooxidative stress tolerance, whereas scavenging or inhibition of H2 O2 production attenuated but did not abolish GSH-induced tolerance to photooxidative stress. These results strongly suggest that exogenous melatonin is capable of inducing both local and systemic defense against photooxidative stress and melatonin-enhanced GSH/GSSG ratio in a H2 O2 -dependent manner is critical in the induction of tolerance.

  12. Broadcasting a message in a parallel computer

    Science.gov (United States)

    Berg, Jeremy E [Rochester, MN; Faraj, Ahmad A [Rochester, MN

    2011-08-02

    Methods, systems, and products are disclosed for broadcasting a message in a parallel computer. The parallel computer includes a plurality of compute nodes connected together using a data communications network. The data communications network optimized for point to point data communications and is characterized by at least two dimensions. The compute nodes are organized into at least one operational group of compute nodes for collective parallel operations of the parallel computer. One compute node of the operational group assigned to be a logical root. Broadcasting a message in a parallel computer includes: establishing a Hamiltonian path along all of the compute nodes in at least one plane of the data communications network and in the operational group; and broadcasting, by the logical root to the remaining compute nodes, the logical root's message along the established Hamiltonian path.

  13. Astronaut Franklin Chang-Diaz organizes shuttle mail message

    Science.gov (United States)

    1994-01-01

    On Discovery's aft flight deck, Astronaut Franklin R. Chang-Diaz begins to organize what was believed to be among the longest mail messages in Shuttle history. Though early Shuttle flights could brag of longer teleprinted messages, the Thermal Imaging Printing Systems's day four correspondence, most of which is out of frame here, is a record length for recent flights.

  14. Enhancing the security of chaotic signals in binary message transmission

    OpenAIRE

    Kostenko, Pavlo Yu.; Symonenko, S. N.; S.G. Semenov; Vasiuta, K. S.

    2009-01-01

    A technique for inserting a binary message into chaotic carrier has been proposed that enhances the security of data transmission systems at the expense of destructing the behavior typical for chaotic processes on the phase plane. An algorithm for recovery of the transmitted message was obtained and its quality for different signal-to-noise levels was estimated.

  15. Protocol-Based Verification of Message-Passing Parallel Programs

    DEFF Research Database (Denmark)

    López-Acosta, Hugo-Andrés; Eduardo R. B. Marques, Eduardo R. B.; Martins, Francisco;

    2015-01-01

    a protocol language based on a dependent type system for message-passing parallel programs, which includes various communication operators, such as point-to-point messages, broadcast, reduce, array scatter and gather. For the verification of a program against a given protocol, the protocol is first...

  16. Graphical route information on variable message signs

    NARCIS (Netherlands)

    Alkim, T.P.; Mede, P.H.J. van der; Janssen, W.H.

    2002-01-01

    Reports on experiments in the Netherlands on the use of graphical route information panels (GRIP) as part of variable message systems (VMS) providing information to drivers. GRIP appear to be as safe as regular VMS. Digestion of the information presented is initially quicker for regular VMS, but mot

  17. Creating buzz: the neural correlates of effective message propagation.

    Science.gov (United States)

    Falk, Emily B; Morelli, Sylvia A; Welborn, B Locke; Dambacher, Karl; Lieberman, Matthew D

    2013-07-01

    Social interaction promotes the spread of values, attitudes, and behaviors. Here, we report on neural responses to ideas that are destined to spread. We scanned message communicators using functional MRI during their initial exposure to the to-be-communicated ideas. These message communicators then had the opportunity to spread the messages and their corresponding subjective evaluations to message recipients outside the scanner. Successful ideas were associated with neural responses in the communicators' mentalizing systems and reward systems when they first heard the messages, prior to spreading them. Similarly, individuals more able to spread their own views to others produced greater mentalizing-system activity during initial encoding. Unlike prior social-influence studies that focused on the individuals being influenced, this investigation focused on the brains of influencers. Successful social influence is reliably associated with an influencer-to-be's state of mind when first encoding ideas.

  18. Event Driven Messaging with Role-Based Subscriptions

    Science.gov (United States)

    Bui, Tung; Bui, Bach; Malhotra, Shantanu; Chen, Fannie; Kim, rachel; Allen, Christopher; Luong, Ivy; Chang, George; Zendejas, Silvino; Sadaqathulla, Syed

    2009-01-01

    Event Driven Messaging with Role-Based Subscriptions (EDM-RBS) is a framework integrated into the Service Management Database (SMDB) to allow for role-based and subscription-based delivery of synchronous and asynchronous messages over JMS (Java Messaging Service), SMTP (Simple Mail Transfer Protocol), or SMS (Short Messaging Service). This allows for 24/7 operation with users in all parts of the world. The software classifies messages by triggering data type, application source, owner of data triggering event (mission), classification, sub-classification and various other secondary classifying tags. Messages are routed to applications or users based on subscription rules using a combination of the above message attributes. This program provides a framework for identifying connected users and their applications for targeted delivery of messages over JMS to the client applications the user is logged into. EDMRBS provides the ability to send notifications over e-mail or pager rather than having to rely on a live human to do it. It is implemented as an Oracle application that uses Oracle relational database management system intrinsic functions. It is configurable to use Oracle AQ JMS API or an external JMS provider for messaging. It fully integrates into the event-logging framework of SMDB (Subnet Management Database).

  19. Arabidopsis transcriptome analysis reveals key roles of melatonin in plant defense systems.

    Directory of Open Access Journals (Sweden)

    Sarah Weeda

    Full Text Available Melatonin is a ubiquitous molecule and exists across kingdoms including plant species. Studies on melatonin in plants have mainly focused on its physiological influence on growth and development, and on its biosynthesis. Much less attention has been drawn to its affect on genome-wide gene expression. To comprehensively investigate the role(s of melatonin at the genomics level, we utilized mRNA-seq technology to analyze Arabidopsis plants subjected to a 16-hour 100 pM (low and 1 mM (high melatonin treatment. The expression profiles were analyzed to identify differentially expressed genes. 100 pM melatonin treatment significantly affected the expression of only 81 genes with 51 down-regulated and 30 up-regulated. However, 1 mM melatonin significantly altered 1308 genes with 566 up-regulated and 742 down-regulated. Not all genes altered by low melatonin were affected by high melatonin, indicating different roles of melatonin in regulation of plant growth and development under low and high concentrations. Furthermore, a large number of genes altered by melatonin were involved in plant stress defense. Transcript levels for many stress receptors, kinases, and stress-associated calcium signals were up-regulated. The majority of transcription factors identified were also involved in plant stress defense. Additionally, most identified genes in ABA, ET, SA and JA pathways were up-regulated, while genes pertaining to auxin responses and signaling, peroxidases, and those associated with cell wall synthesis and modifications were mostly down-regulated. Our results indicate critical roles of melatonin in plant defense against various environmental stresses, and provide a framework for functional analysis of genes in melatonin-mediated signaling pathways.

  20. Pregnancy and menopause in patients with systemic lupus erythematosus and/or antiphospholipid syndrome. Practical messages from the EULAR guidelines.

    Science.gov (United States)

    Vagelli, Roberta; Tani, Chiara; Mosca, Marta

    2017-01-25

    Over the last few decades, reproductive medicine has observed an improvement in the management and outcome of pregnancy in connective tissue diseases, such as systemic lupus erythematosus (SLE) and antiphospholipid syndrome (APS). However, pregnancy and related issues remain a challenge in these patients. In routine clinical practice, health professionals dealing with SLE and APS need to consider the numerous aspects of the reproductive life of their patients, such as pregnancy, family planning, fertility, contraception, cancer surveillance, and menopause. The new European League Against Rheumatism recommendations for women's health and family planning reflect the need for a novel approach to communication in the patient-physician relationship. Preconception counseling is essential to ensure optimal pregnancy outcomes through a careful risk stratification involving disease activity, organ involvement, autoantibody profile, use of drugs, and previous pregnancy outcomes, as well as to ensure better preventive and therapeutic strategies to limit complications. In patients with stable/inactive disease and low risk of thrombosis, adequate hormonal contraception and menopausal replacement therapy should be recommended. Assisted reproductive techniques can be safely used in these patients, but anticoagulation or low-dose aspirin (or both) should be added in those with positive antiphospholipid antibody titers. All menstruating women should be counseled on the possibility to preserve fertility with gonadotropin- ‑releasing hormone analogues if receiving alkylating agents. Strict clinical, serological, laboratory, and multidisciplinary monitoring during pregnancy is mandatory to early recognize and effectively treat disease flares or obstetric complications. Doppler ultrasonography and fetal biometry should be regularly performed, especially in the second and third trimesters. Physicians should recommend screening for cervical dysplasia related to human papillomavirus

  1. Game Theory for Proactive Dynamic Defense and Attack Mitigation in Cyber-Physical Systems

    Energy Technology Data Exchange (ETDEWEB)

    Letchford, Joshua [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-09-01

    While there has been a great deal of security research focused on preventing attacks, there has been less work on how one should balance security and resilience investments. In this work we developed and evaluated models that captured both explicit defenses and other mitigations that reduce the impact of attacks. We examined these issues both in more broadly applicable general Stackelberg models and in more specific network and power grid settings. Finally, we compared these solutions to existing work in terms of both solution quality and computational overhead.

  2. Game Theory for Proactive Dynamic Defense and Attack Mitigation in Cyber-Physical Systems.

    Energy Technology Data Exchange (ETDEWEB)

    Letchford, Joshua

    2016-10-01

    While there has been a great deal of security research focused on preventing attacks, there has been less work on how one should balance security and resilience investments. In this work we developed and evaluated models that captured both explicit defenses and other mitigations that reduce the impact of attacks. We examined these issues both in more broadly applicable general Stackelberg models and in more specific network and power grid settings. Finally, we compared these solutions to existing work in terms of both solution quality and computational overhead.

  3. DEFENSE SYSTEM TO EXPLORE ON MILITARY CASTLE OF HAILONG TUEN%古代军事城堡海龙屯防御体系探究

    Institute of Scientific and Technical Information of China (English)

    李亮; 但文红; 吴孟珊

    2013-01-01

    建于13世纪中期海龙屯是中国军事防御城堡的杰出代表,是西南地区播州土司文化军事领域的重要遗迹.海龙屯城堡在军事防御思想、堡址选择、军事防御体系布防等方面体现了冷兵器时代“以弱御强”的战略防御思想.借自然天险筑军事城堡,设立远、中、近的军事防御体系,屯兵于民,建立自给自足的军事给养保障,是海龙屯军事城堡防御思想的集中体现.%Hailong tuen is outstanding representative of China's military defense castle and it was built in middle of 13 th century . It is an important historical remains of sowing state toast culture of military field in southwest. The military defense thought of the age of cold" to the weak strong " is reflected by Hailong tuen in the aspects of the military defense thought, fort address selection, military defense system etc. The military castle defense concentration system of Hailong tuen depends natural , setting up far, medium and near military defense system, assembled troops in people , and established self - sufficient military supplies security.

  4. 家庭安防系统中手机彩信报警的实现%Realization of multimedia messaging service of home safety alarm system

    Institute of Scientific and Technical Information of China (English)

    张光异; 王会清; 程勇

    2013-01-01

    利用 LabVIEW 软件开发了集现场数据采集、传送及远程监视于一体的彩信实时报警系统。当监控现场有非法侵入时,控制主机收到被触发的探测器报警信号后立即启动相应的模块采集现场的声音与图像,经信号处理后以最直观的彩信形式,通过 GPRS 网络发送到用户设定的手机。系统运行结果表明,数据发送稳定、实时性好,声音和图像清晰,可以作为传统报警方式的补充,也可应用于其他方面的远程监控。%A multimedia messaging service real-time alarm system of onsite data collection, transmission and remote monitoring has been established using LabVIEW development tools. As soon as the probes are triggered by illegal intruder , control host immediately starts the data collection of live sound and image by related module, and after signal processing, the data are sent to the appointed mobile phone. Testing results show that the data transmission is stable, time lag is short, the sound and the image are clear. The MMS can be used as an enhanced assembly to the traditional alarm system , as well as to other remote monitoring.

  5. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    have adapted to resist plant defenses, and in some cases even sequester the compounds and reuse them in their own defense. Both plant defense and insect adaptation involve metabolic costs, so most plant-insect interactions reach a stand-off, where both host and herbivore survive although......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar....... Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight...

  6. The persuasive effects of framing messages on fruit and vegetable consumption according to regulatory focus theory.

    Science.gov (United States)

    Dijkstra, Arie; Rothman, Alexander; Pietersma, Suzanne

    2011-08-01

    According to Regulatory Focus theory (RFT), outcomes in persuasive messages can be framed in four different ways, as gains, non-gains, losses or non-losses. In study 1, the persuasiveness of all four frames was compared and the presence/absence effect that was expected on the basis of the feature-positive effect was verified: Statements about present outcomes (gain, loss) were more persuasive than those about absent outcomes (non-gain, non-loss). However, this study failed to support the prediction that a gain-framed message would be more persuasive than a loss-framed message when promoting a prevention behaviour. Study 2 was designed to examine the latter finding. It was hypothesised that the threat posed by the loss-framed message in study 1 was too low to elicit a defensive reaction. Therefore, in study 2, the personal relevance of the gain and the loss framed message was manipulated. Consistent with predictions, the gain-framed message was more persuasive than the loss-framed message, but only when the message was personalised to increase self-relevance. Moreover, the effect was due to a significant drop in persuasion in the loss condition, probably caused by a defensive reaction. These data shed a new light on the findings of past framing studies.

  7. Creative Analytics of Mission Ops Event Messages

    Science.gov (United States)

    Smith, Dan

    2017-01-01

    Historically, tremendous effort has been put into processing and displaying mission health and safety telemetry data; and relatively little attention has been paid to extracting information from missions time-tagged event log messages. Todays missions may log tens of thousands of messages per day and the numbers are expected to dramatically increase as satellite fleets and constellations are launched, as security monitoring continues to evolve, and as the overall complexity of ground system operations increases. The logs may contain information about orbital events, scheduled and actual observations, device status and anomalies, when operators were logged on, when commands were resent, when there were data drop outs or system failures, and much much more. When dealing with distributed space missions or operational fleets, it becomes even more important to systematically analyze this data. Several advanced information systems technologies make it appropriate to now develop analytic capabilities which can increase mission situational awareness, reduce mission risk, enable better event-driven automation and cross-mission collaborations, and lead to improved operations strategies: Industry Standard for Log Messages. The Object Management Group (OMG) Space Domain Task Force (SDTF) standards organization is in the process of creating a formal standard for industry for event log messages. The format is based on work at NASA GSFC. Open System Architectures. The DoD, NASA, and others are moving towards common open system architectures for mission ground data systems based on work at NASA GSFC with the full support of the commercial product industry and major integration contractors. Text Analytics. A specific area of data analytics which applies statistical, linguistic, and structural techniques to extract and classify information from textual sources. This presentation describes work now underway at NASA to increase situational awareness through the collection of non

  8. Daily variations of the antioxidant defense system of the lithodid crab Lithodes santolla.

    Science.gov (United States)

    Schvezov, Natasha; Lovrich, Gustavo A; Tapella, Federico; Romero, M Carolina

    2013-04-01

    Several physiological processes can induce daily variations in aerobic metabolism. Lithodes santolla is a decapod crustacean of special concern since it is a sub-Antarctic species of commercial interest. The aim of this work was to study in L. santolla the daily variations in levels of enzymatic and non-enzymatic antioxidants, lipid peroxidation and protein oxidation, and haemolymphatic pH. Males of L. santolla of commercial size were randomly dissected every 4 h during a period of 24 h. Enzymatic activities of superoxide dismutase (SOD), catalase (CAT), glutathione-S-transferase and glutathione peroxidase were determined in samples of gills, muscle, hepatopancreas and haemolymph. Ascorbic acid, total glutathione, lipid peroxidation and protein oxidation were also determined in all tissues. Gills showed the highest enzymatic activity and hepatopancreas the highest concentration of non-enzymatic antioxidants. Maximum antioxidant activity was during the dark phase in gills and during the photophase in the haemolymph. Muscle showed significant daily variations, with peaks during the photophase and scotophase. Overall, an antioxidant protective mechanism is present in all tissues, where SOD and CAT represent the first line of defense. The defense mechanism in L. santolla seems to be more active during the dark phase, with slight differences among the analyzed tissues, indicating a higher metabolic rate.

  9. Plant Defense against Insect Herbivores

    Science.gov (United States)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar. Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight, defense compounds. These bioactive specialized plant defense compounds may repel or intoxicate insects, while defense proteins often interfere with their digestion. Volatiles are released upon herbivory to repel herbivores, attract predators or for communication between leaves or plants, and to induce defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects have adapted to resist plant defenses, and in some cases even sequester the compounds and reuse them in their own defense. Both plant defense and insect adaptation involve metabolic costs, so most plant-insect interactions reach a stand-off, where both host and herbivore survive although their development is suboptimal. PMID:23681010

  10. Host-pathogen interactions between the human innate immune system and Candida albicans - Understanding and modeling defense and evasion strategies

    Directory of Open Access Journals (Sweden)

    Sybille eDühring

    2015-06-01

    Full Text Available The diploid, polymorphic yeast Candida albicans is one of the most important humanpathogenic fungi. C. albicans can grow, proliferate and coexist as a commensal on or within thehuman host for a long time. Alterations in the host environment, however, can render C. albicansvirulent. In this review, we describe the immunological cross-talk between C. albicans and thehuman innate immune system. We give an overview in form of pairs of human defense strategiesincluding immunological mechanisms as well as general stressors such as nutrient limitation,pH, fever etc. and the corresponding fungal response and evasion mechanisms. FurthermoreComputational Systems Biology approaches to model and investigate these complex interactionare highlighted with a special focus on game-theoretical methods and agent-based models. Anoutlook on interesting questions to be tackled by Systems Biology regarding entangled defenseand evasion mechanisms is given.

  11. Calcium supplementation improves Na+/K+ ratio, antioxidant defense and glyoxalase systems in salt-stressed rice seedlings

    Directory of Open Access Journals (Sweden)

    Anisur eRahman

    2016-05-01

    Full Text Available The present study investigates the regulatory role of exogenous calcium (Ca in developing salt stress tolerance in rice seedlings. Hydroponically grown 13-d-old rice (Oryza sativa L. cv. BRRI dhan47 seedlings were exposed to 200 mM NaCl alone and combined with 2 mM CaCl2 and 2 mM ethylene glycol tetraacetic acid (EGTA, a Ca scavenger for three days. The salt stress caused growth inhibition, chlorosis and water shortage in the rice seedlings. The salt-induced stress disrupted ion homeostasis through Na+ influx and K+ efflux, and decreased other mineral nutrient uptake. Salt-induced stress caused oxidative stress in rice seedlings through lipid peroxidation, loss of plasma membrane integrity, higher reactive oxygen species (ROS production and methylglyoxal (MG formation. The salt-stressed rice seedlings supplemented with exogenous Ca recovered from water loss, chlorosis and growth inhibition. Calcium supplementation in the salt-stressed rice seedlings improved ion homeostasis by inhibition of Na+ influx and K+ leakage. Exogenous Ca also improved ROS and MG detoxification by improving the antioxidant defense and glyoxalase systems, respectively. On the other hand, applying EGTA along with salt and Ca again negatively affected the rice seedlings as EGTA negated Ca activity. It confirms that, the positive responses in salt-stressed rice seedlings to exogenous Ca were for Ca mediated improvement of ion homeostasis, antioxidant defense and glyoxalase system.

  12. Influence of Genotype, Environment, and Gypsy Moth Herbivory on Local and Systemic Chemical Defenses in Trembling Aspen (Populus tremuloides).

    Science.gov (United States)

    Rubert-Nason, Kennedy F; Couture, John J; Major, Ian T; Constabel, C Peter; Lindroth, Richard L

    2015-07-01

    Numerous studies have explored the impacts of intraspecific genetic variation and environment on the induction of plant chemical defenses by herbivory. Relatively few, however, have considered how those factors affect within-plant distribution of induced defenses. This work examined the impacts of plant genotype and soil nutrients on the local and systemic phytochemical responses of trembling aspen (Populus tremuloides) to defoliation by gypsy moth (Lymantria dispar). We deployed larvae onto foliage on individual tree branches for 15 days and then measured chemistry in leaves from: 1) branches receiving damage, 2) undamaged branches of insect-damaged trees, and 3) branches of undamaged control trees. The relationship between post-herbivory phytochemical variation and insect performance also was examined. Plant genotype, soil nutrients, and damage all influenced phytochemistry, with genotype and soil nutrients being stronger determinants than damage. Generally, insect damage decreased foliar nitrogen, increased levels of salicinoids and condensed tannins, but had little effect on levels of a Kunitz trypsin inhibitor, TI3. The largest damage-mediated tannin increases occurred in leaves on branches receiving damage, whereas the largest salicinoid increases occurred in leaves of adjacent, undamaged branches. Foliar nitrogen and the salicinoid tremulacin had the strongest positive and negative relationships, respectively, with insect growth. Overall, plant genetics and environment concomitantly influenced both local and systemic phytochemical responses to herbivory. These findings suggest that herbivory can contribute to phytochemical heterogeneity in aspen foliage, which may in turn influence future patterns of herbivory and nutrient cycling over larger spatial scales.

  13. Oral Rg1 supplementation strengthens antioxidant defense system against exercise-induced oxidative stress in rat skeletal muscles

    Directory of Open Access Journals (Sweden)

    Yu Szu-Hsien

    2012-05-01

    Full Text Available Abstract Background Previous studies reported divergent results on nutraceutical actions and free radical scavenging capability of ginseng extracts. Variations in ginsenoside profile of ginseng due to different soil and cultivating season may contribute to the inconsistency. To circumvent this drawback, we assessed the effect of major ginsenoside-Rg1 (Rg1 on skeletal muscle antioxidant defense system against exhaustive exercise-induced oxidative stress. Methods Forty weight-matched rats were evenly divided into control (N = 20 and Rg1 (N = 20 groups. Rg1 was orally administered at the dose of 0.1 mg/kg bodyweight per day for 10-week. After this long-term Rg1 administration, ten rats from each group performed an exhaustive swimming, and remaining rats considered as non-exercise control. Tibialis anterior (TA muscles were surgically collected immediately after exercise along with non-exercise rats. Results Exhaustive exercise significantly (p Conclusions This study provide compelling evidences that Rg1 supplementation can strengthen antioxidant defense system in skeletal muscle and completely attenuate the membrane lipid peroxidation induced by exhaustive exercise. Our findings suggest that Rg1 can use as a nutraceutical supplement to buffer the exhaustive exercise-induced oxidative stress.

  14. Systemic defense priming by Pseudomonas putida KT2440 in maize depends on benzoxazinoid exudation from the roots.

    Science.gov (United States)

    Neal, Andrew L; Ton, Jurriaan

    2013-01-01

    Exudation of benzoxazinoid metabolites from roots of young maize seedlings recruits the rhizobacterial strain Pseudomonas putida KT2440 from the soil to the rhizosphere. In this study, we have investigated whether these rhizobacteria are beneficial for maize by eliciting systemic defense priming. Root colonization of the maize hybrid cultivar Delprim by P. putida primed wound- and jasmonic acid (JA)-inducible emission of aromatic and terpenoid volatiles, but not the emission of the green leaf volatile (Z)-3-hexenyl acetate. Furthermore, root colonization by P. putida primed stress-inducible transcription of the JA-dependent gene SerPIN, whereas JA-dependent induction of the MPI gene was unaffected. Systemic priming of SerPIN by P. putida only occurred in benzoxazinoid-producing plants, and was absent in benzoxazinoid-deficient plants. The results from this study suggest that root colonization by P. putida primes a selection of JA-dependent defenses in Maize, which is reliant on benzoxazinoid exudation from the roots.

  15. Calcium Supplementation Improves Na+/K+ Ratio, Antioxidant Defense and Glyoxalase Systems in Salt-Stressed Rice Seedlings

    Science.gov (United States)

    Rahman, Anisur; Nahar, Kamrun; Hasanuzzaman, Mirza; Fujita, Masayuki

    2016-01-01

    The present study investigates the regulatory role of exogenous calcium (Ca) in developing salt stress tolerance in rice seedlings. Hydroponically grown 13-day-old rice (Oryza sativa L. cv. BRRI dhan47) seedlings were exposed to 200 mM NaCl alone and combined with 2 mM CaCl2 and 2 mM ethylene glycol tetraacetic acid (EGTA, a Ca scavenger) for 3 days. The salt stress caused growth inhibition, chlorosis and water shortage in the rice seedlings. The salt-induced stress disrupted ion homeostasis through Na+ influx and K+ efflux, and decreased other mineral nutrient uptake. Salt stress caused oxidative stress in seedlings through lipid peroxidation, loss of plasma membrane integrity, higher reactive oxygen species (ROS) production and methylglyoxal (MG) formation. The salt-stressed seedlings supplemented with exogenous Ca recovered from water loss, chlorosis and growth inhibition. Calcium supplementation in the salt-stressed rice seedlings improved ion homeostasis by inhibition of Na+ influx and K+ leakage. Exogenous Ca also improved ROS and MG detoxification by improving the antioxidant defense and glyoxalase systems, respectively. On the other hand, applying EGTA along with salt and Ca again negatively affected the seedlings as EGTA negated Ca activity. It confirms that, the positive responses in salt-stressed rice seedlings to exogenous Ca were for Ca mediated improvement of ion homeostasis, antioxidant defense and glyoxalase system. PMID:27242816

  16. Alternative Data Storage Solution for Mobile Messaging Services

    Directory of Open Access Journals (Sweden)

    David C. C. Ong

    2007-01-01

    Full Text Available In recent years, mobile devices have become relatively more powerful with additional features which have the capability to provide multimedia streaming. Better, faster and more reliable data storage solutions in the mobile messaging platform have become more essential with these additional improvements. The existing mobile messaging infrastructure, in particular the data storage platform has become less proficient in coping with the increased demand for its services. This demand especially in the mobile messaging area (i.e. SMS – Short Messaging Service, MMS – Multimedia Messaging Service, which may well exceeded 250,000 requests per second, means that the need to evaluate competing data management systems has become not only necessary but essential. This paper presents an evaluation of SMS and MMS platforms using different database management systems – DBMS and recommends the best data management strategies for these platforms.

  17. Short Message System (SMS) revisited

    DEFF Research Database (Denmark)

    Simonsen, Eivind Ortind; Dahl, Mads Ronald

    both students and educators are changing. There is a risk of information overload and difficulty ensuring, that important information passes through to all relevant individuals. This provides a challenge to institutions, which have an urgent need to pass on personal important information. One way......In a rapidly changing world of technology, communication and information is everywhere around us. Technology is constantly moving the frontier for what is possible and having an increasing impact on education. New inventions create new ways of effective mass communication and the expectations from...... route was chosen as part of improving the digital communication and information environment at the faculty. A SMS service was implemented and tested in three settings: course communication tool, University administration tool and as examination result tool....

  18. Short Message System (SMS) revisited

    DEFF Research Database (Denmark)

    Simonsen, Eivind Ortind; Dahl, Mads Ronald

    In a rapidly changing world of technology, communication and information is everywhere around us. Technology is constantly moving the frontier for what is possible and having an increasing impact on education. New inventions create new ways of effective mass communication and the expectations from...... to meet this challenge is to make use of new technological achievements in some novel way (CMS, LMS, VLE, RSS etc.). Another way is to take one step backwards, and employ an older technology that is stable and which people are familiar with. At the Faculty of Health, Aarhus University, Denmark, the latter...

  19. Short Message Monitoring System Based on Social Network Mechanism%基于社交网络机理的短信息监控系统

    Institute of Scientific and Technical Information of China (English)

    仲玉芳; 王慧芬; 叶星; 吴明光

    2011-01-01

    短信息实时过滤基于社交网络机理,从社交网络的聚类现象切入,通过确认发送者的身份实现短信息实时监控过滤.首先根据接收者与发送者之间是否存在通信历史对发送的短信进行预处理,进而根据接收者与发送者、接收者之间的通信历史记录实施二度实时过滤,确认发送者身份,拦截文本或多媒体形式的垃圾短信.并行过滤算法在对称多处理(SMP)的硬件平台上运行.%Real-time monitoring and filtering for mobile short message service (SMS) system is in terms of the clustering phenomenon of social network to check the sender's identify. At first pre-process SMS based on whether there are historical records between the sender and receiver, then take two degrees of real-time filtering in the light of statistics of both historical records from receivers to the sender and those among receivers. Parallel filtering algorithm and multinuclear hardware platform with symmetric multiprocessor (SMP) structure are used. It can be expected to solve the problem of filtering junk SMS, like text, sound and media in any language radically.

  20. Navigation message designing with high accuracy for NAV

    Institute of Scientific and Technical Information of China (English)

    Wang Luxiao; Huang Zhigang; Zhao Yun

    2014-01-01

    Navigation message designing with high accuracy guarantee is the key to efficient navi-gation message distribution in the global navigation satellite system (GNSS). Developing high accu-racy-aware navigation message designing algorithms is an important topic. This paper investigates the high-accuracy navigation message designing problem with the message structure unchanged. The contributions made in this paper include a heuristic that employs the concept of the estimated range deviation (ERD) to improve the existing well-known navigation message on L1 frequency (NAV) of global positioning system (GPS) for good accuracy service; a numerical analysis approximation method (NAAM) to evaluate the range error due to truncation (RET) of different navigation messages; and a basic positioning parameters designing algorithm in the limited space allocation. Based on the predicted ultra-rapid data from the ultra-rapid data from the international GPS service for geodynamic (IGU), ERDs are generated in real time for error correction. Simulations show that the algorithms developed in this paper are general and flexible, and thus are applicable to NAV improvement and other navigation message designs.

  1. Enhancement of Delivery of Warning Messages for Mobile Networks

    Directory of Open Access Journals (Sweden)

    Chia-Sheng Tsai

    2008-07-01

    Full Text Available Vehicle-to-vehicle (V2V communication systems have been studied extensively in recent years by transportation experts worldwide. Such systems enable the transmission of warning messages (alarms between vehicles without additional roadside infrastructure. Thus, messages can be sent faster than through base stations. Because of these advantages, researchers worldwide are exploring how this technology can improve traffic safety. However, the various V2V schemes proposed thus far share the same problem: (1 unnecessary repetition of warning messages and (2 transmission to inapplicable respondents. This study proposes a new method for delivering V2V warning messages which reduces the redundant messages common in current schemes. Here, three schemes to deliver alarms are considered. One is blind flooding to broadcast alarms. Warning messages are routed by AODV protocol. Another is called Two Lanes. The broadcasting region of alarms is limited in two traffic lanes nearby a traffic accident only. And the last one is the proposed strategy where a warning message received by a car will be simply checked the prime number carried within the alarm header and decided whether the car is responsible to deliver it. If necessary, it will be forwarded to the next nodes. Otherwise, the redundant warning message shall be discarded to release system load and avoid to suspend other normal transmission proceeding. The results reveal that minimizing the delays caused by such redundant messages enables warnings to be sent to drivers more rapidly. Also, it prioritizes warning messages so that drivers are apprised of the most serious and dangerous traffic accidents. Moreover, another key finding in this paper is that the radii of the broadcasting coverage shall be adjusted carefully and adaptively to optimize the system performance.

  2. Construction of High Performance Instant Messaging System Based on Socket.io+Node.js+Redis%基于Socket.io+Node.js+Redis构建高效即时通讯系统

    Institute of Scientific and Technical Information of China (English)

    黄经赢

    2014-01-01

    随着互联网技术的发展,市场上已有一些比较成熟的即时通讯系统,但大多数都是基于C/S结构,而基于B/S结构的即时通讯系统还处于发展阶段,主要受制于不同浏览器版本的兼容问题,且该类系统对高并发和数据快速存取有着较高的要求。而基于Socket.io、Node.js和Redis的技术,可以较好地解决B/S结构所遇到的问题。%With the development of Internet, there have been some mature instant messaging systems on the market, but most of them are based on C/S structure, the instant messaging system based on B/S structure is still developing, the main reason is subject to the different versions of browser compatibility issues, and the instant messaging system require high concurrency and fast data access. Based on Socket.io, Node.js and Redis technology can be better to solve the problem of B/S structure encountered.

  3. Department of Defense Materiel Distribution System Study. Volume 3, Book 2. Appendices A, B and C

    Science.gov (United States)

    1978-07-01

    Logistics Agency: M-Gen John L. Klingenhagen, USA (to Sep 75) M-Gen Eugene B. Sterling, USAF Office Of the Assistant Secretary of Defense...m-ohi ki.iuu iOMI K£Y • lbl.OLl n I N« l-HOUUCI IbbULb wt l&hl lUBI HKKL CHOO PCX CUMH Pll...1OOo 1 101 /PCT l-KUO 12 1 >»iIOOOI/per CHOO HI t»llOOOI/flT fKOO 112 »»iIOOOI/PCT PKOU 111 ••1lOOOt/PCT KMOo Itb »t|10001/PCT fHOO Ibl

  4. Individual differences in drivers' cognitive processing of road safety messages.

    Science.gov (United States)

    Kaye, Sherrie-Anne; White, Melanie J; Lewis, Ioni M

    2013-01-01

    Using Gray and McNaughton's (2000) revised reinforcement sensitivity theory (r-RST), we examined the influence of personality on processing of words presented in gain-framed and loss-framed anti-speeding messages and how the processing biases associated with personality influenced message acceptance. The r-RST predicts that the nervous system regulates personality and that behaviour is dependent upon the activation of the behavioural activation system (BAS), activated by reward cues and the fight-flight-freeze system (FFFS), activated by punishment cues. According to r-RST, individuals differ in the sensitivities of their BAS and FFFS (i.e., weak to strong), which in turn leads to stable patterns of behaviour in the presence of rewards and punishments, respectively. It was hypothesised that individual differences in personality (i.e., strength of the BAS and the FFFS) would influence the degree of both message processing (as measured by reaction time to previously viewed message words) and message acceptance (measured three ways by perceived message effectiveness, behavioural intentions, and attitudes). Specifically, it was anticipated that, individuals with a stronger BAS would process the words presented in the gain-frame messages faster than those with a weaker BAS and individuals with a stronger FFFS would process the words presented in the loss-frame messages faster than those with a weaker FFFS. Further, it was expected that greater processing (faster reaction times) would be associated with greater acceptance for that message. Driver licence holding students (N=108) were recruited to view one of four anti-speeding messages (i.e., social gain-frame, social loss-frame, physical gain-frame, and physical loss-frame). A computerised lexical decision task assessed participants' subsequent reaction times to message words, as an indicator of the extent of processing of the previously viewed message. Self-report measures assessed personality and the three message

  5. 人防地下室楼盖选型%Selection on Civil Air Defense Basement Floor System

    Institute of Scientific and Technical Information of China (English)

    马东亚

    2015-01-01

    Through the selection and comprehensive analysis of civil air defense basement floor system, it can be found that the occupancy floor height, construction cost, concrete and steel bar cost of beam and slab of Girderless floor are less than those of other floor systems.Girderless floor has huge comprehensive benefits.%进行人防地下室楼盖选型,综合分析比较可以得到:无梁楼盖相对于其他形式楼盖占用层高最少,施工费用最低,梁和板混凝土和钢筋材料费最少,综合效益最好。

  6. Advanced technologies for maintenance of electrical systems and equipment at the Savannah River Site Defense Waste Processing Facility

    Energy Technology Data Exchange (ETDEWEB)

    Husler, R.O. (Westinghouse Savannah River Co., Aiken, SC (United States)); Weir, T.J. (Pentek, Inc., Coraopolis, PA (United States))

    1991-01-01

    An enhanced maintenance program is being established to characterize and monitor cables, components, and process response at the Savannah River Site, Defense Waste Processing Facility. This facility was designed and constructed to immobilize the radioactive waste currently stored in underground storage tanks and is expected to begin operation in 1993. The plant is initiating the program to baseline and monitor instrument and control (I C) and electrical equipment, remote process equipment, embedded instrument and control cables, and in-cell jumper cables used in the facility. This program is based on the electronic characterization and diagnostic (ECAD) system which was modified to include process response analysis and to meet rigid Department of Energy equipment requirements. The system consists of computer-automated, state-of-the-art electronics. The data that are gathered are stored in a computerized database for analysis, trending, and troubleshooting. It is anticipated that the data which are gathered and trended will aid in life extension for the facility.

  7. 短信仿伪系统在中小型企业的应用%Application of Short Message Autifalse System in Small and Medium Enterprise

    Institute of Scientific and Technical Information of China (English)

    葛森; 田荣凤; 李丽萍

    2011-01-01

    企业为了保护自己和消费者的利益,大多数企业对自己的产品都采取了防伪技术.目前,短信防伪系统以其不受现场条件影响、全天候、全方位,消费者只需通过手机输入防伪号码,随时随地可以查询鉴别产品的真伪,越来越受到消费者和企业的青睐.短信防伪系统在企业对产品进行防伪,保护产品品牌的实际工作中,发挥越来越重要的作用.对于基于GSM-MODEL构造的短信防伪系统与以其投入低、维护成本低、无需申请接入号码,短信息资费低的特点,在中小型企业中,具有广泛的应用价值.%Enterprise in order to protect ourselves and the interests of the consumer,most companies in their products by adopting a anti-counterfeiting technology(--most businesses have taken their anti-counterfeiting technology products).At present,SMS autifalse system with its from site condition the influence,all-weather,all-round,consumer simply enter anti-counterfeiting number through the mobile phone,anytime,anywhere can check the authenticity of identification products,more and more get the favour of consumers and businesses.SMS anti-counterfeiting system in the enterprise product anti-fake,protect product brand in the actual work,play more and more important role.For the structure based on GSM-MODEL with anti-counterfeiting system and its low investment,low maintenance,no need to apply the access number,short message fee low characteristics has wide application value in small and medium enterprises.

  8. The Cutaneous Microbiome and Aspects of Skin Antimicrobial Defense System Resist Acute Treatment with Topical Skin Cleansers.

    Science.gov (United States)

    Two, Aimee M; Nakatsuji, Teruaki; Kotol, Paul F; Arvanitidou, Evangelia; Du-Thumm, Laurence; Hata, Tissa R; Gallo, Richard L

    2016-10-01

    The human skin microbiome has been suggested to play an essential role in maintaining health by contributing to innate defense of the skin. These observations have inspired speculation that the use of common skin washing techniques may be detrimental to the epidermal antibacterial defense system by altering the microbiome. In this study, several common skin cleansers were used to wash human forearms and the short-term effect on the abundance of the antimicrobial peptide LL-37 and the abundance and diversity of bacterial DNA was measured. Despite small but significant decreases in the amount of LL-37 on the skin surface shortly after washing, no significant change in the bacterial community was detected. Furthermore, Group A Streptococcus did not survive better on the skin after washing. In contrast, the addition of antimicrobial compounds such as benzalkonium chloride or triclocarban to soap before washing decreased the growth of Group A Streptococcus applied after rinse. These results support prior studies that hand washing techniques in the health care setting are beneficial and should be continued. Additional research is necessary to better understand the effects of chronic washing and the potential impact of skin care products on the development of dysbiosis in some individuals. Copyright © 2016 The Authors. Published by Elsevier Inc. All rights reserved.

  9. Microbial modulation of bacoside A biosynthetic pathway and systemic defense mechanism in Bacopa monnieri under Meloidogyne incognita stress

    Science.gov (United States)

    Gupta, Rupali; Singh, Akanksha; Srivastava, Madhumita; Singh, Vivek; Gupta, M. M.; Pandey, Rakesh

    2017-01-01

    Plant-associated beneficial microbes have been explored to fulfill the imperative function for plant health. However, their impact on the host secondary metabolite production and nematode disease management remains elusive. Our present work has shown that chitinolytic microbes viz., Chitiniphilus sp. MTN22 and Streptomyces sp. MTN14 singly as well as in combination modulated the biosynthetic pathway of bacoside A and systemic defense mechanism against Meloidogyne incognita in Bacopa monnieri. Interestingly, expression of bacoside biosynthetic pathway genes (3-Hydroxy-3-methylglutaryl coenzyme A reductase, mevalonate diphosphate decarboxylase, and squalene synthase) were upregulated in plants treated with the microbial combination in the presence as well as in absence of M. incognita stress. These microbes not only augmented bacoside A production (1.5 fold) but also strengthened host resistance via enhancement in chlorophyll a, defense enzymes and phenolic compounds like gallic acid, syringic acid, ferulic acid and cinnamic acid. Furthermore, elevated lignification and callose deposition in the microbial combination treated plants corroborate well with the above findings. Overall, the results provide novel insights into the underlying mechanisms of priming by beneficial microbes and underscore their capacity to trigger bacoside A production in B. monnieri under biotic stress. PMID:28157221

  10. Viral RNA silencing suppressors (RSS): novel strategy of viruses to ablate the host RNA interference (RNAi) defense system.

    Science.gov (United States)

    Bivalkar-Mehla, Shalmali; Vakharia, Janaki; Mehla, Rajeev; Abreha, Measho; Kanwar, Jagat Rakesh; Tikoo, Akshay; Chauhan, Ashok

    2011-01-01

    Pathogenic viruses have developed a molecular defense arsenal for their survival by counteracting the host anti-viral system known as RNA interference (RNAi). Cellular RNAi, in addition to regulating gene expression through microRNAs, also serves as a barrier against invasive foreign nucleic acids. RNAi is conserved across the biological species, including plants, animals and invertebrates. Viruses in turn, have evolved mechanisms that can counteract this anti-viral defense of the host. Recent studies of mammalian viruses exhibiting RNA silencing suppressor (RSS) activity have further advanced our understanding of RNAi in terms of host-virus interactions. Viral proteins and non-coding viral RNAs can inhibit the RNAi (miRNA/siRNA) pathway through different mechanisms. Mammalian viruses having dsRNA-binding regions and GW/WG motifs appear to have a high chance of conferring RSS activity. Although, RSSs of plant and invertebrate viruses have been well characterized, mammalian viral RSSs still need in-depth investigations to present the concrete evidences supporting their RNAi ablation characteristics. The information presented in this review together with any perspective research should help to predict and identify the RSS activity-endowed new viral proteins that could be the potential targets for designing novel anti-viral therapeutics. Copyright © 2010 Elsevier B.V. All rights reserved.

  11. [Effect of ecopathogenic environmental factors on the system of antioxidant defense in different parts of the rat brain].

    Science.gov (United States)

    Severynovs'ka, O V; Hryhorova, M O; Zaĭchenko, O Iu; Rybal'chenko, V K

    2006-01-01

    Influence ofecopathogenic environmental (radiation-chemical) factors on activities of superoxiddismutase, catalase and total antioxidative activity (TAA) has been investigated in morphologically and functionally different parts of rat brain. It has been found that reaction of cells in brain cortex, subcortical structures and cerebellum to these factors in all cases is revealed through the antioxidant enzyme activities decrease in all studied brain structures but in various degrees. In brain cortex, which is characterized by higher metabolic level, functional complexity and specialization, the higher level of antioxidation defense is marked both in normal state and under the action of negative factors, that allows to maintain the prooxidation-antioxidation balance. Subcortical structures were more sensitive to the heavy metal impact. Compared to the action of single factors at chronic combined influence of radiation and heavy metals on the separate antioxidative enzymes a summation effect can be observed and at aforesaid joint impact on multi-component system of antioxidation defense a partial mutual evening-out of effects of radiation and chemical agents can be marked.

  12. ICE在模拟训练系统消息中间件中的应用%Application of ICE to Message-Oriented Middleware in Simulation Training System

    Institute of Scientific and Technical Information of China (English)

    祝义荣

    2016-01-01

    Message-oriented middleware which provides good quality of service and self-adaptive ability becomes the key in simulation training systems. This paper points out the ICE(Internet Communications Engine)in detail. It de-signs and implements a message-oriented middleware based on ICE,which provides a suit of reliable and universal method for sending and receiving messages in distributed simulation training systems.%如何提供一种高服务质量、自适应能力强的信息中间件,成为模拟训练研究的重要组成部分。本文在对ICE(Internet Communications Engine)进行深入研究的基础上,设计并实现了一种消息中间件系统,为分布式模拟训练系统中数据收发提供了一套可靠通用的机制。

  13. Effectiveness Evaluation of Air Defense System Based on Queuing Theory%基于排队论的防空作战效能评估

    Institute of Scientific and Technical Information of China (English)

    高志华; 唐金国; 文建国; 李木易; 刘志豪; 王雷

    2012-01-01

    文章分析了防空体系对空袭目标的拦截次数计算方法,通过排队论的方法,建立了防空体系效能评估模型。最后通过仿真计算,得出影响防空体系作战效能的重要因素,为决策提供一定的理论依据。%This text analyzes the computing technology of intercepting numbers of air defense system to the goal. Through the queuing theory method, have set up the evaluation efficiency model of air defense system. Finally simulation results show the important factors of in- fluencing the fighting efficiency of air defense system, and offer certain theoretical foundation for people who making policy.

  14. Unified messaging solution for biosurveillance and disease surveillance.

    Science.gov (United States)

    Abellera, John P; Srinivasan, Arunkumar; Danos, C Scott; McNabb, Scott; Rhodes, Barry

    2007-10-11

    Biosurveillance and disease surveillance systems serve different purposes. However, the richness and quality of an existing data stream and infrastructure used in biosurveillance may prove beneficial for any state-based electronic disease surveillance system, especially if an electronic laboratory data feed does not exist between a hospital and state-based system. The use of an Enterprise Application Integration(EAI) engine, such as the BioSense Integrator,will be necessary to map heterogeneous messages into standard representations, then validate and route them [1] to a disparate system. This poster illustrates the use of an existing BioSense Integrator in order to create a unified message to support the exchange of electronic lab messages necessary for reportable disease notification. An evaluation of the infrastructure for data messaging will be examined and presented, along with a cost and benefit analysis between hospital and state-based system.

  15. 48 CFR 52.223-18 - Contractor Policy to Ban Text Messaging While Driving.

    Science.gov (United States)

    2010-10-01

    ... Text Messaging While Driving. 52.223-18 Section 52.223-18 Federal Acquisition Regulations System... Text of Provisions and Clauses 52.223-18 Contractor Policy to Ban Text Messaging While Driving. As prescribed in 23.1105, insert the following clause: CONTRACTOR POLICY TO BAN TEXT MESSAGING WHILE...

  16. Networking Effect Analysis of Ship-Airplane Cooperating Air Defense System%舰机协同防空体系网络化效应分析

    Institute of Scientific and Technical Information of China (English)

    陈国生; 刘钢; 贾子英

    2011-01-01

    针对舰机海上协同防空作战体系网络化效应难以度量的问题,提出舰机协同组网概念,建立舰机协同组网网络环模型.将舰机协同防空区域进行划分,通过核心子网络在不同防空区域的转移以及邻接矩阵Perron-Frobenius特征值(PFE)的计算,分析了舰机协同防空体系的网络化效应.该分析方法简单,将其应用在舰机协同防空体系网络化效应分析是有效的.%To solve the question of measuring networking effect for ship-airplane cooperating air defense system, the definition of ship-airplane cooperating networking is proposed, and the networking loop model of ship-airplane cooperating networking is established. The ship-airplane cooperating air defense area is divided, through the core sub-networking shifting in different air defense area and the computation of adjoin matrix Perron-Frobeniu eigenvalue(PFE), the networking effect of ship-airplane cooperating air defense system is analyzed. This analysis method is simple and effective on analyzing networking effect of ship-airplane cooperating air defense system.

  17. Generating Coherent Messages in Real-time Decision Support Exploiting Discourse Theory for Discourse Practice

    CERN Document Server

    Carberry, S; Carberry, Sandra; Harvey, Terrence

    1997-01-01

    This paper presents a message planner, TraumaGEN, that draws on rhetorical structure and discourse theory to address the problem of producing integrated messages from individual critiques, each of which is designed to achieve its own communicative goal. TraumaGEN takes into account the purpose of the messages, the situation in which the messages will be received, and the social role of the system.

  18. Anonymous Broadcast Messages

    Directory of Open Access Journals (Sweden)

    Dragan Lazic

    2013-01-01

    Full Text Available The Dining Cryptographer network (or DC-net is a privacy preserving communication protocol devised by David Chaum for anonymous message publication. A very attractive feature of DC-nets is the strength of its security, which is inherent in the protocol and is not dependent on other schemes, like encryption. Unfortunately the DC-net protocol has a level of complexity that causes it to suffer from exceptional communication overhead and implementation difficulty that precludes its use in many real-world use-cases. We have designed and created a DC-net implementation that uses a pure client-server model, which successfully avoids much of the complexity inherent in the DC-net protocol. We describe the theory of DC-nets and our pure client-server implementation, as well as the compromises that were made to reduce the protocol’s level of complexity. Discussion centers around the details of our implementation of DC-net.

  19. Program Manager: Journal of the Defense Systems Management College, Volume 23, Number 3, DSMC 120, May-June 1994

    Science.gov (United States)

    1994-06-01

    The Medium is the Message; is planned in the near future to hide 769. Marshall McLuhan . (1 st Edition) New the technology when not in use. 4...Henry Marshall , Brenda Lawter and Debbie Laforme in front of the successfully initiated reuse activities Army Reuse Center exhibit. that have taken...observes that, his- torically, when a society’s stylized S// Similarly, Marshall McLuhan’s The behavior patterns become subject to S Medium is the Message

  20. Microbial community induces a plant defense system under growing on the lunar regolith analogue

    Science.gov (United States)

    Zaetz, Irina; Mytrokhyn, Olexander; Lukashov, Dmitry; Mashkovska, Svitlana; Kozyrovska, Natalia; Foing, Bernard H.

    The lunar rock considered as a potential source of chemical elements essential for plant nutrition, however, this substrate is of a low bioavailability. The use of microorganisms for decomposition of silicate rocks and stimulation of plant growth is a key idea in precursory scenario of growing pioneer plants for a lunar base (Kozyrovska et al., 2004; 2006; Zaetz et al., 2006). In model experiments a consortium of well-defined plant-associated bacteria were used for growing of French marigold (Tagetes patula L.) in anorthosite, analogous to a lunar rock. Inoculated plants appeared better seed germination, more fast development and also increased accumulation of K, Mg, Mn, Co, Cu and lowered level of the toxic Zn, Ni, Cr, comparing to control tagetes'. Bacteria regulate metal homeostasis in plants by changing their bioavailability and by stimulating of plant defense mechanisms. Inoculated plants were being accommodated to growth under stress conditions on anorthosite used as a substrate. In contrast, control plants manifested a heavy metal-induced oxidative stress, as quantified by protein carbonyl accumulation. Depending on the plant organ sampled and developmental stage there were increases or loses in the antioxidant enzyme activities (guaiacol peroxidase and glutathione-S-transferase). These changes were most evident in inoculated plants. Production of phenolic compounds, known as antioxidants and heavy metal chelators, is rised in variants of inoculated marigolds. Guaiacol peroxidase plays the main role, finally, in a reducing toxicity of heavy metals in plant leaves, while glutathione-S-transferase and phenolics overcome stress in roots.

  1. A highly specific phage defense system is a conserved feature of the Vibrio cholerae mobilome.

    Science.gov (United States)

    O'Hara, Brendan J; Barth, Zachary K; McKitterick, Amelia C; Seed, Kimberley D

    2017-06-01

    Vibrio cholerae-specific bacteriophages are common features of the microbial community during cholera infection in humans. Phages impose strong selective pressure that favors the expansion of phage-resistant strains over their vulnerable counterparts. The mechanisms allowing virulent V. cholerae strains to defend against the ubiquitous threat of predatory phages have not been established. Here, we show that V. cholerae PLEs (phage-inducible chromosomal island-like elements) are widespread genomic islands dedicated to phage defense. Analysis of V. cholerae isolates spanning a 60-year collection period identified five unique PLEs. Remarkably, we found that all PLEs (regardless of geographic or temporal origin) respond to infection by a myovirus called ICP1, the most prominent V. cholerae phage found in cholera patient stool samples from Bangladesh. We found that PLE activity reduces phage genome replication and accelerates cell lysis following ICP1 infection, killing infected host cells and preventing the production of progeny phage. PLEs are mobilized by ICP1 infection and can spread to neighboring cells such that protection from phage predation can be horizontally acquired. Our results reveal that PLEs are a persistent feature of the V. cholerae mobilome that are adapted to providing protection from a single predatory phage and advance our understanding of how phages influence pathogen evolution.

  2. Overview of the molecular defense systems used by sea urchin embryos to cope with UV radiation.

    Science.gov (United States)

    Bonaventura, Rosa; Matranga, Valeria

    2017-07-01

    The sea urchin embryo is a well-recognized developmental biology model and its use in toxicological studies has been widely appreciated. Many studies have focused on the evaluation of the effects of chemical stressors and their mixture in marine ecosystems using sea urchin embryos. These are well equipped with defense genes used to cope with chemical stressors. Recently, ultraviolet radiation (UVR), particularly UVB (280-315 nm), received more attention as a physical stressor. Mainly in the Polar Regions, but also at temperate latitudes, the penetration of UVB into the oceans increases as a consequence of the reduction of the Earth's ozone layer. In general, UVR induces oxidative stress in marine organisms affecting molecular targets such as DNA, proteins, and lipids. Depending on the UVR dose, developing sea urchin embryos show morphological perturbations affecting mainly the skeleton formation and patterning. Nevertheless, embryos are able to protect themselves against excessive UVR, using mechanisms acting at different levels: transcriptional, translational and post-translational. In this review, we recommend the sea urchin embryo as a suitable model for testing physical stressors such as UVR and summarize the mechanisms adopted to deal with UVR. Moreover, we review UV-induced apoptotic events and the combined effects of UVR and other stressors. Copyright © 2016 Elsevier Ltd. All rights reserved.

  3. A highly specific phage defense system is a conserved feature of the Vibrio cholerae mobilome.

    Directory of Open Access Journals (Sweden)

    Brendan J O'Hara

    2017-06-01

    Full Text Available Vibrio cholerae-specific bacteriophages are common features of the microbial community during cholera infection in humans. Phages impose strong selective pressure that favors the expansion of phage-resistant strains over their vulnerable counterparts. The mechanisms allowing virulent V. cholerae strains to defend against the ubiquitous threat of predatory phages have not been established. Here, we show that V. cholerae PLEs (phage-inducible chromosomal island-like elements are widespread genomic islands dedicated to phage defense. Analysis of V. cholerae isolates spanning a 60-year collection period identified five unique PLEs. Remarkably, we found that all PLEs (regardless of geographic or temporal origin respond to infection by a myovirus called ICP1, the most prominent V. cholerae phage found in cholera patient stool samples from Bangladesh. We found that PLE activity reduces phage genome replication and accelerates cell lysis following ICP1 infection, killing infected host cells and preventing the production of progeny phage. PLEs are mobilized by ICP1 infection and can spread to neighboring cells such that protection from phage predation can be horizontally acquired. Our results reveal that PLEs are a persistent feature of the V. cholerae mobilome that are adapted to providing protection from a single predatory phage and advance our understanding of how phages influence pathogen evolution.

  4. A highly specific phage defense system is a conserved feature of the Vibrio cholerae mobilome

    Science.gov (United States)

    O’Hara, Brendan J.

    2017-01-01

    Vibrio cholerae-specific bacteriophages are common features of the microbial community during cholera infection in humans. Phages impose strong selective pressure that favors the expansion of phage-resistant strains over their vulnerable counterparts. The mechanisms allowing virulent V. cholerae strains to defend against the ubiquitous threat of predatory phages have not been established. Here, we show that V. cholerae PLEs (phage-inducible chromosomal island-like elements) are widespread genomic islands dedicated to phage defense. Analysis of V. cholerae isolates spanning a 60-year collection period identified five unique PLEs. Remarkably, we found that all PLEs (regardless of geographic or temporal origin) respond to infection by a myovirus called ICP1, the most prominent V. cholerae phage found in cholera patient stool samples from Bangladesh. We found that PLE activity reduces phage genome replication and accelerates cell lysis following ICP1 infection, killing infected host cells and preventing the production of progeny phage. PLEs are mobilized by ICP1 infection and can spread to neighboring cells such that protection from phage predation can be horizontally acquired. Our results reveal that PLEs are a persistent feature of the V. cholerae mobilome that are adapted to providing protection from a single predatory phage and advance our understanding of how phages influence pathogen evolution. PMID:28594826

  5. Patient-clinician mobile communication: analyzing text messaging between adolescents with asthma and nurse case managers.

    Science.gov (United States)

    Yoo, Woohyun; Kim, Soo Yun; Hong, Yangsun; Chih, Ming-Yuan; Shah, Dhavan V; Gustafson, David H

    2015-01-01

    With the increasing penetration of digital mobile devices among adolescents, mobile texting messaging is emerging as a new channel for patient-clinician communication for this population. In particular, it can promote active communication between healthcare clinicians and adolescents with asthma. However, little is known about the content of the messages exchanged in medical encounters via mobile text messaging. Therefore, this study explored the content of text messaging between clinicians and adolescents with asthma. We collected a total of 2,953 text messages exchanged between 5 nurse case managers and 131 adolescents with asthma through a personal digital assistant. The text messages were coded using a scheme developed by adapting categories from the Roter Interaction Analysis System. Nurse case managers sent more text messages (n=2,639) than adolescents with asthma. Most messages sent by nurse case managers were targeted messages (n=2,475) directed at all adolescents with asthma, whereas there were relatively few tailored messages (n=164) that were created personally for an individual adolescent. In addition, both targeted and tailored messages emphasized task-focused behaviors over socioemotional behaviors. Likewise, text messages (n=314) sent by adolescents also emphasized task-focused over socioemotional behaviors. Mobile texting messaging has the potential to play an important role in patient-clinician communication. It promotes not only active interaction, but also patient-centered communication with clinicians. In order to achieve this potential, healthcare clinicians may need to focus on socioemotional communication as well as task-oriented communication.

  6. Involvement of an antioxidant defense system in the adaptive response to cadmium in maize seedlings (Zea mays L.).

    Science.gov (United States)

    Xu, Xianghua; Liu, Cuiying; Zhao, Xiaoyan; Li, Renying; Deng, Wenjing

    2014-11-01

    Chemical and biological analyses were used to investigate the growth response and antioxidant defense mechanism of maize seedlings (Zea mays L.) grown in soils with 0-100 mg kg(-1) Cd. Results showed that maize seedlings have strong abilities to accumulate and tolerate high concentrations of Cd. For soil with 50 mg kg(-1) Cd, the Cd contents in roots and shoots of maize seedlings are as large as 295.6 and 153.0 mg kg(-1) DW, respectively, without visible symptoms of toxicity. Lower soil Cd concentrations lead to a decrease in reduced glutathione (GSH) content in leaves of maize seedlings, whereas higher soil Cd concentrations resulted in an increase in the activities of superoxide dismutase, guaiacol peroxidase, catalase, and ascorbate peroxidase. Maize seedlings have strong capacities to adapt to low concentrations of Cd by consuming GSH and to develop an antioxidative enzyme system to defend against high-Cd stress.

  7. Metallothionein-mediated antioxidant defense system and its response to exercise training are impaired in human type 2 diabetes

    DEFF Research Database (Denmark)

    Scheede-Bergdahl, Celena; Penkowa, Milena; Hidalgo, Juan

    2005-01-01

    the MT-I+II-mediated antioxidant capacity and its response to exercise training in the skeletal muscle of patients with type 2 diabetes, biopsies and blood samples were taken from 13 matched subjects (type 2 diabetes n = 8, control subjects n = 5) both before and after 8 weeks of exercise training....... Immunohistochemical analysis revealed reduced MT-I+II levels in the skeletal muscle of type 2 diabetic subjects compared with control subjects. Control subjects produced a robust increase of MT-I+II in response to training; however, in type 2 diabetes, MT-I+II levels remained essentially unchanged. Significantly...... lower levels of MT-I+II were also detected in the plasma of type 2 diabetic subjects compared with control subjects. These results suggest that, in control subjects, the MT-I+II defense system is active and inducible within skeletal muscle tissue and plasma. In type 2 diabetes, reduced levels of MT...

  8. ROMANIA’S PARTICIPATION TO THE AEGIS BALLISTIC MISSILE DEFENSE SYSTEM AS REFLECTED BY ROMANIAN NEWSPAPERS’ EVALUATIVE DISCOURSE

    Directory of Open Access Journals (Sweden)

    Raluca Mihaela LEVONIAN

    2012-01-01

    Full Text Available This study aims to investigate Romanian media discourse on the current standing of the relations between Romania and the United States of America in the military fi eld. The main topic investigated is connected to Romania’s decision to host the land-based component of the Balllistic Missile Defense System on its ground, an event which attracted signifi cant media coverage during the year 2011. The corpus analyzed consisted of 37 news and opinion items and reports published on the site of three Romanian newspapers. The main research questions were to assess whether the evaluations of this event were positive or negative, who were the actors issuing these statements and what objects were discussed in association to this event. The results showed that positive evaluations were more common than negative evaluations and that the offi cial stances on this topic formed a very coherent perspective, endorsing the project.

  9. Message Correlation Analysis Tool for NOvA

    CERN Document Server

    CERN. Geneva

    2012-01-01

    A complex running system, such as the NOvA online data acquisition, consists of a large number of distributed but closely interacting components. This paper describes a generic realtime correlation analysis and event identification engine, named Message Analyzer. Its purpose is to capture run time abnormalities and recognize system failures based on log messages from participating components. The initial design of analysis engine is driven by the DAQ of the NOvA experiment. The Message Analyzer performs filtering and pattern recognition on the log messages and reacts to system failures identified by associated triggering rules. The tool helps the system maintain a healthy running state and to minimize data corruption. This paper also describes a domain specific language that allows the recognition patterns and correlation rules to be specified in a clear and flexible way. In addition, the engine provides a plugin mechanism for users to implement specialized patterns or rules in generic languages such as C++.

  10. Assisted entry mitigates text messaging-based driving detriment.

    Science.gov (United States)

    Sawyer, Benjamin D; Hancock, Peter A

    2012-01-01

    Previous research using cell phones indicates that manual manipulation is not a principal component of text messaging relating driving detriment. This paper suggests that manipulation of a phone in conjunction with the cognitive need to compose the message itself co-act to contribute to driving degradation. This being so, drivers sending text messages might experience reduced interference to the driving task if the text messaging itself were assisted through the predictive T9 system. We evaluated undergraduate drivers in a simulator who drove and texted using either Assisted Text entry, via Nokia's T9 system, or unassisted entry via the multitap interface. Results supported the superiority of the T9 system over the multitap system implying that specific assistive technologies can modulate the degradation of capacity which texting tragically induces.

  11. Advanced Steganography Algorithm using Encrypted secret message

    Directory of Open Access Journals (Sweden)

    Joyshree Nath

    2011-03-01

    Full Text Available In the present work the authors have introduced a new method for hiding any encrypted secret message inside a cover file. For encrypting secret message the authors have used new algorithm proposed by Nath et al(1. For hiding secret message we have used a method proposed by Nath et al(2. In MSA(1 method we have modified the idea of Play fair method into a new platform where we can encrypt or decrypt any file. We have introduced a new randomization method for generating the randomized key matrix to encrypt plain text file and to decrypt cipher text file. We have also introduced a new algorithm for encrypting the plain text multiple times. Our method is totally dependent on the random text_key which is to be supplied by the user. The maximum length of the text_key can be of 16 characters long and it may contain any character(ASCII code 0 to 255. We have developed an algorithm to calculate the randomization number and the encryption number from the given text_key. The size of the encryption key matrix is 16x16 and the total number of matrices can be formed from 16 x 16 is 256! which is quite large and hence if someone applies the brute force method then he/she has to give trail for 256! times which is quite absurd. Moreover the multiple encryption method makes the system further secured. For hiding secret message in the cover file we have inserted the 8 bits of each character of encrypted message file in 8 consecutive bytes of the cover file. We have introduced password for hiding data in the cover file. We propose that our new method could be most appropriate for hiding any file in any standard cover file such as image, audio, video files. Because the hidden message is encrypted hence it will be almost impossible for the intruder to unhide the actual secret message from the embedded cover file. This method may be the most secured method in digital water marking.

  12. 75 FR 76692 - Defense Federal Acquisition Regulation Supplement; Business Systems-Definition and Administration...

    Science.gov (United States)

    2010-12-09

    ... Federal Acquisition Regulation Supplement; Business Systems--Definition and Administration (DFARS Case... INFORMATION: I. Background DoD published a proposed rule for Business Systems--Definition and...

  13. Priority nutrition messages.

    Science.gov (United States)

    1991-01-01

    The Philippine Food and Nutrition Program deliver priority short, simple, clear, and action filled nutrition messages in different languages and dialects to different audiences. Its 1st priority task is to promote breast feeding. It informs mothers that breast milk is the most nutritious food for infants and that it protects them from infectious diseases. The program also encourages breast feeding as long as possible. If mothers cannot breast feed, they should talk to an infant nutrition expert to help them choose the best formula and learn about proper preparation. A 4-6 month infant needs to begin eating small amounts of semisolid nutritious foods. Moreover these foods must include body building foods, such as meat and eggs, and energy providing foods, such as corn and rice. Mothers must 1st attend to food needs of infants and preschoolers since they are more likely to suffer malnutrition than older children and adults. This is especially important when they suffer from an infection. Specifically, the very young need a variety of foods each day including the vitamin and mineral rich vegetables and fruits. In fact, families should grow their own fruits and vegetables to ensure an adequate supply. Hands must be cleaned with soap and water after defecation and before preparing foods. Mothers should add fats and oils when preparing foods because they provide concentrated energy, fatty acids, and fat soluble vitamins. Pregnant mothers must consume increased amounts of fish, beans, and other body building foods as well as regulating foods (vegetables and fruits). Mothers must also space births. They should weigh children each month to monitor nutritional levels. Moreover they must pay attention to signs indicating inadequate and insufficient food intake e.g., underweight and night blindness.

  14. 基于短消息平台的气象卫星业务维护管理系统%Business maintenance management system for meteorological satellite based on short message service platform

    Institute of Scientific and Technical Information of China (English)

    郭强; 谢利子; 赵磊; 康宁; 冯小虎

    2014-01-01

    为满足静止气象卫星地面应用系统的运行管理需求,保证业务系统的高可靠性和维护响应的高时效性,设计了一套基于短消息平台的业务维护管理系统。该系统由短消息平台、实时业务监测和自动维护管理三部分组成,能够实时监测多套卫星系统的业务关键点,及时发现业务故障和特殊事件,利用短消息平台实现消息的集中管理和即时发送,同时具备故障策略管理、维护调度管理和自动化维护响应等功能。实施效果表明该系统具备良好的适用性和可扩展性,能有效减轻维护管理人员的工作压力,为高时效和高可靠要求的大型系统维护管理工作提供有效的技术手段。%In order to meet the operation management requirement of geostationary meteorological satellite ground application system, the authors proposed a business maintenance management system based on short message service platform to guarantee high reliability of business system and high efficiency of maintenance response. The functions of this system included short message service platform, real-time monitoring and automatic maintenance management. The system can provide real-time monitoring service for multiple satellite systems, discover business faults and special events in time, and send the messages through short message service platform. It also has fault strategy management, maintenance dispatching management and automatic response functions. The application results show that the system has good extensibility and maintainability, can effectively reduce the pressure of maintenance personnel, and provide effective technical approach for maintenance management work of high reliability and high efficiency system.

  15. The DEFENSE (debris Flows triggEred by storms - nowcasting system): An early warning system for torrential processes by radar storm tracking using a Geographic Information System (GIS)

    Science.gov (United States)

    Tiranti, Davide; Cremonini, Roberto; Marco, Federica; Gaeta, Armando Riccardo; Barbero, Secondo

    2014-09-01

    Debris flows, responsible for economic losses and occasionally casualties in the alpine region, are mainly triggered by heavy rains characterized by hourly peaks of varying intensity, depending on the features of the basin under consideration. By integrating a recent classification of alpine basins with the radar storm tracking method, an innovative early warning system called DEFENSE (DEbris Flows triggEred by storms - Nowcasting SystEm) was developed using a Geographical Information System (GIS). Alpine catchments were classified into three main classes based on the weathering capacity of the bedrock into clay or clay-like minerals, the amount of which, in unconsolidated material, directly influences the debris flow rheology, and thus the sedimentary processes, the alluvial fan architecture, as well as the triggering frequency and seasonal occurrence probability of debris flows. Storms were identified and tracked by processing weather radar observations; subsequently, rainfall intensities and storm severity were estimated over each classified basin. Due to rainfall threshold values determined for each basin class, based on statistical analysis of historical records, an automatic corresponding warning could be issued to municipalities.

  16. The classification on short message

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    This paper discusses the importance of the classification of short message, and details some key technologies related. Through implementing a fundamental prototype, some basic models and technical references are provided.

  17. Dark matter in archaeal genomes: a rich source of novel mobile elements, defense systems and secretory complexes.

    Science.gov (United States)

    Makarova, Kira S; Wolf, Yuri I; Forterre, Patrick; Prangishvili, David; Krupovic, Mart; Koonin, Eugene V

    2014-09-01

    Microbial genomes encompass a sizable fraction of poorly characterized, narrowly spread fast-evolving genes. Using sensitive methods for sequences comparison and protein structure prediction, we performed a detailed comparative analysis of clusters of such genes, which we denote "dark matter islands", in archaeal genomes. The dark matter islands comprise up to 20% of archaeal genomes and show remarkable heterogeneity and diversity. Nevertheless, three classes of entities are common in these genomic loci: (a) integrated viral genomes and other mobile elements; (b) defense systems, and (c) secretory and other membrane-associated systems. The dark matter islands in the genome of thermophiles and mesophiles show similar general trends of gene content, but thermophiles are substantially enriched in predicted membrane proteins whereas mesophiles have a greater proportion of recognizable mobile elements. Based on this analysis, we predict the existence of several novel groups of viruses and mobile elements, previously unnoticed variants of CRISPR-Cas immune systems, and new secretory systems that might be involved in stress response, intermicrobial conflicts and biogenesis of novel, uncharacterized membrane structures.

  18. Lactobacillus rhamnosus GG supernatant enhance neonatal resistance to systemic Escherichia coli K1 infection by accelerating development of intestinal defense

    Science.gov (United States)

    He, Xiaolong; Zeng, Qing; Puthiyakunnon, Santhosh; Zeng, Zhijie; Yang, Weijun; Qiu, Jiawen; Du, Lei; Boddu, Swapna; Wu, Tongwei; Cai, Danxian; Huang, Sheng-He; Cao, Hong

    2017-01-01

    The objective of this study was to determine whether Lactobacillus rhamnosus GG culture supernatant (LCS) has a preventive effect against gut-derived systemic neonatal Escherichia coli (E. coli) K1 infection. The preventive effects were evaluated in human colonic carcinoma cell line Caco-2 and neonatal rat models. Our in vitro results showed that LCS could block adhesion, invasion and translocation of E. coli K1 to Caco-2 monolayer via up-regulating mucin production and maintaining intestinal integrity. In vivo experiments revealed that pre-treatment with LCS significantly decrease susceptibility of neonatal rats to oral E. coli K1 infection as reflected by reduced bacterial intestinal colonization, translocation, dissemination and systemic infections. Further, we found that LCS treated neonatal rats have higher intestinal expressions of Ki67, MUC2, ZO-1, IgA, mucin and lower barrier permeability than those in untreated rats. These results indicated that LCS could enhance neonatal resistance to systemic E. coli K1 infection via promoting maturation of neonatal intestinal defense. In conclusions, our findings suggested that LCS has a prophylactic effect against systemic E. coli K1 infection in neonates. Future studies aimed at identifying the specific active ingredients in LCS will be helpful in developing effective pharmacological strategies for preventing neonatal E. coli K1 infection. PMID:28262688

  19. Text messaging during simulated driving.

    Science.gov (United States)

    Drews, Frank A; Yazdani, Hina; Godfrey, Celeste N; Cooper, Joel M; Strayer, David L

    2009-10-01

    This research aims to identify the impact of text messaging on simulated driving performance. In the past decade, a number of on-road, epidemiological, and simulator-based studies reported the negative impact of talking on a cell phone on driving behavior. However, the impact of text messaging on simulated driving performance is still not fully understood. Forty participants engaged in both a single task (driving) and a dual task (driving and text messaging) in a high-fidelity driving simulator. Analysis of driving performance revealed that participants in the dual-task condition responded more slowly to the onset of braking lights and showed impairments in forward and lateral control compared with a driving-only condition. Moreover, text-messaging drivers were involved in more crashes than drivers not engaged in text messaging. Text messaging while driving has a negative impact on simulated driving performance. This negative impact appears to exceed the impact of conversing on a cell phone while driving. The results increase our understanding of driver distraction and have potential implications for public safety and device development.

  20. System Re-set: High LET Radiation or Transient Musculoskeletal Disuse Cause Lasting Changes in Oxidative Defense Pathways Within Bone

    Science.gov (United States)

    Kumar, Akhilesh; Chatterjee, A.; Alwood, Joshua S.; Dvorochkin, Natalya; Almeida, Eduardo A. C.

    2011-01-01

    Six months post-IR, there were no notable changes in skeletal expression of 84 principal genes in the p53 signaling pathway due to low dose IR (0.5Gy), HU, or both. In contrast, numerous genes relevant to oxidative stress were regulated by the treatments, typically in a direction indicative of increased oxidative stress and impaired defense. IR and HU independently reduced (between 0.46 to 0.88 fold) expression levels of Noxa1, Gpx3, Prdx2, Prdx3, and Zmynd17. Surprisingly, transient HU alone (sham-irradiated) decreased expression of several redox-related genes (Gpx1,Gstk1, Prdx1, Txnrd2), which were not affected significantly by IR alone. Irradiation increased (1.13 fold) expression of a gene responsible for production of superoxides by neutrophils (NCF2). Of interest, only combined treatment with HU and IR led to increased expression levels of Ercc2, (1.19 fold), a DNA excision repair enzyme. Differences in gene expression levels may reflect a change in gene expression on a per cell basis, a shift in the repertoire of specific cell types within the tissue, or both. Serum nitrite/nitrate levels were elevated to comparable levels (1.6-fold) due to IR, HU or both, indicative of elevated systemic nitrosyl stress. CONCLUSIONS The magnitude of changes in skeletal expression of oxidative stress-related genes six months after irradiation and/or transient unloading tended to be relatively modest (0.46-1.15 fold), whereas the p53 pathway was not affected. The finding that many different oxidative stress-related genes differed from controls at this late time point implicates a generalized impairment of oxidative defense within skeletal tissue, which coincides with both profound radiation damage to osteoprogenitors/stem cells in bone marrow and impaired remodeling of mineralized tissue.

  1. 75 FR 75549 - Defense Federal Acquisition Regulation Supplement; Business Systems-Definition and Administration...

    Science.gov (United States)

    2010-12-03

    ... Acquisition Regulation Supplement; Business Systems-- Definition and Administration (DFARS Case 2009-D038...D published a proposed rule for Business Systems--Definition and Administration (DFARS Case 2009... contractor business systems, DoD is considering a rule to clarify the definition and administration...

  2. A Systems Biology Approach to the Coordination of Defensive and Offensive Molecular Mechanisms in the Innate and Adaptive Host-Pathogen Interaction Networks.

    Science.gov (United States)

    Wu, Chia-Chou; Chen, Bor-Sen

    2016-01-01

    Infected zebrafish coordinates defensive and offensive molecular mechanisms in response to Candida albicans infections, and invasive C. albicans coordinates corresponding molecular mechanisms to interact with the host. However, knowledge of the ensuing infection-activated signaling networks in both host and pathogen and their interspecific crosstalk during the innate and adaptive phases of the infection processes remains incomplete. In the present study, dynamic network modeling, protein interaction databases, and dual transcriptome data from zebrafish and C. albicans during infection were used to infer infection-activated host-pathogen dynamic interaction networks. The consideration of host-pathogen dynamic interaction systems as innate and adaptive loops and subsequent comparisons of inferred innate and adaptive networks indicated previously unrecognized crosstalk between known pathways and suggested roles of immunological memory in the coordination of host defensive and offensive molecular mechanisms to achieve specific and powerful defense against pathogens. Moreover, pathogens enhance intraspecific crosstalk and abrogate host apoptosis to accommodate enhanced host defense mechanisms during the adaptive phase. Accordingly, links between physiological phenomena and changes in the coordination of defensive and offensive molecular mechanisms highlight the importance of host-pathogen molecular interaction networks, and consequent inferences of the host-pathogen relationship could be translated into biomedical applications.

  3. Prokaryotic homologs of Argonaute proteins are predicted to function as key components of a novel system of defense against mobile genetic elements

    NARCIS (Netherlands)

    Makarova, K.S.; Wolf, Y.I.; Oost, van der J.; Koonin, E.V.

    2009-01-01

    ABSTRACT: BACKGROUND: In eukaryotes, RNA interference (RNAi) is a major mechanism of defense against viruses and transposable elements as well of regulating translation of endogenous mRNAs. The RNAi systems recognize the target RNA molecules via small guide RNAs that are completely or partially comp

  4. The Effects of Transition from DoD (Department of Defense) to ISO (international Standards Organization) OSI (Open Systems Interconnection) Communication Protocols

    Science.gov (United States)

    1987-11-01

    Alpert , Director 1 copy Center for Advanced Study University of Illinois 912 W. Illinois Street Dr. Barry W. Boehm 1 copy TRW Defense Systems Group MS...Dr. Larry E. Druffel 1 copy Software Engineering Institute Carnegie-Mellon University Pittsburgh, PA 15213-3890 Dr. C.E. Hutchinson, Dean 1 copy

  5. 基于消息中间件的制造执行系统的设计与实现%DESIGN AND IMPLEMENTATION OF MESSAGE-ORIENTED MIDDLEWARE-BASED MANUFACTURING EXECUTION SYSTEM

    Institute of Scientific and Technical Information of China (English)

    张政; 侍守创

    2016-01-01

    Through analysing the characteristics of traditional discrete manufacturing production and the advantages & disadvantages of manufacturing execution system (MES)at home and abroad in its user-defined degree and openness,combining the principle and mechanism of message-oriented middleware we proposed the message-oriented middleware-based MES architecture.The MES can realise functions such as distributed deployment,message service agent and unified messaging management.Besides,it has the key technologies including report self-defining,process self-defining,production lines virtualisation and manufacturing Kanban self-defining,etc.Through testing and acquiring the manufacturing Kanban information in the workshop manufacturing and processing spare parts of ahead blind flange of engines,it is proved that the design of MES based on message-oriented middleware can provide efficient and reliable solution for the production mode with multiple varieties and small batch.%通过分析传统离散型制造的生产特点以及国内外制造执行系统(MES)在自定义程度和开放性等方面的优缺点,结合消息中间件原理机制,提出基于消息中间件的 MES 体系结构。该 MES 可实现分布式部署、消息服务代理和消息统一管理等功能,具有报表自定义、流程自定义、产线虚拟化及生产看板自定义等关键技术。通过对发动机前盖板零部件加工生产车间的生产看板信息的测试获取,证明基于消息中间件的 MES 设计能够为多品种小批量的生产模式提供高效可靠的解决方案。

  6. RESEARCH ON kNN METHOD FOR SHORT MESSAGES FILTERING SYSTEM WITH UNBALANCED TRAINING SET%不均衡训练集下短信过滤系统 kNN方法的研究

    Institute of Scientific and Technical Information of China (English)

    徐山; 杜卫锋

    2013-01-01

    The overrunning of the unwanted short messages seriously impacts the social ethos and disrupts the normal life order of people .It has considerable practical value to research and develop the filtering technology of harmful short messages .In this paper, ICTCLAS segmentation system developed by the Institute of Computing Technology of CAS is applied to realise the transition of short message text to the eigenvectors in combination with keywords extraction using TFIDF word right metrics , then the kNN method is adopted to realise the discriminant of short messagescategories, thus the filtration of bad short messages is realised .In addition, according to the unbalanced distribution of training set, we apply the density-based improved method to solve the case of original classification results which are prone to the categories of big sample quite efficiently.Experiments show that the accuracy rate of the improved method reaches about 79.18%, a 1.23% increase compared with the originalmethod.This method is able to more effectively filter the unwanted short messages , and has certain practical value .%不良短信的泛滥,严重影响了社会风气,干扰了人们正常的生活秩序,研发不良短信过滤技术具有相当的实用价值。应用中科院计算所研制开发的ICTCLAS分词系统,结合TFIDF词权度量指标提取关键词,实现短信文本到特征向量的转换,然后采用kNN方法实现短信的类别判断,从而实现不良短信的过滤。另外,针对训练集分布不均衡的情况,应用基于密度的改进方法,较为有效地处理了原来分类结果倾向于大类别样本的情况。实验表明,改进后的方法的准确率约79.18%,比原方法提升了约1.23%。该方法能够比较有效地过滤不良短信,具有一定的实用价值。

  7. Multi-modal low cost mobile indoor surveillance system on the Robust Artificial Intelligence-based Defense Electro Robot (RAIDER)

    Science.gov (United States)

    Nair, Binu M.; Diskin, Yakov; Asari, Vijayan K.

    2012-10-01

    We present an autonomous system capable of performing security check routines. The surveillance machine, the Clearpath Husky robotic platform, is equipped with three IP cameras with different orientations for the surveillance tasks of face recognition, human activity recognition, autonomous navigation and 3D reconstruction of its environment. Combining the computer vision algorithms onto a robotic machine has given birth to the Robust Artificial Intelligencebased Defense Electro-Robot (RAIDER). The end purpose of the RAIDER is to conduct a patrolling routine on a single floor of a building several times a day. As the RAIDER travels down the corridors off-line algorithms use two of the RAIDER's side mounted cameras to perform a 3D reconstruction from monocular vision technique that updates a 3D model to the most current state of the indoor environment. Using frames from the front mounted camera, positioned at the human eye level, the system performs face recognition with real time training of unknown subjects. Human activity recognition algorithm will also be implemented in which each detected person is assigned to a set of action classes picked to classify ordinary and harmful student activities in a hallway setting.The system is designed to detect changes and irregularities within an environment as well as familiarize with regular faces and actions to distinguish potentially dangerous behavior. In this paper, we present the various algorithms and their modifications which when implemented on the RAIDER serves the purpose of indoor surveillance.

  8. Strain-Related Differences on Response of Liver and Kidney Antioxidant Defense System in Two Rat Strains Following Diazinon Exposure

    Directory of Open Access Journals (Sweden)

    Maryam Salehi

    2016-02-01

    Full Text Available Background Diazinon (DZN is one of the most organophosphates that widely used in agriculture and ectoparasiticide formulations. Its extensive use as an effective pesticide was associated with the environmental deleterious effects on biological systems. Objectives The aim of this study was to investigate the potency of DZN to affect serum biochemical parameters and the antioxidant defense system in the liver and kidney of two rat strains. Materials and Methods In this experimental study, 30 female Wistar and 30 female Norway rats were randomly divided into control and DZN groups. DZN group was divided into four subgroups: 25, 50, 100 and 200 mg/kg of DZN administered groups by i.p. injection. The parameters were evaluated after 24 hours. Results At higher doses of DZN, superoxide dismutase, catalase, glutathione S-transferase and lactate dehydrogenase activities and glutathione (GSH and malondialdehyde levels in liver and kidney of Wistar rats were higher than Norway rats. At these concentrations, DZN increased some serum biochemical indices such as liver enzymes activities and levels of urea, uric acid and creatinine in Wistar rat. Conclusions DZN at higher doses alters the oxidant-antioxidant balance in liver and kidney of both rat strains and induces oxidative stress, which is associated with a depletion of GSH and increased lipid peroxidation. However, Wistar rats are found to be more sensitive to the toxicity of DZN compared to Norway rats. In addition, the effect of DZN on liver antioxidant system was more than kidney.

  9. Eye movement responses to health messages on cigarette packages

    Directory of Open Access Journals (Sweden)

    TE Kessels Loes

    2012-07-01

    Full Text Available Abstract Background While the majority of the health messages on cigarette packages contain threatening health information, previous studies indicate that risk information can trigger defensive reactions, especially when the information is self-relevant (i.e., smokers. Providing coping information, information that provides help for quitting smoking, might increase attention to health messages instead of triggering defensive reactions. Methods Eye-movement registration can detect attention preferences for different health education messages over a longer period of time during message exposure. In a randomized, experimental study with 23 smoking and 41 non-smoking student volunteers, eye-movements were recorded for sixteen self-created cigarette packages containing health texts that presented either high risk or coping information combined with a high threat or a low threat smoking-related photo. Results Results of the eye movement data showed that smokers tend to spend more time looking (i.e., more unique fixations and longer dwell time at the coping information than at the high risk information irrespective of the content of the smoking-related photo. Non-smokers tend to spend more time looking at the high risk information than at the coping information when the information was presented in combination with a high threat smoking photo. When a low threat photo was presented, non-smokers paid more attention to the coping information than to the high risk information. Results for the smoking photos showed more attention allocation for low threat photos that were presented in combination with high risk information than for low threat photos in combination with coping information. No attention differences were found for the high threat photos. Conclusions Non-smokers demonstrated an attention preference for high risk information as opposed to coping information, but only when text information was presented in combination with a high threat photo

  10. Clandestine Message Passing in Virtual Environments

    Science.gov (United States)

    2008-09-01

    Steganography Hiding messages in pictures, audio , packets Place messages in clothing textures, object files Bots Automate the logic and control of...information will be developed along with proof of concepts. Visual cues, steganography and autonomous bots will be examined. Monitoring techniques are...14. SUBJECT TERMS Message Passing, Virtual Environments, Steganography , Second Life, Internet Terrorism, Honeyworld, Sun MPK20, Clandestine Messages

  11. Short-Message Quantize-Forward Network Coding

    CERN Document Server

    Kramer, Gerhard

    2011-01-01

    Compression via quantization and hashing lets relays form distributed "multi-output" nodes of a multi-input, multi-output (MIMO) system. Recent work shows that quantize-forward (QF) with long-message encoding and decoding achieves the same reliable rates as short-message compress-forward (CF). It is shown that short-message QF with backward or pipelined (sliding-window) decoding also achieve the same rates for a single-relay channel. The price paid is a more restrictive quantization that degrades performance for slow-fading channels with outage. For many relays and sources, short-message QF with backward decoding achieves the same rates as long-message QF, although again with a more restrictive quantization. Several practical advantages of short-message encoding are pointed out, e.g., reduced delay (enabling streaming) and simplified modulation (without requiring additional hashing). Furthermore, short-message encoding lets relays use decode-forward (DF) if their channel quality is good, and therefore enables...

  12. Research and Implementation of Short Message Technology in Traffic Condition Publishing System%短消息在交通信息发布系统中的应用与研究

    Institute of Scientific and Technical Information of China (English)

    郑林江; 王锦锦; 廖孝勇; 马庆禄

    2011-01-01

    Based on the advanced Traffic Data Collection System and combined with individuation and diversification demand of travelers, the dynamic short message publishing mode for the city real-time traffic information has been studied in order to meet the travelers' demands for traffic information. In view of Short Message Gateway Interface Protocol,employing self-defining application layer protocol,as well as the designed two serving ways of publishing which include servo and push modes,a better cooperation performance of mobile phone terminal and transportation information platform is exhibited. The real-time dynamic short message publishing system, which was built on the base of the Java - open source software, extends the existing basic functions of Traffic Information Publishing System.%为满足出行者时实时交通信息的需求,在已获得交通信息的基础上,结合出行者需求的个性化、多样化等特点,研究了实时交通信息的短消息动态发布模式.以通用SMIP协议为承载,采用自定义的应用层协议;设计伺服和推送两种发布服务方式,达到更好的手机终端与交通信息平台之间的信息协同效果.最后,以Java开源软件为平台开发交通信息的短消息动态发布子系统,使已有交通信息发布系统的基本功能得到进一步的拓展.

  13. Design and Implementation of Android System Short Message Encryption based on 3DES and RSA%基于3DES和RSA的Android系统短信加密设计与实现

    Institute of Scientific and Technical Information of China (English)

    马玉琢; 郭玉翠

    2016-01-01

    Android System, as an open source system, is more and more popular.At the same time, its security and user privacy face a great challenge.This paper puts forward an encryption scheme to protect the privacy of short mes-sage. Starting from the overall architecture and hierarchical idea of Android system, a new encryption scheme based on the hybrid encryption algorithm is proposed in this paper through the analysis and research on the 3DES symmetric encryption algorithm and RSA non symmetric encryption algorithm. The process of realizing algorithmis introduced in detail. The test by using the Android simulator to send and receive the short message proves the feasibility of the short message encryption scheme.%Android系统作为开源的系统,受到越来越多的青睐,同时其安全性及用户的隐私也受到了极大的考验。本文提出了一种针对短信隐私保护的加密方案。从 Android 系统的整体架构及分层思想出发,通过对3DES 对称加密算法及 RSA非对称加密算法的原理进行分析与研究,提出了一种新型的针对 Android系统的混合加密算法的短信加密方案,详细地介绍了具体的实现过程。使用Android模拟器进行的收发仿真实验,证明了短信加密方案的可行性。

  14. Guidelines on the defense-in-depth and diversity planning and analysis in digital instrumentation and control systems

    Energy Technology Data Exchange (ETDEWEB)

    Cheon, Se Woo; Park, Jong Kyun; Lee, Ki Young; Kwon, Ki Choon; Lee, Jang Soo; Kim, Jang Yeol

    2000-08-01

    Digital instrumentation and control (I and C) systems are becoming an ever-increasing part in I and C systems of nuclear power plants due to such features such as versatility, flexibility, and reduced sizes. The digital technology introduces a possibility that common-cause or common-mode failures (CCF or CMF) may cause redundant safety systems to fail in such a way that there is loss of safety function. A special form of CMF analysis called 'defense-in-depth and diversity' (D-in-D and D) analysis has been developed to identify possible common-mode failure vulnerabilities and to support a specific licensing action in digital systems. There are two main stages in D-in-D and D activities: both plan and analysis. The purposes of this technical report are (i) to review background of D-in-D and D and some of important issues in digital D-in-D and D, (ii) to provide guidelines for a vendor to prepare planning and/or analysis documents on D-in-D and D, and (iii) to provide guidelines for an evaluator to review applicant's D-in-D and D planning and/or analysis documents, to ensure that the requirements of the D-in-D and D for digital I and C systems are followed. Most of guidelines suggested in this report were based on NUREG/CR-6303 which was published in 1994. The report will be helpful for a vendor to prepare and for an evaluator to review both D-in-D and D planning or analysis documents for digital I and C systems such as the KNGR project.

  15. Pilot and feasibility test of adolescent-controlled text messaging reminders.

    Science.gov (United States)

    Britto, Maria T; Munafo, Jennifer Knopf; Schoettker, Pamela J; Vockell, Anna-Liisa B; Wimberg, Janet A; Yi, Michael S

    2012-02-01

    This pilot study assessed the feasibility, acceptability, and utility of a text messaging system that allowed teenagers with asthma to generate and control medical reminders sent to their mobile phones. The 12 teens in the study group were able to create their own reminder text messages, add or change reminders, and determine when and how often the messages were sent to their cell phone. In total, 18 of the 21 unique messages created were reminders to take medication. No teen made changes to their original text messages or delivery schedule on their own. They gave high ratings on the usefulness, acceptability, and ease of use of the text messaging system. Self-reported asthma control at baseline was similar for both the study and comparison groups and did not change significantly. Allowing teens to control the timing and content of reminder text messages may support self-management of chronic disease.

  16. Design and Implementation of the Message Push Function of Real-time Based on DNC Workshop System%DNC车间管理系统的消息实时推送功能的设计与实现∗

    Institute of Scientific and Technical Information of China (English)

    安涛; 胡毅; 张腾飞; 王帅; 郭安

    2016-01-01

    In the process of industrial control ,the acquisition of a variety of real-time messages are increas-ingly demanding, the push mechanism are more important on mobile application development. As for sol-ving the overload problem of data update at job shop manage systems, we design and implement a data transfer system ,which mainly depend on a message push mechanism, based on the Distributed Numerical Control( DNC) system in the analysis of traditional push mechanism’ insufficient. In our system, users only choose the messages that need to send instead of every information which may contain some useless informa-tion, aim to improve the real-time performance and reliability, cater the user’ s experience, finally make the message transmission much more humility.%在工业控制过程中,各种数据消息的获取的实时性要求越来越高,推送功能在手机应用开发中显得越来越重要。文章在分析了传统推送功能不足的前提下,在实现了DNC车间管理系统的基础上,设计并实现了车床状态消息实时推送的功能,有效的解决了车间管理系统消息实时更新带来的客户端的负荷问题。用户可以自己选择要接收的消息,避免了传统消息推送中过多的无效消息,有效的提高了对车间进行监控的实时性和可靠性,增加用户的体验感,提供更加人性化的推送。

  17. The P3 Power Generation System for Advanced Missile Defense Applications

    Science.gov (United States)

    2008-11-01

    Kansal, J. Hsu, J. Friedman, and M. B. Srivastava, "Design Considerations for Solar Energy Harvesting Wireless Embedded Systems", IEEE...Generator", Proceedings of the Materials Research Society, Perovskite Materials, vol. 718, pp. D10.25.l-7 (2002) A.L. Olson, L.M. Eakins, B.W. Olson, D.F...system in which the P3 system is a bottoming cycle for a mid to high temperature fuel cell will be developed. This option will require a total of two

  18. Inflammatory monocytes mediate early and organ-specific innate defense during systemic candidiasis.

    Science.gov (United States)

    Ngo, Lisa Y; Kasahara, Shinji; Kumasaka, Debra K; Knoblaugh, Sue E; Jhingran, Anupam; Hohl, Tobias M

    2014-01-01

    Candida albicans is a commensal fungus that can cause systemic disease in patients with breaches in mucosal integrity, indwelling catheters, and defects in phagocyte function. Although circulating human and murine monocytes bind C. albicans and promote inflammation, it remains unclear whether C-C chemokine receptor 2 (CCR2)- and Ly6C-expressing inflammatory monocytes exert a protective or a deleterious function during systemic infection. During murine systemic candidiasis, interruption of CCR2-dependent inflammatory monocyte trafficking into infected kidneys impaired fungal clearance and decreased murine survival. Depletion of CCR2-expressing cells led to uncontrolled fungal growth in the kidneys and brain and demonstrated an essential antifungal role for inflammatory monocytes and their tissue-resident derivatives in the first 48 hours postinfection. Adoptive transfer of purified inflammatory monocytes in depleted hosts reversed the defect in fungal clearance to a substantial extent, indicating a compartmentally and temporally restricted protective function that can be transferred to enhance systemic innate antifungal immunity.

  19. 76 FR 28855 - Defense Federal Acquisition Regulation Supplement; Business Systems-Definition and Administration

    Science.gov (United States)

    2011-05-18

    ... they have the requisite skills in contracting. When specialized expertise is required, contracting... Certified Public Accountants (AICPA), the system criteria are applicable equally to DoD, NASA, and...

  20. Direct Deposit -- When Message Passing Meets Shared Memory

    Science.gov (United States)

    2000-05-19

    by H. Karl in [64]. The paper implements the pure DSM code, the pure message passing code and a few intermediate forms on the Charlotte DSM system [8...ASPLOS VI), pages 51–60, San Jose, October 1994. ACM. [64] H. Karl . Bridging the gap between distributed shared memory and message passing. Concurrency...pages 94 – 101, 1988. [73] P.N. Loewenstein and D.L. Dill. Verification of a multiprocessor cache protocol using simulation relations and higher-order

  1. Math on MXit: the medium is the message

    CSIR Research Space (South Africa)

    Butgereit, L

    2007-07-01

    Full Text Available are delivered and received immediately. Instant messaging systems have already successfully been used at university level in distance learning situations [5]. Instant messaging is considered a state-of-the-art communication method. A North West province... with one tutor. As the project grew, however, we recruited tutors from the University of Pretoria. The Faculty of Engineering, Built-Environment and Information Technology have a compulsory module for all undergraduates which...

  2. Physics/computer science. Passing messages between disciplines.

    Science.gov (United States)

    Mézard, Marc

    2003-09-19

    Problems in computer science, such as error correction in information transfer and "satisfiability" in optimization, show phase transitions familiar from solid-state physics. In his Perspective, Mézard explains how recent advances in these three fields originate in similar "message passing" procedures. The exchange of elaborate messages between different variables and constraints, used in the study of phase transitions in physical systems, helps to make error correction and satisfiability codes more efficient.

  3. Study of Adversarial and Defensive Components in an Experimental Machinery Control Systems Laboratory Environment

    Science.gov (United States)

    2014-09-01

    GNU Radio , iPDC, PMU Simulator, Saleae Logic, and Termineter). These tools enhance the vulnerability identification and security assessment of energy...Name INL Kali SamuraiSTFU Developer System(s) OpenDNP3 x Automatak Cross-platform Energy Sector Tools GNU Radio x Eric Blossom / GNU Project...code, Revision Number, as well as the Device IP. https://github.com/digitalbond/Redpoint GNU Radio Eric Blossom / GNU Project Cross

  4. Major Defense Acquisition Program (MDAP) Trail Boss Overview and Joint Strike Fighter Decontamination Shelter System

    Science.gov (United States)

    2011-11-01

    Individual Protection Joint Project Manager  Individual Protection 3 JAN 11 Joint Project Manager  Chemical Biological Medical Systems ( Biosurveillance ...Trail Boss) Joint Project Manager  Chemical Biological Medical Systems ( Biosurveillance  Trail Boss) • ra oss      Decontamination  Joint Project

  5. Advanced technologies for maintenance of electrical systems and equipment at the Savannah River Site Defense Waste Processing Facility

    Energy Technology Data Exchange (ETDEWEB)

    Husler, R.O. [Westinghouse Savannah River Co., Aiken, SC (United States); Weir, T.J. [Pentek, Inc., Coraopolis, PA (United States)

    1991-12-31

    An enhanced maintenance program is being established to characterize and monitor cables, components, and process response at the Savannah River Site, Defense Waste Processing Facility. This facility was designed and constructed to immobilize the radioactive waste currently stored in underground storage tanks and is expected to begin operation in 1993. The plant is initiating the program to baseline and monitor instrument and control (I&C) and electrical equipment, remote process equipment, embedded instrument and control cables, and in-cell jumper cables used in the facility. This program is based on the electronic characterization and diagnostic (ECAD) system which was modified to include process response analysis and to meet rigid Department of Energy equipment requirements. The system consists of computer-automated, state-of-the-art electronics. The data that are gathered are stored in a computerized database for analysis, trending, and troubleshooting. It is anticipated that the data which are gathered and trended will aid in life extension for the facility.

  6. Response of antioxidant defense system to laser radiation apical meristem of Isatis indigotica seedlings exposed to UV-B

    Science.gov (United States)

    2009-01-01

    To determine the response of antioxidant defense system to laser radiation apical meristem of Isatis indigotica seedlings, Isatis indigotica seedlings were subjected to UV-B radiation (10.08 kJ m−2) for 8 h day−1 for 8 days (PAR, 220 µmol m−2 s−1) and then exposed to He-Ne laser radiation (633 nm; 5.23 mW mm−2; beam diameter: 1.5 mm) for 5 min each day without ambient light radiation. Changes in free radical elimination systems were measured, the results indicate that: (1) UV-B radiation enhanced the concentration of Malondialdahyde (MDA) and decreased the activities of superoxide dismutase (SOD), catalase (CAT) and peroxidase (POD) in seedlings compared with the control. The concentration of MDA was decreased and the activities of SOD, CAT and POD were increased when seedlings were subjected to elevated UV-B damage followed by laser; (2) the concentration of UV absorbing compounds and proline were increased progressively with UV-B irradiation, laser irradiation and He-Ne laser irradiation plus UV-B irradiation compared with the control. These results suggest that laser radiation has an active function in repairing UV-B-induced lesions in seedlings. PMID:19820308

  7. Near-Earth Objects: Targets for Future Human Exploration, Solar System Science, Resource Utilization, and Planetary Defense

    Science.gov (United States)

    Abell, Paul A.

    2011-01-01

    U.S. President Obama stated on April 15, 2010 that the next goal for human spaceflight will be to send human beings to a near-Earth asteroid by 2025. Given this direction from the White House, NASA has been involved in studying various strategies for near-Earth object (NEO) exploration in order to follow U.S. Space Exploration Policy. This mission would be the first human expedition to an interplanetary body beyond the Earth-Moon system and would prove useful for testing technologies required for human missions to Mars and other Solar System destinations. Missions to NEOs would undoubtedly provide a great deal of technical and engineering data on spacecraft operations for future human space exploration while conducting in-depth scientific investigations of these primitive objects. In addition, the resulting scientific investigations would refine designs for future extraterrestrial resource extraction and utilization, and assist in the development of hazard mitigation techniques for planetary defense. This presentation will discuss some of the physical characteristics of NEOs and review some of the current plans for NEO research and exploration from both a human and robotic mission perspective.

  8. Towards a Cyber Defense Framework for SCADA Systems Based on Power Consumption Monitoring

    Energy Technology Data Exchange (ETDEWEB)

    Hernandez Jimenez, Jarilyn M [ORNL; Chen, Qian [Savannah State University; Nichols, Jeff A. {Cyber Sciences} [ORNL; Calhoun, Chelsea [Savannah State University; Sykes, Summer [Savannah State University

    2017-01-01

    Supervisory control and data acquisition (SCADA) is an industrial automation system that remotely monitor, and control critical infrastructures. SCADA systems are major targets for espionage and sabotage attackers. According to the 2015 Dell security annual threat report, the number of cyber-attacks against SCADA systems has doubled in the past year. Cyber-attacks (i.e., buffer overflow, rootkits and code injection) could cause serious financial losses and physical infrastructure damages. Moreover, some specific cyber-attacks against SCADA systems could become a threat to human life. Current commercial off-the-shelf security solutions are insufficient in protecting SCADA systems against sophisticated cyber-attacks. In 2014 a report by Mandiant stated that only 69% of organizations learned about their breaches from third entities, meaning that these companies lack of their own detection system. Furthermore, these breaches are not detected in real-time or fast enough to prevent further damages. The average time between compromise and detection (for those intrusions that were detected) was 205 days. To address this challenge, we propose an Intrusion Detection System (IDS) that detects SCADA-specific cyber-attacks by analyzing the power consumption of a SCADA device. Specifically, to validate the proposed approach, we chose to monitor in real-time the power usage of a a Programmable Logic Controller (PLC). To this end, we configured the hardware of the tetsbed by installing the required sensors to monitor and collect its power consumption. After that two SCADA-specific cyber-attacks were simulated and TracerDAQ Pro was used to collect the power consumption of the PLC under normal and anomalous scenarios. Results showed that is possible to distinguish between the regular power usage of the PLC and when the PLC was under specific cyber-attacks.

  9. Wide Area Recovery & Resiliency Program (WARRP) Transition Manager Series, Coalition Warrior Interoperability Demonstration (CWID) 2011: SSC Pacific Civilian Message Systems in Trial 2.32

    Science.gov (United States)

    2011-07-01

    They acquired materials and equipment on short notice, and shipped and tracked equipment to the various locations for testing and operations. SSC...displayed sensor readings and maps: an Apple iPad and a Samsung Galaxy Tab. • Mobile Wi-Fi Hotspot: A 3G AT&T MiFi integrated the sensors, laptops and...Sullivan (1) 85300 Archive Stock (1) 53627 Francis Cortez (1) Defense Technical Information Center Fort Belvoir, VA 22060

  10. Solution to Upgrade the Existing Power System Network Security Defense System%提升电力系统现有网络安全防御体系的解决方案

    Institute of Scientific and Technical Information of China (English)

    李永康; 周军鹏; 陈云峰

    2011-01-01

    Analyzed technologies of the existing power system network security defense,it shows the current security and defense technology can solve the vast majority of known malicious code attacks,but it is in a state of passive defense,which can not recognize the new and unknown malicious code,it proposed to upgrade the existing security defense system for the active defense system,to achieve the solution of differentiation and defense in depth.%对电力系统现有的网络安全防御技术进行了分析,得出当前的安全防御技术虽能够解决绝大部分已知的恶意代码攻击,但却处于对新型的和未知的恶意代码攻击无法识别的被动防御的状态,并提出将现有的安全防御体系提升为主动防御体系,实现差异化、纵深防御的解决方案。

  11. Antioxidative defense

    Directory of Open Access Journals (Sweden)

    Stevanović Jelka

    2011-01-01

    Full Text Available Free radicals occur constantly during metabolism and take part in numerous physiological processes, such as: intra-cellular and inter-cellular signalization, gene expression, removal of damaged or senescent cells, and control of the tone of blood vessels. However, there is an increased quantity of free radicals in situations of so-called oxidative stress, when they cause serious damage to cellular membranes (peroxidation of their lipids, damage of membrane proteins, and similar, to interior cellular protein molecules, as well as DNA molecules and carbohydrates. This is precisely why the organism has developed numerous mechanisms for removing free radicals and/or preventing their production. Some of these are enzyme-related and include superoxide-dismutase, catalase, glutathione-peroxidase, and others. Other, non-enzyme mechanisms, imply antioxidative activities of vitamins E and C, provitamin A, coenzyme Q, reduced glutation, and others. Since free radicals can leave the cell that has produced them and become dispersed throughout the body, in addition to antioxidative defense that functions within cellular structures, antioxidant extra-cellular defense has also been developed. This is comprised by: transferrin, lactoferrin, haptoglobin, hemopexin, ceruloplasmin, albumins, extra-cellular isoform SOD, extracellular glutathione-peroxidase, glucose, bilirubin, urates, and many other molecules.

  12. Plant defense against insect herbivores

    DEFF Research Database (Denmark)

    Fürstenberg-Hägg, Joel; Zagrobelny, Mika; Bak, Søren

    2013-01-01

    defense responses. Plants also apply morphological features like waxes, trichomes and latices to make the feeding more difficult for the insects. Extrafloral nectar, food bodies and nesting or refuge sites are produced to accommodate and feed the predators of the herbivores. Meanwhile, herbivorous insects......Plants have been interacting with insects for several hundred million years, leading to complex defense approaches against various insect feeding strategies. Some defenses are constitutive while others are induced, although the insecticidal defense compound or protein classes are often similar....... Insect herbivory induce several internal signals from the wounded tissues, including calcium ion fluxes, phosphorylation cascades and systemic- and jasmonate signaling. These are perceived in undamaged tissues, which thereafter reinforce their defense by producing different, mostly low molecular weight...

  13. 75 FR 2457 - Defense Federal Acquisition Regulation Supplement; Business Systems-Definition and Administration...

    Science.gov (United States)

    2010-01-15

    ... withholding payments. (e) System review matrix. Refer to the matrix at PGI 242.70X1(e) to cross-reference DCAA... estimates; (ii) Provide a written description of the organization and duties of the personnel responsible..., including but not limited to providing, as applicable-- (1) A basic structure that defines the form and...

  14. Conversion of the Defense Communications System from Analog to Digital Form.

    Science.gov (United States)

    1974-06-01

    Digital Services ," Proceedings of the IEEE, LX, No. 11 (November 1972), 1352. I p. 1353. 69Allen R. Worley, "The DATRAN System," Proceedings o t he IEE...August 1973, entire issue. Cox, J. E. "Western Union Digital Services ." Proceedings of the IEEE, LX, No. 11 (November 1972), 1350-57. "Crosstalk." Lenkurt

  15. Concepts. The Journal of Defense Systems Acquisition Management. Summer 1981. Volume 4, Number 3.

    Science.gov (United States)

    1981-01-01

    Market research and analysis will...totally new function, market research and analysis , and by requiring decisions which could replace entire sections of the existing pro- cedures for major...systems acquisition. The market research and analysis (MR&A) function will determine the success or failure of the ADCP policy. Its that

  16. In defense of unified health system: discourses of health professionals, municipal counselors and aldermen

    Directory of Open Access Journals (Sweden)

    Karly Garcia Delamuta

    2015-03-01

    Full Text Available The objective of this study was to evaluate the perceptions of municipal health counselors, primary care professionals and aldermen about the Unified Health System and the Brazilian Primary Care Policy. From these, we intend to analyze their involvement to improve the system and verify participation in projects that foster discussions about the challenges of this issue. The investigation took a qualitative approach, the data being collected through 28 semi-structured interviews conducted between November and December 2010 in Londrina-PR. Between the interviewed groups, it becomes apparent that health professionals have better conceptual approach of public health policies. However, all groups demonstrate misconceptions and distance for the principles and guidelines of the Unified Health System, as well as provisions of the Brazilian Primary Care Policy. The findings pointed indicate focus on disease, prioritization of medical consultations and greater value of hospital structures. Although conceptualized with misconceptions, limitations are noted at the public health services. However, the proposals to change the frame remain with distorted connotations. In these groups no practical actions or projects were found to improve the public health scenario. It is concluded the need for ownership of theoretical knowledge about policies involving health organization, by stakeholders, to change the paradigms of the traditional model to the Primary Health care become valued and understood as form of organization of the system.

  17. Software Intensive Systems Data Quality and Estimation Research in Support of Future Defense Cost Analysis

    Science.gov (United States)

    2012-03-13

    the units. For Kanban in less-familiar systems, and for sizing builds in agile methods such as Scrum , group consensus techniques such as Planning...Schwaber, K. and Beedle, M., Scrum : Agile Software Development, Prentice-Hall, 2002. [Selby 1988] Selby R, “Empirically Analyzing Software Reuse in

  18. Using Organizational Systems Theory to Improve Defense Acquisition and Warfighter Requirements

    Science.gov (United States)

    2007-12-01

    is no reality knowable.”13 The famous German philosopher, Friedrich Hegel, also mused over systems and is credited with highlighting the existence...Goodman, 1977). Although the best performing organizations are both effective and efficient ( Katz & Kahn, 1978), there may be tradeoffs between the two

  19. System Maturity Indices for Decision Support in the Defense Acquisition Process

    Science.gov (United States)

    2008-04-23

    technologies, but was to be used as ontology for contracting support (Sadin, Povinelli , & Rosen, 1989), thus TRL does not address: A complete...via probabilistic solution discovery. Reliability Engineering & System Safety. In press. Sadin, S.R., Povinelli , F.P., & Rosen, R. (1989). The NASA

  20. ZeroMQ: Messaging Made Simple

    CERN Document Server

    CERN. Geneva

    2013-01-01

    Since its inception in 2007, ZeroMQ has defined a new product category of thin, fast, open source message transports. This little library has now grown into a large, vibrant community of projects tied together with standard protocols and APIs. Applications, written in any language, talk to each other over TCP, multicast, or inproc transports, using a single socket-based API, and a set of "patterns" (pub-sub, request-reply, dealer-router, pipeline). ZeroMQ handles message framing, batching, and I/O, but ignores aspects like serialization and persistence. By focussing on the essentials, and acting as a toolkit rather than a pre-packaged solution, ZeroMQ turns the complex problem of distributed computing into a relatively simple recipe. About the speaker Pieter Hintjens is a writer, programmer, and public speaker who has spent decades building large software systems, organizations, and businesses. He designed the Advanced Message Queuing Protocol (AMQP) in 2006 for JPMorganChase and left ...

  1. ZeroMQ messaging for many applications

    CERN Document Server

    Hintjens, Pieter

    2013-01-01

    Dive into ØMQ (aka ZeroMQ), the smart socket library that gives you fast, easy, message-based concurrency for your applications. With this quick-paced guide, you’ll learn hands-on how to use this scalable, lightweight, and highly flexible networking tool for exchanging messages among clusters, the cloud, and other multi-system environments. ØMQ maintainer Pieter Hintjens takes you on a tour of real-world applications, using extended examples in C to help you work with ØMQ’s API, sockets, and patterns. Learn how to use specific ØMQ programming techniques, build multithreaded applications, and create your own messaging architectures. You’ll discover how ØMQ works with several programming languages and most operating systems—with little or no cost. Learn ØMQ’s main patterns: request-reply, publish-subscribe, and pipeline Work with ØMQ sockets and patterns by building several small applications Explore advanced uses of ØMQ’s request-reply pattern through working examples Build reliable request...

  2. Dissertation Defense: Computational Fluid Dynamics Uncertainty Analysis for Payload Fairing Spacecraft Environmental Control Systems

    Science.gov (United States)

    Groves, Curtis Edward

    2014-01-01

    Spacecraft thermal protection systems are at risk of being damaged due to airflow produced from Environmental Control Systems. There are inherent uncertainties and errors associated with using Computational Fluid Dynamics to predict the airflow field around a spacecraft from the Environmental Control System. This paper describes an approach to quantify the uncertainty in using Computational Fluid Dynamics to predict airflow speeds around an encapsulated spacecraft without the use of test data. Quantifying the uncertainty in analytical predictions is imperative to the success of any simulation-based product. The method could provide an alternative to traditional validation by test only mentality. This method could be extended to other disciplines and has potential to provide uncertainty for any numerical simulation, thus lowering the cost of performing these verifications while increasing the confidence in those predictions.Spacecraft requirements can include a maximum airflow speed to protect delicate instruments during ground processing. Computational Fluid Dynamics can be used to verify these requirements; however, the model must be validated by test data. This research includes the following three objectives and methods. Objective one is develop, model, and perform a Computational Fluid Dynamics analysis of three (3) generic, non-proprietary, environmental control systems and spacecraft configurations. Several commercially available and open source solvers have the capability to model the turbulent, highly three-dimensional, incompressible flow regime. The proposed method uses FLUENT, STARCCM+, and OPENFOAM. Objective two is to perform an uncertainty analysis of the Computational Fluid Dynamics model using the methodology found in Comprehensive Approach to Verification and Validation of Computational Fluid Dynamics Simulations. This method requires three separate grids and solutions, which quantify the error bars around Computational Fluid Dynamics predictions

  3. Dissertation Defense Computational Fluid Dynamics Uncertainty Analysis for Payload Fairing Spacecraft Environmental Control Systems

    Science.gov (United States)

    Groves, Curtis Edward

    2014-01-01

    Spacecraft thermal protection systems are at risk of being damaged due to airflow produced from Environmental Control Systems. There are inherent uncertainties and errors associated with using Computational Fluid Dynamics to predict the airflow field around a spacecraft from the Environmental Control System. This paper describes an approach to quantify the uncertainty in using Computational Fluid Dynamics to predict airflow speeds around an encapsulated spacecraft without the use of test data. Quantifying the uncertainty in analytical predictions is imperative to the success of any simulation-based product. The method could provide an alternative to traditional "validation by test only" mentality. This method could be extended to other disciplines and has potential to provide uncertainty for any numerical simulation, thus lowering the cost of performing these verifications while increasing the confidence in those predictions. Spacecraft requirements can include a maximum airflow speed to protect delicate instruments during ground processing. Computational Fluid Dynamics can be used to verify these requirements; however, the model must be validated by test data. This research includes the following three objectives and methods. Objective one is develop, model, and perform a Computational Fluid Dynamics analysis of three (3) generic, non-proprietary, environmental control systems and spacecraft configurations. Several commercially available and open source solvers have the capability to model the turbulent, highly three-dimensional, incompressible flow regime. The proposed method uses FLUENT, STARCCM+, and OPENFOAM. Objective two is to perform an uncertainty analysis of the Computational Fluid Dynamics model using the methodology found in "Comprehensive Approach to Verification and Validation of Computational Fluid Dynamics Simulations". This method requires three separate grids and solutions, which quantify the error bars around Computational Fluid Dynamics

  4. Future-based Static Analysis of Message Passing Programs

    Directory of Open Access Journals (Sweden)

    Wytse Oortwijn

    2016-06-01

    Full Text Available Message passing is widely used in industry to develop programs consisting of several distributed communicating components. Developing functionally correct message passing software is very challenging due to the concurrent nature of message exchanges. Nonetheless, many safety-critical applications rely on the message passing paradigm, including air traffic control systems and emergency services, which makes proving their correctness crucial. We focus on the modular verification of MPI programs by statically verifying concrete Java code. We use separation logic to reason about local correctness and define abstractions of the communication protocol in the process algebra used by mCRL2. We call these abstractions futures as they predict how components will interact during program execution. We establish a provable link between futures and program code and analyse the abstract futures via model checking to prove global correctness. Finally, we verify a leader election protocol to demonstrate our approach.

  5. Stress responses sculpt the insect immune system, optimizing defense in an ever-changing world.

    Science.gov (United States)

    Adamo, Shelley Anne

    2017-01-01

    A whole organism, network approach can help explain the adaptive purpose of stress-induced changes in immune function. In insects, mediators of the stress response (e.g. stress hormones) divert molecular resources away from immune function and towards tissues necessary for fight-or-flight behaviours. For example, molecules such as lipid transport proteins are involved in both the stress and immune responses, leading to a reduction in disease resistance when these proteins are shifted towards being part of the stress response system. Stress responses also alter immune system strategies (i.e. reconfiguration) to compensate for resource losses that occur during fight-or flight events. In addition, stress responses optimize immune function for different physiological conditions. In insects, the stress response induces a pro-inflammatory state that probably enhances early immune responses.

  6. Major Automated Information Systems: Selected Defense Programs Need to Implement Key Acquisition Practices

    Science.gov (United States)

    2014-03-01

    information system NGEN Next Generation Enterprise Network PMBOK ® Project Management Body of Knowledge TMIP-J Theater Medical Information Program...Management Institute’s Guide to the Project Management Body of Knowledge ( PMBOK ®), and assessed each of the 3 programs against these criteria.14 To...1) requirements management and (2) project monitoring and control best practices, as defined by CMMI-ACQ and PMBOK ®. We also assessed these

  7. Defense Information Systems Agency Technical Integration Support (DISA- TIS). MUMPS Study.

    Science.gov (United States)

    1993-01-01

    programming language; it includes facilities for both high- and low-level programming . C supports low-level hardware control and bit manipulation in addition...purposes. Sup- porting structured programming C 1974 D. Ritchie ALGOL 68 Systems programming (Bell Labs) BCPL Ada 1979 J. lchbiah eta.. Pascal, General...requirements and has high de facto usage for scientific and mathematical programming . C also provides support for efficient array and matrix calculations

  8. System and Mass Storage Study for Defense Mapping Agency Topographic Center (DMATC/HC)

    Science.gov (United States)

    1977-04-01

    extraction, file merging, and file extension (beyond 1x1 blocks) features • Automated transaction log The DIED system was installed at...34 This standard establishes a uniform structure for the content and format of digital terrain elevation data. The file structure is organized into 1x1 ...time they completed their minicomputer evaluation study; a la^ge market for the PDP 11/70 already exists in both the government and commercial

  9. Defense Science Board Task Force Report: The Role of Autonomy in DoD Systems

    Science.gov (United States)

    2012-07-01

    or range sensing to identify and track handles, doorknobs or objects of interest. Grasping is informed by haptic sensing, both touch ( tactile ) and...uncontrolled action. While the reality of what autonomy is and can do is quite different from those conjured images, these concerns are—in some...independent acting system and automation as an augmentation of human operation. In such cases, autonomy’s fundamental benefits are to increase a

  10. Accelerating Technology Transition: Bridging the Valley of Death for Materials and Processes in Defense Systems

    Science.gov (United States)

    2004-01-01

    California, Berkeley GARY FISCHMAN , University of Illinois, Chicago KATHARINE G. FRASE, IBM HAMISH L. FRASER, Ohio State University JOHN J. GASSNER...Boeing Commercial Airplane Group, and Ranji Vaidyanathan, Advanced Ceramics Research, Inc. 10:30 a.m. Boeing Phantom Works, David Banks, The Boeing...Bushman, 3M 8:45 a.m. Approaches Used for Deployment of Automated Biological Detection Systems, David Tilles, Northrop Grumman Automation and

  11. The Defense Civilian Intelligence Personnel System: An Independent Assessment of Design, Implementation, and Impact

    Science.gov (United States)

    2010-06-01

    recruiting among the “ millennial ” generation of workers who are more accustomed to instant feedback and recognition and would not be content with a...curve, the suppression of wages by permitting bonuses to be paid instead of base salary increases, and the virtual elimination of merit consideration...not support a pay system which ultimately is designed to suppress wages for civilian DoD employees over time. In March 2009, DoD suspended

  12. Program Manager: The Journal of the Defense Systems Management College. Volume 12, Number 6, November-December 1983,

    Science.gov (United States)

    1983-12-01

    Division, prime mission equipment acquisition languages in use; and (4) 40 percent of Wright-Patterson AFB, Ohio. He is a process and were designed to...compromising management style or objectives. It em- tems from both the public and private sectors. A synthesis braces a basic language that simplifies... Acqusition at the Defense Communications Agency" by tivity improvement is important to us in defense, then we Fred L. Adler, C. Bruce Baird, and Joseph

  13. RNAi and antiviral defense in Drosophila: setting up a systemic immune response.

    Science.gov (United States)

    Karlikow, Margot; Goic, Bertsy; Saleh, Maria-Carla

    2014-01-01

    RNA interference (RNAi) controls gene expression in eukaryotic cells and thus, cellular homeostasis. In addition, in plants, nematodes and arthropods it is a central antiviral effector mechanism. Antiviral RNAi has been well described as a cell autonomous response, which is triggered by double-stranded RNA (dsRNA) molecules. This dsRNA is the precursor for the silencing of viral RNA in a sequence-specific manner. In plants, systemic antiviral immunity has been demonstrated, however much less is known in animals. Recently, some evidence for a systemic antiviral response in arthropods has come to light. Cell autonomous RNAi may not be sufficient to reach an efficient antiviral response, and the organism might rely on the spread and uptake of an RNAi signal of unknown origin. In this review, we offer a perspective on how RNAi-mediated antiviral immunity could confer systemic protection in insects and we propose directions for future research to understand the mechanism of RNAi-immune signal sorting, spreading and amplification.

  14. Strategic Defense Initiative: Splendid Defense or Pipe Dream? Headline Series No. 275.

    Science.gov (United States)

    Armstrong, Scott; Grier, Peter

    This pamphlet presents a discussion of the various components of President Reagan's Strategic Defense Initiative (SDI) including the problem of pulling together various new technologies into an effective defensive system and the politics of the so-called "star wars" system. An important part of the defense initiative is the "layered" defense…

  15. Changes in Antioxidant Defense System Using Different Lipid Emulsions in Parenteral Nutrition in Children after Hematopoietic Stem Cell Transplantation

    Directory of Open Access Journals (Sweden)

    María Auxiliadora Baena-Gómez

    2015-08-01

    Full Text Available Background: Traditionally, lipids used in parenteral nutrition (PN are based on ω-6 fatty acid-rich vegetable oils, such as soybean oil, with potential adverse effects involving oxidative stress. Methods: We evaluated the antioxidant defense system in children, after hematopoietic stem cell transplantation (HSCT, who were randomized to use a lipid emulsion with fish oil or soybean oil. Blood samples at baseline, at 10 days, and at the end of the PN were taken to analyze plasma retinol, α-tocopherol, β-carotene, coenzyme Q9 and coenzyme Q10 levels, and catalase (CAT, glutathione reductase (GR, glutathione peroxidase (GPOX, and superoxide dismutase (SOD levels in lysed erythrocytes. Results: An increase in plasma α-tocopherol levels in the group of patients receiving the fish oil-containing emulsion (FO compared with the group receiving the soybean emulsion was observed at day 10 of PN. Concurrently, plasma α-tocopherol increased in the FO group and β-carotene decreased in both groups at day 10 compared with baseline levels, being more significant in the group receiving the FO emulsion. Conclusion: FO-containing emulsions in PN could improve the antioxidant profile by increasing levels of α-tocopherol in children after HSCT who are at higher risk of suffering oxidative stress and metabolic disorders.

  16. Influence of Different Doses of Levofloxacin on Antioxidant Defense Systems and Markers of Renal and Hepatic Dysfunctions in Rats

    Directory of Open Access Journals (Sweden)

    Ebenezer Tunde Olayinka

    2015-01-01

    Full Text Available Levofloxacin (LFX is a broad spectrum fluoroquinolone antibiotic used in the treatment of infections such as pneumonia, chronic bronchitis, and sinusitis. The present study assessed the likely toxic effect of LFX on hepatic and renal tissues in rats. Twenty male Wistar rats were randomly divided into four treatment groups: A: control, B: 5 mg/kg bw LFX (half therapeutic dose, C: 10 mg/kg bw LFX (therapeutic dose, and D: 20 mg/kg bw LFX (double therapeutic dose. After seven days of administration, result indicated significant (P<0.05 increase in plasma ALT, AST, and ALP activities in the treated groups compared to control. Also, there was a significant increase in plasma creatinine, urea, and total bilirubin in the treated groups relative to control. Plasma total cholesterol, HDL-cholesterol, LDL-cholesterol, and triglycerides also increased significantly in the treated groups relative to control. Also, hepatic MDA level increased significantly in all the treated groups. However, hepatic SOD, catalase, and GST activities were significantly reduced in the LFX-treated animals. Moreover, GSH and ascorbic acid levels were significantly decreased in the LFX-treated groups relative to control. In conclusion, three doses of levofloxacin depleted antioxidant defense system and induced oxidative stress and hepatic and renal dysfunctions in rats.

  17. Effect of vitamin E and C supplements on antioxidant defense system in cardiovascular disease patients in Zahedan, southeast Iran.

    Science.gov (United States)

    Karajibani, Mansour; Hashemi, Mohammad; Montazerifar, Farzaneh; Dikshit, Madhurima

    2010-01-01

    Oxidative stress plays an important role in the pathogenesis of cardiovascular disease (CVD). Growing evidence suggest that antioxidant vitamins might reduce the risk of disease outcomes by their ability to scavenge free radicals. The aim of the present study was to evaluate the supplementation of vitamins E and C on oxidant and antioxidant status in CVD patients. We conducted a case-control study with vitamin E (400 IU/d) and vitamin C (500 mg/d) supplementation in 40 CVD patients for 2 mo. Antioxidant (enzymatic and non-enzymatic) and oxidant status were analyzed pre and post supplementation. In the initial stage the activity of both enzymatic and non-enzymatic antioxidants were lower, while the malondialdehyde (MDA) level was elevated (pvitamin E (83.7%), C (145.3%), total antioxidant capacity (TAC) (62.8%) and a significant decrease in MDA (40%) value were observed (pvitamins E and C reduced lipid peroxidation and strengthened the antioxidant defense system. Hence, there will be beneficial effects on the heart by reducing oxidative stress in CVD patients.

  18. Aloin Protects Skin Fibroblasts from Heat Stress-Induced Oxidative Stress Damage by Regulating the Oxidative Defense System.

    Directory of Open Access Journals (Sweden)

    Fu-Wei Liu

    Full Text Available Oxidative stress is commonly involved in the pathogenesis of skin damage induced by environmental factors, such as heat stress. Skin fibroblasts are responsible for the connective tissue regeneration and the skin recovery from injury. Aloin, a bioactive compound in Aloe vera, has been reported to have various pharmacological activities, such as anti-inflammatory effects. The aim of this study was to investigate the protective effect of aloin against heat stress-mediated oxidative stress in human skin fibroblast Hs68 cells. Hs68 cells were first incubated at 43°C for 30 min to mimic heat stress. The study was further examined if aloin has any effect on heat stress-induced oxidative stress. We found that aloin protected Hs68 cells against heat stress-induced damage, as assessed by 3-(4,5-dimethylthiazol-2-yl-2,5-diphenyltetrazolium bromide and lactate dehydrogenase assay. Aloin protected Hs68 cells by regulating reactive oxygen species production and increasing the levels of glutathione, cytosolic and mitochondrial superoxide dismutase. Aloin also prevented the elevation of thiobarbituric acid reactive substances and the reduction of 8-OH-dG induced by heat stress. These results indicated that aloin protected human skin fibroblasts from heat stress-induced oxidative stress damage by regulating the oxidative defense system.

  19. An Identity-Based (IDB) Broadcast Encryption Scheme with Personalized Messages (BEPM)

    Science.gov (United States)

    Xu, Ke; Liao, Yongjian; Qiao, Li

    2015-01-01

    A broadcast encryption scheme with personalized messages (BEPM) is a scheme in which a broadcaster transmits not only encrypted broadcast messages to a subset of recipients but also encrypted personalized messages to each user individually. Several broadcast encryption (BE) schemes allow a broadcaster encrypts a message for a subset S of recipients with public keys and any user in S can decrypt the message with his/her private key. However, these BE schemes can not provide an efficient way to transmit encrypted personalized messages to each user individually. In this paper, we propose a broadcast encryption scheme with a transmission of personalized messages. Besides, the scheme is based on multilinear maps ensure constant ciphertext size and private key size of each user and the scheme can achieve statically security. More realistically, the scheme can be applied to the Conditional Access System (CAS) of pay television (pay-TV) efficiently and safely. PMID:26629817

  20. An Identity-Based (IDB) Broadcast Encryption Scheme with Personalized Messages (BEPM).

    Science.gov (United States)

    Xu, Ke; Liao, Yongjian; Qiao, Li; Liu, Zhangyun; Yang, Xiaowei

    2015-01-01

    A broadcast encryption scheme with personalized messages (BEPM) is a scheme in which a broadcaster transmits not only encrypted broadcast messages to a subset of recipients but also encrypted personalized messages to each user individually. Several broadcast encryption (BE) schemes allow a broadcaster encrypts a message for a subset S of recipients with public keys and any user in S can decrypt the message with his/her private key. However, these BE schemes can not provide an efficient way to transmit encrypted personalized messages to each user individually. In this paper, we propose a broadcast encryption scheme with a transmission of personalized messages. Besides, the scheme is based on multilinear maps ensure constant ciphertext size and private key size of each user and the scheme can achieve statically security. More realistically, the scheme can be applied to the Conditional Access System (CAS) of pay television (pay-TV) efficiently and safely.

  1. Snap-Stabilizing Linear Message Forwarding

    CERN Document Server

    Lamani, Anissa; Dubois, Swan; Petit, Franck; Villain, Vincent

    2010-01-01

    In this paper, we present the first snap-stabilizing message forwarding protocol that uses a number of buffers per node being inde- pendent of any global parameter, that is 4 buffers per link. The protocol works on a linear chain of nodes, that is possibly an overlay on a large- scale and dynamic system, e.g., Peer-to-Peer systems, Grids. . . Provided that the topology remains a linear chain and that nodes join and leave "neatly", the protocol tolerates topology changes. We expect that this protocol will be the base to get similar results on more general topologies.

  2. Automatic Sarcasm Detection in Twitter Messages

    OpenAIRE

    Ræder, Johan Georg Cyrus Mazaher

    2016-01-01

    In the past decade, social media like Twitter have become popular and a part of everyday life for many people. Opinion mining of the thoughts and opinions they share can be of interest to, e.g., companies and organizations. The sentiment of a text can be drastically altered when figurative language such as sarcasm is used. This thesis presents a system for automatic sarcasm detection in Twitter messages. To get a better understanding of the field, state-of-the-art systems fo...

  3. Polymorphic Endpoint Types for Copyless Message Passing

    Directory of Open Access Journals (Sweden)

    Viviana Bono

    2011-07-01

    Full Text Available We present PolySing#, a calculus that models process interaction based on copyless message passing, in the style of Singularity OS. We equip the calculus with a type system that accommodates polymorphic endpoint types, which are a variant of polymorphic session types, and we show that well-typed processes are free from faults, leaks, and communication errors. The type system is essentially linear, although linearity alone may leave room for scenarios where well-typed processes leak memory. We identify a condition on endpoint types that prevents these leaks from occurring.

  4. Defense and counterdefense in the RNAi-based antiviral immune system in insects.

    Science.gov (United States)

    van Mierlo, Joël T; van Cleef, Koen W R; van Rij, Ronald P

    2011-01-01

    RNA interference (RNAi) is an important pathway to combat virus infections in insects and plants. Hallmarks of antiviral RNAi in these organisms are: (1) an increase in virus replication after inactivation of major actors in the RNAi pathway, (2) production of virus-derived small interfering RNAs (v-siRNAs), and (3) suppression of RNAi by dedicated viral proteins. In this chapter, we will review the mechanism of RNAi in insects, its function as an antiviral immune system, viral small RNA profiles, and viral counterdefense strategies. We will also consider alternative, inducible antiviral immune responses.

  5. Onset of herbivore-induced resistance in systemic tissue primed for jasmonate-dependent defenses is activated by abscisic acid.

    Science.gov (United States)

    Vos, Irene A; Verhage, Adriaan; Schuurink, Robert C; Watt, Lewis G; Pieterse, Corné M J; Van Wees, Saskia C M

    2013-01-01

    In Arabidopsis, the MYC2 transcription factor on the one hand and the AP2/ERF transcription factors ORA59 and ERF1 on the other hand regulate distinct branches of the jasmonic acid (JA) signaling pathway in an antagonistic fashion, co-regulated by abscisic acid (ABA) and ethylene, respectively. Feeding by larvae of the specialist herbivorous insect Pieris rapae (small cabbage white butterfly) results in activation of the MYC-branch and concomitant suppression of the ERF-branch in insect-damaged leaves. Here we investigated differential JA signaling activation in undamaged systemic leaves of P. rapae-infested plants. We found that the MYC2 transcription factor gene was induced both in the local insect-damaged leaves and the systemic undamaged leaves of P. rapae-infested Arabidopsis plants. However, in contrast to the insect-damaged leaves, the undamaged tissue did not show activation of the MYC-branch marker gene VSP1. Comparison of the hormone signal signature revealed that the levels of JA and (+)-7-iso-jasmonoyl-L-isoleucine raised to similar extents in locally damaged and systemically undamaged leaves, but the production of ABA and the JA precursor 12-oxo-phytodienoic acid was enhanced only in the local herbivore-damaged leaves, and not in the distal undamaged leaves. Challenge of undamaged leaves of pre-infested plants with either P. rapae larvae or exogenously applied ABA led to potentiated expression levels of MYC2 and VSP1, with the latter reaching extremely high expression levels. Moreover, P. rapae-induced resistance, as measured by reduction of caterpillar growth on pre-infested plants, was blocked in the ABA biosynthesis mutant aba2-1, that was also impaired in P. rapae-induced expression of VSP1. Together, these results suggest that ABA is a crucial regulator of herbivore-induced resistance by activating primed JA-regulated defense responses upon secondary herbivore attack in Arabidopsis.

  6. System-on-chip-centric unattended embedded sensors in homeland security and defense applications

    Science.gov (United States)

    Jannson, Tomasz; Forrester, Thomas; Degrood, Kevin; Shih, Min-Yi; Walter, Kevin; Lee, Kang; Gans, Eric; Esterkin, Vladimir

    2009-05-01

    System-on-chip (SoC) single-die electronic integrated circuit (IC) integration has recently been attracting a great deal of attention, due to its high modularity, universality, and relatively low fabrication cost. The SoC also has low power consumption and it is naturally suited to being a base for integration of embedded sensors. Such sensors can run unattended, and can be either commercial off-the-shelf (COTS) electronic, COTS microelectromechanical systems (MEMS), or optical-COTS or produced in house (i.e., at Physical Optics Corporation, POC). In the version with the simplest electronic packaging, they can be integrated with low-power wireless RF that can communicate with a central processing unit (CPU) integrated in-house and installed on the specific platform of interest. Such a platform can be a human body (for e-clothing), unmanned aerial vehicle (UAV), unmanned ground vehicle (UGV), or many others. In this paper we discuss SoC-centric embedded unattended sensors in Homeland Security and military applications, including specific application scenarios (or CONOPS). In one specific example, we analyze an embedded polarization optical sensor produced in house, including generalized Lambertian light-emitting diode (LED) sources and secondary nonimaging optics (NIO).

  7. Comparative analysis of kill probability one of the main features of Air Defense Integrated Systems

    Directory of Open Access Journals (Sweden)

    Vasile SANDRU

    2014-09-01

    Full Text Available The combat features of the Ground Based Air Defence Systems represent the potential of search, discovery, indicate, combat and destruction of the enemy's air assets and the ability to manoeuvre of forces and combat means, for the purpose of capturing the enemy's airspace and avoid actions and attack to defend objectives (of troops assigned in the area of responsibility tacking into account the conditions established by the mission. The paper is focused on a comparative study on the possibilities of target destruction of the Air Air Defence Systems (antiaircraft artillery and Surface-To-Air Missiles. Two situations were chosen: for the first case, related to S1, S2 and S3, we’ve assumed the presence of a flying target describing a uniform rectilinear trajectory both in the presence and in the absence of the enemy’s electronic jamming. For the second case concerning S4 we’ve assumed that the target changed its angle of flight.

  8. In the presence of danger:the extracellular matrix defensive response to central nervous system injury

    Institute of Scientific and Technical Information of China (English)

    Lyn B. Jakeman; Kent E. Williams; Bryan Brautigam

    2014-01-01

    Glial cells in the central nervous system (CNS) contribute to formation of the extracellular matrix, which provides adhesive sites, signaling molecules, and a diffusion barrier to enhance efifcient neurotransmission and axon potential propagation. In the normal adult CNS, the extracellular matrix (ECM) is relatively stable except in selected regions characterized by dynamic remodel-ing. However, after trauma such as a spinal cord injury or cortical contusion, the lesion epicenter becomes a focus of acute neuroinlfammation. The activation of the surrounding glial cells leads to a dramatic change in the composition of the ECM at the edges of the lesion, creating a perile-sion environment dominated by growth inhibitory molecules and restoration of the peripheral/central nervous system border. An advantage of this response is to limit the invasion of damaging cells and diffusion of toxic molecules into the spared tissue regions, but this occurs at the cost of inhibiting migration of endogenous repair cells and preventing axonal regrowth. The following review was prepared by reading and discussing over 200 research articles in the ifeld published in PubMed and selecting those with signiifcant impact and/or controversial points. This article highlights structural and functional features of the normal adult CNS ECM and then focuses on the reactions of glial cells and changes in the perilesion border that occur following spinal cord or contusive brain injury. Current research strategies directed at modifying the inhibitory perile-sion microenvironment without eliminating the protective functions of glial cell activation are discussed.

  9. The Regional Dimension of Romania's Participation to the Anti-Missile Defense System

    Directory of Open Access Journals (Sweden)

    Florin Iftode

    2015-08-01

    Full Text Available The current security environment is characterized by a high degree of instability and unpredictability, through the manifestation of new risks and threats, especially those with asymmetrical nature, by redefining the relations between the great powers, and increasing freedom of action of the regional actors (state and non-state. At the international level, the end of the Cold War has led to a fragmentation of efforts in the security field, with direct implications on the need for further efforts of the international community coordination. In this era of profound change and transformation it is not possible the adoption of an isolationist policy of security, but only in a broader context of interdependencies and relationships between general trends, threats or challenges specific to a particular area or geographic areas. Swift operationalization of the anti-missile system will strengthen the national security both directly, through the protection it provides for the entire national territory, and indirectly, as the system will have a deterrent important role, able to mitigate risks of possible attacks by ballistic missiles. The role of deterrence will remove the risk of attack against any Allied territory on which, by virtue of membership in NATO and obligations involved according to article 5 of the Washington Treaty, Romania has also responsibilities.

  10. Host-pathogen interactions between the human innate immune system and Candida albicans-understanding and modeling defense and evasion strategies.

    Science.gov (United States)

    Dühring, Sybille; Germerodt, Sebastian; Skerka, Christine; Zipfel, Peter F; Dandekar, Thomas; Schuster, Stefan

    2015-01-01

    The diploid, polymorphic yeast Candida albicans is one of the most important human pathogenic fungi. C. albicans can grow, proliferate and coexist as a commensal on or within the human host for a long time. However, alterations in the host environment can render C. albicans virulent. In this review, we describe the immunological cross-talk between C. albicans and the human innate immune system. We give an overview in form of pairs of human defense strategies including immunological mechanisms as well as general stressors such as nutrient limitation, pH, fever etc. and the corresponding fungal response and evasion mechanisms. Furthermore, Computational Systems Biology approaches to model and investigate these complex interactions are highlighted with a special focus on game-theoretical methods and agent-based models. An outlook on interesting questions to be tackled by Systems Biology regarding entangled defense and evasion mechanisms is given.

  11. Short message aided NAT traversal for mobile P2 P system%短信辅助的移动对等系统NAT穿越

    Institute of Scientific and Technical Information of China (English)

    黄保华; 谢统义

    2014-01-01

    In order to resolve the problem that smart phone terminals isolated by NAT devices can not communicate through network in Peer-to-Peer model, a short message aided ICE protocol named SMAICE is proposed. Because short messages can be sent between smart phones directly, the proto-col can help the negotiation procedure of ICE to simplify the function of rendezvous server and re-duce the demands of the server. The design, program and testing of SMAICE based on Android plateform show that SMAICE has simple negotiation procedure and is easy to implement. Multiple times of NAT traversal tests with commonly used softwares are suceessful, which means that SMAICE has high success rate in NAT traversal.%为了解决被NAT设备隔离的智能手机终端难以进行对等网络通信的问题,设计了短信辅助的ICE协议SMAICE。该协议利用手机短信可在终端间直达的特性,用短信辅助ICE协商过程,能够简化集结服务器功能并降低对服务器的要求。基于Android平台的系统设计、编程实现和测试结果表明:SMAICE交互过程简单,容易编程实现;常用软件的多次NAT穿越测试均获成功,因此该协议具有很高的NAT穿越成功率。

  12. Influenza Viral Manipulation of Sphingolipid Metabolism and Signaling to Modulate Host Defense System

    Directory of Open Access Journals (Sweden)

    Madhuvanthi Vijayan

    2014-01-01

    Full Text Available Viruses attempt to create a distinctive cellular environment to favor viral replication and spread. Recent studies uncovered new functions of the sphingolipid signaling/metabolism during pathogenic virus infections. While sphingolipids such as sphingomyelin and ceramide were reported to influence the entry step of several viruses, sphingolipid-metabolizing enzymes could directly alter viral replication processes. Influenza virus was shown to increase the level of sphingosine kinase (SK 1 to promote virus propagation. The mechanism involves regulation of intracellular signaling pathways, leading to the amplification of influenza viral RNA synthesis and nuclear export of viral ribonucleoprotein (RNP complex. However, bovine viral diarrhea virus inhibits SK1 to enhance the efficacy of virus replication, demonstrating the presence of virus-specific strategies for modulation of the sphingolipid system. Therefore, investigating the sphingolipid metabolism and signaling in the context of virus replication could help us design innovative therapeutic approaches to improve human health.

  13. 防空武器系统射击概率研究%Research on Firing Probability of Air Defense System

    Institute of Scientific and Technical Information of China (English)

    韩星; 段芳芳; 高剑

    2014-01-01

    Operational effectiveness of an air defense system is an important factor to evaluate advantages and disad-vantage of the system. Through establishing firing probability model of air defense weapon system, firing probability of an anti-aircraft gun and missile integrated air defense system is analyzed, relation between firing probability and air attack intensity and multi-target capability is determined, which can provide design consideration for system designer.%地面防空武器系统作战效能是衡量武器系统优劣的重要因素。本文通过建立防空武器系统射击概率模型,对某弹炮结合防空武器系统射击概率进行分析,明确射击概率与空袭密度和系统同时多目标能力之间的关系,为系统设计人员提供设计依据。

  14. Message framing, it does a body good: effects of message framing and motivational orientation on young women's calcium consumption.

    Science.gov (United States)

    Gerend, Mary A; Shepherd, Melissa A

    2013-10-01

    We investigated the effects of gain-framed versus loss-framed messages and motivational orientation on calcium consumption. After completing a motivational orientation scale (behavioral inhibition system/behavioral activation system), undergraduate women (N = 141) were randomly assigned to read a gain-framed or loss-framed pamphlet promoting calcium consumption. Calcium consumption was assessed 1 month later. For calcium supplement behavior, a gain-framed advantage was observed for behavioral activation system-oriented individuals, whereas a loss-framed advantage was observed for behavioral inhibition system-oriented individuals. For dietary calcium intake, a gain-framed advantage was observed among behavioral activation system-oriented individuals; however, no framing effect emerged for behavioral inhibition system-oriented individuals. The success of framed messages depends on the message recipient's motivational orientation.

  15. Hierarchical message bus-based software architectural style

    Institute of Scientific and Technical Information of China (English)

    张世琨; 王立福; 杨芙清

    2002-01-01

    As the size and complexity of software systems increase,the design and specification of overall system structure become more significant issues than the choice of algorithms and data structures of computation.An appropriate architecture for a system is a key element of its success.Based on the practice of Jadebird software production line,this paper proposes a software architectural style based on hierarchical message buses,named JB/HMB.In this style,the component model consists of external interfaces,static structure and dynamic behavior,which depicts a component from different aspects.Supported by message buses,components interact with one another by messages,which can be used to describe distributed and concurrent systems well.JB/HMB style supports stepwise decomposition and refinement,and runtime system evolution.Finally,characteristics of JB/HMB style are summarized as a conclusion,and future research directions are specified.``

  16. Defensive weapons and defense signals in plants: some metabolites serve both roles.

    Science.gov (United States)

    Maag, Daniel; Erb, Matthias; Köllner, Tobias G; Gershenzon, Jonathan

    2015-02-01

    The defense of plants against herbivores and pathogens involves the participation of an enormous range of different metabolites, some of which act directly as defensive weapons against enemies (toxins or deterrents) and some of which act as components of the complex internal signaling network that insures that defense is timed to enemy attack. Recent work reveals a surprising trend: The same compounds may act as both weapons and signals of defense. For example, two groups of well-studied defensive weapons, glucosinolates and benzoxazinoids, trigger the accumulation of the protective polysaccharide callose as a barrier against aphids and pathogens. In the other direction, several hormones acting in defense signaling (and their precursors and products) exhibit activity as weapons against pathogens. Knowing which compounds are defensive weapons, which are defensive signals and which are both is vital for understanding the functioning of plant defense systems. © 2015 WILEY Periodicals, Inc.

  17. Inflammation and schizophrenia: alterations in cytokine levels and perturbation in antioxidative defense systems.

    Science.gov (United States)

    Al-Asmari, A K; Khan, Md W

    2014-02-01

    Although several theories have been proposed including developmental/neurodegenerative processes, neurotransmitter abnormalities, viral infection, and immune dysfunction, the exact causative factor of schizophrenia is unclear. A relationship between inflammation and schizophrenia has been supported by abnormal cytokine production and altered antioxidant status. This study was aimed to examine the alterations in serum oxidative-antioxidative status and cytokine levels of schizophrenic patients. A total of 91 schizophrenic patients from Saudi Arabia and 50 age- and sex-matched healthy controls were enrolled in the present study. Fresh blood samples were collected to measure the levels of cytokines and markers of oxidative stress by spectrophotometric assays simultaneously. We observed that there was a significant increase in the levels of tumor necrosis factor-α, interleukin (IL)-1β, and IL-6 and a decrease in the levels of interferon-γ. Lipid peroxides are elevated in serum, while total-sulfhydryl levels were decreased. Also, the activities of superoxide dismutase and glutathione peroxidase were decreased, while the activities of catalase, glutathione reductase, and myeloperoxidase were found to be elevated in serum. We conclude that inflammation resulting from dysregulation of cytokines and altered antioxidant systems may play a critical role in the etiology of schizophrenia.

  18. Enhancement of antioxidant defense system by epigallocatechin-3-gallate during bleomycin induced experimental pulmonary fibrosis.

    Science.gov (United States)

    Sriram, Narayanan; Kalayarasan, Srinivasan; Sudhandiran, Ganapasam

    2008-07-01

    Oxidative stress resulting from an imbalance between radical-generating and radical scavenging systems plays an important role in the pathogenesis of pulmonary fibrosis. Epigallocatechin-3-gallate (EGCG), a polyphenol and a major component of green tea, possess a potent antioxidant property. This study was designed to evaluate the potential antioxidative activity of EGCG in the plasma and lungs during bleomycin induced experimental pulmonary fibrosis. Intratracheal administration of bleomycin (6.5 U/kg body weight) to rats resulted in significant reduction of body weight, enzymic antioxidants (superoxide dismutase, catalase, glutathione peroxidase and glutathione reductase) and non-enzymic antioxidants (reduced glutathione, vitamin C, vitamin E and vitamin A). Elevations in lung W/D (wet weight/dry weight) ratio, hydroxyproline content was observed with a synchronized increase in lipid peroxidation markers (thiobarbituric acid reactive substances and hydroperoxides). Intraperitoneal administration of EGCG at a dose of 20 mg/kg body weight significantly improved the body weight, enzymic and non enzymic antioxidants and considerably decreased the W/D ratio, hydroxyproline and lipid peroxidation marker levels. Histological observations also correlated with the biochemical parameters. Thus, this study confirms the beneficial use of EGCG in alleviating the oxidative stress induced during pulmonary fibrosis.

  19. Radiating Messages: An International Perspective.

    Science.gov (United States)

    Walker, Janet

    2003-01-01

    Negative messages about the detrimental impacts of divorce on children prompted urgent calls in the United Kingdom for a reinstatement of traditional family values. Suggests that although the effects of divorce are real, care should be taken to avoid exaggeration, thus moving the debate to one centered on providing better support, advice, and…

  20. Applications of quantum message sealing

    CERN Document Server

    Worley, G G

    2005-01-01

    In 2003, Bechmann-Pasquinucci introduced the concept of quantum seals, a quantum analogue to wax seals used to close letters and envelopes. Since then, some improvements on the method have been found. We first review the current quantum sealing techniques, then introduce and discuss potential applications of quantum message sealing, and conclude with some discussion of the limitations of quantum seals.

  1. Lead tolerance mechanism in Conyza canadensis: subcellular distribution, ultrastructure, antioxidative defense system, and phytochelatins.

    Science.gov (United States)

    Li, Ying; Zhou, Chuifan; Huang, Meiying; Luo, Jiewen; Hou, Xiaolong; Wu, Pengfei; Ma, Xiangqing

    2016-03-01

    We used hydroponic experiments to examine the effects of different concentrations of lead (Pb) on the performance of the Pb-tolerable plant Conyza canadensis. In these experiments, most of the Pb was accumulated in the roots; there was very little Pb accumulated in stems and leaves. C. canadensis is able to take up significant amounts of Pb whilst greatly restricting its transportation to specific parts of the aboveground biomass. High Pb concentrations inhibited plant growth, increased membrane permeability, elevated antioxidant enzyme activity in roots, and caused a significant increase in root H2O2 and malondialdehyde content. Analysis of Pb content at the subcellular level showed that most Pb was associated with the cell wall fraction, followed by the nucleus-rich fraction, and with a minority present in the mitochondrial and soluble fractions. Furthermore, transmission electron microscopy and energy dispersive X-ray analysis of root cells revealed that the cell wall and intercellular space in C. canadensis roots are the main locations of Pb accumulation. Additionally, high Pb concentrations adversely affected the cellular structure of C. canadensis roots. The increased enzyme activity suggests that the antioxidant system may play an important role in eliminating or alleviating Pb toxicity in C. canadensis roots. However, the levels of non-protein sulfhydryl compounds, glutathione, and phytochelatin did not significantly change in either the roots or leaves under Pb-contaminated treatments. Our results provide strong evidence that cell walls restrict Pb uptake into the root and act as an important barrier protecting root cells, while demonstrating that antioxidant enzyme levels are correlated with Pb exposure. These findings demonstrate the roles played by these detoxification mechanisms in supporting Pb tolerance in C. canadensis.

  2. Impact of Contract Bundling and Consolidation on Defense Acquisition System and Defense Industrial Base: The Case of the U.S. Department of the Navy

    Science.gov (United States)

    2012-04-27

    or 39% of the value of such contracts. Next, a group of nine firms—EDO Communications and Countermeasures Systems, Lockheed Martin, Sociedad ...49,437,854.00 5.94% SOCIEDAD ESPAIOLA DE MONTAJES INDUSTRIALES SA $60,000,000.00 7.21% LOCKHEED MARTIN CORPORATION $79,342,491.00 9.54% EDO

  3. 舰载弹炮结合近程武器系统技术研究%Study on Shipped Missile-Gun Integrated Defense Weapon System

    Institute of Scientific and Technical Information of China (English)

    白奕

    2014-01-01

    现代高性能反舰导弹是舰艇末端防御的最大威胁,而舰载弹炮结合近程武器系统为舰艇的末端防御提供了一种有效的途径。分析了舰载弹炮结合近程武器系统的作战使用和主要特点,针对海上空袭武器的特点,重点研究了增强系统抗饱和攻击能力的设计方法,并探讨了舰载弹炮结合近程武器系统在现代海战中的使用方向。%Modern high-powered antiship missile is the main threaten of ship,and shipped missile-gun integrated defense weapon system is an effective way to the terminal defense of ship. This paper first analyzes the combat operation and main characteristic of missile-gun integrated defense weapon system,then studies the key factor of designing a system. At last the system usage is discussed in the modern sea war.

  4. 分布式信息安全防御系统的设计与实现%Design and Realization of Distributed Information Security Defense System

    Institute of Scientific and Technical Information of China (English)

    王国鑫; 朱宪花

    2012-01-01

    In allusion to the United Threat Management(UTM)'s problems of single point failure and stability of equipment etc., a distributed information security defense system is designed. This system is tree multi-level management structure, it can be divided into three parts, including proactive defense platform, monitoring nodes and host monitoring module. They separately undertake different information system defense tasks. So it can effectively relieve the safety management burden of the gateway, thus solve the problems of single point failure and system stability. This helps to solve hybrid network security threats.%针对统一威胁管理(UTM)的单点失效、设备稳定性等问题,设计一种分布式信息安全防御系统.该系统为树形多级管理结构,可分为主动防御平台、监控节点、主机监控模块3个部分,分别承担不同的信息系统防御任务.实验结果表明,该系统可有效地减轻网关处的安全管理负担,解决单点失效及系统稳定性问题,适用于防御混合型网络安全威胁.

  5. Message from the Editor

    OpenAIRE

    Haque, Abida K.; Samadani, Ayaz M.; Syed, Labiq Hossain; Ahmed, Syed; Abdel-Ghany, Naima; Nadeemullah, Mohammad; Zahir, Khalique; Bawani, Mohammad H.; Bawany, Muhammed Z.; Akmal, Mohammad; Arutyounian, N.; Kaptein, Elain M.; Khan, Sumiya; Saeed, Ziena; Diwan, Hanifa Hameed

    2011-01-01

    Objective: To study the prevalence of cardiac and pulmonary and other organ system diseases in obese patients. For the past several decades, the global prevalence of obesity has been rising, with the greatest increase seen in the United States. Recent data indicate that 190 million Americans are either obese or overweight. The treatment of obesity-related diseases is estimated to be $147 billion a year. Between 280,000 and 325,000 deaths annually are attributable to obesity. Left ventricular ...

  6. Representing culture in interstellar messages

    Science.gov (United States)

    Vakoch, Douglas A.

    2008-09-01

    As scholars involved with the Search for Extraterrestrial Intelligence (SETI) have contemplated how we might portray humankind in any messages sent to civilizations beyond Earth, one of the challenges they face is adequately representing the diversity of human cultures. For example, in a 2003 workshop in Paris sponsored by the SETI Institute, the International Academy of Astronautics (IAA) SETI Permanent Study Group, the International Society for the Arts, Sciences and Technology (ISAST), and the John Templeton Foundation, a varied group of artists, scientists, and scholars from the humanities considered how to encode notions of altruism in interstellar messages art_science/2003>. Though the group represented 10 countries, most were from Europe and North America, leading to the group's recommendation that subsequent discussions on the topic should include more globally representative perspectives. As a result, the IAA Study Group on Interstellar Message Construction and the SETI Institute sponsored a follow-up workshop in Santa Fe, New Mexico, USA in February 2005. The Santa Fe workshop brought together scholars from a range of disciplines including anthropology, archaeology, chemistry, communication science, philosophy, and psychology. Participants included scholars familiar with interstellar message design as well as specialists in cross-cultural research who had participated in the Symposium on Altruism in Cross-cultural Perspective, held just prior to the workshop during the annual conference of the Society for Cross-cultural Research . The workshop included discussion of how cultural understandings of altruism can complement and critique the more biologically based models of altruism proposed for interstellar messages at the 2003 Paris workshop. This paper, written by the chair of both the Paris and Santa Fe workshops, will explore the challenges of communicating concepts of altruism that draw on both biological and cultural models.

  7. CADMIUM AND NICKEL COMBINED EFFECT ON ASCORBATE-DEPENDENT MECHANISM OF ANTIOXIDATIVE DEFENSE SYSTEM OF PEA

    Directory of Open Access Journals (Sweden)

    T. A. Artiushenko

    2014-04-01

    towards control level, i.e. there is a significant induction of the synthesis process. In addition, the amount of ascorbate oxidized forms, as in previous research period, continued to increase. After 24 hours of experiment we registered similar to 12 hours trend of changes in the content of ascorbic acid metabolites. Violation of pro-/antioxidant balance also accompanied by increased ascorbate peroxidase activity. In the pea root system there is the tendency to increase the ascorbate peroxidase activity and this is in concordance with the increasing content of ascorbic and dehydroascorbate acids. At the beginning of stressful activities caused by cadmium and nickel compounds in the leaves is not the case of ascorbate peroxidase activity changes, although 7-hour influence resulted in a statistically significant increase in activity specified oxidoreductase. By the action of heavy metals in low concentrations the content of ascorbic acid in pea leaves increased by 14%. High content in the medium of at least one of the metals since 7-hour exposure caused the depletion of antioxidant resources, as evidenced by the decrease of ascorbic acid in the assimilation organs. After 24 hours of experiment we observed a slowdown in ascorbate peroxidase activity, which could be explained by the lack of ascorbic acid under prolonged stress exposure. Keywords: Pisum sativum L., cadmium, nickel, ascorbic acid, ascorbate peroxidase.

  8. [The condition of the system "peroxide oxidation of lipids-antioxidant defense" in mixed saliva of patients with chronic generalized periodontitis].

    Science.gov (United States)

    Butiyugin, I A; Volchegorskiy, I A

    2014-02-01

    The comparative analysis was made concerning conditions of the system "Peroxide oxidation of lipids-antioxidant defenses in mixed saliva of patients with chronic disseminated periodontitis of light (n = 45), mean (n = 36) and severe (n = 18) degrees. The control group consisted of 25 clinically healthy persons with intact periodontium. The study revealed that in comparison with control group, in patients with chronic disseminated periodontitis occurred an increasing of content of heptane-soluble diene conjugates, isopropanol-soluble ketodienes and conjugated trienes, ceruloplasmin and a decreasing of level of alpha-tocopherol, especially under severe degree of disease. The study also established a non-linear U-dependence between indicators of the system "Peroxide oxidation of lipids-antioxidant defenses" in mixed saliva and severity of affection of tissues of periodontium in patients with chronic disseminated dermatosis.

  9. A Decision Support System for Identifying and Ranking Critical Habitat Parcels on and in the Vicinity of Department of Defense Installations

    Science.gov (United States)

    2011-01-01

    DOD Department of Defense DBH Diameter at Breast Height DEM Digital Elevation Model DSS Decision Support System DTM Digital Terrain...Typically a 200 foot buffer is marked around the set of cavity trees belonging to a woodpecker group (termed a cavity tree cluster), and within...girdling trees with wire, burying cable, firing artillery within 600 feet and using anything that produces excessive disturbance (e.g., noise

  10. The Development and Inter-Rater Reliability of the Department of Defense Human Factors Analysis and Classification System, Version 7.0

    Science.gov (United States)

    2015-04-09

    human factors ” are causal in a majority of military mishaps. This report also reports on a Department of Defense (DoD) effort to improve the system...used to categorize causal and contributing human factors . Specifically, recent attempts to improve coding methods with the goal of achieving better...only as causal . Factor – Any deviation, out-of-the-ordinary, or deficient action or condition discovered in the course of a mishap investigation

  11. 基于NS3的分布式消息系统 Kafka的仿真实现%Simulate and Implement of Kafka distributed message system based on NS3

    Institute of Scientific and Technical Information of China (English)

    马浩然

    2015-01-01

    As data has penetrated into most fields of our life,the use of Data mining is more frequently. Distributed messaging system, which shares data on message basis,become the core technology gradually. With the extreme growing of information recently, the traditional system which focus on small account of data, cannot meet our demands for data processing. A high-throughput distributed messaging system with the function of real-time consumption become necessary. Kafka is such arequirement. This paper summarizes the characteristics and framework design of Kafka, then modelswith the network simulator tool NS3 and simulates the behavior of actual system, at last make conclusion through analysis the simu-lation result in order to realize and evaluate Kafka.%在数据已渗透到我们生活的各个领域的时代,人们对于数据的挖掘和使用愈发频繁。作为以消息为单位进行数据共享的分布式架构,分布式消息系统成为数据处理的核心技术。传统的分布式消息系统大多用于处理数据量小的关键性数据,然而在信息剧增的今天,人们对信息的关注领域在不断扩大,挖掘的信息量在不断增多,传统的消息处理架构已不能满足我们对数据的处理需求,一个高吞吐量,可实时消费的高性能分布式消息系统成为必需。Kafka 即是一种处理海量数据的分布式消息系统[1]。本文总结了Kafka系统的特征和架构策略,对其进行抽象建模,通过网络仿真工具NS3[2],设计实际系统的场景部署,最后运行仿真系统,得出数据并分析,以帮助我们理解和评估Kafka分布式消息系统。

  12. Toward Predicting Popularity of Social Marketing Messages

    Science.gov (United States)

    Yu, Bei; Chen, Miao; Kwok, Linchi

    Popularity of social marketing messages indicates the effectiveness of the corresponding marketing strategies. This research aims to discover the characteristics of social marketing messages that contribute to different level of popularity. Using messages posted by a sample of restaurants on Facebook as a case study, we measured the message popularity by the number of "likes" voted by fans, and examined the relationship between the message popularity and two properties of the messages: (1) content, and (2) media type. Combining a number of text mining and statistics methods, we have discovered some interesting patterns correlated to "more popular" and "less popular" social marketing messages. This work lays foundation for building computational models to predict the popularity of social marketing messages in the future.

  13. Construction of the Disciplinary System of Defense S & T Information Science & Its Core Field Research%装备科技情报学科体系构筑与核心领域研究

    Institute of Scientific and Technical Information of China (English)

    符福峘

    2003-01-01

    Five issues regarding the construction of the disciplinary system of defense S & T information science are discussed, i. e. the concept and the research subject; the basic factors; the research object and major fields; the na-ture and academic position; and the function and mission. It's pointed out that strengthening the research on the theoreti-cal system of defense S & T information science and using this system to guide information practice and promote the devel-opment of defense S & T information undertakings are of great significance.

  14. Language Models for Handwritten Short Message Services

    CERN Document Server

    Prochasson, Emmanuel Ep; Morin, Emmanuel

    2009-01-01

    Handwriting is an alternative method for entering texts composing Short Message Services. However, a whole new language features the texts which are produced. They include for instance abbreviations and other consonantal writing which sprung up for time saving and fashion. We have collected and processed a significant number of such handwriting SMS, and used various strategies to tackle this challenging area of handwriting recognition. We proposed to study more specifically three different phenomena: consonant skeleton, rebus, and phonetic writing. For each of them, we compare the rough results produced by a standard recognition system with those obtained when using a specific language model.

  15. Salicylic acid mediates antioxidant defense system and ABA pathway related gene expression in Oryza sativa against quinclorac toxicity.

    Science.gov (United States)

    Wang, Jian; Lv, Mengting; Islam, Faisal; Gill, Rafaqat A; Yang, Chong; Ali, Basharat; Yan, Guijun; Zhou, Weijun

    2016-11-01

    The auxin herbicide quinclorac is widely used for controlling weeds in transplanted and direct-seeded rice fields. However, its phytotoxic responses on rice are still unknown. Therefore, in the present investigation we studied the effects of different concentrations (0, 0.1 and 0.5g/L) of quinclorac herbicide on the physiological and biochemical changes of two rice cultivars (XS 134 and ZJ 88) and further analyzed the ameliorating role of salicylic acid (SA) on quinclorac toxicity in rice plants. The results revealed that exogenous application of SA significantly increased plant biomass and total chlorophyll contents in herbicide stressed plants. The lipid peroxidation and ROS (H2O2, O2(-.), (-)OH) production were significantly increased in roots and leaves of both rice cultivars under quinclorac stress, demonstrating an oxidative burst in rice plants. Whereas, application of SA significantly lowered ROS contents under quinclorac stress. Further, exogenous SA treatment significantly modulated antioxidant enzymes and enhanced GSH concentration in stress plants. Anatomical observations of leaf and root revealed that herbicide affected internal structures, while SA played a vital role in protection from toxic effects. Expression analysis of stress hormone ABA genes (OsABA8oxs, OsNCEDs) revealed that quinclorac application enhanced stress condition in cultivar ZJ 88, while SA treatment downregulated ABA genes more in cultivar XS 134, which correlated with the enhanced tolerance to quinclorac induced oxidative stress in this cultivar. The present study delineated that SA played a critical role under quinclorac stress in both rice cultivars by regulating antioxidant defense system, reducing ROS formation and preventing the degradation of internal cell organelles.

  16. Effects of Dietary Lycopene Supplementation on Plasma Lipid Profile, Lipid Peroxidation and Antioxidant Defense System in Feedlot Bamei Lamb

    Science.gov (United States)

    Jiang, Hongqin; Wang, Zhenzhen; Ma, Yong; Qu, Yanghua; Lu, Xiaonan; Luo, Hailing

    2015-01-01

    Lycopene, a red non-provitamin A carotenoid, mainly presenting in tomato and tomato byproducts, has the highest antioxidant activity among carotenoids because of its high number of conjugated double bonds. The objective of this study was to investigate the effect of lycopene supplementation in the diet on plasma lipid profile, lipid peroxidation and antioxidant defense system in feedlot lamb. Twenty-eight Bamei male lambs (90 days old) were divided into four groups and fed a basal diet (LP0, 40:60 roughage: concentrate) or the basal diet supplemented with 50, 100, and 200 mg/kg lycopene. After 120 days of feeding, all lambs were slaughtered and sampled. Dietary lycopene supplementation significantly reduced the levels of plasma total cholesterol (p0.05). The levels of TG (p<0.001) and LDL-C (p<0.001) were decreased with the feeding time extension, and both showed a linear trend (p<0.01). Malondialdehyde level in plasma and liver decreased linearly with the increase of lycopene inclusion levels (p<0.01). Dietary lycopene intake linearly increased the plasma antioxidant vitamin E level (p<0.001), total antioxidant capacity (T-AOC, p<0.05), and activities of catalase (CAT, p<0.01), glutathione peroxidase (GSH-Px, p<0.05) and superoxide dismutase (SOD, p<0.05). The plasma T-AOC and activities of GSH-Px and SOD decreased with the extension of the feeding time. In liver, dietary lycopene inclusion showed similar antioxidant effects with respect to activities of CAT (p<0.05, linearly) and SOD (p<0.001, linearly). Therefore, it was concluded that lycopene supplementation improved the antioxidant status of the lamb and optimized the plasma lipid profile, the dosage of 200 mg lycopene/kg feed might be desirable for growing lambs to prevent environment stress and maintain normal physiological metabolism. PMID:26104400

  17. Beta-carotene reduces oxidative stress, improves glutathione metabolism and modifies antioxidant defense systems in lead-exposed workers

    Energy Technology Data Exchange (ETDEWEB)

    Kasperczyk, Sławomir, E-mail: kaslav@mp.pl [Dept. of Biochemistry, School of Medicine with the Division of Dentistry, Medical University of Silesia, ul. Jordana 19, 41-808 Zabrze (Poland); Dobrakowski, Michał [Dept. of Biochemistry, School of Medicine with the Division of Dentistry, Medical University of Silesia, ul. Jordana 19, 41-808 Zabrze (Poland); Kasperczyk, Janusz [Dept. of Environmental Medicine and Epidemiology, School of Medicine with the Division of Dentistry, Medical University of Silesia, ul. Jordana 19, 41-808 Zabrze (Poland); Ostałowska, Alina; Zalejska-Fiolka, Jolanta; Birkner, Ewa [Dept. of Biochemistry, School of Medicine with the Division of Dentistry, Medical University of Silesia, ul. Jordana 19, 41-808 Zabrze (Poland)

    2014-10-01

    The aim of this study was to determine whether beta-carotene administration reduces oxidative stress and influences antioxidant, mainly glutathione-related, defense systems in workers chronically exposed to lead. The population consisted of two randomly divided groups of healthy male volunteers exposed to lead. Workers in the first group (reference group) were not administered any antioxidants, while workers in the second group (CAR group) were treated orally with 10 mg of beta-carotene once a day for 12 weeks. Biochemical analysis included measuring markers of lead-exposure and oxidative stress in addition to the levels and activities of selected antioxidants. After treatment, levels of malondialdehyde, lipid hydroperoxides and lipofuscin significantly decreased compared with the reference group. However, the level of glutathione significantly increased compared with the baseline. Treatment with beta-carotene also resulted in significantly decreased glutathione peroxidase activity compared with the reference group, while the activities of other glutathione-related enzymes and of superoxide dismutase were not significantly changed. However, the activities of glucose-6-phosphate dehydrogenase and catalase, as well as the level of alpha-tocopherol, were significantly higher after treatment compared with the baseline. Despite controversy over the antioxidant properties of beta-carotene in vivo, our findings showed reduced oxidative stress after beta-carotene supplementation in chronic lead poisoning. - Highlights: • Beta-carotene reduces oxidative stress in lead-exposed workers. • Beta-carotene elevates glutathione level in lead-exposed workers. • Beta-carotene administration could be beneficial in lead poisoning.

  18. Cultivated sea lettuce is a multiorgan protector from oxidative and inflammatory stress by enhancing the endogenous antioxidant defense system.

    Science.gov (United States)

    Ratnayake, Ranjala; Liu, Yanxia; Paul, Valerie J; Luesch, Hendrik

    2013-09-01

    The health-promoting effects of seaweeds have been linked to antioxidant activity that may counteract cancer-causing oxidative stress-induced damage and inflammation. Although antioxidant activity is commonly associated with direct radical scavenging activity, an alternative way to increase the antioxidant status of a cell is to enhance the endogenous (phase II) defense system consisting of cytoprotective antioxidant enzymes, including NAD(P)H:quinone oxidoreductase 1 (NQO1). These enzymes are transcriptionally regulated by the antioxidant response element (ARE) via the transcription factor Nrf2. Extracts derived from cultivated Ulva sp., a green alga regarded as a marine vegetable (sea lettuce), potently activated the Nrf2-ARE pathway in IMR-32 neuroblastoma and LNCaP prostate cancer cells. RNA interference studies showed that Nrf2 and phosphoinositide 3-kinase (PI3K) are essential for the phase II response in IMR-32 cells. Activity-enriched fractions induced Nrf2 nuclear translocation and target gene transcription, and boosted the cellular glutathione level and therefore antioxidant status. A single-dose gavage feeding of Ulva-derived fractions increased Nqo1 transcript levels in various organs. Nqo1 induction spiked in different tissues, depending on the specific chemical composition of each administered fraction. We purified and characterized four ARE inducers in this extract, including loliolide (1), isololiolide (2), a megastigmen (3), and a novel chlorinated unsaturated aldehyde (4). The ARE-active fractions attenuated lipopolysaccharide-induced iNOS and Cox2 gene expression in macrophagic RAW264.7 cells, decreasing nitric oxide (NO) and prostaglandin E2 (PGE2) production, respectively. Nqo1 activity and NO production were abrogated in nrf2(-/-) mouse embryonic fibroblasts, providing a direct link between the induction of phase II response and anti-inflammatory activity.

  19. Variations in Growth, Photosynthesis and Defense System Among Four Weed Species Under Increased UV-B Radiation

    Institute of Scientific and Technical Information of China (English)

    Shiwen Wang; Liusheng Duan; Anthony Egrinya Eneji; Zhaohu Li

    2007-01-01

    Weed tolerance of UV-B radiation varies with species, and the radiation could affect weed ecology and management.Variations in growth, photosynthesis and defense system among four important agronomic weeds, Abutilon theophrasti Medik, Amaranthus retroflexus L., Digitaria sangulnalis (L.) Scop and Chloris virgata Swartz, under increased UV-B radiation (ambient and increased radiation at 2.7, 5.4 and 10.8 kJ·m-2·d-1) were studied in the greenhouse experiment. After 2 weeks of radiation, the shoots' dry mass decreased with increasing UV-B radiation except for D. sanguinalis. The reduction in biomass was the result of changes in morphology and physiology.Higher levels of UV-B treatment decreased the leaf area, plant height, net photosynthetic rate and chlorophyll contents, while it increased the contents of wax and UV-B absorbing compound in all species, except for A. retroflexus,which did not increase significantly. The activity of superoxide dismutase, catalase, ascorbate peroxide and the content of ascorbic acid changed differently among the weed species as UV-B radiation increased. D. sanguinalis was the most tolerant and A. retroflexus the most sensitive to increased UV-B radiation. The results also show that the two grass species (D. sanguinalis and C. virgata) were more tolerant to UV-B radiation than the two broadleafed species (A. theophrasti and A. retroflexus). The UV-B absorbing compound and leaf wax played important roles against UV-B damages in the two grass weeds. The overall results suggest that weed community, competition and management will be altered by continuous ozone depletion.

  20. Role of 9-Lipoxygenase and α-Dioxygenase Oxylipin Pathways as Modulators of Local and Systemic Defense

    Institute of Scientific and Technical Information of China (English)

    Jorge Vicente; Tomás Cascón; Begonya Vicedo; Pilar García-Agustín; Mats Hamberg; Carmen Castresana

    2012-01-01

    Plant 9-lipoxygenases(9-LOX)and α-dioxygenases(α-DOX)initiate the synthesis of oxylipins after bacterial infection.Here,the role of these enzymes in plants' defense was investigated using individual Arabidopsis thaliana lox1 and dox1 mutants and a double lox1 dox1 mutant.Studies with Pseudomonas syringae pv.tomato(Pst)revealed the enhanced susceptibility of lox1 to the virulent strain Pst DC3000 and the partial impairment of lox1 and dox1 mutants to activate systemic acquired resistance.Notably,both defects were enhanced in the lox1 dox1 plants as compared with individual mutants.We found that pre-treatment with 9-LOX- and α-DOX-generated oxylipins protected plant tissues against bacterial infection.The strongest effect in this respect was exerted by 9-ketooctadecatrienoic acid(9-KOT),which is produced from linolenic acid by 9-LOX.Quantification of 9-KOT revealed its accumulation after bacterial infection.The levels were reduced in lox1 and lox1 dox1 plants but strongly increased in the dox1 mutant due to metabolic interaction of the two pathways.Transcriptional analyses indicated that 9-KOT pre-treatment modifies hormone homeostasis during bacterial infection.The nature of the changes detected suggested that 9-KOT interferes with the hormonal changes caused by bacterial effectors.This notion was substantiated by the finding that 9-KOT failed to reduce the growth of PstDC3000hrpA,a mutant compromised in effector secretion,and of the avirulent strain Pst DC3000 avrRpm1.Further support for the action of the 9-LOX- and α-DOX-oxylipin pathways as modulators of hormone homeostasis was the observation that lox1 dox1 seedlings are hypersensitive to the growth-inhibitory effect of ABA and showed enhanced activation of ABA-inducible marker genes as compared with wild-type plants.