376 research outputs found

    Algorithms Used to Update State Soil Survey

    Get PDF
    While seasonal weather can be the difference between a good and a bad harvest, it is the soil that moderates the long-term productivity of a field. The inherent properties of soils are vital to know when it comes to management practices on any agricultural landscape

    SciTokens: Capability-Based Secure Access to Remote Scientific Data

    Full text link
    The management of security credentials (e.g., passwords, secret keys) for computational science workflows is a burden for scientists and information security officers. Problems with credentials (e.g., expiration, privilege mismatch) cause workflows to fail to fetch needed input data or store valuable scientific results, distracting scientists from their research by requiring them to diagnose the problems, re-run their computations, and wait longer for their results. In this paper, we introduce SciTokens, open source software to help scientists manage their security credentials more reliably and securely. We describe the SciTokens system architecture, design, and implementation addressing use cases from the Laser Interferometer Gravitational-Wave Observatory (LIGO) Scientific Collaboration and the Large Synoptic Survey Telescope (LSST) projects. We also present our integration with widely-used software that supports distributed scientific computing, including HTCondor, CVMFS, and XrootD. SciTokens uses IETF-standard OAuth tokens for capability-based secure access to remote scientific data. The access tokens convey the specific authorizations needed by the workflows, rather than general-purpose authentication impersonation credentials, to address the risks of scientific workflows running on distributed infrastructure including NSF resources (e.g., LIGO Data Grid, Open Science Grid, XSEDE) and public clouds (e.g., Amazon Web Services, Google Cloud, Microsoft Azure). By improving the interoperability and security of scientific workflows, SciTokens 1) enables use of distributed computing for scientific domains that require greater data protection and 2) enables use of more widely distributed computing resources by reducing the risk of credential abuse on remote systems.Comment: 8 pages, 6 figures, PEARC '18: Practice and Experience in Advanced Research Computing, July 22--26, 2018, Pittsburgh, PA, US

    3D Tracking via Body Radio Reflections

    Get PDF
    This paper introduces WiTrack, a system that tracks the 3D motion of a user from the radio signals reflected off her body. It works even if the person is occluded from the WiTrack device or in a different room. WiTrack does not require the user to carry any wireless device, yet its accuracy exceeds current RF localization systems, which require the user to hold a transceiver. Empirical measurements with a WiTrack prototype show that, on average, it localizes the center of a human body to within 10 to 13 cm in the x and y dimensions, and 21 cm in the z dimension. It also provides coarse tracking of body parts, identifying the direction of a pointing hand with a median of 11.2 degrees. WiTrack bridges a gap between RF-based localization systems which locate a user through walls and occlusions, and human-computer interaction systems like WiTrack, which can track a user without instrumenting her body, but require the user to stay within the direct line of sight of the device

    Assessing Quantitative and Qualitative Approaches to Measure Program Outcomes in Human Service Organizations

    Get PDF
    Leadership and organizational performance are interconnected, and in many cases the two go hand in hand. In nonprofit organizations, leaders are expected to guide and produce positive program outcomes that reflect the mission of the organization. One problem nonprofit leaders face, however, is how to measure program outcomes. What metrics, including impact measurement and performance measurement, of outcomes are available for nonprofit leaders to use? How does a leader know if his or her nonprofit is performing well? Are there any new frameworks or models to consider that may help with this problem? This paper addresses these questions by exploring the nonprofit literature on performance measurement specific to human service organizations. In addition, the paper creates three frameworks that can be used by nonprofit leaders to help measure their program outcomes

    A dosimetric comparison of four treatment planning methods for high grade glioma

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>High grade gliomas (HGG) are typically treated with a combination of surgery, radiotherapy and chemotherapy. Three dimensional (3D) conformal radiotherapy treatment planning is still the main stay of treatment for these patients. New treatment planning methods suggest better dose distributions and organ sparing but their clinical benefit is unclear. The purpose of the current study was to compare normal tissue sparing and tumor coverage using four different radiotherapy planning methods in patients with high grade glioma.</p> <p>Methods</p> <p>Three dimensional conformal (3D), sequential boost IMRT, integrated boost (IB) IMRT and Tomotherapy (TOMO) treatment plans were generated for 20 high grade glioma patients. T1 and T2 MRI abnormalities were used to define GTV and CTV with 2 and 2.5 cm margins to define PTV1 and PTV2 respectively.</p> <p>Results</p> <p>The mean dose to PTV2 but not to PTV1 was less then 95% of the prescribed dose with IB and IMRT plans. The mean doses to the optic chiasm and the ipsilateral globe were highest with 3D plans and least with IB plans. The mean dose to the contralateral globe was highest with TOMO plans. The mean of the integral dose (ID) to the brain was least with the IB plan and was lower with IMRT compared to 3D plans. The TOMO plans had the least mean D10 to the normal brain but higher mean D50 and D90 compared to IB and IMRT plans. The mean D10 and D50 but not D90 were significantly lower with the IMRT plans compared to the 3D plans.</p> <p>Conclusion</p> <p>No single treatment planning method was found to be superior to all others and a personalized approach is advised for planning and treating high-grade glioma patients with radiotherapy. Integral dose did not reflect accurately the dose volume histogram (DVH) of the normal brain and may not be a good indicator of delayed radiation toxicity.</p

    Flexible Session Management in a Distributed Environment

    Full text link
    Many secure communication libraries used by distributed systems, such as SSL, TLS, and Kerberos, fail to make a clear distinction between the authentication, session, and communication layers. In this paper we introduce CEDAR, the secure communication library used by the Condor High Throughput Computing software, and present the advantages to a distributed computing system resulting from CEDAR's separation of these layers. Regardless of the authentication method used, CEDAR establishes a secure session key, which has the flexibility to be used for multiple capabilities. We demonstrate how a layered approach to security sessions can avoid round-trips and latency inherent in network authentication. The creation of a distinct session management layer allows for optimizations to improve scalability by way of delegating sessions to other components in the system. This session delegation creates a chain of trust that reduces the overhead of establishing secure connections and enables centralized enforcement of system-wide security policies. Additionally, secure channels based upon UDP datagrams are often overlooked by existing libraries; we show how CEDAR's structure accommodates this as well. As an example of the utility of this work, we show how the use of delegated security sessions and other techniques inherent in CEDAR's architecture enables US CMS to meet their scalability requirements in deploying Condor over large-scale, wide-area grid systems
    • …
    corecore