34 research outputs found

    Understanding the need for digital twins’ data in patient advocacy and forecasting oncology

    Get PDF
    Digital twins are made of a real-world component where data is measured and a virtual component where those measurements are used to parameterize computational models. There is growing interest in applying digital twins-based approaches to optimize personalized treatment plans and improve health outcomes. The integration of artificial intelligence is critical in this process, as it enables the development of sophisticated disease models that can accurately predict patient response to therapeutic interventions. There is a unique and equally important application of AI to the real-world component of a digital twin when it is applied to medical interventions. The patient can only be treated once, and therefore, we must turn to the experience and outcomes of previously treated patients for validation and optimization of the computational predictions. The physical component of a digital twins instead must utilize a compilation of available data from previously treated cancer patients whose characteristics (genetics, tumor type, lifestyle, etc.) closely parallel those of a newly diagnosed cancer patient for the purpose of predicting outcomes, stratifying treatment options, predicting responses to treatment and/or adverse events. These tasks include the development of robust data collection methods, ensuring data availability, creating precise and dependable models, and establishing ethical guidelines for the use and sharing of data. To successfully implement digital twin technology in clinical care, it is crucial to gather data that accurately reflects the variety of diseases and the diversity of the population

    WHOI Hawaii Ocean Timeseries Station (WHOTS) : WHOTS-10 2013 mooring turnaround cruise report

    Get PDF
    The Woods Hole Oceanographic Institution (WHOI) Hawaii Ocean Timeseries Site (WHOTS), 100 km north of Oahu, Hawaii, is intended to provide long-term, high-quality air-sea fluxes as a part of the NOAA Climate Observation Program. The WHOTS mooring also serves as a coordinated part of the Hawaii Ocean Timeseries (HOT) program, contributing to the goals of observing heat, fresh water and chemical fluxes at a site representative of the oligotrophic North Pacific Ocean. The approach is to maintain a surface mooring outfitted for meteorological and oceanographic measurements at a site near 22.75°N, 158°W by successive mooring turnarounds. These observations will be used to investigate air–sea interaction processes related to climate variability. This report documents recovery of the ninth WHOTS mooring (WHOTS-9) and deployment of the tenth mooring (WHOTS-10). Both moorings used Surlyn foam buoys as the surface element and were outfitted with two Air–Sea Interaction Meteorology (ASIMET) systems. Each ASIMET system measures, records, and transmits via Argos satellite the surface meteorological variables necessary to compute air–sea fluxes of heat, moisture and momentum. The upper 155 m of the moorings were outfitted with oceanographic sensors for the measurement of temperature, conductivity and velocity in a cooperative effort with R. Lukas of the University of Hawaii. A pCO2 system and ancillary sensors were installed on the buoys in cooperation with Chris Sabine at the Pacific Marine Environmental Laboratory. A set of radiometers were installed in cooperation with Sam Laney at WHOI. The WHOTS mooring turnaround was done on the NOAA ship Hi’ialakai by the Upper Ocean Processes Group of the Woods Hole Oceanographic Institution. The cruise took place between 9 and 16 July 2013. Operations began with deployment of the WHOTS-10 mooring on 10 July. This was followed by meteorological intercomparisons and CTDs. Recovery of the WHOTS-9 mooring took place on 14 July. This report describes these cruise operations, as well as some of the in-port operations and pre-cruise buoy preparations.Funding was provided by the National Oceanic and Atmospheric Administration under Grant. No. NA090AR4320129 and the Cooperative Institute for the North Atlantic Region (CINAR

    WHOI Hawaii Ocean Timeseries Station (WHOTS): WHOTS-11 2014 mooring Turnaround Cruise Report

    Get PDF
    The Woods Hole Oceanographic Institution (WHOI) Hawaii Ocean Timeseries Site (WHOTS), 100 km north of Oahu, Hawaii, is intended to provide long-term, high-quality air-sea fluxes as a part of the NOAA Climate Observation Program. The WHOTS mooring also serves as a coordinated part of the Hawaii Ocean Timeseries (HOT) program, contributing to the goals of observing heat, fresh water and chemical fluxes at a site representative of the oligotrophic North Pacific Ocean. The approach is to maintain a surface mooring outfitted for meteorological and oceanographic measurements at a site near 22.75°N, 158°W by successive mooring turnarounds. These observations will be used to investigate air–sea interaction processes related to climate variability. This report documents recovery of the tenth WHOTS mooring (WHOTS-10) and deployment of the eleventh mooring (WHOTS-11). Both moorings used Surlyn foam buoys as the surface element and were outfitted with two Air–Sea Interaction Meteorology (ASIMET) systems. Each ASIMET system measures, records, and transmits via Argos satellite the surface meteorological variables necessary to compute air–sea fluxes of heat, moisture and momentum. The upper 155 m of the moorings were outfitted with oceanographic sensors for the measurement of temperature, conductivity and velocity in a cooperative effort with R. Lukas of the University of Hawaii. A pCO2 system and ancillary sensors were installed on the buoys in cooperation with Chris Sabine at the Pacific Marine Environmental Laboratory. A set of radiometers were installed in cooperation with Sam Laney at WHOI. The WHOTS mooring turnaround was done on the NOAA ship Hi’ialakai by the Upper Ocean Processes Group of the Woods Hole Oceanographic Institution. The cruise took place between 15 and 23 July 2014. Operations began with deployment of the WHOTS-11 mooring on 16 July. This was followed by meteorological intercomparisons and CTDs. Recovery of the WHOTS-10 mooring took place on 20 July. This report describes these cruise operations, as well as some of the in-port operations and pre-cruise buoy preparations.Funding was provided by the National Oceanic and Atmospheric Administration under Grant No. NA140AR4320158 and the Cooperative Institute for the North Atlantic Region (CINAR

    Mammalian cell expression, purification, crystallization and microcrystal data collection of autotaxin/ENPP2, a secreted mammalian glycoprotein

    Get PDF
    Autotaxin, a four-domain ∌100 kDa mammalian glycoprotein, was expressed in stably transfected mammalian cells, purified from the medium and crystallized. Diffraction data from micrometre-thick crystal plates were collected on various European synchrotron beamlines and are presented and analysed

    The James Webb Space Telescope Mission

    Full text link
    Twenty-six years ago a small committee report, building on earlier studies, expounded a compelling and poetic vision for the future of astronomy, calling for an infrared-optimized space telescope with an aperture of at least 4m4m. With the support of their governments in the US, Europe, and Canada, 20,000 people realized that vision as the 6.5m6.5m James Webb Space Telescope. A generation of astronomers will celebrate their accomplishments for the life of the mission, potentially as long as 20 years, and beyond. This report and the scientific discoveries that follow are extended thank-you notes to the 20,000 team members. The telescope is working perfectly, with much better image quality than expected. In this and accompanying papers, we give a brief history, describe the observatory, outline its objectives and current observing program, and discuss the inventions and people who made it possible. We cite detailed reports on the design and the measured performance on orbit.Comment: Accepted by PASP for the special issue on The James Webb Space Telescope Overview, 29 pages, 4 figure

    Experimental security analysis of a modern automobile

    No full text
    Abstract—Modern automobiles are no longer mere mechanical devices; they are pervasively monitored and controlled by dozens of digital computers coordinated via internal vehicular networks. While this transformation has driven major advancements in efficiency and safety, it has also introduced a range of new potential risks. In this paper we experimentally evaluate these issues on a modern automobile and demonstrate the fragility of the underlying system structure. We demonstrate that an attacker who is able to infiltrate virtually any Electronic Control Unit (ECU) can leverage this ability to completely circumvent a broad array of safety-critical systems. Over a range of experiments, both in the lab and in road tests, we demonstrate the ability to adversarially control a wide range of automotive functions and completely ignore driver input — including disabling the brakes, selectively braking individual wheels on demand, stopping the engine, and so on. We find that it is possible to bypass rudimentary network security protections within the car, such as maliciously bridging between our car’s two internal subnets. We also present composite attacks that leverage individual weaknesses, including an attack that embeds malicious code in a car’s telematics unit and that will completely erase any evidence of its presence after a crash. Looking forward, we discuss the complex challenges in addressing these vulnerabilities while considering the existing automotive ecosystem. Keywords—Automobiles, communication standards, communication system security, computer security, data buses. I

    Botcoin: Monetizing Stolen Cycles

    No full text
    Abstract—At the current stratospheric value of Bitcoin, miners with access to significant computational horsepower are literally printing money. For example, the first operator of a USD $1,500 custom ASIC mining platform claims to have recouped his investment in less than three weeks in early February 2013, and the value of a bitcoin has more than tripled since then. Not surprisingly, cybercriminals have also been drawn to this potentially lucrative endeavor, but instead are leveraging the resources available to them: stolen CPU hours in the form of botnets. We conduct the first comprehensive study of Bitcoin mining malware, and describe the infrastructure and mechanism deployed by several major players. By carefully reconstructing the Bitcoin transaction records, we are able to deduce the amount of money a number of mining botnets have made. Permission to freely reproduce all or part of this paper for noncommercial purposes is granted provided that copies bear this notice and the full citation on the first page. Reproduction for commercial purposes is strictly prohibited without the prior written consent of the Internet Society, the first-named author (for reproduction of an entire paper only), and the author’s employer if the paper was prepared within the scope of employment
    corecore