2,805 research outputs found

    Factors influencing offspring traits in the oviparous multi-clutched lizard,Calotes versicolor (Agamidae)

    Get PDF
    The determinants of offspring size and number in the tropical oviparous multi-clutched lizard, Calotes versicolor, were examined using both univariate and multivariate (path) analyses. In C. versicolor maternal snout-vent length (SVL) and body condition influence clutch mass and clutch size but have no significant influence on offspring size. The positive effect of maternal SVL and body condition on offspring number is counterbalanced by a negative effect of breeding time on egg mass. In fact, breeding time directly influences the offspring body mass and condition through variation in the egg mass. There is a trade-off between offspring mass and condition with offspring number, and breeding time influences both. Offspring hatched from the eggs of early (May-June) or mid (July-August) breeding periods invariably show lower mass and condition than those hatched from the eggs of late breeding season (September-October). Yet, there is no variation in offspring SVL among early, mid and late clutches. Thus, inC. versicolor offspring SVL is optimized while body mass and condition are not optimized

    HPC Cloud for Scientific and Business Applications: Taxonomy, Vision, and Research Challenges

    Full text link
    High Performance Computing (HPC) clouds are becoming an alternative to on-premise clusters for executing scientific applications and business analytics services. Most research efforts in HPC cloud aim to understand the cost-benefit of moving resource-intensive applications from on-premise environments to public cloud platforms. Industry trends show hybrid environments are the natural path to get the best of the on-premise and cloud resources---steady (and sensitive) workloads can run on on-premise resources and peak demand can leverage remote resources in a pay-as-you-go manner. Nevertheless, there are plenty of questions to be answered in HPC cloud, which range from how to extract the best performance of an unknown underlying platform to what services are essential to make its usage easier. Moreover, the discussion on the right pricing and contractual models to fit small and large users is relevant for the sustainability of HPC clouds. This paper brings a survey and taxonomy of efforts in HPC cloud and a vision on what we believe is ahead of us, including a set of research challenges that, once tackled, can help advance businesses and scientific discoveries. This becomes particularly relevant due to the fast increasing wave of new HPC applications coming from big data and artificial intelligence.Comment: 29 pages, 5 figures, Published in ACM Computing Surveys (CSUR

    Pharmacological correction of experimental osteoporosis and fractures related to it by means of rosuvastatin, L-norvaline and their combination

    Get PDF
    Osteoporosis (OP) is a multifactorial disease which is based on a dynamic decrease in bone mass and, as a result, disruption of bone structure, leading to higher chances of skeletal fractures. Endothelial dysfunction is a key cause of impaired blood supply to the bone, resulting in a decreased perfusion, disrupted osteogenesis and, as a consequence, osteoporotic changes. According to modern literature and available research, L-norvaline and rosuvastatin have a powerful endotheliotropic effect. However, there is no information that the osteoprotective properties of these drugs used as a monotherapy and as their combination have ever been studie

    SWKB Quantization Rules for Bound States in Quantum Wells

    Get PDF
    In a recent paper by Gomes and Adhikari (J.Phys B30 5987(1997)) a matrix formulation of the Bohr-Sommerfield quantization rule has been applied to the study of bound states in one dimension quantum wells. Here we study these potentials in the frame work of supersymmetric WKB (SWKB) quantization approximation and find that SWKB quantization rule is superior to the modified Bohr-Sommerfield or WKB rules as it exactly reproduces the eigenenergies.Comment: 8 page

    Study of the influence of L-norvaline, rosuvastatin and their combination on the level of microcirculation in bone tissue in experimental osteoporosis and fractures on its background

    Get PDF
    The experiment was carried out in female white Wistar rats to investigate the effect of L-norvaline, rosuvastatin and their combination on parameters of blood supply to the bone tissue on models of experimental osteoporosis and osteoporotic fracture

    Study of the microcirculation level in bone with osteoporosis and osteoporotic fractures during therapy with recombinant erythropoietin, rosuvastatin and their combinations

    Get PDF
    The experiment was carried out in female white Wistar rats. The effects of recombinant erythropoietin, rosuvastatin and their combination were investigated based on the blood supply to the bone after a modelled experimental osteoporosis. It was found that the studied drugs prevent decrease of bone microcirculation in cases of osteoporosis and in callus tissue in experimental osteoporotic fractures, positively influencing the course of reparative regeneration of bone tissu

    Secure Digital Information Forward Using Highly Developed AES Techniques in Cloud Computing

    Get PDF
    Nowadays, in communications, the main criteria are ensuring the digital information and communication in the network. The normal two users' communication exchanges confidential data and files via the web. Secure data communication is the most crucial problem for message transmission networks. To resolve this problem, cryptography uses mathematical encryption and decryption data on adaptation by converting data from a key into an unreadable format. Cryptography provides a method for performing the transmission of confidential or secure communication. The proposed AES (Advanced Encryption Standard)-based Padding Key Encryption (PKE) algorithm encrypts the Data; it generates the secret key in an unreadable format. The receiver decrypts the data using the private key in a readable format. In the proposed PKE algorithm, the sender sends data into plain Text to cypher-text using a secret key to the authorized person; the unauthorized person cannot access the data through the Internet; only an authorized person can view the data through the private key. A method for identifying user groups was developed. Support vector machines (SVM) were used in user behaviour analysis to estimate probability densities so that each user could be predicted to launch applications and sessions independently. The results of the proposed simulation offer a high level of security for transmitting sensitive data or files to recipients compared to other previous methods and user behaviour analysis
    corecore