1,348 research outputs found

    Efficacy of afoxolaner plus milbemycin oxime and afoxolaner alone as treatment for sarcoptic mange in naturally infested dogs

    Get PDF
    Artículo de investigaciónSarcoptic mange is a pruritic, contagious, ectoparasitic skin disease that affects mammals, including the domestic dog. The objective of this study was to evaluate and compare the efficacy of afoxolaner plus milbemycin oxime (NexGard Spectra) and afoxolaner alone (NexGard) as treatments for sarcoptic mange in naturally infested dogs. A total of 142 dogs naturally infested with Sarcoptes scabiei was evaluated. The dogs were diagnosed by microscopic examinations of skin scrapings. The dogs were divided into 2 groups: 96 dogs were treated with a combined dosage of 2.50 to 5.36 mg/kg body weight (BW) of afoxolaner and 0.50 to 1.07 mg/kg BW of milbemycin oxime and 46 dogs were treated with 2.50 mg/kg BW of afoxolaner alone. The presence or absence of pruritus and lesions were evaluated using an analogous scale on days 7, 14, 21, 28, and 56 after receiving the treatment. Data obtained were analyzed by Student’s t-test (P # 0.05). The single oral treatment of afoxolaner plus milbemycin oxime resulted in a significant reduction in pruritus of 87.4% at 28 d after treatment (P # 0.05). Resolution of the lesions after treatment was variable, with a significant decrease (P # 0.05) observed within the first 14 d, although this parameter continued to improve until the end of the study on day 28, when a decrease of 96% was observed. By the end of the study, a single dose of either the afoxolaner alone or the afoxolaner combined with milbemycin oxime was effective in significantly reducing the signs associated with sarcoptic mange during a 56-day evaluation period

    Application-level differential checkpointing for HPC applications with dynamic datasets

    Get PDF
    High-performance computing (HPC) requires resilience techniques such as checkpointing in order to tolerate failures in supercomputers. As the number of nodes and memory in supercomputers keeps on increasing, the size of checkpoint data also increases dramatically, sometimes causing an I/O bottleneck. Differential checkpointing (dCP) aims to minimize the checkpointing overhead by only writing data differences. This is typically implemented at the memory page level, sometimes complemented with hashing algorithms. However, such a technique is unable to cope with dynamic-size datasets. In this work, we present a novel dCP implementation with a new file format that allows fragmentation of protected datasets in order to support dynamic sizes. We identify dirty data blocks using hash algorithms. In order to evaluate the dCP performance, we ported the HPC applications xPic, LULESH 2.0 and Heat2D and analyze them regarding their potential of reducing I/O with dCP and how this data reduction influences the checkpoint performance. In our experiments, we achieve reductions of up to 62% of the checkpoint time.This project has received funding from the European Unions Seventh Framework Programme (FP7/2007-2013) and the Horizon 2020 (H2020) funding framework under grant agreement no. H2020-FETHPC-754304 (DEEP-EST); and from the European Unions Horizon 2020 research and innovation programme under the LEGaTO Project (legato- project.eu), grant agreement No 780681.Peer ReviewedPostprint (author's final draft

    Discovering the Ethereum2 P2P network

    Get PDF
    Achieving the equilibrium between scalability, sustainability, and security while keeping decentralization has prevailed as the target solution for decentralized blockchain applications over the last years. Several approaches have been proposed by multiple blockchain teams to achieve it, Ethereum being among them. Ethereum is on the path of a major protocol improvement called Ethereum 2.0 (Eth2), implementing Sharding and introducing the Proof-of-Stake (PoS). As the change of consensus mechanism is a delicate matter, this improvement will be achieved through different phases, the first of which is the implementation of the Beacon Chain. As Ethereum1, Eth2 relies on a decentralized peer-to-peer (p2p) network for the message distribution. Up to date, we estimate that there are around 5.000 nodes in the Eth2 main net geographically distributed. However, the topology of this one still prevails unknown. In this paper, we present the results obtained from the analysis we performed on the Eth2 p2p network. Describing the topology of the network, as possible hazards that this one implies.This work has been supported by the Ethereum Foundation under Grant FY20-0198.Peer ReviewedPostprint (author's final draft

    Students’ cognitive and metacognitive learning strategies towards hands-on science

    Get PDF
    Cognitive and metacognitive learning strategies are geared towards giving autonomy to every learner in their studies. Students’ affordances on cognitive and metacognitive learning strategies in their studies are believed to predict their academic success and performances in their learning tasks. This study determined the cognitive and metacognitive learning strategies in science among the 278 education students in the three campuses of a state university in the Philippines as bases in crafting a developmental plan to bolster the science instruction in the university. Using the descriptive-inferential research and employing a questionnaire on the cognitive and metacognitive strategies of education students, the following are known: incomparable affordances of the students along planning and information management practices while comparable affordances were determined on the respondents’ cognitive learning strategies; and incomparable affordances along procedural knowledge while comparable affordances along declarative and conditional knowledge were determined on the respondents’ metacognitive learning strategies. Based on the results, a developmental plan was designed to bolster the science courses in the education programs of the university centering on the inclusion of research camp, research expo, shepherding on research through the niche program, immersion, and hands-on science. It was recommended that the proposed enhanced science program will be implemented in the university system as there is only one science course in their respective programs in the new curricular plot.

    Armiarma: Ethereum2 Network Monitoring Tool

    Get PDF
    Achieving the equilibrium between scalability, sustainability and security has prevailed as the ideal solution for decentralized blockchain applications over the last years. Several approaches have been proposed being Ethereum a solid proposal among them. Ethereum is on the path of a major protocol improvement called Ethereum 2.0 (Eth2), implementing Sharding and introducing the Proof-of-Stake (PoS). As the change of consensus mechanism is a delicate matter, this improvement will be achieved through different phases, the first of which is the implementation of the Beacon Chain. The implementation of the latest has been stated with the recent launch of the Eth2 main net. In this work, we introduce an Eth2 network monitor tool, called Armiarma, used to generate a complete analysis of the p2p network of the Eth2 main net. In this paper, we present some of the results of what this Eth2 network monitor can achieve

    Performance Study of Non-volatile Memories on a High-End Supercomputer

    Get PDF
    The first exa-scale supercomputers are expected to be operational in China, USA, Japan and Europe within the early 2020’s. This allows scientists to execute applications at extreme scale with more than 1018 floating point operations per second (exa-FLOPS). However, the number of FLOPS is not the only parameter that determines the final performance. In order to store intermediate results or to provide fault tolerance, most applications need to perform a considerable amount of I/O operations during runtime. The performance of those operations is determined by the throughput from volatile (e.g. DRAM) to non-volatile stable storage. Regarding the slow growth in network bandwidth compared to the computing capacity on the nodes, it is highly beneficial to deploy local stable storage such as the new non-volatile memories (NVMe), in order to avoid the transfer through the network to the parallel file system. In this work, we analyse the performance of three different storage levels of the CTE-POWER9 cluster, located at the Barcelona Supercomputing Center (BSC). We compare the throughputs of SSD, NVMe on the nodes to the GPFS under various scenarios and settings. We measured a maximum performance on 16 nodes of 83 GB/s using NVMe devices, 5.6 GB/s for SSD devices and 4.4 GB/s for writes to the GPFS.This project has received funding from the European Union’sHorizon 2020 research and innovation programme under the Marie Sklodowska-Curiegrant agreement No 708566 (DURO). Part of the research presented here has receivedfunding from the European Union’s Seventh Framework Programme (FP7/2007-2013)and the Horizon 2020 (H2020) funding framework under grant agreement no. H2020-FETHPC-754304 (DEEP-EST). The present publication reflects only the authors’views. The European Commission is not liable for any use that might be made ofthe information contained therein.Peer ReviewedPostprint (author's final draft

    Resource analysis of Ethereum 2.0 clients

    Get PDF
    Scalability is a common issue among the most used permissionless blockchains, and several approaches have been proposed to solve this issue. Tackling scalability while preserving the security and decentralization of the network is an important challenge. To deliver effective scaling solutions, Ethereum is on the path of a major protocol improvement called Ethereum 2.0 (Eth2), which implements sharding. As the change of consensus mechanism is an extremely delicate matter, this improvement will be achieved through different phases, the first of which is the implementation of the Beacon Chain. For this, a specification has been developed, and multiple groups have implemented clients to run the new protocol. This work analyzes the resource usage behavior of different clients running as Eth2 nodes, comparing their performance and analyzing differences. Our results show multiple important network perturbations and how different clients react to them. We discuss the differences between Eth2 clients and their limitations.This work has been supported by the Ethereum Foundation under Grant FY20-0198.Peer ReviewedPostprint (author's final draft

    Resource Analysis of Ethereum 2.0 Clients

    Get PDF
    Scalability is a common issue among the most used permissionless blockchains, and several approaches have been proposed accordingly. As Ethereum is set to be a solid foundation for a decentralized Internet web, the need for tackling scalability issues while preserving the security of the network is an important challenge. In order to successfully deliver effective scaling solutions, Ethereum is on the path of a major protocol improvement called Ethereum 2.0 (Eth2), which implements sharding. As the change of consensus mechanism is an extremely delicate matter, this improvement will be achieved through different phases, the first of which is the implementation of the Beacon Chain. For this, a specification has been developed and multiple groups have implemented clients to run the new protocol. In this work, we analyse the resource usage behaviour of different clients running as Eth2 nodes, comparing their performance and analysing differences. Our results show multiple network perturbations and how different clients react to it
    • …
    corecore