10,549 research outputs found

    Oocyte cryopreservation as an adjunct to the assisted reproductive technologies

    Get PDF
    The document attached has been archived with permission from the editor of the Medical Journal of Australia. An external link to the publisher’s copy is included. See page 2 of PDF for this item.Keith L Harrison, Michelle T Lane, Jeremy C Osborn, Christine A Kirby, Regan Jeffrey, John H Esler and David Mollo

    The Desktop Muon Detector: A simple, physics-motivated machine- and electronics-shop project for university students

    Full text link
    This paper describes an undergraduate-level physics project that incorporates various aspects of machine- and electronics-shop technical development. The desktop muon detector is a self-contained apparatus that employs plastic scintillator as a detection medium and a silicon photomultiplier for light collection. These detectors can be used in conjunction with the provided software to make interesting physics measurements. The total cost of each counter is approximately $100.Comment: 29 pages, 14 figure

    A peer-to-peer infrastructure for resilient web services

    Get PDF
    This work is funded by GR/M78403 “Supporting Internet Computation in Arbitrary Geographical Locations” and GR/R51872 “Reflective Application Framework for Distributed Architectures”, and by Nuffield Grant URB/01597/G “Peer-to-Peer Infrastructure for Autonomic Storage Architectures”This paper describes an infrastructure for the deployment and use of Web Services that are resilient to the failure of the nodes that host those services. The infrastructure presents a single interface that provides mechanisms for users to publish services and to find hosted services. The infrastructure supports the autonomic deployment of services and the brokerage of hosts on which services may be deployed. Once deployed, services are autonomically managed in a number of aspects including load balancing, availability, failure detection and recovery, and lifetime management. Services are published and deployed with associated metadata describing the service type. This same metadata may be used subsequently by interested parties to discover services. The infrastructure uses peer-to-peer (P2P) overlay technologies to abstract over the underlying network to deploy and locate instances of those services. It takes advantage of the P2P network to replicate directory services used to locate service instances (for using a service), Service Hosts (for deployment of services) and Autonomic Managers which manage the deployed services. The P2P overlay network is itself constructed using novel Web Services-based middleware and a variation of the Chord P2P protocol, which is self-managing.Postprin

    Non semi-simple sl(2) quantum invariants, spin case

    Full text link
    Invariants of 3-manifolds from a non semi-simple category of modules over a version of quantum sl(2) were obtained by the last three authors in [arXiv:1404.7289]. In their construction the quantum parameter qq is a root of unity of order 2r2r where r>1r>1 is odd or congruent to 22 modulo 44. In this paper we consider the remaining cases where rr is congruent to zero modulo 44 and produce invariants of 33-manifolds with colored links, equipped with generalized spin structure. For a given 33-manifold MM, the relevant generalized spin structures are (non canonically) parametrized by H1(M;C/2Z)H^1(M;\mathbb C/2\mathbb Z).Comment: 13 pages, 16 figure

    Risk factors for house-entry by malaria vectors in a rural town and satellite villages in The Gambia.

    Get PDF
    Background: In the pre-intervention year of a randomized controlled trial investigating the protective effects of house screening against malaria-transmitting vectors, a multi-factorial risk factor analysis study was used to identify factors that influence mosquito house entry. Methods: Mosquitoes were sampled using CDC light traps in 976 houses, each on one night, in Farafenni town and surrounding villages during the malaria-transmission season in The Gambia. Catches from individual houses were both (a) left unadjusted and (b) adjusted relative to the number of mosquitoes caught in four sentinel houses that were operated nightly throughout the period, to allow for night-to-night variation. Houses were characterized by location, architecture, human occupancy and their mosquito control activities, and the number and type of domestic animals within the compound. Results: 106,536 mosquitoes were caught, of which 55% were Anopheles gambiae sensu lato, the major malaria vectors in the region. There were seven fold higher numbers of An. gambiae s.l. in the villages (geometric mean per trap night = 43.7, 95% confidence intervals, CIs = 39.5–48.4) than in Farafenni town (6.3, 5.7–7.2) and significant variation between residential blocks (p < 0.001). A negative binomial multivariate model performed equally well using unadjusted or adjusted trap data. Using the unadjusted data the presence of nuisance mosquitoes was reduced if the house was located in the town (odds ratio, OR = 0.11, 95% CIs = 0.09–0.13), the eaves were closed (OR = 0.71, 0.60–0.85), a horse was tethered near the house (OR = 0.77, 0.73–0.82), and churai, a local incense, was burned in the room at night (OR = 0.56, 0.47–0.66). Mosquito numbers increased per additional person in the house (OR = 1.04, 1.02–1.06) or trapping room (OR = 1.19, 1.13–1.25) and when the walls were made of mud blocks compared with concrete (OR = 1.44, 1.10–1.87). Conclusion: This study demonstrates that the risk of malaria transmission is greatest in rural areas, where large numbers of people sleep in houses made of mud blocks, where the eaves are open, horses are not tethered nearby and where churai is not burnt at night. These factors need to be considered in the design and analysis of intervention studies designed to reduce malaria transmission in The Gambia and other parts of sub-Saharan Africa

    Automorphisms of linear automata

    Get PDF
    AbstractRelationships between the group, Aut(M), of automorphisms of a linear automaton M and the structure of M are determined. Linear automata in which Aut(M) is a group of translations are characterized in terms of the structure of the state space of M. Also, conditions are determined as to when Aut(M) contains only linear transformations

    The centralizer of a group automorphism

    Get PDF
    AbstractLet G be a finite group. The structure of the near-ring C(A) of identity preserving functions f: G → G, which commute with a given automorphism A of G, is investigated. The results are then applied to the case in which G is a finite vector space and A is an invertible linear transformation
    • 

    corecore