10,549 research outputs found
Oocyte cryopreservation as an adjunct to the assisted reproductive technologies
The document attached has been archived with permission from the editor of the Medical Journal of Australia. An external link to the publisherâs copy is included. See page 2 of PDF for this item.Keith L Harrison, Michelle T Lane, Jeremy C Osborn, Christine A Kirby, Regan Jeffrey, John H Esler and David Mollo
The Desktop Muon Detector: A simple, physics-motivated machine- and electronics-shop project for university students
This paper describes an undergraduate-level physics project that incorporates
various aspects of machine- and electronics-shop technical development. The
desktop muon detector is a self-contained apparatus that employs plastic
scintillator as a detection medium and a silicon photomultiplier for light
collection. These detectors can be used in conjunction with the provided
software to make interesting physics measurements. The total cost of each
counter is approximately $100.Comment: 29 pages, 14 figure
A peer-to-peer infrastructure for resilient web services
This work is funded by GR/M78403 âSupporting Internet Computation in Arbitrary Geographical Locationsâ and GR/R51872 âReflective Application Framework for Distributed Architecturesâ, and by Nuffield Grant URB/01597/G âPeer-to-Peer Infrastructure for Autonomic Storage ArchitecturesâThis paper describes an infrastructure for the deployment and use of Web Services that are resilient to the failure of the nodes that host those services. The infrastructure presents a single interface that provides mechanisms for users to publish services and to find hosted services. The infrastructure supports the autonomic deployment of services and the brokerage of hosts on which services may be deployed. Once deployed, services are autonomically managed in a number of aspects including load balancing, availability, failure detection and recovery, and lifetime management. Services are published and deployed with associated metadata describing the service type. This same metadata may be used subsequently by interested parties to discover services. The infrastructure uses peer-to-peer (P2P) overlay technologies to abstract over the underlying network to deploy and locate instances of those services. It takes advantage of the P2P network to replicate directory services used to locate service instances (for using a service), Service Hosts (for deployment of services) and Autonomic Managers which manage the deployed services. The P2P overlay network is itself constructed using novel Web Services-based middleware and a variation of the Chord P2P protocol, which is self-managing.Postprin
Non semi-simple sl(2) quantum invariants, spin case
Invariants of 3-manifolds from a non semi-simple category of modules over a
version of quantum sl(2) were obtained by the last three authors in
[arXiv:1404.7289]. In their construction the quantum parameter is a root of
unity of order where is odd or congruent to modulo . In this
paper we consider the remaining cases where is congruent to zero modulo
and produce invariants of -manifolds with colored links, equipped with
generalized spin structure. For a given -manifold , the relevant
generalized spin structures are (non canonically) parametrized by
.Comment: 13 pages, 16 figure
Risk factors for house-entry by malaria vectors in a rural town and satellite villages in The Gambia.
Background:
In the pre-intervention year of a randomized controlled trial investigating the protective effects of house screening against malaria-transmitting vectors, a multi-factorial risk factor analysis study was used to identify factors that influence mosquito house entry.
Methods:
Mosquitoes were sampled using CDC light traps in 976 houses, each on one night, in Farafenni town and surrounding villages during the malaria-transmission season in The Gambia. Catches from individual houses were both (a) left unadjusted and (b) adjusted relative to the number of mosquitoes caught in four sentinel houses that were operated nightly throughout the period, to allow for night-to-night variation. Houses were characterized by location, architecture, human occupancy and their mosquito control activities, and the number and type of domestic animals within the compound.
Results:
106,536 mosquitoes were caught, of which 55% were Anopheles gambiae sensu lato, the major malaria vectors in the region. There were seven fold higher numbers of An. gambiae s.l. in the villages (geometric mean per trap night = 43.7, 95% confidence intervals, CIs = 39.5â48.4) than in Farafenni town (6.3, 5.7â7.2) and significant variation between residential blocks (p < 0.001). A negative binomial multivariate model performed equally well using unadjusted or adjusted trap data. Using the unadjusted data the presence of nuisance mosquitoes was reduced if the house was located in the town (odds ratio, OR = 0.11, 95% CIs = 0.09â0.13), the eaves were closed (OR = 0.71, 0.60â0.85), a horse was tethered near the house (OR = 0.77, 0.73â0.82), and churai, a local incense, was burned in the room at night (OR = 0.56, 0.47â0.66). Mosquito numbers increased per additional person in the house (OR = 1.04, 1.02â1.06) or trapping room (OR = 1.19, 1.13â1.25) and when the walls were made of mud blocks compared with concrete (OR = 1.44, 1.10â1.87).
Conclusion:
This study demonstrates that the risk of malaria transmission is greatest in rural areas, where large numbers of people sleep in houses made of mud blocks, where the eaves are open, horses are not tethered nearby and where churai is not burnt at night. These factors need to be considered in the design and analysis of intervention studies designed to reduce malaria transmission in The Gambia and other parts of sub-Saharan Africa
Automorphisms of linear automata
AbstractRelationships between the group, Aut(M), of automorphisms of a linear automaton M and the structure of M are determined. Linear automata in which Aut(M) is a group of translations are characterized in terms of the structure of the state space of M. Also, conditions are determined as to when Aut(M) contains only linear transformations
The centralizer of a group automorphism
AbstractLet G be a finite group. The structure of the near-ring C(A) of identity preserving functions f: G â G, which commute with a given automorphism A of G, is investigated. The results are then applied to the case in which G is a finite vector space and A is an invertible linear transformation
- âŠ