578 research outputs found
A simplified protocol for detecting two systemic bait markers (Rhodamine B and iophenoxic acid) in small mammals
We developed a method of quantifying levels of fluorescence in the whiskers of wild stoats (Mustela erminea) using fluorescence microscopy and Axiovision 3.0.6.1 software. The method allows for discrimination between natural fluorescence present in or on a whisker, and the fluorescence resulting from the ingestion of the systemic marker Rhodamine B (RB), although some visual judgement is still required. We also developed a new high performance liquid chromatography (HPLC) protocol for detecting the systemic marker iophenoxic acid (IPA) in the blood of laboratory rats (Rattus norvegicus) and wild stoats. With this method, the blood of an animal that has consumed IPA can be tested for the presence of the foreign IPA compound itself. This is a more reliable test than the previous method, which measured the raised level of natural blood protein-bound iodine correlated with IPA absorption. The quantity of blood required from animal subjects is very small (10 μl), so the testing is less intrusive and the method can be extended to smaller species. The extraction technique uses methanol, rather than acids and heavy metal salts, thereby simplifying the procedure. Recovery of IPA is quantitative, giving a highly reliable reading. In experiments on captive rats the IPA method proved successful. Of 12 positively marked carcasses, two that had not been frozen for the 24 h before blood samples were taken showed relatively lower IPA levels. The same IPA detection method, as well as the whisker analysis for RB, was applied successfully to a population of wild stoats to which both Rhodamine B and IPA were made available at bait stations. The presence of both bait markers was detectable in rats for at least 21 days and in stoats for at least 27 days
DEPAS: A Decentralized Probabilistic Algorithm for Auto-Scaling
The dynamic provisioning of virtualized resources offered by cloud computing
infrastructures allows applications deployed in a cloud environment to
automatically increase and decrease the amount of used resources. This
capability is called auto-scaling and its main purpose is to automatically
adjust the scale of the system that is running the application to satisfy the
varying workload with minimum resource utilization. The need for auto-scaling
is particularly important during workload peaks, in which applications may need
to scale up to extremely large-scale systems.
Both the research community and the main cloud providers have already
developed auto-scaling solutions. However, most research solutions are
centralized and not suitable for managing large-scale systems, moreover cloud
providers' solutions are bound to the limitations of a specific provider in
terms of resource prices, availability, reliability, and connectivity.
In this paper we propose DEPAS, a decentralized probabilistic auto-scaling
algorithm integrated into a P2P architecture that is cloud provider
independent, thus allowing the auto-scaling of services over multiple cloud
infrastructures at the same time. Our simulations, which are based on real
service traces, show that our approach is capable of: (i) keeping the overall
utilization of all the instantiated cloud resources in a target range, (ii)
maintaining service response times close to the ones obtained using optimal
centralized auto-scaling approaches.Comment: Submitted to Springer Computin
Renormalization group method applied to the primitive equations
AbstractIn this article we study the limit, as the Rossby number ε goes to zero, of the primitive equations of the atmosphere and the ocean. From the mathematical viewpoint we study the averaging of a penalization problem displaying oscillations generated by an antisymmetric operator and by the presence of two time scales
Averaging method applied to the three-dimensional primitive equations
In this article we study the small Rossby number asymptotics for the three-dimensional primitive equations of the oceans and of the atmosphere. The fast oscillations present in the exact solution are eliminated using an averaging method, the so-called renormalisation group method
Angiogenesis in old-aged subjects after ischemic stroke: a cautionary note for investigators
Angiogenesis represents a form of neovascularisation of exceptional importance in numerous pathological conditions including stroke. In this context it is directly related to neuroregeneration which is seen in close proximity. However, numerous experimental data have been drawn from studies that have ignored the age criterion. This is extremely important as angiogenesis is different in young versus old subjects. Extrapolating data obtained from studies performed in young subjects or "in vitro" to old-age patients could lead to inexact conclusions since the dynamics of angiogenesis is age-dependent
Critical analysis of vendor lock-in and its impact on cloud computing migration: a business perspective
Vendor lock-in is a major barrier to the adoption of cloud computing, due to the lack of standardization. Current solutions and efforts tackling the vendor lock-in problem are predominantly technology-oriented. Limited studies exist to analyse and highlight the complexity of vendor lock-in problem in the cloud environment. Consequently, most customers are unaware of proprietary standards which inhibit interoperability and portability of applications when taking services from vendors. This paper provides a critical analysis of the vendor lock-in problem, from a business perspective. A survey based on qualitative and quantitative approaches conducted in this study has identified the main risk factors that give rise to lock-in situations. The analysis of our survey of 114 participants shows that, as computing resources migrate from on-premise to the cloud, the vendor lock-in problem is exacerbated. Furthermore, the findings exemplify the importance of interoperability, portability and standards in cloud computing. A number of strategies are proposed on how to avoid and mitigate lock-in risks when migrating to cloud computing. The strategies relate to contracts, selection of vendors that support standardised formats and protocols regarding standard data structures and APIs, developing awareness of commonalities and dependencies
among cloud-based solutions. We strongly believe that the implementation of these strategies has a great potential
to reduce the risks of vendor lock-in
A comparative study of heating elements used for the development of textile heaters
The focus of this paper is to make a comparison between five different types of conductive, heatable samples. These textile samples have been produced according to the five most important implementation techniques such as knitting, weaving, embroidery, printing and nonwoven padding. The idea is to identify a conductive option best suitable for a heating application. This study was divided into four major steps: choosing the adequate materials, swatch production, conductivity measurements and heating behaviour assessment. The first three methods use electro conductive wires as heating elements, the fourth uses conductive ink and the fifth uses carbon black coating. For all of them, resistance, current and heat distribution was measured. The results show that the best options for the development of a wearable textile heating system are the embroidered and the woven techniques, as their mechanical strength and elasticity, is sufficiently high and the fabric/substrate structure allows the insertion/deposition of different types of heating element
- …