578 research outputs found

    A simplified protocol for detecting two systemic bait markers (Rhodamine B and iophenoxic acid) in small mammals

    Get PDF
    We developed a method of quantifying levels of fluorescence in the whiskers of wild stoats (Mustela erminea) using fluorescence microscopy and Axiovision 3.0.6.1 software. The method allows for discrimination between natural fluorescence present in or on a whisker, and the fluorescence resulting from the ingestion of the systemic marker Rhodamine B (RB), although some visual judgement is still required. We also developed a new high performance liquid chromatography (HPLC) protocol for detecting the systemic marker iophenoxic acid (IPA) in the blood of laboratory rats (Rattus norvegicus) and wild stoats. With this method, the blood of an animal that has consumed IPA can be tested for the presence of the foreign IPA compound itself. This is a more reliable test than the previous method, which measured the raised level of natural blood protein-bound iodine correlated with IPA absorption. The quantity of blood required from animal subjects is very small (10 μl), so the testing is less intrusive and the method can be extended to smaller species. The extraction technique uses methanol, rather than acids and heavy metal salts, thereby simplifying the procedure. Recovery of IPA is quantitative, giving a highly reliable reading. In experiments on captive rats the IPA method proved successful. Of 12 positively marked carcasses, two that had not been frozen for the 24 h before blood samples were taken showed relatively lower IPA levels. The same IPA detection method, as well as the whisker analysis for RB, was applied successfully to a population of wild stoats to which both Rhodamine B and IPA were made available at bait stations. The presence of both bait markers was detectable in rats for at least 21 days and in stoats for at least 27 days

    DEPAS: A Decentralized Probabilistic Algorithm for Auto-Scaling

    Full text link
    The dynamic provisioning of virtualized resources offered by cloud computing infrastructures allows applications deployed in a cloud environment to automatically increase and decrease the amount of used resources. This capability is called auto-scaling and its main purpose is to automatically adjust the scale of the system that is running the application to satisfy the varying workload with minimum resource utilization. The need for auto-scaling is particularly important during workload peaks, in which applications may need to scale up to extremely large-scale systems. Both the research community and the main cloud providers have already developed auto-scaling solutions. However, most research solutions are centralized and not suitable for managing large-scale systems, moreover cloud providers' solutions are bound to the limitations of a specific provider in terms of resource prices, availability, reliability, and connectivity. In this paper we propose DEPAS, a decentralized probabilistic auto-scaling algorithm integrated into a P2P architecture that is cloud provider independent, thus allowing the auto-scaling of services over multiple cloud infrastructures at the same time. Our simulations, which are based on real service traces, show that our approach is capable of: (i) keeping the overall utilization of all the instantiated cloud resources in a target range, (ii) maintaining service response times close to the ones obtained using optimal centralized auto-scaling approaches.Comment: Submitted to Springer Computin

    Renormalization group method applied to the primitive equations

    Get PDF
    AbstractIn this article we study the limit, as the Rossby number ε goes to zero, of the primitive equations of the atmosphere and the ocean. From the mathematical viewpoint we study the averaging of a penalization problem displaying oscillations generated by an antisymmetric operator and by the presence of two time scales

    Averaging method applied to the three-dimensional primitive equations

    Get PDF
    In this article we study the small Rossby number asymptotics for the three-dimensional primitive equations of the oceans and of the atmosphere. The fast oscillations present in the exact solution are eliminated using an averaging method, the so-called renormalisation group method

    Angiogenesis in old-aged subjects after ischemic stroke: a cautionary note for investigators

    Get PDF
    Angiogenesis represents a form of neovascularisation of exceptional importance in numerous pathological conditions including stroke. In this context it is directly related to neuroregeneration which is seen in close proximity. However, numerous experimental data have been drawn from studies that have ignored the age criterion. This is extremely important as angiogenesis is different in young versus old subjects. Extrapolating data obtained from studies performed in young subjects or "in vitro" to old-age patients could lead to inexact conclusions since the dynamics of angiogenesis is age-dependent

    Critical analysis of vendor lock-in and its impact on cloud computing migration: a business perspective

    Get PDF
    Vendor lock-in is a major barrier to the adoption of cloud computing, due to the lack of standardization. Current solutions and efforts tackling the vendor lock-in problem are predominantly technology-oriented. Limited studies exist to analyse and highlight the complexity of vendor lock-in problem in the cloud environment. Consequently, most customers are unaware of proprietary standards which inhibit interoperability and portability of applications when taking services from vendors. This paper provides a critical analysis of the vendor lock-in problem, from a business perspective. A survey based on qualitative and quantitative approaches conducted in this study has identified the main risk factors that give rise to lock-in situations. The analysis of our survey of 114 participants shows that, as computing resources migrate from on-premise to the cloud, the vendor lock-in problem is exacerbated. Furthermore, the findings exemplify the importance of interoperability, portability and standards in cloud computing. A number of strategies are proposed on how to avoid and mitigate lock-in risks when migrating to cloud computing. The strategies relate to contracts, selection of vendors that support standardised formats and protocols regarding standard data structures and APIs, developing awareness of commonalities and dependencies among cloud-based solutions. We strongly believe that the implementation of these strategies has a great potential to reduce the risks of vendor lock-in

    A comparative study of heating elements used for the development of textile heaters

    Get PDF
    The focus of this paper is to make a comparison between five different types of conductive, heatable samples. These textile samples have been produced according to the five most important implementation techniques such as knitting, weaving, embroidery, printing and nonwoven padding. The idea is to identify a conductive option best suitable for a heating application. This study was divided into four major steps: choosing the adequate materials, swatch production, conductivity measurements and heating behaviour assessment. The first three methods use electro conductive wires as heating elements, the fourth uses conductive ink and the fifth uses carbon black coating. For all of them, resistance, current and heat distribution was measured. The results show that the best options for the development of a wearable textile heating system are the embroidered and the woven techniques, as their mechanical strength and elasticity, is sufficiently high and the fabric/substrate structure allows the insertion/deposition of different types of heating element
    corecore