510 research outputs found

    Angiogenesis in old-aged subjects after ischemic stroke: a cautionary note for investigators

    Get PDF
    Angiogenesis represents a form of neovascularisation of exceptional importance in numerous pathological conditions including stroke. In this context it is directly related to neuroregeneration which is seen in close proximity. However, numerous experimental data have been drawn from studies that have ignored the age criterion. This is extremely important as angiogenesis is different in young versus old subjects. Extrapolating data obtained from studies performed in young subjects or "in vitro" to old-age patients could lead to inexact conclusions since the dynamics of angiogenesis is age-dependent

    Critical analysis of vendor lock-in and its impact on cloud computing migration: a business perspective

    Get PDF
    Vendor lock-in is a major barrier to the adoption of cloud computing, due to the lack of standardization. Current solutions and efforts tackling the vendor lock-in problem are predominantly technology-oriented. Limited studies exist to analyse and highlight the complexity of vendor lock-in problem in the cloud environment. Consequently, most customers are unaware of proprietary standards which inhibit interoperability and portability of applications when taking services from vendors. This paper provides a critical analysis of the vendor lock-in problem, from a business perspective. A survey based on qualitative and quantitative approaches conducted in this study has identified the main risk factors that give rise to lock-in situations. The analysis of our survey of 114 participants shows that, as computing resources migrate from on-premise to the cloud, the vendor lock-in problem is exacerbated. Furthermore, the findings exemplify the importance of interoperability, portability and standards in cloud computing. A number of strategies are proposed on how to avoid and mitigate lock-in risks when migrating to cloud computing. The strategies relate to contracts, selection of vendors that support standardised formats and protocols regarding standard data structures and APIs, developing awareness of commonalities and dependencies among cloud-based solutions. We strongly believe that the implementation of these strategies has a great potential to reduce the risks of vendor lock-in

    A comparative study of heating elements used for the development of textile heaters

    Get PDF
    The focus of this paper is to make a comparison between five different types of conductive, heatable samples. These textile samples have been produced according to the five most important implementation techniques such as knitting, weaving, embroidery, printing and nonwoven padding. The idea is to identify a conductive option best suitable for a heating application. This study was divided into four major steps: choosing the adequate materials, swatch production, conductivity measurements and heating behaviour assessment. The first three methods use electro conductive wires as heating elements, the fourth uses conductive ink and the fifth uses carbon black coating. For all of them, resistance, current and heat distribution was measured. The results show that the best options for the development of a wearable textile heating system are the embroidered and the woven techniques, as their mechanical strength and elasticity, is sufficiently high and the fabric/substrate structure allows the insertion/deposition of different types of heating element

    The Cyclin-Dependent Kinase 5 Inhibitor Peptide Inhibits Herpes Simplex Virus Type 1 Replication

    Get PDF
    © 2019, The Author(s). In order to evaluate the influence of CDK5 inhibitory peptide (CIP) on Human alphaherpesvirus 1 (HSV-1) replication, we constructed two recombinant adeno-associated-virus 2 (rAAV2) vectors encoding CIP fused with cyan-fluorescent-protein (CFP), with or without nuclear localization signal. A third vector encoding non-fused CIP and CFP was also constructed. HeLa and HEK 293T cells were infected with the rAAV-CIP vectors at multiplicity of infection (MOI) of 5000, in the absence or presence of a recombinant HSV-1 that encodes a yellow-fluorescent-protein (rHSV48Y; MOI = 1). Cells co-infected with rHSV48Y and rAAV vectors that did not express the CIP gene (rAAV-CFP-Neo) served as controls. At 24 h after infection, the effect of CIP on rHSV48Y replication was assessed by PCR, qRT-PCR, Western-blot, flow-cytometry, epifluorescence and confocal microscopy. We show that in cultures co-infected with rAAV-CFP-Neo, 27% of the CFP-positive cells present rHSV48Y replication compartments. By contrast, in cultures co-infected with CIP-encoding rAAV2 vectors and rHSV48Y only 6–20% of the cells positive for CIP showed rHSV48Y replication compartments, depending on the CIP variant. Flow-cytometry showed that less than 40% of the rHSV48Y/rAAV-CIP, and more than 75% of rHSV48Y/rAAV-CFP-Neo co-infected cells were positive for both transgene products. The microscopy and flow-cytometry data support the hypothesis that CIP is inhibiting HSV-1 replication

    Orthogonal variability modeling to support multi-cloud application configuration

    Get PDF
    Cloud service providers benefit from a vast majority of customers due to variability and making profit from commonalities between the cloud services that they provide. Recently, application configuration dimensions has been increased dramatically due to multi-tenant, multi-device and multi-cloud paradigm. This challenges the configuration and customization of cloud-based software that are typically offered as a service due to the intrinsic variability. In this paper, we present a model-driven approach based on variability models originating from the software product line community to handle such multi-dimensional variability in the cloud. We exploit orthogonal variability models to systematically manage and create tenant-specific configuration and customizations. We also demonstrate how such variability models can be utilized to take into account the already deployed application parts to enable harmonized deployments for new tenants in a multi-cloud setting. The approach considers application functional and non-functional requirements to provide a set of valid multi-cloud configurations. We illustrate our approach through a case study
    • 

    corecore