319 research outputs found
Pressure screening in the interior of primary shells in double-wall carbon nanotubes
The pressure response of double-wall carbon nanotubes has been investigated
by means of Raman spectroscopy up to 10 GPa. The intensity of the radial
breathing modes of the outer tubes decreases rapidly but remain observable up
to 9 GPa, exhibiting a behavior similar (but less pronounced) to that of
single-wall carbon nanotubes, which undergo a shape distortion at higher
pressures. In addition, the tangential band of the external tubes broadens and
decreases in amplitude. The corresponding Raman features of the internal tubes
appear to be considerably less sensitive to pressure. All findings lead to the
conclusion that the outer tubes act as a protection shield for the inner tubes
whereas the latter increase the structural stability of the outer tubes upon
pressure application.Comment: PDF with 15 pages, 3 figures, 1 table; submitted to Physical Review
A theory and model for the evolution of software services
Software services are subject to constant change and variation. To control service development, a service developer needs to know why a change was made, what are its implications and whether the change is complete. Typically, service clients do not perceive the upgraded service immediately. As a consequence, service-based applications may fail on the service client side due to changes carried out during a provider service upgrade. In order to manage changes in a meaningful and effective manner service clients must therefore be considered when service changes are introduced at the service provider's side. Otherwise such changes will most certainly result in severe application disruption. Eliminating spurious results and inconsistencies that may occur due to uncontrolled changes is therefore a necessary condition for the ability of services to evolve gracefully, ensure service stability, and handle variability in their behavior. Towards this goal, this work presents a model and a theoretical framework for the compatible evolution of services based on well-founded theories and techniques from a number of disparate fields.
A theory and model for the evolution of software services.
Software services are subject to constant change and variation. To control service development, a service developer needs to know why a change was made, what are its implications and whether the change is complete. Typically, service clients do not perceive the upgraded service immediately. As a consequence, service-based applications may fail on the service client side due to changes carried out during a provider service upgrade. In order to manage changes in a meaningful and effective manner service clients must therefore be considered when service changes are introduced at the service provider's side. Otherwise such changes will most certainly result in severe application disruption. Eliminating spurious results and inconsistencies that may occur due to uncontrolled changes is therefore a necessary condition for the ability of services to evolve gracefully, ensure service stability, and handle variability in their behavior. Towards this goal, this work presents a model and a theoretical framework for the compatible evolution of services based on well-founded theories and techniques from a number of disparate fields.
Recommended from our members
Continuous Monitoring in Evolving Business Networks
The literature on continuous monitoring of cross-organizational processes, executed within virtual enterprises or business networks, considers monitoring as an issue regarding the network formation, since what can be monitored during process execution is fixed when the network is established. In particular, the impact of evolving agreements in such networks on continuous monitoring is not considered. Also, monitoring is limited to process execution progress and simple process data. In this paper, we extend the possible monitoring options by linking monitoring requirements to generic clauses in agreements established across a network and focus on the problem of preserving the continuous monitorability of these clauses when the agreements evolve, i.e. they are introduced, dropped, or updated. We discuss mechanisms to preserve continuous monitorability in a business network for different types of agreement evolution and we design a conceptual and technical architecture for a continuous monitoring IT infrastructure that implements the requirements derived from such mechanisms
Cloud migration patterns: a multi-cloud service architecture perspective
Many organizations migrate their on-premise software systems to the cloud. However, current coarse-grained cloud migration solutions have made a transparent migration of on-premise applications to the cloud a difficult, sometimes trial-and-error based endeavor. This paper suggests a catalogue of fine-grained service-based cloud architecture migration patterns that target multi-cloud settings and are specified with architectural notations. The proposed migration patterns are based on empirical evi-dence from a number of migration projects, best practices for cloud architectures and a systematic literature review of existing research. The pattern catalogue allows an or-ganization to (1) select appropriate architecture migration patterns based on their ob-jectives, (2) compose them to define a migration plan, and (3) extend them based on the identification of new patterns in new contexts
An exploration of the determinants for decision to migrate existing resources to cloud computing using an integrated TOE-DOI model
Migrating existing resources to cloud computing is a strategic organisational decision that can be difficult. It requires the consideration and evaluation of a wide range of technical and organisational aspects. Although a significant amount of attention has been paid by many industrialists and academics to aid migration decisions, the procedure remains difficult. This is mainly due to underestimation of the range of factors and characteristics affecting the decision for cloud migration. Further research is needed to investigate the level of effect these factors have on migration decisions and the overall complexity. This paper aims to explore the level of complexity of the decision to migrate the cloud. A research model based on the diffusion of innovation (DOI) theory and the technology-organization-environment (TOE) framework was developed. The model was tested using exploratory and confirmatory factor analysis. The quantitative analysis shows the level of impact of the identified variables on the decision to migrate. Seven determinants that contribute to the complexity of the decisions are identified. They need to be taken into account to ensure successful migration. This result has expanded the collective knowledge about the complexity of the issues that have to be considered when making decisions to migrate to the cloud. It contributes to the literature that addresses the complex and multidimensional nature of migrating to the cloud
Critical analysis of vendor lock-in and its impact on cloud computing migration: a business perspective
Vendor lock-in is a major barrier to the adoption of cloud computing, due to the lack of standardization. Current solutions and efforts tackling the vendor lock-in problem are predominantly technology-oriented. Limited studies exist to analyse and highlight the complexity of vendor lock-in problem in the cloud environment. Consequently, most customers are unaware of proprietary standards which inhibit interoperability and portability of applications when taking services from vendors. This paper provides a critical analysis of the vendor lock-in problem, from a business perspective. A survey based on qualitative and quantitative approaches conducted in this study has identified the main risk factors that give rise to lock-in situations. The analysis of our survey of 114 participants shows that, as computing resources migrate from on-premise to the cloud, the vendor lock-in problem is exacerbated. Furthermore, the findings exemplify the importance of interoperability, portability and standards in cloud computing. A number of strategies are proposed on how to avoid and mitigate lock-in risks when migrating to cloud computing. The strategies relate to contracts, selection of vendors that support standardised formats and protocols regarding standard data structures and APIs, developing awareness of commonalities and dependencies
among cloud-based solutions. We strongly believe that the implementation of these strategies has a great potential
to reduce the risks of vendor lock-in
Voltage-gated Na<sup>+</sup> channel activity increases colon cancertranscriptional activity and invasion via persistent MAPK signaling
© 2015 Macmillan Publishers Limited. All rights reserved. Functional expression of voltage-gated Na+ channels (VGSCs) has been demonstrated in multiple cancer cell types where channel activity induces invasive activity. The signaling mechanisms by which VGSCs promote oncogenesis remain poorly understood. We explored the signal transduction process critical to VGSC-mediated invasion on the basis of reports linking channel activity to gene expression changes in excitable cells. Coincidentally, many genes transcriptionally regulated by the SCN5A isoform in colon cancer have an over-representation of cis-acting sites for transcription factors phosphorylated by ERK1/2 MAPK. We hypothesized that VGSC activity promotes MAPK activation to induce transcriptional changes in invasion-related genes. Using pharmacological inhibitors/activators and siRNA-mediated gene knockdowns, we correlated channel activity with Rap1-dependent persistent MAPK activation in the SW620 human colon cancer cell line. We further demonstrated that VGSC activity induces downstream changes in invasion-related gene expression via a PKA/ERK/c-JUN/ELK-1/ETS-1 transcriptional pathway. This is the first study illustrating a molecular mechanism linking functional activity of VGSCs to transcriptional activation of invasion-related genes
- …
