103 research outputs found

    On thermodynamic modeling and the role of the second law of thermodynamics in geophysics

    Get PDF
    The article contains a brief review of elements of thermodynamic modeling in theoretical geophysics. We motivate the existence of the second law of thermodynamics in macroscopic theoretical physics and demonstrate its evaluation. In particular we show its consequences in the construction of constitutive laws for a two-component poroelastic medium. This construction is also related to microstructural properties verified by means of the second law

    Managing Phenol Contents in Crop Plants by Phytochemical Farming and Breeding—Visions and Constraints

    Get PDF
    Two main fields of interest form the background of actual demand for optimized levels of phenolic compounds in crop plants. These are human health and plant resistance to pathogens and to biotic and abiotic stress factors. A survey of agricultural technologies influencing the biosynthesis and accumulation of phenolic compounds in crop plants is presented, including observations on the effects of light, temperature, mineral nutrition, water management, grafting, elevated atmospheric CO2, growth and differentiation of the plant and application of elicitors, stimulating agents and plant activators. The underlying mechanisms are discussed with respect to carbohydrate availability, trade-offs to competing demands as well as to regulatory elements. Outlines are given for genetic engineering and plant breeding. Constraints and possible physiological feedbacks are considered for successful and sustainable application of agricultural techniques with respect to management of plant phenol profiles and concentrations

    Modelling human choices: MADeM and decision‑making

    Get PDF
    Research supported by FAPESP 2015/50122-0 and DFG-GRTK 1740/2. RP and AR are also part of the Research, Innovation and Dissemination Center for Neuromathematics FAPESP grant (2013/07699-0). RP is supported by a FAPESP scholarship (2013/25667-8). ACR is partially supported by a CNPq fellowship (grant 306251/2014-0)

    Therapy and prophylaxis of opportunistic infections in HIV-infected patients: a guideline by the German and Austrian AIDS societies (DAIG/ÖAG) (AWMF 055/066)

    Get PDF

    Viewpoint

    No full text

    ARTICLES STALKING THE WILY HACKER

    No full text
    of trying to keep the intruder out, we took the novel approach of allowing him access while we printed out his activities and traced him to his source. This trace back was harder than we expected, requiring nearly a year of work and the cooperation of many organizations. This article tells the story of the break-ins and the trace, and sums up what we learned. We approached the problem as a short, scientific exercise in discovery, intending to determine who was breaking into our system and document the exploited weaknesses. It became apparent, however, that rather than innocuously playing around, the intruder was using our computer as a hub to reach many others. His main interest was in computers operated by the military and by defense contractors. Targets and keywords suggested that he was attempting espionage by remotely entering sensitive computers and stealing data; at least he exhibited an unusual interest in a few, specifically military topics. Although most attacked computers were at military and defense contractor sites, some were at universities and research organizations. Over the next 10 months, we watched this individual attack about 450 computers and successfully enter more than 30. LBL is a research institute with few military contracts and no classified research (unlike our siste

    Resolving webuser on the fly

    No full text

    Information Security Management Handbook

    No full text
    corecore