3 resultados para 1st cycle
em Universitätsbibliothek Kassel, Universität Kassel, Germany
Resumo:
For millennia oasis agriculture has been the backbone of rural livelihood in the desertic Sultanate of Oman. However, little is known about the functioning of these oasis systems, in particular with respect to the C turnover. The objective was to determine the effects of crop, i.e. alfalfa, wheat and bare fallow on the CO2 evolution rate during an irrigation cycle in relation to changes in soil water content and soil temperature. The gravimetric soil water content decreased from initially 24% to approximately 16% within 7 days after irrigation. The mean CO2 evolution rates increased significantly in the order fallow (27.4 mg C m^−2 h^−1) < wheat (45.5 mg C m^−2 h^−1) < alfalfa (97.5 mg C m^−2 h^−1). It can be calculated from these data that the CO2 evolution rate of the alfalfa root system was nearly four times higher than the corresponding rate in the wheat root system. The decline in CO2 evolution rate, especially during the first 4 days after irrigation, was significantly related to the decline in the gravimetric water content, with r = 0.70. CO2 evolution rate and soil temperature at 5 cm depth were negatively correlated (r = -0.56,n = 261) due to increasing soil temperature with decreasing gravimetric water content.
Resumo:
With this document, we provide a compilation of in-depth discussions on some of the most current security issues in distributed systems. The six contributions have been collected and presented at the 1st Kassel Student Workshop on Security in Distributed Systems (KaSWoSDS’08). We are pleased to present a collection of papers not only shedding light on the theoretical aspects of their topics, but also being accompanied with elaborate practical examples. In Chapter 1, Stephan Opfer discusses Viruses, one of the oldest threats to system security. For years there has been an arms race between virus producers and anti-virus software providers, with no end in sight. Stefan Triller demonstrates how malicious code can be injected in a target process using a buffer overflow in Chapter 2. Websites usually store their data and user information in data bases. Like buffer overflows, the possibilities of performing SQL injection attacks targeting such data bases are left open by unwary programmers. Stephan Scheuermann gives us a deeper insight into the mechanisms behind such attacks in Chapter 3. Cross-site scripting (XSS) is a method to insert malicious code into websites viewed by other users. Michael Blumenstein explains this issue in Chapter 4. Code can be injected in other websites via XSS attacks in order to spy out data of internet users, spoofing subsumes all methods that directly involve taking on a false identity. In Chapter 5, Till Amma shows us different ways how this can be done and how it is prevented. Last but not least, cryptographic methods are used to encode confidential data in a way that even if it got in the wrong hands, the culprits cannot decode it. Over the centuries, many different ciphers have been developed, applied, and finally broken. Ilhan Glogic sketches this history in Chapter 6.
Resumo:
Ultrafast laser pulses have become an integral part of the toolbox of countless laboratories doing physics, chemistry, and biological research. The work presented here is motivated by a section in the ever-growing, interdisciplinary research towards understanding the fundamental workings of light-matter interactions. Specifically, attosecond pulses can be useful tools to obtain the desired insight. However access to, and the utility of, such pulses is dependent on the generation of intense, few-cycle, carrier-envelope-phase stabilized laser pulses. The presented work can be thought of as a sort of roadmap towards the latter. From the oscillator which provides the broadband seed to amplification methods, the integral pieces necessary for the generation of attosecond pulses are discussed. A range of topics from the fundamentals to design challenges is presented, outfitting the way towards the practical implementation of an intense few-cycle carrier-envelope-phase stabilized laser source.