Refine
Departments, institutes and facilities
- Fachbereich Angewandte Naturwissenschaften (30)
- Fachbereich Wirtschaftswissenschaften (29)
- Institut für Technik, Ressourcenschonung und Energieeffizienz (TREE) (25)
- Internationales Zentrum für Nachhaltige Entwicklung (IZNE) (20)
- Fachbereich Ingenieurwissenschaften und Kommunikation (18)
- Fachbereich Sozialpolitik und Soziale Sicherung (18)
- Fachbereich Informatik (16)
- Institut für funktionale Gen-Analytik (IFGA) (13)
- Institut für Cyber Security & Privacy (ICSP) (11)
- Institut für Verbraucherinformatik (IVI) (10)
Document Type
- Article (65)
- Conference Object (44)
- Part of a Book (15)
- Working Paper (12)
- Preprint (5)
- Part of Periodical (4)
- Conference Proceedings (3)
- Contribution to a Periodical (1)
- Master's Thesis (1)
- Other (1)
Year of publication
- 2021 (153) (remove)
Has Fulltext
- yes (153) (remove)
Keywords
- Big Data Analysis (3)
- Usable Security (3)
- radiation (3)
- recovery (3)
- AOD (2)
- Augmented Reality (2)
- Authentication features (2)
- C sequestration (2)
- C source (2)
- COD (2)
Cancer is a complex disease where resistance to therapies and relapses often pose a serious clinical challenge. The scenario is even more complicated when the cancer type itself is heterogeneous in nature, e.g., lymphoma, a cancer of the lymphocytes which constitutes more than 70 different subtypes. Indeed, the treatment options continue to expand in lymphomas. Herein, we provide insights into lymphoma-specific clinical trials based on cytokine-induced killer (CIK) cell therapy and other pre-clinical lymphoma models where CIK cells have been used along with other synergetic tumor-targeting immune modules to improve their therapeutic potential. From a broader perspective, we will highlight that CIK cell therapy has potential, and in this rapidly evolving landscape of cancer therapies its optimization (as a personalized therapeutic approach) will be beneficial in lymphomas.
Cytokine-induced killer (CIK) cells are an ex vivo expanded heterogeneous cell population with an enriched NK-T phenotype (CD3+CD56+). Due to the convenient and relatively inexpensive expansion capability, together with low incidence of graft versus host disease (GVHD) in allogeneic cancer patients, CIK cells are a promising candidate for immunotherapy. It is well known that natural killer group 2D (NKG2D) plays an important role in CIK cell-mediated antitumor activity; however, it remains unclear whether its engagement alone is sufficient or if it requires additional co-stimulatory signals to activate the CIK cells. Likewise, the role of 2B4 has not yet been identified in CIK cells. Herein, we investigated the individual and cumulative contribution of NKG2D and 2B4 in the activation of CIK cells. Our analysis suggests that (a) NKG2D (not 2B4) is implicated in CIK cell (especially CD3+CD56+ subset)-mediated cytotoxicity, IFN-γ secretion, E/T conjugate formation, and degranulation; (b) NKG2D alone is adequate enough to induce degranulation, IFN-γ secretion, and LFA-1 activation in CIK cells, while 2B4 only provides limited synergy with NKG2D (e.g., in LFA-1 activation); and (c) NKG2D was unable to costimulate CD3. Collectively, we conclude that NKG2D engagement alone suffices to activate CIK cells, thereby strengthening the idea that targeting the NKG2D axis is a promising approach to improve CIK cell therapy for cancer patients. Furthermore, CIK cells exhibit similarities to classical invariant natural killer (iNKT) cells with deficiencies in 2B4 stimulation and in the costimulation of CD3 with NKG2D. In addition, based on the current data, the divergence in receptor function between CIK cells and NK (or T) cells can be assumed, pointing to the possibility that molecular modifications (e.g., using chimeric antigen receptor technology) on CIK cells may need to be customized and optimized to maximize their functional potential.
The clear-sky radiative effect of aerosol-radiation interactions is of relevance for our understanding of the climate system. The influence of aerosol on the surface energy budget is of high interest for the renewable energy sector. In this study, the radiative effect is investigated in particular with respect to seasonal and regional variations for the region of Germany and the year 2015 at the surface and top of atmosphere using two complementary approaches.
First, an ensemble of clear-sky models which explicitly consider aerosols is utilized to retrieve the aerosol optical depth and the surface direct radiative effect of aerosols by means of a clear sky fitting technique. For this, short-wave broadband irradiance measurements in the absence of clouds are used as a basis. A clear sky detection algorithm is used to identify cloud free observations. Considered are measurements of the shortwave broadband global and diffuse horizontal irradiance with shaded and unshaded pyranometers at 25 stations across Germany within the observational network of the German Weather Service (DWD). Clear sky models used are MMAC, MRMv6.1, METSTAT, ESRA, Heliosat-1, CEM and the simplified Solis model. The definition of aerosol and atmospheric characteristics of the models are examined in detail for their suitability for this approach.
Second, the radiative effect is estimated using explicit radiative transfer simulations with inputs on the meteorological state of the atmosphere, trace-gases and aerosol from CAMS reanalysis. The aerosol optical properties (aerosol optical depth, Ångström exponent, single scattering albedo and assymetrie parameter) are first evaluated with AERONET direct sun and inversion products. The largest inconsistency is found for the aerosol absorption, which is overestimated by about 0.03 or about 30 % by the CAMS reanalysis. Compared to the DWD observational network, the simulated global, direct and diffuse irradiances show reasonable agreement within the measurement uncertainty. The radiative kernel method is used to estimate the resulting uncertainty and bias of the simulated direct radiative effect. The uncertainty is estimated to −1.5 ± 7.7 and 0.6 ± 3.5 W m−2 at the surface and top of atmosphere, respectively, while the annual-mean biases at the surface, top of atmosphere and total atmosphere are −10.6, −6.5 and 4.1 W m−2, respectively.
The retrieval of the aerosol radiative effect with the clear sky models shows a high level of agreement with the radiative transfer simulations, with an RMSE of 5.8 W m−2 and a correlation of 0.75. The annual mean of the REari at the surface for the 25 DWD stations shows a value of −12.8 ± 5 W m−2 as average over the clear sky models, compared to −11 W m−2 from the radiative transfer simulations. Since all models assume a fixed aerosol characterisation, the annual cycle of the aerosol radiation effect cannot be reproduced. Out of this set of clear sky models, the largest level of agreement is shown by the ESRA and MRMv6.1 models.
The clear-sky radiative effect of aerosol–radiation interactions is of relevance for our understanding of the climate system. The influence of aerosol on the surface energy budget is of high interest for the renewable energy sector. In this study, the radiative effect is investigated in particular with respect to seasonal and regional variations for the region of Germany and the year 2015 at the surface and top of atmosphere using two complementary approaches.
First, an ensemble of clear-sky models which explicitly consider aerosols is utilized to retrieve the aerosol optical depth and the surface direct radiative effect of aerosols by means of a clear-sky fitting technique. For this, short-wave broadband irradiance measurements in the absence of clouds are used as a basis. A clear-sky detection algorithm is used to identify cloud-free observations. Considered are measurements of the short-wave broadband global and diffuse horizontal irradiance with shaded and unshaded pyranometers at 25 stations across Germany within the observational network of the German Weather Service (DWD). The clear-sky models used are the Modified MAC model (MMAC), the Meteorological Radiation Model (MRM) v6.1, the Meteorological–Statistical solar radiation model (METSTAT), the European Solar Radiation Atlas (ESRA), Heliosat-1, the Center for Environment and Man solar radiation model (CEM), and the simplified Solis model. The definition of aerosol and atmospheric characteristics of the models are examined in detail for their suitability for this approach.
Second, the radiative effect is estimated using explicit radiative transfer simulations with inputs on the meteorological state of the atmosphere, trace gases and aerosol from the Copernicus Atmosphere Monitoring Service (CAMS) reanalysis. The aerosol optical properties (aerosol optical depth, Ångström exponent, single scattering albedo and asymmetry parameter) are first evaluated with AERONET direct sun and inversion products. The largest inconsistency is found for the aerosol absorption, which is overestimated by about 0.03 or about 30 % by the CAMS reanalysis. Compared to the DWD observational network, the simulated global, direct and diffuse irradiances show reasonable agreement within the measurement uncertainty. The radiative kernel method is used to estimate the resulting uncertainty and bias of the simulated direct radiative effect. The uncertainty is estimated to −1.5 ± 7.7 and 0.6 ± 3.5 W m−2 at the surface and top of atmosphere, respectively, while the annual-mean biases at the surface, top of atmosphere and total atmosphere are −10.6, −6.5 and 4.1 W m−2, respectively.
The retrieval of the aerosol radiative effect with the clear-sky models shows a high level of agreement with the radiative transfer simulations, with an RMSE of 5.8 W m−2 and a correlation of 0.75. The annual mean of the REari at the surface for the 25 DWD stations shows a value of −12.8 ± 5 W m−2 as the average over the clear-sky models, compared to −11 W m−2 from the radiative transfer simulations. Since all models assume a fixed aerosol characterization, the annual cycle of the aerosol radiation effect cannot be reproduced. Out of this set of clear-sky models, the largest level of agreement is shown by the ESRA and MRM v6.1 models.
In thyroid carcinoma cells, the soluble βgalactosidespecific lectin, galectin3, is extra and intracellularly expressed and plays a significant role in thyroid cancer diagnosis. The functional relevance of this molecule, particularly in its extracellular environment however, warrants further elucidation. To gain insight into this topic, the present study characterized principal functional properties of galectin3 in 3 commonly used thyroid carcinoma cell lines (BCPAP, Cal62 and FTC133) that express the molecule intra and extracellulary. Cellintrinsic galectin3 harbors a functional carbohydrate recognition domain as determined by affinity purification. Moreover, cell surface expressed galectin3 can be partially removed by treatment with lactose or asialofetuin, but not with sucrose. Thyroid carcinoma cells adhere to substratebound galectin3 in a βgalactosidespecific manner, whereby only cell adhesion, but not cell migration is promoted. Thus, thyroid tumor cells harbor functional active galectin3 that, inter alia, specifically interacts with cell surfaceexpressed molecular ligands in a βgalactosidedependent manner, whereby the molecule can at least interfere with cell adhesion. The modulation of galectin3 expression level or its ligands in such tumor cells could be of therapeutic interest and needs further experimental clarification.
Turbulent compressible flows are traditionally simulated using explicit time integrators applied to discretized versions of the Navier-Stokes equations. However, the associated Courant-Friedrichs-Lewy condition severely restricts the maximum time-step size. Exploiting the Lagrangian nature of the Boltzmann equation’s material derivative, we now introduce a feasible three-dimensional semi-Lagrangian lattice Boltzmann method (SLLBM), which circumvents this restriction. While many lattice Boltzmann methods for compressible flows were restricted to two dimensions due to the enormous number of discrete velocities in three dimensions, the SLLBM uses only 45 discrete velocities. Based on compressible Taylor-Green vortex simulations we show that the new method accurately captures shocks or shocklets as well as turbulence in 3D without utilizing additional filtering or stabilizing techniques other than the filtering introduced by the interpolation, even when the time-step sizes are up to two orders of magnitude larger compared to simulations in the literature. Our new method therefore enables researchers to study compressible turbulent flows by a fully explicit scheme, whose range of admissible time-step sizes is dictated by physics rather than spatial discretization.
Off-lattice Boltzmann methods increase the flexibility and applicability of lattice Boltzmann methods by decoupling the discretizations of time, space, and particle velocities. However, the velocity sets that are mostly used in off-lattice Boltzmann simulations were originally tailored to on-lattice Boltzmann methods. In this contribution, we show how the accuracy and efficiency of weakly and fully compressible semi-Lagrangian off-lattice Boltzmann simulations is increased by velocity sets derived from cubature rules, i.e. multivariate quadratures, which have not been produced by the Gauß-product rule. In particular, simulations of 2D shock-vortex interactions indicate that the cubature-derived degree-nine D2Q19 velocity set is capable to replace the Gauß-product rule-derived D2Q25. Likewise, the degree-five velocity sets D3Q13 and D3Q21, as well as a degree-seven D3V27 velocity set were successfully tested for 3D Taylor–Green vortex flows to challenge and surpass the quality of the customary D3Q27 velocity set. In compressible 3D Taylor–Green vortex flows with Mach numbers on-lattice simulations with velocity sets D3Q103 and D3V107 showed only limited stability, while the off-lattice degree-nine D3Q45 velocity set accurately reproduced the kinetic energy provided by literature.
The identification of energetic materials in containments is an important challenge for analytical methods in the field of safety and security. Opening a package without knowledge of its contents and the resulting hazards is highly involved with risks and should be avoided whenever possible. Therefore, preferable methods work non-destructive with minimal interaction and are capable of identifying target substances in a containment quickly and reliably. Most spectroscopic methods find their limits, if the target substance is shielded by a covering material. To solve this problem, a combined laser drilling method with subsequent identification of the target substance by means of Raman spectroscopic measurements through microscopic bore holes of the covering material is presented. A pulsed laser beam is used for both the drilling process and as an excitation source for Raman measurements in the same optical setup. Results show the ability of this new method to gain high-quality spectra even when performed through microscopic small bore channels. With the laser parameters chosen right, the method can even be performed on highly sensitive explosives like triacetone triperoxide (TATP). Another advantageous effect arises in an observed reduction in unwanted fluorescence signal in the spectral data, resulting from the confocal-like measurement setup with the bore hole acting as aperture.
Risk-based authentication (RBA) extends authentication mechanisms to make them more robust against account takeover attacks, such as those using stolen passwords. RBA is recommended by NIST and NCSC to strengthen password-based authentication, and is already used by major online services. Also, users consider RBA to be more usable than two-factor authentication and just as secure. However, users currently obtain RBA's high security and usability benefits at the cost of exposing potentially sensitive personal data (e.g., IP address or browser information). This conflicts with user privacy and requires to consider user rights regarding the processing of personal data. We outline potential privacy challenges regarding different attacker models and propose improvements to balance privacy in RBA systems. To estimate the properties of the privacy-preserving RBA enhancements in practical environments, we evaluated a subset of them with long-term data from 780 users of a real-world online service. Our results show the potential to increase privacy in RBA solutions. However, it is limited to certain parameters that should guide RBA design to protect privacy. We outline research directions that need to be considered to achieve a widespread adoption of privacy preserving RBA with high user acceptance.
Risk-based authentication (RBA) aims to strengthen password-based authentication rather than replacing it. RBA does this by monitoring and recording additional features during the login process. If feature values at login time differ significantly from those observed before, RBA requests an additional proof of identification. Although RBA is recommended in the NIST digital identity guidelines, it has so far been used almost exclusively by major online services. This is partly due to a lack of open knowledge and implementations that would allow any service provider to roll out RBA protection to its users. To close this gap, we provide a first in-depth analysis of RBA characteristics in a practical deployment. We observed N=780 users with 247 unique features on a real-world online service for over 1.8 years. Based on our collected data set, we provide (i) a behavior analysis of two RBA implementations that were apparently used by major online services in the wild, (ii) a benchmark of the features to extract a subset that is most suitable for RBA use, (iii) a new feature that has not been used in RBA before, and (iv) factors which have a significant effect on RBA performance. Our results show that RBA needs to be carefully tailored to each online service, as even small configuration adjustments can greatly impact RBA's security and usability properties. We provide insights on the selection of features, their weightings, and the risk classification in order to benefit from RBA after a minimum number of login attempts.
Risk-based authentication (RBA) is an adaptive security measure to strengthen password-based authentication against account takeover attacks. Our study on 65 participants shows that users find RBA more usable than two-factor authentication equivalents and more secure than password-only authentication. We identify pitfalls and provide guidelines for putting RBA into practice.
Risk-based authentication (RBA) aims to strengthen password-based authentication rather than replacing it. RBA does this by monitoring and recording additional features during the login process. If feature values at login time differ significantly from those observed before, RBA requests an additional proof of identification. Although RBA is recommended in the NIST digital identity guidelines, it has so far been used almost exclusively by major online services. This is partly due to a lack of open knowledge and implementations that would allow any service provider to roll out RBA protection to its users.
To close this gap, we provide a first in-depth analysis of RBA characteristics in a practical deployment. We observed N=780 users with 247 unique features on a real-world online service for over 1.8 years. Based on our collected data set, we provide (i) a behavior analysis of two RBA implementations that were apparently used by major online services in the wild, (ii) a benchmark of the features to extract a subset that is most suitable for RBA use, (iii) a new feature that has not been used in RBA before, and (iv) factors which have a significant effect on RBA performance. Our results show that RBA needs to be carefully tailored to each online service, as even small configuration adjustments can greatly impact RBA's security and usability properties. We provide insights on the selection of features, their weightings, and the risk classification in order to benefit from RBA after a minimum number of login attempts.
Many workers experience their jobs as effortful or even stressful, which can result in strain. Although recovery from work would be an adaptive strategy to prevent the adverse effects of work-related strain, many workers face problems finding enough time to rest and to mentally disconnect from work during nonwork time. What goes on in workers’ minds after a stressful workday? What is it about their jobs that makes them think about their work? This special issue aims to bridge the gap between research on recovery processes mainly examined in Occupational Health Psychology, and research on work stress and working hours, often investigated in the field of Human Resource Management. We first summarize conceptual and theoretical streams from both fields of research. In the following, we discuss the contributions of the five special issue papers and conclude with key messages and directions for further research.
Although work events can be regarded as pivotal elements of organizational life, only a few studies have examined how positive and negative events relate to and combine to affect work engagement over time. Theory suggests that, to better understand how current events affect work engagement (WE), we have to account for recent events that have preceded these current events. We present competing theoretical views on how recent and current work events may affect employees (e.g., getting used to a high frequency of negative events or becoming more sensitive to negative events). Although the occurrence of events implies discrete changes in the experience of work, prior research has not considered whether work events actually accumulate to sustained mid-term changes in WE. To address these gaps in the literature, we conducted a week-level longitudinal study across a period of 15 consecutive weeks among 135 employees, which yielded 849 weekly observations. While positive events were associated with higher levels of WE within the same week, negative events were not. Our results support neither satiation nor sensitization processes. However, a high frequency of negative events in the preceding week amplified the beneficial effects of positive events on WE in the current week. Growth curve analyses show that the benefits of positive events accumulate to sustain high levels of WE. WE dissipates in the absence of a continuous experience of positive events. Our study adds a temporal component by highlighting that positive events affect work engagement, particularly in light of recent negative events. Our study informs research that has taken a feature-oriented perspective on the dynamic interplay of job demands and resources.
The synthesis and characterization of a new class of 1,2,4-oxadiazolylpyridinium as a cationic scaffold for fluorinated ionic liquid crystals is herein described. A series of 12 fluorinated heterocyclic salts based on a 1,2,4-oxadiazole moiety, connected through its C(5) or C(3) to an N-alkylpyridinium unit and a perfluoroheptyl chain, differing in the length of the alkyl chain and counterions, has been synthesized. As counterions iodide, bromide and bis(trifluoromethane)sulfonimide have been considered. The synthesis, structure, and liquid crystalline properties of these compounds are discussed on the basis of the tuned structural variables. The thermotropic properties of this series of salts have been investigated by differential scanning calorimetry and polarized optical microscopy. The results showed the existence of an enantiotropic mesomorphic smectic liquid crystalline phase for six bis(trifluoromethane)sulfonimide salts.
New sustainable, environmentally friendly materials for thermal insulation of buildings are necessary to reduce their carbon footprints. In this study, Miscanthus fiber-reinforced geopolymer composites, foamed with sodium dodecyl sulfate (SDS), were developed using fly ash as a geopolymer precursor. The effects of fiber content, fiber size, curing temperature, foaming agent content, fumed silica specific surface area and fumed silica content on thermal conductivity and compressive strength were evaluated using a Plackett-Burman design of experiment. Furthermore, the microstructure of geopolymer composites was investigated using X-ray diffraction (XRD), X-ray micro-computed tomography (μCT) and scanning electron microscopy (SEM). The measured characteristic values were in the following ranges: Thermal conductivity 0.057 W (m K)−1 to 0.127 W (m K)−1, compressive strength 0.007 MPa–0.719 MPa and porosity 49 vol% to 76 vol%. The results reveal an enhancement of thermal conductivity by elevated fiber size and foaming agent content. In contrast, the compressive strength is enhanced by high fiber content. Additionally, SEM images indicate a good interaction between the fibers and the geopolymer matrix, because nearly the whole fiber surface is covered by the geopolymer.
Aim: To understand how transcriptional factors Pdr1 and Pdr3, belonging to the pleiotropic drug resistance system, are activated, and regulated after introducing chemical toxins to the cell in the model organism Saccharomyces cerevisiae.
Methods: Series of molecular methods were applied using different strains of S. cerevisiae over-expressing proteins of interest as a eukaryotic cell model. The chemical stress introduced to the cell is represented by menadione. Results were obtained performing protein detection and analysis. Additionally, the regulation of the DNA binding of the transcriptional activators after stimulation is quantified using chromatin immunoprecipitation, employing epitope-tagged factors and real-time qPCR.
Results: Our results indicated higher expression levels of the Pdr1 transcriptional factor, compared to its homologous Pdr3 after treatment with menadione. The yeast-cell defence system was tested against various organic solvents to exclude the possibility of their presence potentially affecting the results. The results indicate that Pdr1 is most abundant after 30 minutes from the beginning of the treatment, compared with 240 minutes after the treatment when the function of the transcription factor is faded. It appears that Pdr1 binding to the PDR5 and SNQ2 promoters, which are both activated by Pdr1, peaks around the same time, or more precisely after 40 minutes from the start of the treatment.
Conclusion: The tendency of Pdr1 reduction after its activation by menadione is detected. One possibility is that Pdr1, after recognizing the xenobiotic menadione, is removed by a degradation mechanism. Given the fact that Pdr1 directly binds the xenobiotic molecule, its destruction might help the cells to remove toxic levels of menadione. It is possible that overexpressing the part of Pdr1 which recognizes menadione alone was sufficient to detoxify and hence produce a tolerance towards menadione.
Machine learning and neural networks are now ubiquitous in sonar perception, but it lags behind the computer vision field due to the lack of data and pre-trained models specifically for sonar images. In this paper we present the Marine Debris Turntable dataset and produce pre-trained neural networks trained on this dataset, meant to fill the gap of missing pre-trained models for sonar images. We train Resnet 20, MobileNets, DenseNet121, SqueezeNet, MiniXception, and an Autoencoder, over several input image sizes, from 32 x 32 to 96 x 96, on the Marine Debris turntable dataset. We evaluate these models using transfer learning for low-shot classification in the Marine Debris Watertank and another dataset captured using a Gemini 720i sonar. Our results show that in both datasets the pre-trained models produce good features that allow good classification accuracy with low samples (10-30 samples per class). The Gemini dataset validates that the features transfer to other kinds of sonar sensors. We expect that the community benefits from the public release of our pre-trained models and the turntable dataset.
Applied privacy research has so far focused mainly on consumer relations in private life. Privacy in the context of employment relationships is less well studied, although it is subject to the same legal privacy framework in Europe. The European General Data Protection Regulation (GDPR) has strengthened employees’ right to privacy by obliging that employers provide transparency and intervention mechanisms. For such mechanisms to be effective, employees must have a sound understanding of their functions and value. We explored possible boundaries by conducting a semistructured interview study with 27 office workers in Germany and elicited mental models of the right to informational self-determination, which is the European proxy for the right to privacy. We provide insights into (1) perceptions of different categories of data, (2) familiarity with the legal framework regarding expectations for privacy controls, and (3) awareness of data processing, data flow, safeguards, and threat models. We found that legal terms often used in privacy policies used to describe categories of data are misleading. We further identified three groups of mental models that differ in their privacy control requirements and willingness to accept restrictions on their privacy rights. We also found ignorance about actual data flow, processing, and safeguard implementation. Participants’ mindsets were shaped by their faith in organizational and technical measures to protect privacy. Employers and developers may benefit from our contributions by understanding the types of privacy controls desired by office workers and the challenges to be considered when conceptualizing and designing usable privacy protections in the workplace.
Intimate swabs taken for examination in sexual assault cases typically yield mixtures of sperm and epithelial cell types. While powerful, differential extraction protocols to overcome such cell type mixtures by separate lysis of epithelial cells and spermatozoa can still prove ineffective, in particular if only few sperm cells are present or if swabs contain sperm from more than one individual leading to complex low level DNA mixtures. A means to avoid such mixtures consists in the analysis of single micromanipulated sperm cells. However, the quantity of DNA from single sperm cells is not sufficient for conventional STR analysis. Here, we describe a simple method for micromanipulating individual sperm cells from intimate swabs and show that whole genome amplification can generate sufficient amounts of DNA from single cells for subsequent DNA profiling. We recovered over 80% of alleles of haploid autosomal STR profiles from the majority of individual sperm cells. Furthermore, we demonstrate that in mixtures of sperm from two contributors, Y-STR and X-STR profiles of individual sperm cells can be used to sort the haploid autosomal profiles to develop the diploid consensus STR profiles of the individual donors. Finally, by analysing single sperm cells from mock sexual assault swabs with one or two sperm donors, we showed that our protocols enabled the identification of the unknown male contributors.
The aim of this study was to investigate employees’ self-reported creativity before and after vacation and to examine the impact of recovery experiences (detachment, relaxation, mastery, meaning, autonomy, affiliation) on changes in creativity. The DRAMMA model of Newman et al. provides the theoretical background of our approach. Longitudinal data was assessed with four repeated measurements. The study encompassed data from 274 white-collar workers. Analyses showed that employees subjectively perceive their creativity to benefit not immediately after their vacation but 2 weeks later. Detachment was significantly related to lower creativity within persons, while mastery experiences explained differences in creativity between persons. This study provides a detailed picture of changes in creativity around vacations.
For several decades, farmers have been mixing rock powders with livestock slurry to reduce its NH3 emissions and increase its nutrient content. However, mixing rock powders with slurry is controversial, and there is currently no scientific evidence for its effects on NH3 and greenhouse gas (GHG) emissions or on changes in its nutrient content due to element release from rock powders. The major aim of this study was therefore to analyse the effects of mixing two commercially established rock powders with cattle slurry on NH3, CO2, N2O and CH4 emissions, and on nutrient release over a course of 46 days. We found that rock powders did not significantly affect CO2 emission rates. NH3 and N2O emission rates did not differ significantly up until the end of the trial, when the emission rates of the rock powder treatments significantly increased for NH3 and significantly decreased for N2O, respectively, which coincided with a reduction of the slurry crust. Cumulative NH3 emissions did not, however, differ significantly between treatments. Unexpected and significant increases in CH4 emission rates occurred for the rock powder treatments. Rock powders increased the macro- and micronutrient content of the slurry. The conflicting results are discussed and future research directions are proposed.
Cultivation of Miscanthus x giganteus L. (Mis) with annual harvest of biomass could provide an additional C source for farmers. To test the potential of Mis-C for immobilizing inorganic N from slurry or manure and as a C source for soil organic matter build-up in comparison to wheat (Triticum aestivum L.) straw (WS), a greenhouse experiment was performed. Pot experiments with ryegrass (Lolium perenne L.) were set up to investigate the N dynamics of two organic fertilisers based on Mis at Campus Klein-Altendorf, Germany. The two fertilisers, a mixture of cattle slurry and Mis as well as cattle manure from Mis-bedding material resulted in a slightly higher N immobilisation. Especially at the 1st and 2nd harvest, they were partly significantly different compared with the WS treatments. The fertilisers based on Mis resulted in a slightly higher microbial biomass C and microbial biomass N and thus can be identified as an additional C source to prevent nitrogen losses and for the build-up of soil organic matter (SOM) in the long-term.
Cultivation of perennials such as Miscanthus x giganteus Greef et Deuter (Mis) combines the provision of ecosystem services and the generation of additional carbon sources for farming. The potential of Mis based fertilisers, regarding immobilisation of inorganic nitrogen (N) and build-up of soil organic matter (SOM), was tested in a field trial. Therefore, a crop rotation of winter barley (Hordeum vulgare L.), mustard (Sinapis alba L.) as catch crop, sugar beet (Beta vulgaris L.) and winter wheat (Triticum aestivum L.) was set up. The tested treatments were a mixture of Cattle Slurry (CS) and Mis, a mixture of CS and Wheat Straw (CS–WS), Cattle Manure (CM) from Mis shredded bedding, CM from WS shredded bedding, a pure CS, Urea Ammonium Nitrate (UAN) and a treatment without any N applied (NoN). When the carbon-rich fertilisers (both mixtures and manures) were applied to cereals, they led to a slight N immobilisation compared to pure CS, whereas differences were mostly not significant. Furthermore, Mis fertilisers were at least as efficient as WS-based organic fertilisers in inducing a contribution of SOM build-up and in reducing inorganic N before winter and thus preventing N losses, whereas differences were mostly not significant.
Design of a Medium Voltage Generator with DC-Cascade for High Power Wind Energy Conversion Systems
(2021)
This paper shows a new concept to generate medium voltage (MV) in wind power application to avoid an additional transformer. Therefore, the generator must be redesigned with additional constraints and a new topology for the power rectifier system by using multiple low voltage (LV) power rectifiers connected in series and parallel to increase the DC output voltage. The combination of parallel and series connection of rectifiers is further introduced as DC-cascade. With the resulting DC-cascade, medium output voltage is achieved with low voltage rectifiers and without a bulky transformer. This approach to form a DC-cascade reduces the effort required to achieve medium DC voltage with a simple rectifier system. In this context, a suitable DC-cascade control was presented and verified with a laboratory test setup. A gearless synchronous generator, which is highly segmented so that each segment can be connected to its own power rectifier, is investigated. Due to the mixed AC and DC voltage given by the DC-cascade structure, it becomes more demanding to the design of the generator insulation, which influences the copper fill factor and the design of the cooling system. A design strategy for the overall generator design is carried out considering the new boundary conditions.