Search results for "GAL"
showing 10 items of 9260 documents
Physiological and autonomic stress responses after prolonged sleep restriction and subsequent recovery sleep in healthy young men
2018
Purpose Sleep restriction is increasingly common and associated with the development of health problems. We investigated how the neuroendocrine stress systems respond to prolonged sleep restriction and subsequent recovery sleep in healthy young men. Methods After two baseline (BL) nights of 8 h time in bed (TIB), TIB was restricted to 4 h per night for five nights (sleep restriction, SR, n = 15), followed by three recovery nights (REC) of 8 h TIB, representing a busy workweek and a recovery weekend. The control group (n = 8) had 8 h TIB throughout the experiment. A variety of autonomic cardiovascular parameters, together with salivary neuropeptide Y (NPY) and cortisol levels, were assessed.…
L’eterno ritorno del problema del metodo
2022
Fabio Ciaramelli’s book L’ordine simbolico della legge e il problema del metodo proposes a convincing methodological perspective for legal knowledge in contemporary constitutional democracies. The central claim is that a middle path between strong objectivism and absolute discretion exists. Ciaramelli thinks that the key concept for legal methodology is that of “symbolic order”. In this paper I deal with this notion and try to emphasize some features of it from a perspective slightly different from Ciaramelli’s one.
AsYouLikeHim: Images ofGalileoSince the17thCentury
2003
Predictive Model for Cut-Edge Corrosion of Galvanized Steels
2006
A numerical model for the electrochemical behavior of cut-edge of galvanized steels is proposed. Some experimental data of current densities above cut-edge immersed in a 0.03M NaCl solution have been measured, using a scanning vibrating electrode technique, and compared with some simulated ones. A good fit has been obtained. The model geometry has been modified by decreasing the electrolyte thickness in order to tend towards an atmospheric corrosion case; such situation that is not easily accessible by electrochemical studies. Three regions can be distinguished according to the efficiency of the galvanic coupling to protect steel.
Semi-discrete Galerkin approximation method applied to initial boundary value problems for Maxwell's equations in anisotropic, inhomogeneous media
1981
SynopsisIn this paper the semi-discrete Galerkin approximation of initial boundary value problems for Maxwell's equations is analysed. For the electric field a hyperbolic system of equations is first derived. The standard Galerkin method is applied to this system and a priori error estimates are established for the approximation.
The Uses of Analogies in Seventeenth and Eighteenth Century Science
2011
The object of this paper is to look at the extent and nature of the uses of analogy during the first century following the so-called scientific revolution.Using the research tool provided by JSTOR we systematically analyze the uses of “analog” and its cognates (analogies, analogous, etc.) in the Philosophical Transactions of the Royal Society of London for the period 1665–1780. In addition to giving the possibility of evaluating quantitatively the proportion of papers explicitly using analogies, this approach makes it possible to go beyond the maybe idiosyncratic cases of Descartes, Kepler, Galileo, and other much studied giants of the so-called Scientific Revolution. As a result a classifi…
Self-Defence Against Non-State Actors: Impulses from the Max Planck Trialogues on the Law of Peace and War
2017
The legality of self-defence against non-state actors is currently one of the most contested issues of the jus contra bellum. How should we interpret state practice – has it already given rise, in law, to a broader concept of self-defence, or is the traditional state centred view still good law? Under which specific requirements should self-defence against non-state actors, if at all, be regarded as lawful and how can an abuse of an extended right to self-defence be prevented? The “Impulses from the Max Planck Trialogues on the Law of Peace and War” consist of short essays dealing with these questions. The essays are grouped in four categories: 1) restrictivist positions upholding a state-c…
Optical study of gallium and nitrogen polarity layers of GaN grown on sapphire
2003
A confocal Raman spectroscopic study was carried out on either side of an intentionally grown GaN inversion domain boundary between a pair of strips with opposite (Ga- or N-) polarity. It is shown that the Raman spectra on the N-polarity side displays an A1(TO) mode, prohibited by symmetry considerations, meanwhile on Ga-polarity material this peak is absent, indicating a lower density of defects present in this region. The Raman spectra reveal that in the lateral direction, the change in structural quality accross the inversion domain boundary is rather continuous and extends along 4 ± 1 μm. (© 2003 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim)
Online activity traces around a "Boston bomber"
2013
This paper describes traces of user activity around a alleged online social network profile of a Boston Marathon bombing suspect, after the tragedy occurred. The analyzed data, collected with the help of an automatic social media monitoring software, includes the perpetrator's page saved at the time the bombing suspects' names were made public, and the subsequently appearing comments left on that page by other users. The analyses suggest that a timely protection of online media records of a criminal could help prevent a large-scale public spread of communication exchange pertaining to the suspects/criminals' ideas, messages, and connections.
A Novel Model for Cybersecurity Economics and Analysis
2017
In recent times, major cybersecurity breaches and cyber fraud had huge negative impact on victim organisations. The biggest impact made on major areas of business activities. Majority of organisations facing cybersecurity adversity and advanced threats suffers from huge financial and reputation loss. The current security technologies, policies and processes are providing necessary capabilities and cybersecurity mechanism to solve cyber threats and risks. However, current solutions are not providing required mechanism for decision making on impact of cybersecurity breaches and fraud. In this paper, we are reporting initial findings and proposing conceptual solution. The paper is aiming to pr…