Si-induced DMA desorption is not the driver for enhanced DMA availability after Si addition to flooded soils
نویسندگان
چکیده
منابع مشابه
Desorption from Si (100)
Ab initio molecular dynamics calculations of deuterium desorbing from Si(100) have been performed in order to monitor the energy redistribution among the hydrogen and silicon degrees of freedom during the desorption process. The calculations show that part of the potential energy at the transition state to desorption is transferred to the silicon lattice. The deuterium molecules leave the surfa...
متن کاملRun-DMA
Copying data from devices into main memory is a computationally-trivial, yet time-intensive, task. In order to free the CPU to perform more interesting work, computers use direct memory access (DMA) engines — a special-purpose piece of hardware — to transfer data into and out of main memory. We show that the ability to chain together such memory transfers, as provided by commodity hardware, is ...
متن کاملStimulation of Rauscher Leukemia Virus DMA Polymerase DMA-directed DMA Synthesis by Cationic Trypanocides and Polyamines1
Activated DMA-directed DNA synthesis catalyzed by Rauscher leukemia virus (RLV) and other type C mammalian retroviral DNA polymerases is uniquely stimulated by biologically active polyamines. Cationic trypanocides may act as antagonists of polyamine function. As described here, several cationic trypanocides stimulate RLV polymerase-catalyzed DNA-directed DNA synthe sis at concentrations signifi...
متن کاملPossible Role for Thymine Glycol in the Selective Inhibition of DMA Synthesis on Oxidized DMA Templates1 *'**
Single-stranded DMA of coliphage M13mp8 was treated with the oxidizing agent, KMn04, under conditions that selectively form c/'s-5,6-dihydro-5,6-dihydroxythymine (thymine glycol). Treatment of DMA with 0.7 and 1.4 HIM KMnO< introduced approximately 200 and 400 thymine glycol residues, respectively, per genome. When these DMAs were used to transform Escherichia coli, it was observed that phage s...
متن کاملUnderstanding DMA Malware
Attackers constantly explore ways to camouflage illicit activities against computer platforms. Stealthy attacks are required in industrial espionage and also by criminals stealing banking credentials. Modern computers contain dedicated hardware such as network and graphics cards. Such devices implement independent execution environments but have direct memory access (DMA) to the host runtime me...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Science of The Total Environment
سال: 2020
ISSN: 0048-9697
DOI: 10.1016/j.scitotenv.2020.139906