18 resultados para Improper inflows
Resumo:
Everglades National Park (ENP) is the last hydrologic unit in the series of impounded marsh units that make up the present-day Everglades. The ENP receives water from upstream Water Conservation Areas via canals and water control structures that are highly regulated for flood control, water supply, wildlife management, concerns about poor water quality and the potential for downstream ecosystem degradation. Recent surveys of surface soils in ENP, designed for random sampling for spatial analysis of soil nutrients, did not sample proximate to inflow structures and thus did not detect increased soil phosphorus associated with these water conveyances. This study specifically addressed these areas in a focused sampling effort at three key inflow points in northeast ENP which revealed elevated soil TP proximate to inflows. Two transects extending down Shark River Slough and one down Taylor Slough (a natural watershed of particular ecological value) were found to have soil TP levels in excess of 500 mg kg−1—a threshold above which P enrichment is indicated. These findings suggest the negative impact of elevated water (P) from surface flows and support the assertion that significant soil TP enrichment is occurring in Taylor Slough and other areas of northeastern ENP.
Resumo:
Understanding the relationships between hydrology and salinity and plant community structure and production is critical to allow predictions of wetland responses to altered water management, changing precipitation patterns and rising sea-level. We addressed how salinity, water depth, hydroperiod, canal inflows, and local precipitation control marsh macrophyte aboveground net primary production (ANPP) and structure in the coastal ecotone of the southern Everglades. We contrasted responses in two watersheds - Taylor Slough (TS) and C-111 - systems that have and will continue to experience changes in water management. Based on long-term trajectories in plant responses, we found continued evidence of increasing water levels and length of inundation in the C-111 watershed south of the C-111 canal. We also found strong differentiation among sites in upper TS that was dependent on hydrology. Finally, salinity, local precipitation and freshwater discharge from upstream explained over 80 % of the variance in Cladium ANPP at a brackish water site in TS. Moreover, our study showed that, while highly managed, the TS and C-111 watersheds maintain legacies in spatial pattern that would facilitate hydrologic restoration. Based on the trajectories in Cladium and Eleocharis, shifts in plant community structure could occur within 5–10 years of sustained water management change.
Resumo:
Protecting confidential information from improper disclosure is a fundamental security goal. While encryption and access control are important tools for ensuring confidentiality, they cannot prevent an authorized system from leaking confidential information to its publicly observable outputs, whether inadvertently or maliciously. Hence, secure information flow aims to provide end-to-end control of information flow. Unfortunately, the traditionally-adopted policy of noninterference, which forbids all improper leakage, is often too restrictive. Theories of quantitative information flow address this issue by quantifying the amount of confidential information leaked by a system, with the goal of showing that it is intuitively "small" enough to be tolerated. Given such a theory, it is crucial to develop automated techniques for calculating the leakage in a system. ^ This dissertation is concerned with program analysis for calculating the maximum leakage, or capacity, of confidential information in the context of deterministic systems and under three proposed entropy measures of information leakage: Shannon entropy leakage, min-entropy leakage, and g-leakage. In this context, it turns out that calculating the maximum leakage of a program reduces to counting the number of possible outputs that it can produce. ^ The new approach introduced in this dissertation is to determine two-bit patterns, the relationships among pairs of bits in the output; for instance we might determine that two bits must be unequal. By counting the number of solutions to the two-bit patterns, we obtain an upper bound on the number of possible outputs. Hence, the maximum leakage can be bounded. We first describe a straightforward computation of the two-bit patterns using an automated prover. We then show a more efficient implementation that uses an implication graph to represent the two- bit patterns. It efficiently constructs the graph through the use of an automated prover, random executions, STP counterexamples, and deductive closure. The effectiveness of our techniques, both in terms of efficiency and accuracy, is shown through a number of case studies found in recent literature. ^