996 resultados para Stream self-purification


Relevância:

80.00% 80.00%

Publicador:

Resumo:

The mathematical modeling in the simulation of self-purification capacity in lotic environment is an important tool in the planning and management of hydric resources in hydrographic basin scale. It satisfactorily deals with the self-purification process when the coefficients of physical and biochemical processes are calibrated from monitorated water quality data, which was the main focus of this study. The present study was conducted to simulate the behavior of the parameters OD, BOD5, total phosphorus, E. coli, ammonia, nitrite, nitrate and the total metals cadmium, chromium, copper, lead and zinc in the Uberabinha’s lower course (with an approximate annual growth flow between 4-35 m3/s), in a stretch of 19 km downstream of the treated effluent release by the WWTP of the city. The modelings, on the present study, show the importance of constant water quality parameters monitoration over the water course, based on the comparison of the simulations from calibrated coefficients and coefficients obtained in the literature for the period of June until November 2015. After coefficients calibration, there were good adjustments between simulated and measured data for the parameters OD, BOD, Ptotal, ammonia and nitrate and unsatisfactory adjust for the parameters nitrite and E. coli. About the total metals, the adjustments were not satisfactory on the reservoir’s vicinity of the Small Hydropower Plant Martins, due the considerable increase of the bottom sediment in lentic region. The greatest scientific contribution of this study was to calibrate the decay coefficient K and the quantification of the release by the fund S of total metals in watercourse midsize WWTP pollutant load receptor, justified by the lack of studies in the literature about the subject. For the metals cadmium, chromium, copper, lead and zinc, the borderline for K and S calibrated were: 0.0 to 13.0 day-1 and 0.0 to 1.7 g/m3.day; 0.0 to 0.9 day-1 and 0.0 to 7.3 g/m3.day; 0.0 to 25.0 day-1 and 0.0 to 1.8 g/m3.day; 0.0 to 7.0 day-1 and 0.0 to 40.3 g/m3.day; 0.0 to 30.0 day-1 and 0.0 to 70.1 g/m3.day.

Relevância:

80.00% 80.00%

Publicador:

Resumo:

Making use of sea, as a place for dumping of wastes and other materials from human activities wasn’t forbidden before creation of the convention on the prevention of marine pollution by dumping of wastes and other matters (London Convention). Therefore, industrial countries, without any specific consideration, were dumping their wastes into the world’s seas. Many years and before the beginning of rapid development of industry, the great self- purification of seas were preventing some of discharging problems. But gradually, the increase of industrial development activities, exceeded the production of wastes and other matters, and this led to the misuse of world’s seas and oceans as a dump site. One of the most important consequences of 1972 Stockholm World Conference was to focusing world attention on threats have jeopardized marine environment balance. World countries` leaders committed in Stockholm to begin protecting the environment. Finally, this movement at marine environment section led to the creation of London Convention in the same year. London Convention was concluded for cooperating between countries at December 29, 1972 to promote effective control of all marine environment polluting resources and to prevent marine pollution by dumping wastes and other matters. Then it was opened for signature to other countries. At last, after 15 states signature, this convention was entered in to force at August 30.1975. Ratification and execution of London Convention resulted in coordinated performance of countries in marine waste management. Common actions with supports and cooperation of different international, regional, governmental and non-governmental organizations and agencies prevent marine pollution by dumping of wastes and other matters. Due to the importance of wastes in our marine and coastal areas, investigation of the performance of London Convention can identify the lack of regulations and lack of regulation supports about marine pollution prevention by dumping of wastes and other matters in Iran. Considering this issue, proper protection of seas will be achieved. London Convention has been studied here to achieve intended purposes. In first chapter, generalities about marine environment, including the importance and necessity of marine environment protection, with the focus on some internal and international resources of environmental law accompanying with marine pollution and its recourses, and finally, due to the study theme, dumping of wastes and other matters at seas with its impacts have been investigated .In the section of international measures, a brief history of marine pollution and marine environment international law with international law framework, exclusively for controlling of wastes and other material discharge at seas and oceans has been reviewed. In second chapter, obligations, amendments, and annexes of London Convention have been investigated and classified. The obligations have been categorized in to legal obligations and technical and organizational obligations. In former section, subject ,purpose, territory, exceptions, rights and duties of parties, convention amendments,… and in latter, special requirements for wastes assessment, determination of pollutants` permissible limit, site selection and type of discharge selection, design principles for marine environment quality monitoring program, and discharge license issuance mechanism have been studied. In third chapter, due to the examination of convention performance in Iran, the internal law system for marine environment conservation and its pollution has been mentioned in detail. Considering this, two issues have been compared .firstly, convention obligations with regional treaties that Iran as a party to them and secondly, Iranian internal law there of .Finally, common and different aspects of these issues have been determined. At last, recommendations and strategies for convention enforcement and conformity of its obligations with internal regulations have been presented. Furthermore, translation of convention English text has been reviewed and its protocol has been translated.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Este artículo realiza un acercamiento a Orlando, de Virginia Woolf, y a Agua viva, de Clarice Lispector, como obras que logran escribir la multiplicidad, la fluidez y la contingencia del ser. Jugando con las convenciones de la biografía y la autobiografía respectivamente, estas obras encuentran los medios para presentar un sujeto multidimensional y para mostrar, en particular, cómo la dimensión relacional, forjada por un orden simbólico patriarcal, ha hecho de la mujer el “otro" del hombre; un “otro" que debe ser dominado. Se exploran en este artículo los conceptos de “economía masculina" y “economía femenina" teorizados por Hélène Cixous y se propone al lenguaje poético como un medio capaz de eludir los dictados del falocentrismo. Lo poético, que no puede ser nunca agotado por uno o varios sistemas de significación, brinda la posibilidad de ir más allá de las categorizaciones y de explorar la multiplicidad. Tanto Orlando como Agua viva muestran las estrategias y las esperanzas de personajes y escritoras que ven en el lenguaje poético, en la “escritura femenina" como la entiende Cixous, el potencial de desarticular la “economía masculina" y abrir un nuevo espacio para sujetos diversos, múltiples y complejos.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Stream ciphers are encryption algorithms used for ensuring the privacy of digital telecommunications. They have been widely used for encrypting military communications, satellite communications, pay TV encryption and for voice encryption of both fixed lined and wireless networks. The current multi year European project eSTREAM, which aims to select stream ciphers suitable for widespread adoptation, reflects the importance of this area of research. Stream ciphers consist of a keystream generator and an output function. Keystream generators produce a sequence that appears to be random, which is combined with the plaintext message using the output function. Most commonly, the output function is binary addition modulo two. Cryptanalysis of these ciphers focuses largely on analysis of the keystream generators and of relationships between the generator and the keystream it produces. Linear feedback shift registers are widely used components in building keystream generators, as the sequences they produce are well understood. Many types of attack have been proposed for breaking various LFSR based stream ciphers. A recent attack type is known as an algebraic attack. Algebraic attacks transform the problem of recovering the key into a problem of solving multivariate system of equations, which eventually recover the internal state bits or the key bits. This type of attack has been shown to be effective on a number of regularly clocked LFSR based stream ciphers. In this thesis, algebraic attacks are extended to a number of well known stream ciphers where at least one LFSR in the system is irregularly clocked. Applying algebriac attacks to these ciphers has only been discussed previously in the open literature for LILI-128. In this thesis, algebraic attacks are first applied to keystream generators using stop-and go clocking. Four ciphers belonging to this group are investigated: the Beth-Piper stop-and-go generator, the alternating step generator, the Gollmann cascade generator and the eSTREAM candidate: the Pomaranch cipher. It is shown that algebraic attacks are very effective on the first three of these ciphers. Although no effective algebraic attack was found for Pomaranch, the algebraic analysis lead to some interesting findings including weaknesses that may be exploited in future attacks. Algebraic attacks are then applied to keystream generators using (p; q) clocking. Two well known examples of such ciphers, the step1/step2 generator and the self decimated generator are investigated. Algebraic attacks are shown to be very powerful attack in recovering the internal state of these generators. A more complex clocking mechanism than either stop-and-go or the (p; q) clocking keystream generators is known as mutual clock control. In mutual clock control generators, the LFSRs control the clocking of each other. Four well known stream ciphers belonging to this group are investigated with respect to algebraic attacks: the Bilateral-stop-and-go generator, A5/1 stream cipher, Alpha 1 stream cipher, and the more recent eSTREAM proposal, the MICKEY stream ciphers. Some theoretical results with regards to the complexity of algebraic attacks on these ciphers are presented. The algebraic analysis of these ciphers showed that generally, it is hard to generate the system of equations required for an algebraic attack on these ciphers. As the algebraic attack could not be applied directly on these ciphers, a different approach was used, namely guessing some bits of the internal state, in order to reduce the degree of the equations. Finally, an algebraic attack on Alpha 1 that requires only 128 bits of keystream to recover the 128 internal state bits is presented. An essential process associated with stream cipher proposals is key initialization. Many recently proposed stream ciphers use an algorithm to initialize the large internal state with a smaller key and possibly publicly known initialization vectors. The effect of key initialization on the performance of algebraic attacks is also investigated in this thesis. The relationships between the two have not been investigated before in the open literature. The investigation is conducted on Trivium and Grain-128, two eSTREAM ciphers. It is shown that the key initialization process has an effect on the success of algebraic attacks, unlike other conventional attacks. In particular, the key initialization process allows an attacker to firstly generate a small number of equations of low degree and then perform an algebraic attack using multiple keystreams. The effect of the number of iterations performed during key initialization is investigated. It is shown that both the number of iterations and the maximum number of initialization vectors to be used with one key should be carefully chosen. Some experimental results on Trivium and Grain-128 are then presented. Finally, the security with respect to algebraic attacks of the well known LILI family of stream ciphers, including the unbroken LILI-II, is investigated. These are irregularly clock- controlled nonlinear filtered generators. While the structure is defined for the LILI family, a particular paramater choice defines a specific instance. Two well known such instances are LILI-128 and LILI-II. The security of these and other instances is investigated to identify which instances are vulnerable to algebraic attacks. The feasibility of recovering the key bits using algebraic attacks is then investigated for both LILI- 128 and LILI-II. Algebraic attacks which recover the internal state with less effort than exhaustive key search are possible for LILI-128 but not for LILI-II. Given the internal state at some point in time, the feasibility of recovering the key bits is also investigated, showing that the parameters used in the key initialization process, if poorly chosen, can lead to a key recovery using algebraic attacks.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The self-similar solution of the unsteady laminar compressible boundary-layer flow with variable properties at a three-dimensional stagnation point with mass transfer has been obtained when the free-stream velocity varies inversely as a linear function of time. The resulting ordinary differential equations have been solved numerically using an implicit finite-difference scheme. The results are found to be strongly dependent on the parameter characterizing the unsteadiness in the free-stream velocity. The velocity profiles show some features not encountered in steady flows.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The self-similar solution of the unsteady laminar incompressible two-dimensional and axisymmetric stagnation point boundary layers for micropolar fluids governing the flow and heat transfer problem has been obtained when the free stream velocity and the square of the mass transfer vary inversely as a linear function of time. The nonlinear ordinary differential equations governing the flow have been solved numerically using a quasilinear finite-Difference scheme. The results indicate that the coupling parameter, mass transfer and unsteadiness in the free stream velocity strongly affect the skin friction, microrotation gradient and heat transfer whereas the effect of microrotation parameter is strong only on the microrotation gradient. The heat transfer is strongly dependent on the prandtl number whereas the skin friction gradient are unaffected by it.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The last enzyme in the arginine-biosynthesis pathway, argininosuccinate lyase, from Mycobacterium tuberculosis has been cloned, expressed, purified and crystallized, and preliminary X-ray studies have been carried out on the crystals. The His-tagged tetrameric enzyme with a subunit molecular weight of 50.9 kDa crystallized with two tetramers in the asymmetric unit of the orthorhombic unit cell, space group P2(1)2(1)2(1). Molecular-replacement calculations and self-rotation calculations confirmed the space group and the tetrameric nature of the molecule.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Hexaazamacrocycle (L) stabilized gold nanoparticles (AuNPs) were prepared by combining L with HAuCl4 center dot 3H(2)O in a variety of alcohol-water (1 : 1) mixtures. The dual roles of L as a reducing and stabilizing agent were exploited for the synthesis of AuNPs under the optimized ratio of L to Au3+ (2 : 1). Self-assembled gold nanofilms (AuNFs) were constructed at liquid-liquid interfaces by adding equal volumes of hexane to the dispersions of AuNPs in the alcohol-water systems. The nanofilms were formed spontaneously by shaking the two-phase mixture for a minute followed by standing. The alcohols explored for the self-assembly phenomenon were methanol, ethanol, i-propanol and t-butanol. The systems containing methanol or t-butanol resulted in AuNFs at the interfaces, whereas the other two alcohols were found not suitable and the AuNPs remained dispersed in the corresponding alcohol-water medium. The AuNFs prepared under suitable conditions were coated on a variety of surfaces by the dip and lift-off method/solvent removal approach. The AuNFs were characterized by UV-vis, SEM, TEM, AFM and contact angle measurement techniques. A coated glass-vial or cuvette was used as a catalytic reservoir for nitro-reduction reactions under ambient and aqueous conditions using NaBH4 as the reducing agent. The reduced products (amines) were extracted by aqueous work-up using ethyl acetate followed by evaporation of the organic layer; the isolated products required no further purification. The catalyst was recovered by simply decanting the reaction mixture whereupon the isolated catalyst remained coated inside the vessel. The recovered catalyst was found to be equally efficient for further catalytic cycles.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

CONTENTS: Efforts of a farmer in fish seed production for self-employment, by Ras Behari Baraik and Ashish Kumar. Remembering: the missing capacity, by Terrence Clayton. Measuring the process, by Nick Innes-Taylor. Women’s fish farmers group in Nawalparasi, Nepal, by S.K. Pradhan. Periphyton-based aquaculture: a sustainable technology for resource-poor farmers, by M.E. Azim, M.A. Wahab, M.C.J. Verdegem, A.A. van Dam and M.C.M. Beveridge. Unlocking information on the Internet: STREAM media monitoring and issue tracking, by Paul Bulcock (PDF has 16 pages.)

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Self-help groups (SHGs) are ways for farmers and fishers, especially those who are poor, to come together and work together. They can be a useful entry point for outsiders, promote a supportive local environment, strengthen voices in decision-making and in negotiations with more powerful forces, increase the effectiveness of local actions, and provide easier access to micro-credit and other resources and services. This case study describes a rural aquaculture development context, in India, the development of SHGs and the concept of a ‘one-stop aqua shop’, set up and run by a federation of self-help groups in Kaipara village, West Bengal (a pilot state along with Jharkhand and Orissa). It outlines testing new ways to share information, as part of a series of revised procedures and institutional arrangements for service delivery recommended by farmers and fishers and prioritized by government, with support from the Department of International Development, London (DFID) Natural Resources Support Programme (NRSP) and the Network of Aquaculture Centres in Asia-Pacific (NACA) to the Support to Regional Aquatic Resources Management (STREAM) Initiative (10 p.)

Relevância:

30.00% 30.00%

Publicador:

Resumo:

CONTENTS: An experience with group formation in Jabarrah, West Bengal, by Amar Prasad, Virendra Singh, Binay Sahay and Gautum Dutta. Aquaculture self-help groups in rural West Bengal, by Satyendra Tripathi, Graham Haylor and William Savage in consultation with Jagdish Gangwar, Virendra Singh, Gautam Dutta and Prabhat Pathak. Lessons learned for Fulwar Toli from an exposure visit to Jabarrah Bhim Nayak and Rubu Mukherjee. Livelihood intervention by Fish Farmers Development Agency: a success story from Mayurbhanj, Orissa, by G.B. Parida. Understanding of assets-based livelihoods through participatory rural appraisal to eliminate hunger, by Binay Sahay. Poverty ranking tools in PRA: experiences of EIRFP in addressing vulnerability, by Binay Sahay.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

CONTENTS: Seaweed culture and farmer incomes in Bekasi, Indonesia, by A. Mauksit L. Maala and Aniza Suspita. Significant change for a self-help group, by Nguyen Song Ha. Conflict over fishing in Jharkhand, by Ashish Kumar. Two worlds across a highway, by William Savage. Critical steps in preparing coastal communities for effective policy changes, by Josephine P. Savaris. New guidelines on data collection and iniormation sharing for co-management, by Charlotte Howard.