993 resultados para Ecological protection


Relevância:

30.00% 30.00%

Publicador:

Resumo:

During the past two centuries there have been three major paradigm shifts in the management of Australian rainforests and the use of their timbers: from felling native forests towards growing plantations; from viewing forests and plantations as mainly providers of timber to viewing them as sources of multiple benefits (e.g. timber, biodiversity, carbon sequestration, catchment protection, recreation, regional economic development); and from timber plantations being developed mainly by government on public land towards those established by private citizens, companies, or joint venture arrangements, on previously-cleared freehold land. Rainforest timber plantations are increasingly established for varied reasons, and with multiple objectives. Landholders are increasingly interested in the biodiversity values of their plantations. However, there are few guidelines on the changes to plantation design and management that would augment biodiversity outcomes, or on the extent to which this might require a sacrifice of production. [Abstract extract]

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Nowadays we meet many different evaluation methods regarding the ecological performance of green surfaces and parks. All these methods are extremely valuable in determining how well a green surface performs from ecological aspect and to what extent the environment were damaged if these sites would be built or would be developed any other way causing reduction of green surfaces. The goal of the article is to clarify the differences between two evaluation methods (GSI – Green Space Intensity, BARC – Biological Activity Rate Calculation) suitable for urban green infrastructure analysis and to see if any significant difference can be observed evaluating the same site by these methods. Our research sites are in Budapest and their sizes vary between 2,5-8 acres. The most important aspects of site analysis are the following: size and boundaries of the park, existence or lack of water features, the characteristics of their surfaces and the complexity of vegetation. We summarize the data of the site analysis in tables, make a summarizing diagram for visual representation and draw conclusions from the results. As a final step, we evaluate how these two evaluation systems relate to urban open space developments.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

What is the human being? Which is its origin and its end? What is the influence of the nature in the man and what is his impact on nature? Forthe animalists, men are like other animals; freedom and rationality are not signs of superiority, nor having rights over the animals. For the ecohumanists, human beings are part of nature, but is qualitatively different and superior to animals; and is the creator of the civilization. We analyze these two ecological looks. A special point is the contribution ofecohumanists -from the first half of the Renaissance, who dealt in extenso the dignity and freedom of the human being-, of Michelangelo and finally, of Mozart, through his four insurmountable operas, which display the difficulty of physical ecology to engender so much beauty, so much wealth, so much love for the creatures and so much variety.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The coastal districts, as an intersection of two perfectly different ecosystems of dry land and sea, is one of the most complicated and the richest natural system on earth. Considering these areas are constantly exposed to aggregation of water pollutants and also consequence resulting from construction and development activities, they are very vulnerable. Therefore, "sensitive Coastal areas" has become a common word in the related subjects to marine environment recently. The said title relates to the areas of the coastal lines which are vulnerable to the natural condition or human actions because of ecological, social, economic, educational and research importance, also they need particular supports. The southern coasts of Caspian Sea, In Iran prominent samples are of these sensitive areas which their environment are exposed to demolition and destruction intensely, due to increasing and uncontrolled development. The first stage of protecting and managing the coastal areas is identifying sensitive Coastal areas and broadening the Coasts. In this survey, we attempted to examine a definite area in the southern coasts of Caspian Sea. In Iran, by profiting from the world experiences and concluded researches in Iran especially the concluded studies by marine environment office and the Environment protection organization on the subject of determination criteria of the sensitive ecological districts. For this purpose (In Gilan Province) Boujagh national park district which is located in the mouth of sefidroud river and also is possessed of the special ecological and environmental features and distinctions. In this survey, first they said district is divided proportionally on the basis of using a grid system in order to identify the sensitive ecological districts and broaden the coast, and then the desired indices have been determined and scored by numeral valuation method in each unit and then analysis has been done by using of the geography information system (GIS) and final has estimated economic valuation of sensitive ecological areas that is presented in this essay.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

The presence or growth of microbes on textiles may result in a series of problems such as unpleasant odors, cross infection, disease transmission, or discoloration and deterioration of textiles. Imparting textiles with antimicrobial property can effectively eliminate these adversities and thus has been attracting great attention. This chapter summarizes the commonly used antimicrobial agents such as silver, metal oxides, photoactive dyes, quaternary ammonium compounds, N-halamines, triclosan, polybiguanides, chitosan, and plant-derived bioactive agents, their characteristics, toxicity, antimicrobial ability, ecological acceptability, and related textile finishing techniques and evaluation methods. Since durability to repeated washing is the major challenge for the practical use of antimicrobial textiles, the chapter provides details on the technique to immobilize antimicrobial agents onto fibers. In addition, impacts of using antimicrobial textiles on the environment and health are discussed in the last section.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In his report into corruption in Queensland, Fitzgerald listed whistleblower protection as a necessary part of a strong governance regime. "What is required is an accessible, independent body to which disclosures can be made, confidentially (at least in the first instance) and in any event free from fear of reprisals." It was one of the reforms studied by the Electoral and Administrative Review Committee, the report of which resulted in the Whistleblowers Protection Act 1994 (WPA). The need for whistleblower protection was supported by all sides of Parliament. The Premier, Wayne Goss, in his Second Reading Speech on the Public Sector Ethics Bill , said that that Act and the WPA would form a package with the former outlining required behaviour and the WPA encouraging staff to report wrongdoing. The WPA was subsequently passed and has remained virtually unamended for over a decade. Such consistency is either an indication of skilled drafting and effectiveness or the fact that the Act has been neglected. It is the hypothesis of this paper that the latter is the case. This hypothesis will be tested by examining the sincerity and diligence with which the Act has been treated during, and following, its passage.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In daily activities people are using a number of available means for the achievement of balance, such as the use of hands and the co-ordination of balance. One of the approaches that explains this relationship between perception and action is the ecological theory that is based on the work of a) Bernstein (1967), who imposed the problem of ‘the degrees of freedom’, b) Gibson (1979), who referred to the theory of perception and the way which the information is received from the environment in order for a certain movement to be achieved, c) Newell (1986), who proposed that movement can derive from the interaction of the constraints that imposed from the environment and the organism and d) Kugler, Kelso and Turvey (1982), who showed the way which “the degrees of freedom” are connected and interact. According to the above mentioned theories, the development of movement co-ordination can result from the different constraints that imposed into the organism-environment system. The close relation between the environmental and organismic constraints, as well as their interaction is responsible for the movement system that will be activated. These constraints apart from shaping the co-ordination of specific movements can be a rate limiting factor, to a certain degree, in the acquisition and mastering of a new skill. This frame of work can be an essential tool for the study of catching an object (e.g., a ball). The importance of this study becomes obvious due to the fact that movements that involved in catching an object are representative of every day actions and characteristic of the interaction between perception and action.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.