952 resultados para Cintra Stream


Relevância:

70.00% 70.00%

Publicador:

Resumo:

Pós-graduação em Agronomia (Energia na Agricultura) - FCA

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Cintra stream is the major receiver of treated effluent from sanitary, hospital and research laboratory sewage from the UNESP campus in Botucatu, Rubião Júnior District, São Paulo state; and it has shown evidence of diffuse contamination by metals along it. Analyses of the most toxic metals (Pb, Cu, Fe, Ni and Zn) were carried out by using an atomic absorption spectrometer AA-6.800 - Perkin Elmer, analyst 700. ANOVA followed by the Tukey test were used for data analyses at 5% significance level. The main objective of this study was to compare current data on metal levels with data from other studies, in the same area, and of the same nature, conducted before and after implementation of chemical residue management by the university in 2008. Also, it aimed at identifying and quantifying possible diffuse and punctual contamination. Sites S1 and S2 showed punctual contamination, while diffuse sources were observed between S4 and S5. The quality of water in the Cintra Stream improved after establishment of the program of laboratory chemical residue management in the Campus of UNESP.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Studying the physical environment of a watershed is the basic condition for a successful planning of the riparian forest preservation, and for water production and conservation. The aims of the present study were to analyze and quantify the spatial and temporal evolution (1984 and 2010) using Landsat-5 satellite images of Cintra Stream sub-watershed, Botucatu, São Paulo State, Brazil, processed by the software IDRISI Andes, as well as to analyze the water quality through the parameters pH, EC, DO and BOD5 at 4 different sites in the years 1999, 2008 and 2009. Considering the 1076.48ha area of the sub-watershed, the pasture class of 1984 was reduced by 25.55% in 2010, resulting in an increase in the remaining classes. The most important class was native forest and reforestation since it had an increase of 5.08%, which indicates recovery of the riparian forest. Degraded areas were identified close to the inferior limit of the sub-watershed (P3 and P4), as well as local contamination (P1 and P2) with worsening of the water quality in the remaining sites in the periods 2008 and 2009. Recovery and management of the ecological succession of degraded areas and water quality monitoring at 1 and 2 sites will be necessary to reestablish the natural condition of the area studied.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper focuses on the development and delivery of a core construction management (CM) unit, which forms the capstone of a four-unit CM stream in an undergraduate programme in the Faculty of Built Environment and Engineering at the Queensland University of Technology. UDB410 (Construction Management) is a final year unit that consolidates skills students have learned throughout their degree, hopefully graduating them as work-ready construction managers. It was developed in consultation with the Queensland Chapter of the Australian Institute of Building (AIB) and is a final year unit in the undergraduate Bachelor of Urban Development (CM) course. The unit uses various tools such as the OSIRIS business database (Bureau van Dijk Electronic Publishing, 2009), the AROUSAL (UK Version) construction business simulation (Lansley, 2009) and the Denison Organisational Culture Survey (Denison, 2000) to facilitate the development of skills in managing a construction company. The objectives of the paper are: • To track the rationale and development of the UDB410 unit sand describe the way in which this final year unit integrates learning from other parts of the course within which it is located as well as capping-off the CM stream of core units; • To highlight the difficulties of blending a balance of technology and management in a single unit; and • To explain how partnering with the construction industry benefited the learning quality of the unit.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This paper provides a fresh analysis of the widely-used Common Scrambling Algorithm Stream Cipher (CSA-SC). Firstly, a new representation of CSA-SC with a state size of only 89 bits is given, a significant reduction from the 103 bit state of a previous CSA-SC representation. Analysis of this 89-bit representation demonstrates that the basis of a previous guess-and-determine attack is flawed. Correcting this flaw increases the complexity of that attack so that it is worse than exhaustive key search. Although that attack is not feasible, the reduced state size of our representation makes it obvious that CSA-SC is vulnerable to several generic attacks, for which feasible parameters are given.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality and integrity protection to messages. AE is potentially more efficient than applying a two-step process of providing confidentiality for a message by encrypting the message and in a separate pass, providing integrity protection by generating a Message Authentication Code (MAC) tag. This paper presents results on the analysis of three AE stream ciphers submitted to the recently completed eSTREAM competition. We classify the ciphers based on the methods the ciphers use to provide authenticated encryption and discuss possible methods for mounting attacks on these ciphers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Dragon is a word-based stream cipher. It was submitted to the eSTREAM project in 2005 and has advanced to Phase 3 of the software profile. This paper discusses the Dragon cipher from three perspectives: design, security analysis and implementation. The design of the cipher incorporates a single word-based non-linear feedback shift register and a non-linear filter function with memory. This state is initialized with 128- or 256-bit key-IV pairs. Each clock of the stream cipher produces 64 bits of keystream, using simple operations on 32-bit words. This provides the cipher with a high degree of efficiency in a wide variety of environments, making it highly competitive relative to other symmetric ciphers. The components of Dragon were designed to resist all known attacks. Although the design has been open to public scrutiny for several years, the only published attacks to date are distinguishing attacks which require keystream lengths greatly exceeding the stated 264 bit maximum permitted keystream length for a single key-IV pair.