1000 resultados para Coastline protection


Relevância:

60.00% 60.00%

Publicador:

Resumo:

A Lagoa de Araruama é reconhecida como a maior laguna hipersalina do mundo, cercada por dunas e vegetação de restinga que, emoldurando a sua decantada beleza natural, configura uma condição de cartão postal internacional. Isso associado à sua grande importância ecológica, faz com que ela se caracterize como um ambiente ímpar, dentro do contexto ambiental. Todavia a degradação de suas margens, ensejada pela sua ocupação desordenada, inclusive através da implantação de salinas, que vem ocorrendo há mais de um século, teve como consequência o desmatamento dessas áreas de preservação permanente, que se constituem na Faixa Marginal de Proteção (FMP). A fundamentação dessa proposta se pauta no fato de que a FMP vigente da lagoa, demarcada e aprovada através de Decreto n 42.694, de 11de novembro de 2010, não levou em conta esse aspecto de extrema relevância ambiental. Nessas condições, faz-se necessária a implementação de política voltada para ações com o objetivo de revitalizar o entorno da lagoa, de sorte a assegurar a preservação desse ecossistema localizado nas áreas limítrofes à orla da Lagoa de Araruama e garantir a sustentabilidade ambiental. O presente estudo se ateve ao levantamento das áreas em que se verificou a ocorrência de vegetação, com o intuito de ordenar a sua classificação, precipuamente com interesse em delimitar as áreas de restinga, que são consideradas Áreas de Preservação Permanente pela Resolução CONAMA 303/2002 e como parte integrante da FMP pelo Código Florestal, quando fixadoras de dunas e estabilizadoras de mangue. Em função dos resultados desse levantamento, propôs-se a inclusão, na Faixa Marginal de Proteção (FMP), das áreas em que ocorre a presença de vegetação de restinga, com respaldo no Código Florestal (Lei Federal n 4771/65) que, atualmente, disciplina o assunto, de sorte a preservar o corpo hídrico como um todo e garantir a sustentabilidade ambiental.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Despite international protection of white sharks (Carcharodon carcharias), important conservation parameters such as abundance, population structure and genetic diversity are largely unknown. The tissue of 97 predominately juvenile white sharks sampled from spatially distant eastern and southwestern Australian coastlines was sequenced for the mitochondrial DNA (mtDNA) control region and genotyped with six nuclear-encoded microsatellite loci. MtDNA population structure was found between the eastern and southwestern coasts (FST = 0.142, p < 0.001), implying female natal philopatry. This concords with recent satellite and acoustic tracking findings which suggest the sustained presence of discrete east coast nursery areas. Furthermore, population subdivision was found between the same regions with biparentally inherited microsatellite markers (FST = 0.009, p <0.05), suggesting that males may also exhibit some degree of reproductive philopatry. Five sharks captured along the east coast had mtDNA haplotypes that resembled western Indian Ocean sharks more closely than Australian/New Zealand sharks, suggesting that transoceanic dispersal or migration resulting in breeding may occur sporadically. Our most robust estimate of contemporary genetic effective population size was low and below the threshold at which adaptive potential may be lost. For a variety of reasons, these contemporary estimates were at least one, possibly two orders of magnitude below our historical effective size estimates. Further population decline could expose these genetically isolated populations to detrimental genetic effects. Regional Australian white shark conservation management units should be implemented until genetic population structure, size and diversity can be investigated in more detail. Reference: Blower, D. C., Pandolfi, J. M., Gomez-Cabrera, M. del C., Bruce, B. D. & Ovenden, J. R. (In press - April 2012). Population genetics of Australian white sharks reveals fine-scale spatial structure, transoceanic dispersal events and low effective population sizes. Marine Ecology Progress Series.

Relevância:

30.00% 30.00%

Publicador:

Resumo:

Análisis de la atenuación del oleaje por un carguero funcionando como dique flotante y aplicación a dos casos de protección portuaria y costera. The effectiveness of a bulk carrier working as a detached floating breakwater to protect a stretch of coast and form salients or tombolos is assessed in this paper. Experiments were conducted in the Madrid CEDEX facilities in a 30 m long, 3 m wide, 1/150 scale flume. The bulk carrier ship is 205 m long, 29 m wide and 18 m in height with a draught of 13 m, and has been subjected to irregular waves with significant heights from 2 m to 4 m and peak periods from 6 s to 12 s at a depth of 15 m, all prototype dimensions. Three probes were placed between the wave paddle and the ship to record incident and reflected waves and four probes were placed between the ship and the coastline to measure the transmitted waves. Transmission, reflection and dissipation coefficients (Ct, Cr, Cd) were calculated to determine wave attenuation. Results show good shelter in the lee of the ship with values of Ct under 0.5 for peak periods from 6 s to 11 s. In addition, forces on the mooring chains were measured showing maximum values of about 2000 tons at a 10 speak period. Finally, two analytical models were used to determine the shoreline’s response to the ship’s protection and to assess the possible forming of salients or tombolos. According to the results, salients - but not tombolos - are formed in all tests.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In his report into corruption in Queensland, Fitzgerald listed whistleblower protection as a necessary part of a strong governance regime. "What is required is an accessible, independent body to which disclosures can be made, confidentially (at least in the first instance) and in any event free from fear of reprisals." It was one of the reforms studied by the Electoral and Administrative Review Committee, the report of which resulted in the Whistleblowers Protection Act 1994 (WPA). The need for whistleblower protection was supported by all sides of Parliament. The Premier, Wayne Goss, in his Second Reading Speech on the Public Sector Ethics Bill , said that that Act and the WPA would form a package with the former outlining required behaviour and the WPA encouraging staff to report wrongdoing. The WPA was subsequently passed and has remained virtually unamended for over a decade. Such consistency is either an indication of skilled drafting and effectiveness or the fact that the Act has been neglected. It is the hypothesis of this paper that the latter is the case. This hypothesis will be tested by examining the sincerity and diligence with which the Act has been treated during, and following, its passage.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Denial-of-service attacks (DoS) and distributed denial-of-service attacks (DDoS) attempt to temporarily disrupt users or computer resources to cause service un- availability to legitimate users in the internetworking system. The most common type of DoS attack occurs when adversaries °ood a large amount of bogus data to interfere or disrupt the service on the server. The attack can be either a single-source attack, which originates at only one host, or a multi-source attack, in which multiple hosts coordinate to °ood a large number of packets to the server. Cryptographic mechanisms in authentication schemes are an example ap- proach to help the server to validate malicious tra±c. Since authentication in key establishment protocols requires the veri¯er to spend some resources before successfully detecting the bogus messages, adversaries might be able to exploit this °aw to mount an attack to overwhelm the server resources. The attacker is able to perform this kind of attack because many key establishment protocols incorporate strong authentication at the beginning phase before they can iden- tify the attacks. This is an example of DoS threats in most key establishment protocols because they have been implemented to support con¯dentiality and data integrity, but do not carefully consider other security objectives, such as availability. The main objective of this research is to design denial-of-service resistant mechanisms in key establishment protocols. In particular, we focus on the design of cryptographic protocols related to key establishment protocols that implement client puzzles to protect the server against resource exhaustion attacks. Another objective is to extend formal analysis techniques to include DoS- resistance. Basically, the formal analysis approach is used not only to analyse and verify the security of a cryptographic scheme carefully but also to help in the design stage of new protocols with a high level of security guarantee. In this research, we focus on an analysis technique of Meadows' cost-based framework, and we implement DoS-resistant model using Coloured Petri Nets. Meadows' cost-based framework is directly proposed to assess denial-of-service vulnerabil- ities in the cryptographic protocols using mathematical proof, while Coloured Petri Nets is used to model and verify the communication protocols using inter- active simulations. In addition, Coloured Petri Nets are able to help the protocol designer to clarify and reduce some inconsistency of the protocol speci¯cation. Therefore, the second objective of this research is to explore vulnerabilities in existing DoS-resistant protocols, as well as extend a formal analysis approach to our new framework for improving DoS-resistance and evaluating the performance of the new proposed mechanism. In summary, the speci¯c outcomes of this research include following results; 1. A taxonomy of denial-of-service resistant strategies and techniques used in key establishment protocols; 2. A critical analysis of existing DoS-resistant key exchange and key estab- lishment protocols; 3. An implementation of Meadows's cost-based framework using Coloured Petri Nets for modelling and evaluating DoS-resistant protocols; and 4. A development of new e±cient and practical DoS-resistant mechanisms to improve the resistance to denial-of-service attacks in key establishment protocols.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This article explains the relevance of the Code and its place in the regulatory framework, discusses some of the key issues arising in the recent review (as identified by consumer advocates1), and explains the relationship between the Code and the Financial Ombudsman Service.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

More than a century ago in their definitive work “The Right to Privacy” Samuel D. Warren and Louis D. Brandeis highlighted the challenges posed to individual privacy by advancing technology. Today’s workplace is characterised by its reliance on computer technology, particularly the use of email and the Internet to perform critical business functions. Increasingly these and other workplace activities are the focus of monitoring by employers. There is little formal regulation of electronic monitoring in Australian or United States workplaces. Without reasonable limits or controls, this has the potential to adversely affect employees’ privacy rights. Australia has a history of legislating to protect privacy rights, whereas the United States has relied on a combination of constitutional guarantees, federal and state statutes, and the common law. This thesis examines a number of existing and proposed statutory and other workplace privacy laws in Australia and the United States. The analysis demonstrates that existing measures fail to adequately regulate monitoring or provide employees with suitable remedies where unjustifiable intrusions occur. The thesis ultimately supports the view that enacting uniform legislation at the national level provides a more effective and comprehensive solution for both employers and employees. Chapter One provides a general introduction and briefly discusses issues relevant to electronic monitoring in the workplace. Chapter Two contains an overview of privacy law as it relates to electronic monitoring in Australian and United States workplaces. In Chapter Three there is an examination of the complaint process and remedies available to a hypothetical employee (Mary) who is concerned about protecting her privacy rights at work. Chapter Four provides an analysis of the major themes emerging from the research, and also discusses the draft national uniform legislation. Chapter Five details the proposed legislation in the form of the Workplace Surveillance and Monitoring Act, and Chapter Six contains the conclusion.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This issue of the Griffith Law Review focuses on consumer law, and the pervasive nature of this area of law. We are all consumers, but do not necessarily identify as such, nor are we a homogeneous group. The boundaries of

Relevância:

20.00% 20.00%

Publicador: