Areas of protection of youth spirituality from harmful resources of the global internet

Author(s):  
Sh. N. Taylakova
Keyword(s):  
Author(s):  
RP Jose ◽  
WA Aureo ◽  
CI Narido ◽  
TD Reyes Jr ◽  
MB Sarnowski

A comprehensive inventory of faunal biodiversity was conducted within three Key Biodiversity Areas of Central Visayas. Mt. Bandilaan Natural Park (MBNP), Balinsasayao Twin Lakes Natural Park (BTLNP), and Rajah Sikatuna Protected Landscape (RSPL). Three primary wildlife groups were surveyed: bats, birds and amphibians. Species diversity and population trends were then analyzed to assess areas of biodiversity importance. RSPL generally had the highest species richness and diversity index while MBNP consistently had the lowest. When pooled. The surveyed areas resulted in a high diversity index and rate of endemicity showing the importance of multiple areas of protection. These findings can be utilized to prioritize habitat protection as well as to serve as a baseline information for future biodiversity inventories. J. Biodivers. Conserv. Bioresour. Manag. 2020, 6(2): 27-34


2015 ◽  
Vol 662 ◽  
pp. 123-126
Author(s):  
Jan Schubert ◽  
Zdeněk Česánek ◽  
Olga Bláhová

Ongoing increase in demands on efficiency of power plants and other facilities leads to increased interest of new progressive materials and technologies. One of the modern methods which lead to enhancement of surface properties is application of coatings on surface of components composed of less quality materials. Commonly used methods protecting components are based on some form of heat treatment. The current pressure on increasing operating temperatures for enhanced performance of steam turbines caused elevation of operating temperature at limit of the applicability of commonly used protections. From this reasons the demand for using an alternative technologies which would provide such a desired protection rises rapidly. One of the key areas of protection in such environment is protection against hot temperature corrosion. Possible solution can be found in application of coatings based on alloys and cermets prepared by HVOF technology. This paper examines local mechanical and microstructural properties of NiCrBSi coating after exposition to extremely severe hot corrosion environment. Furthermore, the nanoindentation measurements of NiCrBSi coating were performed before and after the corrosion test. In this case the mixture of salts composed from 59% Na2(SO)4 with 34.5% KCl and 6.5% NaCl was used. Temperature of test was set on 525°C and 575°C. Duration of exposition to hot corrosion environment was 168 hours in autoclave.


Author(s):  
Mario Parise

Karst refers to the processes of chemical dissolution and mechanical erosion acting on soluble rocks (mainly carbonates and evaporites), and to the surface and subsurface landforms thus produced. In their book Karst Hydrogeology and Geomorphology, Derek Ford and Paul Williams state that about 20 percent of the emerged Earth’s surface is karst, with caves representing a typical and well-known expression (see Ford and Williams 2007, cited under Karst Hydrogeology: The Importance of Karst Aquifers). Together with caves, karst lands are characterized by underground drainages and by scarce presence of water running at the surface. Water, rather than flowing on the ground as watercourses and rivers, rapidly infiltrates underground through networks of fissures and conduits, which combine to the diffuse flow in recent carbonates, giving origin to the complex systems of karst caves. Karst environments and caves have been of interest to humans since the earliest civilizations—for water supply, as settlements or areas of protection, or to bury the dead. Some of the more ancient testimonies of art are within caves, such as those in several caverns of the Mediterranean area (including, to mention the most remarkable, Lascaux and Chauvet in France, Altamira in Spain, and Porto Badisco in Italy). Karst research, which is linked to caving exploration, had a great impulse in the second half of the 20th century. Caves have been recognized as a very precious and peculiar environment, where traces of the past, in terms of sediments (see Sasowsky and Mylroie 2004, cited under Cave Deposits) or evidence of paleoclimate (see Fairchild and Baker 2012, cited under Contribution to Paleoclimatic Studies), have been preserved, often in great detail, in contrast to what occurs at Earth’s surface, where most of it is being destroyed, canceled, or covered by later processes. As a consequence, the classical studies about speleogenesis (that is, the origin of caves) and on geomorphology of the underground settings have developed in integration with those by researches in other disciplines, covering, among others, cave sediments, biospeleology and microbiology, and dating of speleothems for paleoclimatic and paleoenvironmental studies. Further, the expansion of built-up environments and construction in karst lands resulted in the interaction among natural hazards in karst and society, as pointed out in Parise and Gunn 2007 (under Karst Hazards), and Gutiérrez, et al. 2014 (under Human Impacts and Land Management in Karst), bringing to general attention the issue of fragility of karst, due to its peculiar hydrologic and hydrogeological features. As a matter of fact, Goldscheider and Drew 2007 (under Karst Hydrogeology: The Importance of Karst Aquifers) documents that karst aquifers are of high quality and represent between 20 and 25 percent of the world’s drinking resources, but that they are also extremely vulnerable and potentially threatened by a variety of forms of pollution.


2014 ◽  
Vol 165 (9) ◽  
pp. 268-274
Author(s):  
Willy Eyer ◽  
Benoît Mazotti

Method for a standardised assessment of protection forests in the canton of Fribourg The canton of Fribourg has developed a method to monitor protection forests based on available data: site maps, stand maps, map of protection forests (SilvaProtect; with the corresponding hazardous processes) and silvicultural references. In all, eight different indicators issued from a GIS environment are interpreted according to a “traffic light” system (three categories). The analysis can be applied at different scales: catchment areas, forest management units, forest districts and the canton as a whole. The results are used to set priorities and facilitate the planning of silvicultural interventions and logging operations. Moreover, this monitoring method 1) assesses the degree to which a forest fulfils its protection function and 2) identifies the satisfactory and the potentially deficient areas of protection forests.


2018 ◽  
pp. 12-18
Author(s):  
Vladimir Baranov ◽  
Mikhail Kotsynyak ◽  
Denis Ivanov

The main trend in recent years is the shift of emphasis from mass attacks to targeted (target) attacks, which are the actions of the enemy of a particular state or non-state structure in advance. The target attack is always built under the object of influence, being a thoughtful operation, not a simple technical action. Target cyber attack on the element of information and telecommunication network is implemented in the form of a set of activities aimed at studying the information system and software. This allows for revealing weaknesses in the structure of the information and telecommunication network. The authors develop the technique of hidden introduction and bypass of standard means of information protection, fix the infrastructure, distribute the harmful action. Under the impact of a targeted cyber attack, it is difficult to choose the methods and means of protecting the information and telecommunication network, as their resource is limited. One of the ways to resolve this contradiction is a differentiated approach to the protection of information and telecommunication network, which is to choose the most relevant for the current situation areas of protection. The article deals with the problem of targeted attacks proliferation and describes the principle of their realization. The authors also substantiate the need of working out the methodology for estimating the impact of targeted cyber attacks by the enemy on information and telecommunications networks as well as their key elements. The special attention is paid to the purpose and structure of this methodology. The authors describe the stages of targeted cyber attack and its application areas.


Sign in / Sign up

Export Citation Format

Share Document