Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

PDF

Protection

Discipline
Institution
Publication Year
Publication
Publication Type

Articles 1 - 30 of 62

Full-Text Articles in Physical Sciences and Mathematics

Navigating Murky Waters: State-Level Strategies For Wetland Preservation And Tile Drainage Regulation After Sackett V. Epa, Caleb M. Swanson Apr 2024

Navigating Murky Waters: State-Level Strategies For Wetland Preservation And Tile Drainage Regulation After Sackett V. Epa, Caleb M. Swanson

Honors Thesis

Wetlands are some of the world’s most valuable ecosystems, serving as provisioners of species habitat, carbon sequestration, flood mitigation, water quality purification, and other ecosystem services. Human development has resulted in substantial wetland loss the world over. In the 1970s, the United States Congress passed the Clean Water Act, giving the EPA broad authority over wetland protection. However, in the summer of 2023, the United States Supreme Court decided Sackett v. EPA, limiting the EPA’s jurisdiction over wetlands to those indistinguishably connected to generally recognized “Waters of the United States” and removing federal protection for millions of acres of wetlands, …


Undp-Gef Grasslands Project: Conserving Mountain Biodiversity In Southern Lesotho, W. A. Rodgers Aug 2023

Undp-Gef Grasslands Project: Conserving Mountain Biodiversity In Southern Lesotho, W. A. Rodgers

IGC Proceedings (1997-2023)

The Kingdom of Lesotho contains some 70% of the Drakensberg-Maloti Mountains, recognised as the Eastern Mountains "Centre of Biodiversity and Endemism" of southern Africa. The Mountains have globally significant plant diversity, with unique habitats and high endemism. These resources have been increasingly degraded by a grazing regime based on communal access, with reduced regulatory capability. Lack of ownership has restricted investment in conservation. Lesotho has the lowest Protected Area coverage of any nation in Africa (<0.4%). Biodiversity is thus at risk.


Undp-Gef Grasslands Project: Mainstreaming Biodiversity Into Productive Landscapes: The Southern African Grasslands Programme, C. Maze, W. A. Rodgers Aug 2023

Undp-Gef Grasslands Project: Mainstreaming Biodiversity Into Productive Landscapes: The Southern African Grasslands Programme, C. Maze, W. A. Rodgers

IGC Proceedings (1997-2023)

This is an exciting new initiative under the second strategic priority for the Global Environment Programme (GEF)'s Biodiversity Focal Area: Mainstreaming biodiversity into productive landscapes and sector. The rationale is that whilst grassland biomes cover some 30% of South Africa, (within montane, coastal and high-veld systems) less than 3% is formally protected at national, provincial or private land-owner levels. Over 40% of the grasslands have been totally converted to other land usages and 30% is degraded. Forces of degradation and conversion (cultivation, forests, urban spread) continue. The issues of conservation are of land use and putting in place incentives to …


Application Of Machine Learning And Cyber Security In Smart Grid, Soham Dutta Dr. Nov 2022

Application Of Machine Learning And Cyber Security In Smart Grid, Soham Dutta Dr.

Technical Collection

Unplanned islanding of microgrids is a major hindrance in providing continuous power supply to the critical loads. The detection of these islanding instants needs to be very fast so that the distributed generators (DG) are able to take control actions in minimum time. Due to high quality data at a rapid rate, micro phasor measurement unit (μ-PMU) are becoming widely popular in distribution system and micro grids. These μ-PMUs can be leveraged for island detection. However, the working of μ-PMU is hugely dependent on communication network for data transmission which is prone to cyber-attacks. In view of the above facts, …


Protection Against Contagion In Complex Networks, Pegah Hozhabrierdi Aug 2022

Protection Against Contagion In Complex Networks, Pegah Hozhabrierdi

Dissertations - ALL

In real-world complex networks, harmful spreads, commonly known as contagions, are common and can potentially lead to catastrophic events if uncontrolled. Some examples include pandemics, network attacks on crucial infrastructure systems, and the propagation of misinformation or radical ideas. Thus, it is critical to study the protective measures that inhibit or eliminate contagion in these networks. This is known as the network protection problem.

The network protection problem investigates the most efficient graph manipulations (e.g., node and/or edge removal or addition) to protect a certain set of nodes known as critical nodes. There are two types of critical nodes: (1) …


Assessing The Efficacy Of California’S Wildfire And Forest Resilience Action Plan, Chloe Nelson May 2022

Assessing The Efficacy Of California’S Wildfire And Forest Resilience Action Plan, Chloe Nelson

Master's Projects and Capstones

California’s wildfire threat eclipses current forestry management and wildfire mitigation strategies in place to protect people, infrastructure, and the natural environment. Climate change escalates wildfire risks with declining water supply coupled with hotter, drier conditions. California’s Wildfire and Forest Resilience Action Plan attempts to integrate and build upon previously successful wildfire resilience plans to amplify the scale and pace of the state’s land management and community protections. This research assesses the plan’s efficacy to respond to the growing wildfire threat. This study investigates if there is equitable planning for the needs of high-wildfire risk groups living in the WUI and …


Unified Methods In Collecting, Preserving, And Archiving Coral Bleaching And Restoration Specimens To Increase Sample Utility And Interdisciplinary Collaboration, Rebecca Vega Thurber, Emily R. Schmeltzer, Andréa G. Grottoli, Robert Van Woesik, Robert J. Toonen, Mark Warner, Kerri L. Dobson, Rowan H. Mclachlan, Katie Barott, Daniel J. Barshis, Justin Baumann, Leila Chapron, David J. Combosch, Adrienne M.S. Correa, Thomas M. Decarlo, Mary Hagedorn, Laetitia Hédouin, Kenneth Hoadley, Thomas Felis, Christine Ferrier-Pagès, Carly Kenkel, Ilsa B. Kuffner, Jennifer Matthews, Mónica Medina, Christopher Meyer, Corinna Oster, James Price, Hollie M. Putnam, Yvonne Sawall Jan 2022

Unified Methods In Collecting, Preserving, And Archiving Coral Bleaching And Restoration Specimens To Increase Sample Utility And Interdisciplinary Collaboration, Rebecca Vega Thurber, Emily R. Schmeltzer, Andréa G. Grottoli, Robert Van Woesik, Robert J. Toonen, Mark Warner, Kerri L. Dobson, Rowan H. Mclachlan, Katie Barott, Daniel J. Barshis, Justin Baumann, Leila Chapron, David J. Combosch, Adrienne M.S. Correa, Thomas M. Decarlo, Mary Hagedorn, Laetitia Hédouin, Kenneth Hoadley, Thomas Felis, Christine Ferrier-Pagès, Carly Kenkel, Ilsa B. Kuffner, Jennifer Matthews, Mónica Medina, Christopher Meyer, Corinna Oster, James Price, Hollie M. Putnam, Yvonne Sawall

Biological Sciences Faculty Publications

Coral reefs are declining worldwide primarily because of bleaching and subsequent mortality resulting from thermal stress. Currently, extensive efforts to engage in more holistic research and restoration endeavors have considerably expanded the techniques applied to examine coral samples. Despite such advances, coral bleaching and restoration studies are often conducted within a specific disciplinary focus, where specimens are collected, preserved, and archived in ways that are not always conducive to further downstream analyses by specialists in other disciplines. This approach may prevent the full utilization of unexpended specimens, leading to siloed research, duplicative efforts, unnecessary loss of additional corals to research …


Mine Water Drainage Pollution In China's Coal Mining Areas And The Construction Of Prevention And Control Technical System, Sun Yajun, Xu Zhimin, Li Xin, Zhang Li, Chen Ge, Zhao Xianming, Gao Yating, Liu Qi, Zhang Shangguo, Wang Weijun, Zhu Lulu, Wang Sheng Oct 2021

Mine Water Drainage Pollution In China's Coal Mining Areas And The Construction Of Prevention And Control Technical System, Sun Yajun, Xu Zhimin, Li Xin, Zhang Li, Chen Ge, Zhao Xianming, Gao Yating, Liu Qi, Zhang Shangguo, Wang Weijun, Zhu Lulu, Wang Sheng

Coal Geology & Exploration

Mining activities are bound to produce enormous mine water drainage. Mine water in China shows relatively poor water quality and high cost of water treatment and other problems. Firstly, the main characteristics of mine water quality in China's typical mine areas are clarified in this paper: conventional ions are the main chemical components causing poor mine water quality; mine water has a small proportion of toxic and harmful substances, which is generally better than the quality standard of class Ⅲ groundwater. Secondly, some scientific issues on the formation and evolution of mine water quality are discussed in detail, including the …


Protecting Hulun Buir Rangeland Requires Improving The Awareness Of The Importance Of The Ecological Status‐Based On An Investigation In Chen Baerhu Banner, Yunhua Zhang, Rui Liu Jul 2021

Protecting Hulun Buir Rangeland Requires Improving The Awareness Of The Importance Of The Ecological Status‐Based On An Investigation In Chen Baerhu Banner, Yunhua Zhang, Rui Liu

IGC Proceedings (1997-2023)

No abstract provided.


Review And Prospect Of Forage Germplasm Resource Protection In China, Xiaofang Li Apr 2021

Review And Prospect Of Forage Germplasm Resource Protection In China, Xiaofang Li

IGC Proceedings (1997-2023)

No abstract provided.


Effects Of Fence On Daily Variation Of Co2 Flux From The Soil In Subalpine Meadow Of Xinjiang, Ping'an Jiang Nov 2020

Effects Of Fence On Daily Variation Of Co2 Flux From The Soil In Subalpine Meadow Of Xinjiang, Ping'an Jiang

IGC Proceedings (1997-2023)

No abstract provided.


Advice On The Exploitation And Protection Of Grassland Ecotourism Resources In China, Lin Ai Oct 2020

Advice On The Exploitation And Protection Of Grassland Ecotourism Resources In China, Lin Ai

IGC Proceedings (1997-2023)

No abstract provided.


The Majority Rule: A General Protection On Recommender System, Lei Xu, Lin Chen, Martin Flores, Hansheng Lei, Liyu Zhang, Mahmoud K. Quweider, Fitratullah Khan, Weidong Shi Oct 2020

The Majority Rule: A General Protection On Recommender System, Lei Xu, Lin Chen, Martin Flores, Hansheng Lei, Liyu Zhang, Mahmoud K. Quweider, Fitratullah Khan, Weidong Shi

Computer Science Faculty Publications and Presentations

Recommender systems are widely used in a variety of scenarios, including online shopping, social network, and contents distribution. As users rely more on recommender systems for information retrieval, they also become attractive targets for cyber-attacks. The high-level idea of attacking a recommender system is straightforward. An adversary selects a strategy to inject manipulated data into the database of the recommender system to influence the recommendation results, which is also known as a profile injection attack. Most existing works treat attacking and protection in a static manner, i.e., they only consider the adversary’s behavior when analyzing the influence without considering normal …


Overview Of Grassland And Its Development In China, Jiawen Liu, Yingjun Zhang, Yongjun Li, Deli Wang, Guodong Han, Fujiang Hou May 2020

Overview Of Grassland And Its Development In China, Jiawen Liu, Yingjun Zhang, Yongjun Li, Deli Wang, Guodong Han, Fujiang Hou

IGC Proceedings (1997-2023)

No abstract provided.


Comment On “Assessing Preservation Priorities Of Caves And Karst Areas Using The Frequency Of Endemic Cave-Dwelling Species” By Nitzu Et Al. (2018), Int. J. Speleol., 47 (1): 43-52, Oana T. Moldovan, Traian Brad Feb 2019

Comment On “Assessing Preservation Priorities Of Caves And Karst Areas Using The Frequency Of Endemic Cave-Dwelling Species” By Nitzu Et Al. (2018), Int. J. Speleol., 47 (1): 43-52, Oana T. Moldovan, Traian Brad

International Journal of Speleology

No abstract provided.


Integrating Watershed-Scale And River-Reach Protection And Restoration Planning To Promote Climate Resilience In The South Fork Nooksack River (Sfnr), Oliver Grah, Susan Dickerson-Lange Apr 2018

Integrating Watershed-Scale And River-Reach Protection And Restoration Planning To Promote Climate Resilience In The South Fork Nooksack River (Sfnr), Oliver Grah, Susan Dickerson-Lange

Salish Sea Ecosystem Conference

The Nooksack Indian Tribe reservation is located at the foot of the North Cascades Mountains, approximately 13 miles east of Bellingham, WA and the Salish Sea. The Tribe relies on a harvestable surplus of Pacific salmon in the Nooksack River for cultural, subsistence, and commercial purposes. Today, Pacific salmon runs are less than 10 percent of the runs in the late 1800’s. Causes of the declines are complex; however, it is well understood that the legacy of commercial forestry, agriculture, and development has increased sediment loading and water temperature. Climate impacts will cumulatively add to the legacy impacts, which are …


Protection And Restoration Of Salmon Bearing Streams In Agricultural Landscapes Of The Puget Sound Basin: A Synthesis Of Approaches To Reach-Scale Planning For Eight Focus Areas, Colin Hume Apr 2018

Protection And Restoration Of Salmon Bearing Streams In Agricultural Landscapes Of The Puget Sound Basin: A Synthesis Of Approaches To Reach-Scale Planning For Eight Focus Areas, Colin Hume

Salish Sea Ecosystem Conference

In 2015 the Department of Ecology led development of a new initiative to protect and restore riparian areas on salmon bearing streams across agricultural landscapes of the Puget Sound Basin. Using Environmental Protection Agency National Estuary Program funding through the Watershed Lead Organization, the initiative solicited grant proposals from local organizations to develop reach-scale plans for river reaches that provide the strategic basis for a subsequent phase of implementation funding to acquire riparian zones from willing landowners either through conservation easement or fee-simple purchase. Grants were awarded to an array of partnerships between land trusts, Native American tribes, local governments, …


The Dark Side Of Banning Hacking Technique Discussion, Qiu-Hong Wang, Ting Zhang Le Jun 2017

The Dark Side Of Banning Hacking Technique Discussion, Qiu-Hong Wang, Ting Zhang Le

Research Collection School Of Computing and Information Systems

Prior studies have evidenced the effectiveness of more severe and broader enforcement in deterringcybercrimes. This study addresses the other side of the story. Our data analysis shows that theenforcement against the production / distribution / possession of computer misuse tools tends toincrease the contribution on detection and protection related posts in online hacker forums. Butthis enforcement may discourage those contributors who had originally actively contributed to theprotection discussions. Thus government regulations have to be cautiously justify the incentives ofmultiple parties in the cybersecurity context.


The Risk Of Public Data Availability On Critical Infrastructure Protection, Roba Abbas Dec 2016

The Risk Of Public Data Availability On Critical Infrastructure Protection, Roba Abbas

Dr Roba Abbas

This paper examines the threat of freely available information on critical infrastructure protection (CIP) efforts. Critical infrastructure are the services required to maintain the stability and security of a country, and comprise both physical and cyber infrastructures. These interdependent entities must be protected from natural disasters, accidental errors, and deliberate attacks. The CIP process typically includes vulnerability assessment, risk assessment and risk management, and has been a global concern for many years; the concern now amplified in Australia due to a number of recent events such the 9/11 attacks, and the Bali bombings. The events have called into question the …


Slides: Indigenous Water Justice Symposium, Jason Robison Jun 2016

Slides: Indigenous Water Justice Symposium, Jason Robison

Coping with Water Scarcity in River Basins Worldwide: Lessons Learned from Shared Experiences (Martz Summer Conference, June 9-10)

Presenter: Jason Robison, Assistant Professor of Law, University of Wyoming

11 slides


Slides: Synthesis Session: Indigenous Water Symposium, Jason Anthony Robison Jun 2016

Slides: Synthesis Session: Indigenous Water Symposium, Jason Anthony Robison

Indigenous Water Justice Symposium (June 6)

Presenter: Jason Robison, University of Wyoming

15 slides


Slides: The Nsw Aboriginal Land Council (Nswalc) And Aboriginal Land Rights In Nsw, New South Wales Aboriginal Land Council Jun 2016

Slides: The Nsw Aboriginal Land Council (Nswalc) And Aboriginal Land Rights In Nsw, New South Wales Aboriginal Land Council

Indigenous Water Justice Symposium (June 6)

Presenter: Phil Duncan, Gomeroi Nation, New South Wales Aboriginal Land Council

19 slides


Slides: Crystalised Not Frozen: Addressing Historical Exclusion Of Traditional Owners From Water, Poh-Ling Tan Jun 2016

Slides: Crystalised Not Frozen: Addressing Historical Exclusion Of Traditional Owners From Water, Poh-Ling Tan

Indigenous Water Justice Symposium (June 6)

Poh-Ling Tan, Griffith University

13 slides


Grid-Connected Induction Generator Interturn Fault Analysis Using A Pca-Ann-Based Algorithm, Haydar Bayar, Ümi̇t Kemaletti̇n Terzi̇ Jan 2016

Grid-Connected Induction Generator Interturn Fault Analysis Using A Pca-Ann-Based Algorithm, Haydar Bayar, Ümi̇t Kemaletti̇n Terzi̇

Turkish Journal of Electrical Engineering and Computer Sciences

It is difficult for short circuits among the internal windings of one phase in electrical machines to be determined in a reliable and speedy manner. The failure currents that occur, especially in short circuits with a few windings, are at such low levels that they cannot be determined by relay systems. This results in growing faults and damage. In this study, we designed a model that can define winding failures successfully at very small levels by using the PCA and ANN algorithms. We tested the real-time faults and measured the system performance with the installed test rig. The developed protection …


Metal Frame As Local Protection Of Superconducting Films From Thermomagnetic Avalanches, Pavlo Mikheenko, J I. Vestgarden, Supratim Chaudhuri, I J. Maasilta, Y Galperin, Tom H. Johansen Jan 2016

Metal Frame As Local Protection Of Superconducting Films From Thermomagnetic Avalanches, Pavlo Mikheenko, J I. Vestgarden, Supratim Chaudhuri, I J. Maasilta, Y Galperin, Tom H. Johansen

Australian Institute for Innovative Materials - Papers

Thermomagnetic avalanches in superconducting films propagating extremely fast while forming unpredictable patterns, represent a serious threat for the performance of devices based on such materials. It is shown here that a normal-metal frame surrounding a selected region inside the film area can provide efficient protection from the avalanches during their propagation stage. Protective behavior is confirmed by magneto-optical imaging experiments on NbN films equipped with Cu and Al frames, and also by performing numerical simulations. Experimentally, it is found that while conventional flux creep is not affected by the frames, the dendritic avalanches are partially or fully screened by them. …


Innovating Additional Layer 2 Security Requirements For A Protected Stack, Brian Cusack, Raymond Lutui Jan 2015

Innovating Additional Layer 2 Security Requirements For A Protected Stack, Brian Cusack, Raymond Lutui

Australian Information Security Management Conference

Security is only as good as the weakest link and if the weakness is at a low level in the communication stack then every other Layer has potential to inherit the problem. The OSI Layer model has defined the theoretical architecture for network communications (ISO/IEC 7498-1). Standardisation assures that each element of an internetwork uses the same model and hence a message can be moved intelligibly and correctly between participants. The OSI model divides communications into seven hierarchical Layers that provide the necessary services from the application Layer through to the physical Layer of electricity (ISO/IEC 7498-2). Each Layer is …


Central Coordination Relay For Distribution Systems With Distributed Generation, Fati̇h Mehmet Nuroğlu, Ayşen Basa Arsoy Jan 2015

Central Coordination Relay For Distribution Systems With Distributed Generation, Fati̇h Mehmet Nuroğlu, Ayşen Basa Arsoy

Turkish Journal of Electrical Engineering and Computer Sciences

As distributed generation resources penetrate into distribution systems, protection and service continuity are becoming major issues. A new approach for protection coordination and higher reliability of a distribution system with distributed generation is explored in this paper. The concept of central coordination relay (CCR) is developed for this purpose. After a brief introduction of the design and operating procedures of CCR, the utilization of the proposed relay on two feeders of a substation in the Kocaeli region of Turkey is simulated using DIgSILENT PowerFactory. The study results show that CCR can provide better protection coordination and improved reliability indices for …


Corrosion Protection Afforded By Praseodymium Conversion Film On Mg Alloy Aznd In Simulated Biological Fluid Studied By Scanning Electrochemical Microscopy, Seyed S. Jamali, Simon E. Moulton, Dennis E. Tallman, Maria Forsyth, Jan Weber, Azadehsadat Mirabedini, Gordon G. Wallace Jan 2015

Corrosion Protection Afforded By Praseodymium Conversion Film On Mg Alloy Aznd In Simulated Biological Fluid Studied By Scanning Electrochemical Microscopy, Seyed S. Jamali, Simon E. Moulton, Dennis E. Tallman, Maria Forsyth, Jan Weber, Azadehsadat Mirabedini, Gordon G. Wallace

Australian Institute for Innovative Materials - Papers

Surface passivation of AZNd Mg alloy with Pr(NO3)3 is studied using scanning electrochemical microscopy (SECM) in surface generation/tip collection (SG/TC) and AC modes. Corrosion protection afforded by the Pr treatment and the degradation mechanism in a simulated biological environment was examined on a local scale and compared with non-treated AZNd. SG/TC mode results revealed a drastic decrease in H2 evolution due to the Pr treatment. Mapping the local insulating characteristics using AC-SECM showed higher conductivity of the surface where H2 evolution was most favorable.


Faults Identification In Three-Phase Induction Motors Using Support Vector Machines, Rama Hammo Jan 2014

Faults Identification In Three-Phase Induction Motors Using Support Vector Machines, Rama Hammo

Master of Technology Management Plan II Graduate Projects

Induction motor is one of the most important motors used in industrial applications. The operating conditions may sometime lead the machine into different fault situations. The main types of external faults experienced by these motors are over loading, single phasing, unbalanced supply voltage, locked rotor, phase reversal, ground fault, under voltage and over voltage. The machine should be shut down when a fault is experienced to avoid damage and for the safety of the workers. Computer based relays monitor the machine and disconnect it during the faults. The relay logic used to identify these faults requires sophisticated signal processing techniques …


Indigenous Peoples’ Right Of Free Prior Informed Consent With Respect To Indigenous Lands, Territories And Resources (United Nations Workshop, 17-19 January 2005), Indian Law Resource Center Nov 2013

Indigenous Peoples’ Right Of Free Prior Informed Consent With Respect To Indigenous Lands, Territories And Resources (United Nations Workshop, 17-19 January 2005), Indian Law Resource Center

Free, Prior and Informed Consent: Pathways for a New Millennium (November 1)

3 pages.

U.N. Doc PFII/2004/WS.2/6