143 resultados para Security Measures.
Resumo:
The Water Framework Directive (WFD) has initiated a shift towards a targeted approach to implementation through its focus on river basin districts as management units and the natural ecological characteristics of waterbodies. Due to its role in eutrophication, phosphorus (P) has received considerable attention, resulting in a significant body of research, which now forms the evidence base for the programme of measures (POMs) adopted in WFD River Basin Management Plans (RBMP). Targeting POMs at critical sources areas (CSAs) of P could significantly improve environmental efficiency and cost effectiveness of proposed mitigation strategies. This paper summarises the progress made towards targeting mitigation measures at CSAs in Irish catchments. A review of current research highlights that knowledge related to P export at field scale is relatively comprehensive however; the availability of site-specific data and tools limits widespread identification of CSA at this scale. Increasing complexity of hydrological processes at larger scales limits accurate identification of CSA at catchment scale. Implementation of a tiered approach, using catchment scale tools in conjunction with field-by-field surveys could decrease uncertainty and provide a more practical and cost effective method of delineating CSA in a range of catchments. Despite scientific and practical uncertainties, development of a tiered CSA-based approach to assist in the development of supplementary measures would provide a means of developing catchment-specific and cost-effective programmes of measures for diffuse P. The paper presents a conceptual framework for such an approach, which would have particular relevance for the development of supplementary measures in High Status Waterbodies (HSW). The cost and resources necessary for implementation are justified based on HSWs’ value as undisturbed reference condition ecosystems.
Resumo:
A dynamic global security-aware synthesis flow using the SystemC language is presented. SystemC security models are first specified at the system or behavioural level using a library of SystemC behavioural descriptions which provide for the reuse and extension of security modules. At the core of the system is incorporated a global security-aware scheduling algorithm which allows for scheduling to a mixture of components of varying security level. The output from the scheduler is translated into annotated nets which are subsequently passed to allocation, optimisation and mapping tools for mapping into circuits. The synthesised circuits incorporate asynchronous secure power-balanced and fault-protected components. Results show that the approach offers robust implementations and efficient security/area trade-offs leading to significant improvements in turnover.