期刊文献+
共找到31篇文章
< 1 2 >
每页显示 20 50 100
An Efficient Memory Management for Mobile Operating Systems Based on Prediction of Relaunch Distance
1
作者 Jaehwan Lee Sangoh Park 《Computer Systems Science & Engineering》 SCIE EI 2023年第10期171-186,共16页
Recently,various mobile apps have included more features to improve user convenience.Mobile operating systems load as many apps into memory for faster app launching and execution.The least recently used(LRU)-based ter... Recently,various mobile apps have included more features to improve user convenience.Mobile operating systems load as many apps into memory for faster app launching and execution.The least recently used(LRU)-based termination of cached apps is a widely adopted approach when free space of the main memory is running low.However,the LRUbased cached app termination does not distinguish between frequently or infrequently used apps.The app launch performance degrades if LRU terminates frequently used apps.Recent studies have suggested the potential of using users’app usage patterns to predict the next app launch and address the limitations of the current least recently used(LRU)approach.However,existing methods only focus on predicting the probability of the next launch and do not consider how soon the app will launch again.In this paper,we present a new approach for predicting future app launches by utilizing the relaunch distance.We define the relaunch distance as the interval between two consecutive launches of an app and propose a memory management based on app relaunch prediction(M2ARP).M2ARP utilizes past app usage patterns to predict the relaunch distance.It uses the predicted relaunch distance to determine which apps are least likely to be launched soon and terminate them to improve the efficiency of the main memory. 展开更多
关键词 Mobile operating systems memory management background app caching relaunch distance neural networks
在线阅读 下载PDF
Predictability of the Summer 2022 Yangtze River Valley Heatwave in Multiple Seasonal Forecast Systems
2
作者 Jinqing ZUO Jianshuang CAO +5 位作者 Lijuan CHEN Yu NIE Daquan ZHANG Adam A.SCAIFE Nick J.DUNSTONE Steven C.HARDIMAN 《Advances in Atmospheric Sciences》 2025年第6期1156-1166,共11页
The Yangtze River Valley(YRV) of China experienced record-breaking heatwaves in July and August 2022. The characteristics, causes, and impacts of this extreme event have been widely explored, but its seasonal predicta... The Yangtze River Valley(YRV) of China experienced record-breaking heatwaves in July and August 2022. The characteristics, causes, and impacts of this extreme event have been widely explored, but its seasonal predictability remains elusive. This study assessed the real-time one-month-lead prediction skill of the summer 2022 YRV heatwaves using 12operational seasonal forecast systems. Results indicate that most individual forecast systems and their multi-model ensemble(MME) mean exhibited limited skill in predicting the 2022 YRV heatwaves. Notably, after the removal of the linear trend, the predicted 2-m air temperature anomalies were generally negative in the YRV, except for the Met Office Glo Sea6 system, which captured a moderate warm anomaly. While the models successfully simulated the influence of La Ni?a on the East Asian–western North Pacific atmospheric circulation and associated YRV temperature anomalies, only Glo Sea6 reasonably captured the observed relationship between the YRV heatwaves and an atmospheric teleconnection extending from the North Atlantic to the Eurasian mid-to-high latitudes. Such an atmospheric teleconnection plays a crucial role in intensifying the YRV heatwaves. In contrast, other seasonal forecast systems and the MME predicted a distinctly different atmospheric circulation pattern, particularly over the Eurasian mid-to-high latitudes, and failed to reproduce the observed relationship between the YRV heatwaves and Eurasian mid-to-high latitude atmospheric circulation anomalies.These findings underscore the importance of accurately representing the Eurasian mid-to-high latitude atmospheric teleconnection for successful YRV heatwave prediction. 展开更多
关键词 the summer 2022 YRV heatwaves real-time prediction skill operational seasonal forecast systems Eurasian mid-to-high latitude teleconnection
在线阅读 下载PDF
Design of secure operating systems with high security levels 被引量:5
3
作者 QING SiHan1,2 & SHEN ChangXiang3 1 Institute of Software, Chinese Academy of Sciences, Beijing 100080, China 2 School of Software and Microelectronics, Peking University, Beijing 102600, China 3 Institute of Computing Technology, Navy, Beijing 100841, China 《Science in China(Series F)》 2007年第3期399-418,共20页
Numerous Internet security incidents have shown that support from secure operating systems is paramount to fighting threats posed by modern computing environments. Based on the requirements of the relevant national an... Numerous Internet security incidents have shown that support from secure operating systems is paramount to fighting threats posed by modern computing environments. Based on the requirements of the relevant national and international standards and criteria, in combination with our experience in the design and development of the ANSHENG v4.0 secure operating system with high security level (hereafter simply referred to as ANSHENG OS), this paper addresses the following key issues in the design of secure operating systems with high security levels: security architecture, security policy models, and covert channel analysis. The design principles of security architecture and three basic security models: confidentiality, integrity, and privilege control models are discussed, respectively. Three novel security models and new security architecture are proposed. The prominent features of these proposals, as well as their applications to the ANSHENG OS, are elaborated. Cover channel analysis (CCA) is a well-known hard problem in the design of secure operating systems with high security levels since to date it lacks a sound theoretical basis and systematic analysis approach. In order to resolve the fundamental difficulties of CCA, we have set up a sound theoretical basis for completeness of covert channel identification and have proposed a unified framework for covert channel identification and an efficient backward tracking search method. The successful application of our new proposals to the ANSHENG OS has shown that it can help ease and speedup the entire CCA process. 展开更多
关键词 secure operating systems with high security levels ARCHITECTURE security model covert channel analysis
原文传递
Cybersecurity: Identifying the Vulnerability Intensity Function (VIF) and Vulnerability Index Indicator (VII) of a Computer Operating System
4
作者 Ranju Karki Chris P. Tsokos 《Journal of Information Security》 2022年第4期337-362,共26页
The objective of the present study is to define two important aspects of the computer operating system concerning the number of its vulnerabilities behavior. We identify the Vulnerability Intensity Function (VIF), and... The objective of the present study is to define two important aspects of the computer operating system concerning the number of its vulnerabilities behavior. We identify the Vulnerability Intensity Function (VIF), and the Vulnerability Index Indicator (VII) of a computer operating network. Both of these functions, VIF and VII are entities of the stochastic process that we have identified, which characterizes the probabilistic behavior of the number of vulnerabilities of a computer operating network. The VIF identifies the rate at which the number of vulnerabilities changes with respect to time. The VII is an important index indicator that conveys the following information about the number of vulnerabilities of Desktop Operating Systems: the numbers are increasing, decreasing, or remaining the same at a particular time of interest. This decision type of index indicator is crucial in every strategic planning and decision-making. The proposed VIF and VII illustrate their importance by using real data for Microsoft Windows Operating Systems 10, 8, 7, and Apple MacOS. The results of the actual data attest to the importance of VIF and VII in the cybersecurity problem we are currently facing. 展开更多
关键词 CYBERSECURITY operating systems Vulnerabilities Stochastic Process Vulnerability Intensity Function Vulnerability Index Indicator
在线阅读 下载PDF
Iterative Solution for Systems of Nonlinear Two Binary Operator Equations 被引量:2
5
作者 ZHANGZhi-hong LIWen-feng 《Chinese Quarterly Journal of Mathematics》 CSCD 2004年第3期262-266,共5页
Using the cone and partial ordering theory and mixed monotone operator theory, the existence and uniqueness of solutions for some classes of systems of nonlinear two binary operator equations in a Banach space with a ... Using the cone and partial ordering theory and mixed monotone operator theory, the existence and uniqueness of solutions for some classes of systems of nonlinear two binary operator equations in a Banach space with a partial ordering are discussed. And the error estimates that the iterative sequences converge to solutions are also given. Some relevant results of solvability of two binary operator equations and systems of operator equations are improved and generalized. 展开更多
关键词 Banach spaces two binary operators systems of operator equations iterative solution
在线阅读 下载PDF
A GENERAL MATHEMATICAL FRAMEWORK OF COMPLEX SYSTEMS(Ⅰ)
6
作者 Zan Ting-quan 《Applied Mathematics and Mechanics(English Edition)》 SCIE EI 1993年第4期385-394,共10页
The fundamental and simplest structure of a complex system is a network.According to this idea,we plan to develop a general methematical framework of complex systems.In this paper,we discuss in detail the concept of s... The fundamental and simplest structure of a complex system is a network.According to this idea,we plan to develop a general methematical framework of complex systems.In this paper,we discuss in detail the concept of systems,a general description of systems:System=(Hardware,Software,Environment),and whole-part relations,including relations between elements and systems,subsystems and systems,and between systems.The rules of operations of systems are given,and the induced transformations between hardware and software of systems are briefly discussed. 展开更多
关键词 complex systems HARDWARE SOFTWARE operations of systems induced transformations mathematical framework
在线阅读 下载PDF
TENSOR SUM AND DYNAMICAL SYSTEMS
7
作者 D.SENTHILKUMAR P.CHANDRA KALA 《Acta Mathematica Scientia》 SCIE CSCD 2014年第6期1935-1946,共12页
In this paper we introduce the concept of tensor sum semigroups. Also we have given the examples of tensor sum operators which induce dynamical system on weighted locally convex function spaces.
关键词 tensor sum composition operators multiplication operator dynamical systems seminorm operator valued mapping
在线阅读 下载PDF
Operations Support Systems Standards:Status Quo and Trends
8
作者 Wang Yanchuan Kong Lingping (China Telecom Corporation,Beijing 100032,China) 《ZTE Communications》 2006年第1期26-29,共4页
The emerging of diversified new telecommunications technologies leads to a continuous change of telecom networks. Consequently, the operations support systems of telecommunications operators are facing structure adjus... The emerging of diversified new telecommunications technologies leads to a continuous change of telecom networks. Consequently, the operations support systems of telecommunications operators are facing structure adjustments as well as new systems construction. In this situation, new generation operations support systems standards are urgently required. Several standardization organizations have made substantial progress in the study of the new generation standards, such as ITU' s study on Next Generation Network (NGN) management, TMF's on New Generation Operations Systems and Software (NGOSS) and CCSA's on network management standards. However, the existing operations support systems face the challenges of architecture improvement, change of the focus of operations support, orientation of customers' demands and technology evolution. 展开更多
关键词 ITU NGN CCSA Operations Support systems Standards ETOM OSS ITIL GPP TMN SG
在线阅读 下载PDF
Generalized Coherent States for Position-Dependent Effective Mass Systems
9
作者 Naila Amir Shahid Iqbal 《Communications in Theoretical Physics》 SCIE CAS CSCD 2016年第12期615-620,共6页
A generalized scheme for the construction of coherent states in the context of position-dependent effective mass systems has been presented. This formalism is based on the ladder operators and associated algebra of th... A generalized scheme for the construction of coherent states in the context of position-dependent effective mass systems has been presented. This formalism is based on the ladder operators and associated algebra of the system which are obtained using the concepts of supersymmetric quantum mechanics and the property of shape invariance. In order to exemplify the general results and to analyze the properties of the coherent states, several examples have been considered. 展开更多
关键词 generalized coherent states supersymmetric quantum mechanics shape invariance ladder operators position-dependent effective mass systems non-linear oscillators Mandel parameter subPoissonian statistics
原文传递
The Coupled Operational Systems:A Linear Optimisation Review
10
作者 Said El Noshokaty 《Journal of Economic Science Research》 2019年第2期40-49,共10页
The purpose of this review is to summarise the existing literature on the operational systems as to explain the current state of understanding on the coupled operational systems.The review only considers the linear op... The purpose of this review is to summarise the existing literature on the operational systems as to explain the current state of understanding on the coupled operational systems.The review only considers the linear optimisation of the operational systems.Traditionally,the operational systems are classified as decoupled,tightly coupled,and loosely coupled.Lately,the coupled operational systems were classified as systems of time-sensitive and time-insensitive operational cycle,systems employing one mix and different mixes of factors of production,and systems of single-linear,single-linear-fractional,and multi-linear objective.These new classifications extend the knowledge about the linear optimisation of the coupled operational systems and reveal new objective-improving models and new state-of-the-art methodologies never discussed before.Business areas affected by these extensions include product assembly lines,cooperative farming,gas/oil reservoir development,maintenance service throughout multiple facilities,construction via different locations,flights traffic control in aviation,game reserves,and tramp shipping in maritime cargo transport. 展开更多
关键词 Operational systems Coupled systems Assembly lines Facility location Distributed systems Resource allocation Factors of production Linear optimisation
在线阅读 下载PDF
Study of Models for Heating Power Station Operator Training Systems
11
作者 Sholpan Muratkyzy Baimatayeva Yuriy Vladimirovitch Shevyakov 《Journal of Energy and Power Engineering》 2013年第1期162-167,共6页
This paper is devoted to development and study of models for operator training systems of heating power station processes management. It proposed a mathematical model describing the management processes of heating pow... This paper is devoted to development and study of models for operator training systems of heating power station processes management. It proposed a mathematical model describing the management processes of heating power units of the technological complex considering the relationship of technological variables in deviations effective in real time. A software complex is developed for the system of training of operators controlling processes in heating station units. Obtained results may be used in the course of development of computer training systems for operators of heating power stations with cross-linkage. 展开更多
关键词 Training systems of operators steam generator simulation model heating power stations
在线阅读 下载PDF
MAC isolation to realize effective management in public wireless LAN
12
作者 陈立全 胡爱群 计文柯 《Journal of Southeast University(English Edition)》 EI CAS 2004年第2期157-161,共5页
This paper describes how to use medium access control (MAC) isolation to enhance management performance in public wireless LAN (PWLAN). To comply with the IEEE 802.11 standards, a scheme to implement MAC isolation in ... This paper describes how to use medium access control (MAC) isolation to enhance management performance in public wireless LAN (PWLAN). To comply with the IEEE 802.11 standards, a scheme to implement MAC isolation in WLAN access points by re-designing the Distribution_Service component of the MAC state machine is proposed. A variable named dotl 1 Isolation is defined to determine whether the MAC level communication between wireless stations in the same BSS is permitted or not. Finally, a design solution based on MPC860 hardware and embedded Linux software for PWLAN access point is specified. The simulation results of MAC isolation for PWLAN show that the proposed scheme is feasible and effective. 展开更多
关键词 Codes (standards) Computer operating systems Computer simulation Network protocols Wireless telecommunication systems
在线阅读 下载PDF
A new solid-conversion gas detector for high energy X-ray industrial computed tomography
13
作者 周日峰 陈伟民 段晓礁 《Optoelectronics Letters》 EI 2011年第5期337-340,共4页
A new type of solid-conversion gas detector is investigated for high energy X-ray industrial computed tomography (HECT). The conversion efficiency is calculated by using the EGSnrc Monte Carlo code on the Linux platfo... A new type of solid-conversion gas detector is investigated for high energy X-ray industrial computed tomography (HECT). The conversion efficiency is calculated by using the EGSnrc Monte Carlo code on the Linux platform to simulate the transport process of photons and electrons in the detector. The simulation results show that the conversion efficiency could be more than 65%, if the X-ray beam width is less than about 0.2 mm, and a tungsten slab with 0.2 mm thickness and 30 mm length is employed as a radiation conversion medium. Meanwhile the results indicate that this new detector has higher conversion efficiency as well as less volume. Theoretically this new kind of detector could take place of the traditional scintillation detector for HECT. 展开更多
关键词 Computer operating systems Computerized tomography Conversion efficiency Gas detectors High energy physics Multiphoton processes TUNGSTEN X rays
原文传递
High performance reconfigurable hardware system for real-time image processing
14
作者 赵广州 张天序 +2 位作者 王岳环 曹治国 左峥嵘 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2005年第3期502-509,共8页
A novel reconfigurable hardware system which uses both muhi-DSP and FPGA to attain high performance and real-time image processing are presented. The system structure and working principle of mainly processing multi-B... A novel reconfigurable hardware system which uses both muhi-DSP and FPGA to attain high performance and real-time image processing are presented. The system structure and working principle of mainly processing multi-BSP board, extended multi-DSP board are analysed. The outstanding advantage is that the communication among different board components of this system is supported by high speed link ports & serial ports for increasing the system performance and computational power. Then the implementation of embedded real-time operating systems (RTOS) by us is discussed in detail. In this system, we adopt two kinds of parallel structures controlled by RTOS for parallel processing of algorithms. The experimental results show that exploitive period of the system is short, and maintenance convenient. Thus it is suitable for real-time image processing and can get satisfactory effect of image recognition. 展开更多
关键词 MULTI-DSP fidd programmable gate arrays real-time image processing real time operating systems parallel structure.
在线阅读 下载PDF
Relative Time Quantum-based Enhancements in Round Robin Scheduling
15
作者 Sardar Zafar Iqbal Hina Gull +5 位作者 Saqib Saeed Madeeha Saqib Mohammed Alqahtani Yasser A.Bamarouf Gomathi Krishna May Issa Aldossary 《Computer Systems Science & Engineering》 SCIE EI 2022年第5期461-477,共17页
Modern human life is heavily dependent on computing systems and one of the core components affecting the performance of these systems is underlying operating system.Operating systems need to be upgraded to match the n... Modern human life is heavily dependent on computing systems and one of the core components affecting the performance of these systems is underlying operating system.Operating systems need to be upgraded to match the needs of modern-day systems relying on Internet of Things,Fog computing and Mobile based applications.The scheduling algorithm of the operating system dictates that how the resources will be allocated to the processes and the Round Robin algorithm(RR)has been widely used for it.The intent of this study is to ameliorate RR scheduling algorithm to optimize task scheduling.We have carried out an experimental study where we have developed four variations of RR,each algorithm considers three-time quanta and the performance of these variations was compared with the RR algorithm,and results highlighted that these variations performed better than conventional RR algorithm.In the future,we intend to develop an automated scheduler that can determine optimal algorithm based on the current set of processes and will allocate time quantum to the processes intelligently at the run time.This way the task performance of modern-day systems can be improved to make them more efficient. 展开更多
关键词 CPU scheduling Round Robin enhanced Round Robin relative time quantum operating systems
在线阅读 下载PDF
Source Code Comparison of DOS and CP/M
16
作者 Bob Zeidman 《Journal of Computer and Communications》 2016年第12期1-38,共38页
In a previous paper [1], I compared DOS from Microsoft and CP/M from Digital Research Inc. (DRI) to determine whether the original DOS source code had been copied from CP/M source code as had been rumored for many yea... In a previous paper [1], I compared DOS from Microsoft and CP/M from Digital Research Inc. (DRI) to determine whether the original DOS source code had been copied from CP/M source code as had been rumored for many years [2] [3]. At the time, the source code for CP/M was publicly available but the source code for DOS was not. My comparison was limited to the comparison of the DOS 1.11 binary code and the source code for CP/M 2.0 from 1981. Since that time, the Computer History Museum in Mountain View, California received the source code for DOS 2.0 from Microsoft and was given permission to make it public. The museum also received the source code for DOS 1.1 from Tim Paterson, the developer who was originally contracted by Microsoft to write DOS. In this paper, I perform a further analysis using the newly accessible source code and determine that no code was copied. I further conclude that the commands were not copied but that a substantial number of the system calls were copied. 展开更多
关键词 Copyright Infringement CP/M Digital Research DOS Intellectual Property MICROSOFT operating systems Software Forensics
在线阅读 下载PDF
ARM-Based Embedded System Platform and Its Portability Research
17
作者 Hao Liu 《Journal of Computer and Communications》 2023年第11期51-63,共13页
Taking ARM as the hardware platform, the embedded system is built from both hardware and software aspects with the application as the center. In the hardware design, build the hardware platform scheme, design the sche... Taking ARM as the hardware platform, the embedded system is built from both hardware and software aspects with the application as the center. In the hardware design, build the hardware platform scheme, design the schematic diagram as well as PCB, complete the hardware debugging, and ensure the system hardware platform function;in the software design, optimize the three-stage pipeline structure of ARM instruction system, design the instruction set, install the embedded system on the virtual machine, build the cross-toolchain, and set up the correct NFS network file system. Finish the design of the ARM-based embedded system platform, combined with the hardware requirements of the experimental platform, transplant the powerful Uboot as the Bootloader of the system, and further transplant the Linux-2.6. 32 kernel to the system start the operation normally, and finally, build the root file to finish the study of its portability. 展开更多
关键词 Embedded Platforms PORTABILITY operating systems
在线阅读 下载PDF
Social Energy:Mining Energy From the Society 被引量:2
18
作者 Jun Jason Zhang David Wenzhong Gao +6 位作者 Yingchen Zhang Xiao Wang Xiangyang Zhao Dongliang Duan Xiaoxiao Dai Jun Hao Fei-Yue Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2017年第3期466-482,共17页
The inherent nature of energy,i.e.,physicality,sociality and informatization,implies the inevitable and intensive interaction between energy systems and social systems.From this perspective,we define "social ener... The inherent nature of energy,i.e.,physicality,sociality and informatization,implies the inevitable and intensive interaction between energy systems and social systems.From this perspective,we define "social energy" as a complex sociotechnical system of energy systems,social systems and the derived artificial virtual systems which characterize the intense intersystem and intra-system interactions.The recent advancement in intelligent technology,including artificial intelligence and machine learning technologies,sensing and communication in Internet of Things technologies,and massive high performance computing and extreme-scale data analytics technologies,enables the possibility of substantial advancement in socio-technical system optimization,scheduling,control and management.In this paper,we provide a discussion on the nature of energy,and then propose the concept and intention of social energy systems for electrical power.A general methodology of establishing and investigating social energy is proposed,which is based on the ACP approach,i.e., "artificial systems"(A), "computational experiments"(C) and "parallel execution"(P),and parallel system methodology.A case study on the University of Denver(DU) campus grid is provided and studied to demonstrate the social energy concept.In the concluding remarks,we discuss the technical pathway,in both social and nature sciences,to social energy,and our vision on its future. 展开更多
关键词 ACP distribution locational marginal pricing intelligent operation in power systems parallel control parallel intelligence parallel management social energy socio-technical energy systems
在线阅读 下载PDF
Elimination of Partial Overloading of Generators Under Unbalanced Operating Conditions of Power Systems
19
作者 Sudhakar Reddy Sama Subrata Paul Sunita Halder Nee Dey 《CSEE Journal of Power and Energy Systems》 SCIE 2016年第1期81-87,共7页
Unbalanced operating condition in a power system can cause partial overloading of the generators in the network,a condition where one or two of the three phases of the generator become overloaded even if the total 3-p... Unbalanced operating condition in a power system can cause partial overloading of the generators in the network,a condition where one or two of the three phases of the generator become overloaded even if the total 3-phase power output of the generator is within its specified limit.Partial overloading of generators beyond certain limits is undesirable and must be avoided.Distribution systems are often subjected to highly unbalanced operating conditions.Introduction of distributed generations(DGs),therefore,has rendered today’s distribution systems quite susceptible to this problem.Mitigation of this problem requires the issue to be addressed properly during analysis,operation and planning of such systems.Analysis,operation and planning of power networks under unbalanced operating condition require 3-phase load flow study.The existing methods of 3-phase load flow are not equipped to take into account any limit on the loadings of the individual phases of the generators.In the present work,a methodology based on NewtonRaphson(N-R)3-phase load flow with necessary modifications is proposed.The proposed methodology is able to determine the safe loading limits of the generators,and,can be adopted for operation and planning of power networks under unbalanced operating conditions to overcome the above difficulties.Test results on IEEE-37 bus feeder network are presented to demonstrate the effectiveness of the proposed method. 展开更多
关键词 Newton Raphson 3-phase load flow partial overloading of generators unbalanced operating condition of power systems
原文传递
Evidence Emerging from the Survey on European Union Timber Regulation [REG. (EU) 995/2010] in Italy
20
作者 Hadžić Nermin Carbone Francesco 《Open Journal of Forestry》 2022年第1期142-161,共20页
Illegal logging is a pervasive problem of major international concern that causes many negative social, economical and environmental consequences. EUTR is a tool adopted in 2010 and entered into force in 2013 to stop ... Illegal logging is a pervasive problem of major international concern that causes many negative social, economical and environmental consequences. EUTR is a tool adopted in 2010 and entered into force in 2013 to stop the trade of timber illegally logged within the EU market. The implementation in Italy is still in progress and varies among regions. This study considers the respondents’ opinions on different EUTR characteristics, implementation processes and compliance activities. Taking Italy as an example, the questionnaire was delivered to relevant Italian foresters and timber operators in the forest-timber system. Two hypotheses are under verification: </span></span><span><span><span style="font-family:"">1</span></span></span><span><span><span style="font-family:"">) if Italian forest-wood-timber sector integrated EUTR into its activity and </span></span></span><span><span><span style="font-family:"">2</span></span></span><span><span><span style="font-family:"">) if the Italian Due Diligence system is a valid model to other countries. The questionnaire has been submitted to the wood industry stakeholders. It has been organized into six sections to collect information about the professional characteristics of respondents, their experiences on EUTR, the opinion about EUTR and FLEGT, the support received on EUTR implementation, the opinion about the checks system, and the role of EUTR in marketing timber products. Questionnaire data have been elaborated in different ways. Conclusion underlines the EUTR Italian system criticalities and some suggestions for a more effective use of EUTR in the wood market. The picture that emerges from the results collected is that the EUTR, although proposed for morally and ethically valid purposes, doesn’t have unanimous effectiveness. In particular, EUTR can generate a distortion of the market, new expenditures for importers. Various operators applaud the role of certification schemes for sustainable forest management, which indirectly makes it possible to prevent the aforementioned problem. The Italian EUTR system is working only for satisfying Regulation 995/2010 targets. This must be considered as the starting point;however, three innovative topics could be developed in the future: digitalization and computerization of EUTR certification, integration of EUTR certification with forest certifications schemes and other quality certifications, and use of EUTR in the marketing initiatives. 展开更多
关键词 EUTR Illegal Logging Implementation QUESTIONNAIRE Foresters and Timber Operators in the Forest-Timber systems
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部