黄河流域构成了我国重要的生态屏障,同时也是我国重要的经济走廊,由于历史、自然条件等原因,黄河流域生态环境脆弱,生态安全与环境保护形势严峻。选取中国知识资源总库(China national knowledge internet,CNKI)数据库,检索了2003-2023...黄河流域构成了我国重要的生态屏障,同时也是我国重要的经济走廊,由于历史、自然条件等原因,黄河流域生态环境脆弱,生态安全与环境保护形势严峻。选取中国知识资源总库(China national knowledge internet,CNKI)数据库,检索了2003-2023年黄河流域生态环境保护相关研究文献,采用CiteSpace可视化文献分析工具对黄河流域生态环境保护研究现状和热点进行了可视化分析。结果表明:黄河流域生态环境保护相关研究的文献数量自2019年急速上升,流域生态环境问题成为学者关注的重要热点,未来将有较高的研究热度;黄河流域研究热点主要集中在“黄河”“生态保护”“水资源”“黄河”“生态建设”等方面。展开更多
Research in virtualization technology has gained significant developments in recent years, which brings not only opportunities to the forensic community, but challenges as well. This paper discusses the potential role...Research in virtualization technology has gained significant developments in recent years, which brings not only opportunities to the forensic community, but challenges as well. This paper discusses the potential roles of virtualization in digital forensics, examines the recent progresses which use the virtualization techniques to support modem computer forensics. The influences on digital forensics caused by virtualization technology are identified. Tools and methods in common digital forensic practices are analyzed, and experiences of our practice and reflections in this field are shared.展开更多
文摘黄河流域构成了我国重要的生态屏障,同时也是我国重要的经济走廊,由于历史、自然条件等原因,黄河流域生态环境脆弱,生态安全与环境保护形势严峻。选取中国知识资源总库(China national knowledge internet,CNKI)数据库,检索了2003-2023年黄河流域生态环境保护相关研究文献,采用CiteSpace可视化文献分析工具对黄河流域生态环境保护研究现状和热点进行了可视化分析。结果表明:黄河流域生态环境保护相关研究的文献数量自2019年急速上升,流域生态环境问题成为学者关注的重要热点,未来将有较高的研究热度;黄河流域研究热点主要集中在“黄河”“生态保护”“水资源”“黄河”“生态建设”等方面。
文摘Research in virtualization technology has gained significant developments in recent years, which brings not only opportunities to the forensic community, but challenges as well. This paper discusses the potential roles of virtualization in digital forensics, examines the recent progresses which use the virtualization techniques to support modem computer forensics. The influences on digital forensics caused by virtualization technology are identified. Tools and methods in common digital forensic practices are analyzed, and experiences of our practice and reflections in this field are shared.