期刊文献+
共找到307,021篇文章
< 1 2 250 >
每页显示 20 50 100
Research on the Construction of Intellectual Property System and Optimization of Business Environment in China
1
作者 Zhang Xue Lyu Guofu 《科技与法律(中英文)》 2025年第1期125-137,共13页
With the rapid development of globalization and information technology,intellectual property has been one of the key drivers of economic growth,and the construction of intellectual property system has become an import... With the rapid development of globalization and information technology,intellectual property has been one of the key drivers of economic growth,and the construction of intellectual property system has become an important criterion for measuring the quality of business environment.This article is intended to explore the current status of intellectual property system construction in China,the challenges,and its relationship with the business environment,to propose the corresponding countermeasures and suggestions.The study finds that the legal system of intellectual property in China is gradually improving,and judicial and administrative protection are continuously strengthened.However,the challenges still remain such as frequent infringements,rights hard to protect and insufficient international cooperation.These issues not only affect the legitimate rights and interests of innovation entities,but also for the market fairness and the level of the business environment.Therefore,this article proposes that strengthening the perfection of the intellectual property legal system,enhancing intellectual property services and support capabilities,strengthening international cooperation and exchanges,and accelerating the cultivation of composite talents.It aims to provide theoretical references for the construction of intellectual property system and the optimization of the business environment,promote the high-quality development of economy and enhance the global competitiveness of the country. 展开更多
关键词 intellectual property business environment system construction economic development
下载PDF
An Immunity-Based IOT Environment Security Situation Awareness Model 被引量:2
2
作者 Yuanquan Shi Tao Li +2 位作者 Renfa Li Xiaoning Peng Pengju Tang 《Journal of Computer and Communications》 2017年第7期182-197,共16页
To effectively perceive network security situation under IOT environment, an Immunity-based IOT Environment Security Situation Awareness (IIESSA) model is proposed. In IIESSA, some formal definitions for self, non-sel... To effectively perceive network security situation under IOT environment, an Immunity-based IOT Environment Security Situation Awareness (IIESSA) model is proposed. In IIESSA, some formal definitions for self, non-self, antigen and detector are given. According to the relationship between the antibody-concentration of memory detectors and the intensity of network attack activities, the security situation evaluation method under IOT environment based on artificial immune system is presented. And then according to the situation time series obtained by the mentioned evaluation method, the security situation prediction method based on grey prediction theory is presented for forecasting the intensity and security situation of network attack activities that the IOT environment will be suffered in next step. The experimental results show that IIESSA provides a novel and effective model for perceiving security situation of IOT environment. 展开更多
关键词 IOT environment security SITUATION AWARENESS Artificial IMMUNE System GREY Prediction
下载PDF
Urban Market-Gardening in Parakou (Republic of Benin): Spatial Dynamics, Food Security, Protection of the Environment and Creation of Employments 被引量:1
3
作者 Abdoul-Ramane Abdoulaye Aboudou Yacoubou Mama Aboudou Ramanou 《Journal of Geoscience and Environment Protection》 2015年第5期93-103,共11页
Nowadays, African cities are subjected to upsets which result from the extraordinary growth of urban populations. The growth of the population of cities has induced some changes in the structure of the activity of tho... Nowadays, African cities are subjected to upsets which result from the extraordinary growth of urban populations. The growth of the population of cities has induced some changes in the structure of the activity of those cities. Agriculture which was formerly confined to the countryside henceforth develops in the urban area and occupies a preponderant place as a strategy of survival, of insertion and of food supplying of the city-dwellers. It has become an activity integrated to the urban tissue through systems of occupying and exploitation of land in the urban area. Population growth (4.81%) between 2002 and 2013 is a critical poverty rate (65%) of the population of Parakou city, entailing a misery perceptible in all its social and economic dimensions. The market-gardening activity has integrated itself to the urban tissue. The objective of this study is to understand how urban agriculture through market-gardening can be a solution for rural farmers who have moved to Parakou city. In this study, documentary research, interviews and field observation are used for data collection. The main results to be signaled among others are: evolution and status of the market-gardening areas in Parakou, the reduction of food insecurity with the permanent availability in quantity and in quality of market-gardening products accessible to the population: the protection of the environment through the drainage of the urban area and the preservation of the diversity of vegetables;the increase of the income of the households of the farmers and the creation of employments. 展开更多
关键词 URBAN Agriculture Food security Market-Gardening Channel Land Dynamics PROTECTION of the environment Employment Parakou
下载PDF
Study on the Priority and Interaction of Food Security,Food Safety and Environmental Protection 被引量:1
4
作者 Tang Bulong 《学术界》 CSSCI 北大核心 2017年第11期294-303,共10页
Food security, food safety and environmental protection are major livelihood issues in front of the Chinese people. The priorities of the three are different, and there is mutually dependent and contradictory relation... Food security, food safety and environmental protection are major livelihood issues in front of the Chinese people. The priorities of the three are different, and there is mutually dependent and contradictory relationship among them. Facing the triple pressures of food security, food safety, and environmental protection, this paper analyzes the priority of the three from the historical development, then further analyzes the interaction between food security,food safety and environmental protection and finally puts forward the healthy development of food security, food safety and environmental protection, and the proper settlement of the three problems. 展开更多
关键词 FOOD security FOOD safety environmentAL protection PRIORITY INTERACTIVE RELATIONSHIP
下载PDF
Analyzing Security Threats to Virtual Machines Monitor in Cloud Computing Environment 被引量:1
5
作者 Ahmad Fayez S. Althobaiti 《Journal of Information Security》 2017年第1期1-7,共7页
The data and applications in cloud computing reside in cyberspace, that allowing to users access data through any connection device, when you need to transfer information over the cloud, you will lose control of it. T... The data and applications in cloud computing reside in cyberspace, that allowing to users access data through any connection device, when you need to transfer information over the cloud, you will lose control of it. There are multi types of security challenge must be understood and countermeasures. One of the major security challenges is resources of the cloud computing infrastructures are provided as services over the Internet, and entire data in the cloud computing are reside over network resources, that enables the data to be access through VMs. In this work, we describe security techniques for securing a VCCI, VMMs such as Encryption and Key Management (EKM), Access Control Mechanisms (ACMs), Virtual Trusted Platform Module (vTPM), Virtual Firewall (VF), and Trusted Virtual Domains (TVDs). In this paper we focus on security of virtual resources in Virtualized Cloud Computing Infrastructure (VCCI), Virtual Machine Monitor (VMM) by describing types of attacks on VCCI, and vulnerabilities of VMMs and we describe the techniques for securing a VCCI. 展开更多
关键词 CLOUD COMPUTING security Threats Virtual Machine MONITORS CLOUD security
下载PDF
Assessment of Geological Security and Integrated Assessment Geo-environmental Suitability in Worst-hit Areas in Wenchuan Quake 被引量:1
6
作者 LI Wenpeng WEN Dongguang +8 位作者 ZHOU Aiguo SUN Xiaoming MENG Hui SHI Jusong CHEN Zongyu ZHANG Liqin FENG Xiaoming LIU Changli ZHOU Jianwei 《Acta Geologica Sinica(English Edition)》 SCIE CAS CSCD 2009年第4期816-825,共10页
The Wenchuan earthquake in 2008 and geo-hazards triggered by the earthquake caused large injuries and deaths as well as destructive damage for infrastructures like construction, traffic and electricity. It is urgent t... The Wenchuan earthquake in 2008 and geo-hazards triggered by the earthquake caused large injuries and deaths as well as destructive damage for infrastructures like construction, traffic and electricity. It is urgent to select relatively secure areas for townships and cities constructed in high mountainous regions with high magnitude earthquakes. This paper presents the basic thoughts, evaluation indices and evaluation methods of geological security evaluation, water and land resources security demonstration and integrated assessments of geo-environmental suitability for reconstruction in alp and ravine with high magnitude earthquakes, which are applied in the worst-hit areas (12 counties). The integrated assessment shows that: (1) located in the Longmenshan fault zone, the evaluated area is of poor regional crust stability, in which the unstable and second unstable areas account for 79% of the total; (2) the geo-hazards susceptibility is high in the evaluation area. The spots of geo-hazards triggered by earthquake are mainly distributed along the active fault zone with higher distribution in the moderate and high mountains area, in which the areas of high and moderate susceptibility zoning accounts for 40.1% of the total; (3) geological security is poor in the evaluated area, in which the area of the unsuitable construction occupies 73.1%, whereas in the suitable construction area, the areas of geological security, second security and insecurity zoning account for 8.3 %, 9.3% and 9.3 % of the evaluated area respectively; (4) geo-environmentai suitability is poor in the evaluated area, in which the areas of suitability and basic suitability zoning account for 3.5% and 7.3% of the whole evaluation area. 展开更多
关键词 Wenchuan earthquake geological security carrying capacity of water and land resources geo-environmental suitability
下载PDF
Security Challenges of Virtualization Hypervisors in Virtualized Hardware Environment 被引量:1
7
作者 Gabriel Cephas Obasuyi Arif Sari 《International Journal of Communications, Network and System Sciences》 2015年第7期260-273,共14页
The concept of virtualization machines is not new, but it is increasing vastly and gaining popularity in the IT world. Hypervisors are also popular for security as a means of isolation. The virtualization of informati... The concept of virtualization machines is not new, but it is increasing vastly and gaining popularity in the IT world. Hypervisors are also popular for security as a means of isolation. The virtualization of information technology infrastructure creates the enablement of IT resources to be shared and used on several other devices and applications;this increases the growth of business needs. The environment created by virtualization is not restricted to any configuration physically or execution. The resources of a computer are shared logically. Hypervisors help in virtualization of hardware that is a software interact with the physical system, enabling or providing virtualized hardware environment to support multiple running operating system simultaneously utilizing one physical server. This paper explores the benefits, types and security issues of Virtualization Hypervisor in virtualized hardware environment. 展开更多
关键词 VIRTUALIZATION Hypervisors VIRTUAL MACHINE VIRTUAL MACHINE MONITOR security
下载PDF
Two Issues in Studying Security Environment
8
作者 Yin Gang Yin Gang is an Associate Research Professor at the Institute for West Asian and Southeast Asian Studies, the Chinese Academy of Social Sciences. 《Contemporary International Relations》 2003年第1期12-16,共5页
To some extent, China’s security environment depends on if it has active creation, understanding, attention and vigilance on the common interests of the surrounding areas and groups of states, and if it could take ti... To some extent, China’s security environment depends on if it has active creation, understanding, attention and vigilance on the common interests of the surrounding areas and groups of states, and if it could take timely and proper countermeasures. In my personal view, two principles should be taken into consideration. The first principle is 展开更多
关键词 in security Two Issues in Studying security environment of ROK that HAVE
下载PDF
Study on Index System of the Environmental Change and Ecological Security for a River Basin Based on DPSIR Model 被引量:1
9
作者 YAO Yuan 《Meteorological and Environmental Research》 2012年第6期50-54,共5页
[ Objective] The research aimed to study index system of the environmental change and ecological security for a river basin based on DPSIR model. [Method] Based on considering each influence factor of the environmenta... [ Objective] The research aimed to study index system of the environmental change and ecological security for a river basin based on DPSIR model. [Method] Based on considering each influence factor of the environmental change and ecological security for a river basin, DPSIR model as framework, the basic framework, principle and related method of index system of the environmental change and ecological security for a river basin under influence of the multi-level development were put forward. [ ]Result] Index system of the environmental change and ecological se- curity for a river basin based on DPSIR model included driving force indicator, pressure indicator, state indicator, influence indicator and response indicator. Each indicator type also had many sub-indicators. [ Conclusion] The research provided theoretical support and method reference for as- sessment of the ecological security and execution of the ecological environment management for a river basin in China. 展开更多
关键词 DPSIR model environmental change Ecological security Index system China
下载PDF
Reflections on China's Neighboring Security Environment
10
作者 Dao Shulin 《Contemporary International Relations》 2002年第12期27-32,共6页
There is a Chinese saying that goes like this, when stormy weather comes, a giant dragon will rise. It is the feature of the present era. When China begins to rise, it will advance at an enormous inertial force. It ha... There is a Chinese saying that goes like this, when stormy weather comes, a giant dragon will rise. It is the feature of the present era. When China begins to rise, it will advance at an enormous inertial force. It has become the important factor that influences world future trend. In the meanwhile, changes in international situation also exerted increasing influence on China. Therefore it is of special significance to discuss and assess the international environment that China faces. 展开更多
关键词 security Reflections on China’s Neighboring security environment
下载PDF
The Role of Sports Diplomacy in Advancing Environmental Security in Africa: Case of Forest Conservation in Kenya
11
作者 Benjamin Mutuku Kinyili Shazia Chaudhry 《International Relations and Diplomacy》 2021年第5期199-210,共12页
Environmental security remains a key challenge in the late 19th through to the 21st century,whose solution has attracted a number of initiatives.Sports diplomacy has achieved great strides in achieving international,r... Environmental security remains a key challenge in the late 19th through to the 21st century,whose solution has attracted a number of initiatives.Sports diplomacy has achieved great strides in achieving international,regional,and local unity.However,the use of sports diplomacy in achieving environmental security has received much less research attention.This research examines the role of sports in diplomacy in achieving environmental security in Kenya.This study was anchored on the soft power theory and Conservation of Resources(COR)theory which offer frameworks for explaining the role of sports diplomacy in advancing environmental security.The study adopted exploratory research design.The target population was diplomats,marathoners,coaches,environmentalists,conservationists and government officials,academia as well as Water Resources Authority(WRA).The primary data were obtained through open and closed structured questionnaire.The collected data were analyzed through the use of frequency distribution,and thematic analysis.The study established that sports diplomacy advanced environmental security in Kenya,which was better for athletics and volleyball.Environmental security was also enhanced through training,sensitization,conservation efforts,and environmental education.Sport events also allowed a contact-platform for interaction between various groups involved in environment and forest conservation.This study recommends that sports diplomacy should be used in most of the regions in Kenya experiencing environmental perturbations and the current strategies should be applied in the sports diplomacy and environmental conservation as well as security.Further,the government is also encouraged to appoint more sports ambassadors with proper environmental knowledge to help in environmental management.The role of academicians in sports diplomacy and environmental security was found to be minimal where academicians should be at the forefront as the 21st century diplomats are incorporated into sports to be local ambassadors.Perceiving the significance of sports diplomacy and environmental security,there is need for coordination between various county governments to coordinate their efforts and in the process they should bring on board even the non sports actors to boost the role of sports in diplomacy and environment. 展开更多
关键词 sports diplomacy environmental security forest conservation soft power theory Conservation of Resources(COR)theory
下载PDF
Ensuring Security, Confidentiality and Fine-Grained Data Access Control of Cloud Data Storage Implementation Environment 被引量:1
12
作者 Amir Mohamed Talib 《Journal of Information Security》 2015年第2期118-130,共13页
With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality a... With the development of cloud computing, the mutual understandability among distributed data access control has become an important issue in the security field of cloud computing. To ensure security, confidentiality and fine-grained data access control of Cloud Data Storage (CDS) environment, we proposed Multi-Agent System (MAS) architecture. This architecture consists of two agents: Cloud Service Provider Agent (CSPA) and Cloud Data Confidentiality Agent (CDConA). CSPA provides a graphical interface to the cloud user that facilitates the access to the services offered by the system. CDConA provides each cloud user by definition and enforcement expressive and flexible access structure as a logic formula over cloud data file attributes. This new access control is named as Formula-Based Cloud Data Access Control (FCDAC). Our proposed FCDAC based on MAS architecture consists of four layers: interface layer, existing access control layer, proposed FCDAC layer and CDS layer as well as four types of entities of Cloud Service Provider (CSP), cloud users, knowledge base and confidentiality policy roles. FCDAC, it’s an access policy determined by our MAS architecture, not by the CSPs. A prototype of our proposed FCDAC scheme is implemented using the Java Agent Development Framework Security (JADE-S). Our results in the practical scenario defined formally in this paper, show the Round Trip Time (RTT) for an agent to travel in our system and measured by the times required for an agent to travel around different number of cloud users before and after implementing FCDAC. 展开更多
关键词 CLOUD Computing CLOUD DATA STORAGE CLOUD Service PROVIDER Formula-Based CLOUD DATA Access Control Multi-Agent System and Secure Java Agent Development Framework
下载PDF
Expand International Understanding and Improve China's Environment for National Security
13
作者 Yang Yi Director of institute for Strategic Studies of National De fen se University 《International Understanding》 2003年第3期40-40,共1页
关键词 Expand International Understanding and Improve China’s environment for National security for
下载PDF
The Trade-Off Between Performance and Security of Virtualized Trusted Execution Environment on Android
14
作者 Thien-Phuc Doan Ngoc-Tu Chau +1 位作者 Jungsoo Park Souhwan Jung 《Computer Systems Science & Engineering》 SCIE EI 2023年第9期3059-3073,共15页
Nowadays,with the significant growth of the mobile market,security issues on the Android Operation System have also become an urgent matter.Trusted execution environment(TEE)technologies are considered an option for s... Nowadays,with the significant growth of the mobile market,security issues on the Android Operation System have also become an urgent matter.Trusted execution environment(TEE)technologies are considered an option for satisfying the inviolable property by taking advantage of hardware security.However,for Android,TEE technologies still contain restrictions and limitations.The first issue is that non-original equipment manufacturer developers have limited access to the functionality of hardware-based TEE.Another issue of hardware-based TEE is the cross-platform problem.Since every mobile device supports different TEE vendors,it becomes an obstacle for developers to migrate their trusted applications to other Android devices.A software-based TEE solution is a potential approach that allows developers to customize,package and deliver the product efficiently.Motivated by that idea,this paper introduces a VTEE model,a software-based TEE solution,on Android devices.This research contributes to the analysis of the feasibility of using a virtualized TEE on Android devices by considering two metrics:computing performance and security.The experiment shows that the VTEE model can host other software-based TEE services and deliver various cryptography TEE functions on theAndroid environment.The security evaluation shows that adding the VTEE model to the existing Android does not addmore security issues to the traditional design.Overall,this paper shows applicable solutions to adjust the balance between computing performance and security. 展开更多
关键词 Mobile security trusted execution model virtualized trusted execution environment HYPERVISOR
下载PDF
Research on data security under WWW specific environments
15
作者 JI Zhen-zhou1, FANG Bin-xing1, SHI Jie2 (1. Dept. of Computer Science and Engineering, Harbin Institute of Technology, Harbin 150001, China 2. Project Department Railway Office of Shenyang, Shenyang 150001, China) 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2000年第S1期94-96,共3页
We analyze data security technologies, and find out some defects of technologies and then propose a method of data security using protocol check under special environments and make some necessary analysis.
关键词 NETWORK security data detection COMPUTER CRIME
下载PDF
Security and Privacy in 5G Internet of Vehicles(IoV)Environment 被引量:1
16
作者 Benjamin Kwapong Osibo Chengbo Zhang +2 位作者 Changsen Xia Guanzhe Zhao Zilong Jin 《Journal on Internet of Things》 2021年第2期77-86,共10页
Modern vehicles are equipped with sensors,communication,and computation units that make them capable of providing monitoring services and analysis of real-time traffic information to improve road safety.The main aim o... Modern vehicles are equipped with sensors,communication,and computation units that make them capable of providing monitoring services and analysis of real-time traffic information to improve road safety.The main aim of communication in vehicular networks is to achieve an autonomous driving environment that is accident-free alongside increasing road use quality.However,the demanding specifications such as high data rate,low latency,and high reliability in vehicular networks make 5G an emerging solution for addressing the current vehicular network challenges.In the 5G IoV environment,various technologies and models are deployed,making the environment open to attacks such as Sybil,Denial of Service(DoS)and jamming.This paper presents the security and privacy challenges in an IoV 5G environment.Different categories of vehicular network attacks and possible solutions are presented from the technical point of view. 展开更多
关键词 5G Internet of Vehicles PRIVACY security vehicular networks
下载PDF
Novel Architecture of Security Orchestration, Automation and Response in Internet of Blended Environment
17
作者 Minkyung Lee Julian Jang-Jaccard Jin Kwak 《Computers, Materials & Continua》 SCIE EI 2022年第10期199-223,共25页
New technologies that take advantage of the emergence of massive Internet of Things(IoT)and a hyper-connected network environment have rapidly increased in recent years.These technologies are used in diverse environme... New technologies that take advantage of the emergence of massive Internet of Things(IoT)and a hyper-connected network environment have rapidly increased in recent years.These technologies are used in diverse environments,such as smart factories,digital healthcare,and smart grids,with increased security concerns.We intend to operate Security Orchestration,Automation and Response(SOAR)in various environments through new concept definitions as the need to detect and respond automatically to rapidly increasing security incidents without the intervention of security personnel has emerged.To facilitate the understanding of the security concern involved in this newly emerging area,we offer the definition of Internet of Blended Environment(IoBE)where various convergence environments are interconnected and the data analyzed in automation.We define Blended Threat(BT)as a security threat that exploits security vulnerabilities through various attack surfaces in the IoBE.We propose a novel SOAR-CUBE architecture to respond to security incidents with minimal human intervention by automating the BT response process.The Security Orchestration,Automation,and Response(SOAR)part of our architecture is used to link heterogeneous security technologies and the threat intelligence function that collects threat data and performs a correlation analysis of the data.SOAR is operated under Collaborative Units of Blended Environment(CUBE)which facilitates dynamic exchanges of data according to the environment applied to the IoBE by distributing and deploying security technologies for each BT type and dynamically combining them according to the cyber kill chain stage to minimize the damage and respond efficiently to BT. 展开更多
关键词 Blended threat(BT) collaborative units for blended environment(CUBE) internet of blended environment(IoBE) security orchestration automation and response(SOAR)
下载PDF
A Test Bed for Information Security Skill Development with Virtual Training Environment
18
作者 Alok Tripathi Abhinav Mishra Gudalur Varadarajan Raghunathan 《Computer Technology and Application》 2011年第6期449-455,共7页
New attacks are emerging rapidly in Information Security; hence the tools and technologies available for securing the information needs substantial upgradation as well as skills for operationalization to mitigate thes... New attacks are emerging rapidly in Information Security; hence the tools and technologies available for securing the information needs substantial upgradation as well as skills for operationalization to mitigate these attacks. It requires creation of practical training environment with tools and technologies available for Information Security. The design of Information Security courses involves scenario based hands-on-labs with real time security incidents and problems with global reach which could be customized quickly as per the scenario and user's requirement. In order to understand the underlying concepts as well as to learn the practical aspects of network and system security environment, an initiative has been taken and a Virtual Test Bed has been developed to meet the above objectives. It is an essential component in Information Security training concept which could be used to perform actual security attacks and remedial measures as well as to test the effectiveness of protection mechanisms and help in handling the security incidents effectively. This paper discusses the development of this Test Bed for Information Security skill development with virtual training environment using which Information Security concepts, attacks on networks/systems and practical scenarios are simulated for imparting hands on training to participants. 展开更多
关键词 ATTACKS information security test bed virtual training environment SIMULATION
下载PDF
Effects of thinning on the understory light environment of different stands and the photosynthetic performance and growth of the reforestation species Phoebe bournei 被引量:2
19
作者 Shicheng Su Nianqing Jin Xiaoli Wei 《Journal of Forestry Research》 SCIE EI CAS CSCD 2024年第1期12-28,共17页
Light levels determine regeneration in stands and a key concern is how to regulate the light environment of different stand types to the requirements of the understory.In this study,we selected three stands typical in... Light levels determine regeneration in stands and a key concern is how to regulate the light environment of different stand types to the requirements of the understory.In this study,we selected three stands typical in south China(a Cryptomeria japonica plantation,a Quercus acutissima plantation,and a mixed stand of both)and three thinning intensities to determine the best understory light environ-ment for 3-year-old Phoebe bournei seedlings.The canopy structure,understory light environment,and photosynthe-sis and growth indicators were assessed following thin-ning.Thinning improved canopy structure and understory light availability of each stand;species composition was the reason for differences in the understory light environ-ment.Under the same thinning intensity,the mixed stand had the greatest light radiation and most balanced spectral composition.P.bournei photosynthesis and growth were closely related to the light environment;all three stands required heavy thinning to create an effective and sustained understory light environment.In a suitable understory light environment,the efficiency of light interception,absorption,and use by seedlings was enhanced,resulting in a higher carbon assimilation the main limiting factor was stomatal conductance.As a shade-avoidance signal,red/far-red radia-tion is a critical factor driving changes in photosynthesis and growth of P.bournei seedlings,and a reduction increased light absorption and use capacity and height:diameter ratios.The growth advantage transformed from diameter to height,enabling seedlings to access more light.Our findings suggest that the regeneration of shade-tolerant species such as P.bournei could be enhanced if a targeted approach to thinning based on stand type was adopted. 展开更多
关键词 THINNING Understory light environment Phoebe bournei Photosynthetic performance Growth performance
下载PDF
Impact of Environment Conditions on Grapevine (<i>Vitis vinifera</i>L.): To Optimal Production and Sustainability, Achieving Food Security and Increasing the Palestinian Economy
20
作者 Jehad M. H. Ighbareyeh Eusebio Cano Carmona 《Journal of Geoscience and Environment Protection》 2018年第2期62-73,共12页
Grapevine (Vitis vinifera L.) is one of important economic fruit crops found in Hebron of Palestine. Climate is one of the key controlling factors in grape and wine production. Materials & Method: We analyzed grap... Grapevine (Vitis vinifera L.) is one of important economic fruit crops found in Hebron of Palestine. Climate is one of the key controlling factors in grape and wine production. Materials & Method: We analyzed grape production in Hebron region, and studied the correlation analyses between productions and climatic, bioclimatic factors. The bioclimate, climatic factors were obtained according to Rivas-Martinez to classification of the earth. However, the independent variables were examined: the bioclimate factors as compensated thermicity index, annual ombrothermic index, water deficit and simple continentality index;and following climate factors: mean monthly temperature, precipitation and soil water reserve. The data used were from one meteorological station of the Palestinian Meteorological Department for the years 1993 to 2009 (16 years), and to the same years of grape production (rain-fed) from the Palestinian Central Bureau of Statistics (PCBS).?Result & Discussion: When we applied a Principal Component Analysis (PCA), and observed that the Hebron type plots are located at the left of axis 1 during 1999-2004 negatively affected by the bioclimate factors as compensated thermicity index, with a large proportion of the variance explained by axes 1 (76.66%), but precipitation was positive influenced on grape yield for the years (2004-2009), with a proportion of the variance explained by axes 2 (23.34%);Hebron type plots are located at the right of axis1during 1993-1999 positive affected by the bioclimate factor as a simple continentality index and annual ombrothermic index, and climate factors as water deficit, soil water reserve and mean monthly temperature, with a large proportion of the variance explained by axes 1 & 2 (100%). Conclusions: Grapes are sensitive climate and the surrounding environment factors, and in order to get a high production and high-quality grapes, mean monthly temperature must be between 15&#176;C - 20&#176;C, and 20&#176;C - 30&#176;C (27&#176;C) in the last two months of the maturation process, the value of simple continentality index is 15 - 18, compensated thermicity index is 220 - 350, and annual ombrothermic index is more than 3. 展开更多
关键词 Palestine Hebron Grapes Food security ECONOMY Climate
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部