期刊文献+
共找到1,534篇文章
< 1 2 77 >
每页显示 20 50 100
Impacts of multi-scenario land use change on ecosystem services and ecological security pattern: A case study of the Yellow River Delta
1
作者 XueHua Cen Hua Zhang 《Research in Cold and Arid Regions》 CSCD 2024年第1期30-44,共15页
The Yellow River Delta(YRD), a critical economic zone along China's eastern coast, also functions as a vital ecological reserve in the lower Yellow River. Amidst rapid industrialization and urbanization, the regio... The Yellow River Delta(YRD), a critical economic zone along China's eastern coast, also functions as a vital ecological reserve in the lower Yellow River. Amidst rapid industrialization and urbanization, the region has witnessed significant land use/cover changes(LUCC), impacting ecosystem services(ES) and ecological security patterns(ESP). Investigating LUCC's effects on ES and ESP in the YRD is crucial for ecological security and sustainable development. This study utilized the PLUS model to simulate 2030 land use scenarios, including natural development(NDS), economic development(EDS), and ecological protection scenarios(EPS). Subsequently, the InVEST model and circuit theory were applied to assess ES and ESP under varying LUCC scenarios from 2010 to 2030. Findings indicate:(1) Notable LUCC from 2010 to 2030, marked by decreasing cropland and increasing construction land and water bodies.(2) From 2010 to 2020, improvements were observed in carbon storage,water yield, soil retention, and habitat quality, whereas 2020–2030 saw increases in water yield and soil retention but declines in habitat quality and carbon storage. Among the scenarios, EPS showed superior performance in all four ES.(3) Between 2010 and 2030, ecological sources, corridors, and pinchpoints expanded, displaying significant spatial heterogeneity. The EPS scenario yielded the most substantial increases in ecological sources,corridors, and pinchpoints, totaling 582.89 km^(2), 645.03 km^(2),and 64.43 km^(2), respectively. This study highlights the importance of EPS, offering insightful scientific guidance for the YRD's sustainable development. 展开更多
关键词 Land use change Multi-scenario simulation Ecosystem services Ecological security pattern The Yellow River Delta Circuit theory
下载PDF
Using ecosystem service supply and ecosystem sensitivity to identify landscape ecology security patterns in the Lanzhou-Xining urban agglomeration, China 被引量:7
2
作者 TONG Hua-li SHI Pei-ji 《Journal of Mountain Science》 SCIE CSCD 2020年第11期2758-2773,共16页
The construction of an ecological security pattern(ESP)is an important way to ensure regional ecological security and to achieve sustainable regional development.It is also one of the hotspot topics of landscape ecolo... The construction of an ecological security pattern(ESP)is an important way to ensure regional ecological security and to achieve sustainable regional development.It is also one of the hotspot topics of landscape ecology research.This paper identifies the ecological source through the evaluation of the ecosystem service and ecosystem sensitivity of the Lanzhou-Xining(Lan-Xi)urban agglomeration.The minimum cumulative resistance(MCR)model modified by night light data NPP/VIIRS(National Polar-orbiting Operational Environmental Satellite System Preparatory Project/Visible Infrared Imaging Radiometer Suite)was used to measure the relative resistance of the materials and energy circulation between the source areas,and to establish the resistance surface of the ecological source area expansion.Then ecological corridors were identified based on ecological sources and resistance surface.The ecological strategic node is the ecological fragile point in the ecological corridors.The ecological strategic node is identified with hydrological module by superimposing the"ridge line"of cumulative ecological resistance with the ecological corridor.Combined with ecological sources,corridors and strategic nodes,the ESP of the Lan-Xi urban agglomeration can be constructed.The ecological source of the Lan-Xi urban agglomeration accounts for 28.42%of the total area,most of which is distributed within Qinghai Province.The nature reserves in the area are all located within the ecological source area.A total of 41 potential ecological corridors have been identified in the study area.The total length of the potential corridors is 1201.03 km,comprising 23 source corridors and 18 radiation corridors.There are 30 strategic nodes identified in the Lan-Xi urban agglomeration.These locations are the most vulnerable areas of the ecological corridors.Ecological engineering should be applied in the construction of corridors.Affected by the ecological source,the potential ecological corridor extends from the northwest to the southeast,which is basically consistent with the direction trend of the mountains in the region. 展开更多
关键词 Ecological security pattern Ecosystem service Ecosystem sensitivity Ecological source Ecological corridor Urban agglomeration
下载PDF
Ecological Planning and Design of Waterfront in Xianghe County from the Perspective of Landscape Security Pattern 被引量:3
3
作者 SHU Ping PAN Yunsheng WANG Lijun 《Journal of Landscape Research》 2013年第6期1-4,6,共5页
Waterfront is a precious resource in urban ecological construction,and also a key section for ecological protection,so ecological planning of urban waterfront has far-reaching influence on the whole region.This study ... Waterfront is a precious resource in urban ecological construction,and also a key section for ecological protection,so ecological planning of urban waterfront has far-reaching influence on the whole region.This study explored ecological planning and design of waterfront from the perspective of landscape security pattern,analyzed current waterfront in Xianghe County and construction of landscape security pattern for waterfront,provided a basis for the ecological planning and design of landscape. 展开更多
关键词 LANDSCAPE security pattern WATERFRONT LANDSCAPE ECOLOGICAL PLANNING
下载PDF
Optimization of Rural Settlement Distributions Based On the Ecological Security Pattern: A Case Study of Da’an City in Jilin Province of China 被引量:5
4
作者 YIN Jingbo LI Hong +1 位作者 WANG Dongyan LIU Shuhan 《Chinese Geographical Science》 SCIE CSCD 2020年第5期824-838,共15页
Following the trends of Chinese rural transformation development, and the sustainable development goals for resources and environment, reasonable arranging the potential development space and the ecological space, so ... Following the trends of Chinese rural transformation development, and the sustainable development goals for resources and environment, reasonable arranging the potential development space and the ecological space, so as to optimize the distributions of rural settlement would be the key challenge for rural areas in ecologically fragile regions. From the perspective of maintaining regional ecological security, this paper takes Da’an City, a typical ecological fragile region in Jilin Province, as the case area, constructing the comprehensive ecological security pattern(ESP) on basis of landscape ecology, and applying the landscape pattern indexes to quantitative analysis the spatial distribution characteristics of rural settlements. Then, different optimization directions and management strategies are put forward for rural settlements in each secure zone under the comprehensive ESP. The experimental results showed that 1) the area of the low security zone, the general security zone, the moderate security zone and the extreme security zone was 1570.18 km^2, 1463.36 km^2, 1215.80 km^2 and 629.77 km^2, representing 32.18%, 29.99%, 24.92% and 12.91% of the total area of the target area, respectively. 2) The rural settlements in Da’an City were characterized by a high degree of fragmentation with a large number of small-scale patches. 3) The area of rural settlements in the ecological relocation zone, the in situ remediation zone, the limited development zone and the key development zone was 22.80 km^2, 42.31 km^2, 36.28 km^2 and 19.40 km^2, accounting for 18.88%, 35.03%, 30.04% and 16.06% of the total area of rural settlements, respectively. Then, different measures were proposed for settlements in different optimization zones in order to scientifically plan important ecological space, production space and living space in rural areas. This paper aims to provide fundamental support for rural settlements based on redistribution from the perspective of landscape ecology and provide insights for rural planning and rural habitat environmental improvement. 展开更多
关键词 ecologically fragile regions ecological security pattern(ESP) rural settlements Da’an City
下载PDF
Dynamic Signature Verification Using Pattern Recognition
5
作者 Emmanuel Nwabueze Ekwonwune Duroha Austin Ekekwe +1 位作者 Chinyere Iheakachi Ubochi Henry Chinedu Oleribe 《Journal of Software Engineering and Applications》 2024年第5期214-227,共14页
Dynamic signature is a biometric modality that recognizes an individual’s anatomic and behavioural characteristics when signing their name. The rampant case of signature falsification (Identity Theft) was the key mot... Dynamic signature is a biometric modality that recognizes an individual’s anatomic and behavioural characteristics when signing their name. The rampant case of signature falsification (Identity Theft) was the key motivating factor for embarking on this study. This study was necessitated by the damages and dangers posed by signature forgery coupled with the intractable nature of the problem. The aim and objectives of this study is to design a proactive and responsive system that could compare two signature samples and detect the correct signature against the forged one. Dynamic Signature verification is an important biometric technique that aims to detect whether a given signature is genuine or forged. In this research work, Convolutional Neural Networks (CNNsor ConvNet) which is a class of deep, feed forward artificial neural networks that has successfully been applied to analysing visual imagery was used to train the model. The signature images are stored in a file directory structure which the Keras Python library can work with. Then the CNN was implemented in python using the Keras with the TensorFlow backend to learn the patterns associated with the signature. The result showed that for the same CNNs-based network experimental result of average accuracy, the larger the training dataset, the higher the test accuracy. However, when the training dataset are insufficient, better results can be obtained. The paper concluded that by training datasets using CNNs network, 98% accuracy in the result was recorded, in the experimental part, the model achieved a high degree of accuracy in the classification of the biometric parameters used. 展开更多
关键词 VERIFICATION security BIOMETRICS SIGNATURE AUTHENTICATION Model pattern Recognition Dynamic
下载PDF
Security Engineering of SOA Applications Via Reliability Patterns
6
作者 Luigi Coppolino Luigi Romano Valerio Vianello 《Journal of Software Engineering and Applications》 2011年第1期1-8,共8页
Providing reliable compositions of Web Services is a challenging issue since the workflow architect often has only a limited control over the reliability of the composed services. The architect can instead achieve rel... Providing reliable compositions of Web Services is a challenging issue since the workflow architect often has only a limited control over the reliability of the composed services. The architect can instead achieve reliability by properly planning the workflow architecture. To this end he must be able to evaluate and compare the reliability of multiple architectural solutions. In this paper we present a useful tool which allows to conduct reliability analysis on planned workflows, as well as to compare the reliability of alternative solutions in a what-if analysis. The tool is implemented as a plug-in for the widely adopted Active BPEL Designer and exploits the concept of reliability pattern to evaluate the reliability formula of the workflow. The effectiveness of the approach and the operation of the tool are demonstrated with respect to a case study of a business security infrastructure realized by orchestrating simple security services. 展开更多
关键词 RELIABILITY of security SERVICES RELIABILITY patternS WORKFLOW Systems SOA APPLICATIONS Web SERVICES Technology
下载PDF
Spring Security中设计模式的运用浅析
7
作者 覃茏伟 兰全祥 《大众科技》 2023年第9期1-5,共5页
Spring Security作为Web开发中十分重要的安全框架之一,常被用于Web应用的认证和授权。为了进一步了解SpringSecurity框架的设计和实现,加深对常见设计模式的理解,文章详细介绍了SpringSecurity框架中策略模式、代理模式、适配器模式、... Spring Security作为Web开发中十分重要的安全框架之一,常被用于Web应用的认证和授权。为了进一步了解SpringSecurity框架的设计和实现,加深对常见设计模式的理解,文章详细介绍了SpringSecurity框架中策略模式、代理模式、适配器模式、责任链模式、模板方法模式的运用,对上述设计模式的概念、基本原理、作用等进行描述,分析SpringSecurity中关键类库在设计模式中承担的作用及执行流程,为开发人员提供一定的学习参考。 展开更多
关键词 Spring security 设计模式 认证 授权
下载PDF
Groundwork for True XML-based Security Pattern Languages
8
作者 TAWFIQ S.M.Barhoom 张申生 《Journal of Donghua University(English Edition)》 EI CAS 2005年第1期120-123,共4页
A pattern is used to describe best practices and principles. Patterns have been used successfully in architecture and in software design. We propose to apply the pattern method to XML-based security engineering. Organ... A pattern is used to describe best practices and principles. Patterns have been used successfully in architecture and in software design. We propose to apply the pattern method to XML-based security engineering. Organized collections of interrelated patterns (called pattern languages) can embody whole bodies of knowledge on specific topics. We will discuss patterns and security pattern, pattern languages and the requirements of the pattern languages proposing its essential requirement (the template), and lays the groundwork for our future development of a true XML-based security pattern language. 展开更多
关键词 地基 安全模式 建筑物 软件 计算机设计技术
下载PDF
Human Security, Poverty Pattern and Social Order in Igbo Rural Communities of Contemporary Nigeria
9
作者 Iwundu Anthony Onyekwere 《Journalism and Mass Communication》 2017年第8期472-479,共8页
关键词 社会经济 尼日利亚 农村社区 贫穷 安全 环境影响 IMO 三角洲
下载PDF
Impacts of climate change on water quantity, water salinity, food security, and socioeconomy in Egypt 被引量:2
10
作者 Mohie El Din Mohamed Omar Ahmed Moustafa Ahmed Moussa Reinhard Hinkelmann 《Water Science and Engineering》 EI CAS CSCD 2021年第1期17-27,共11页
Climate change might have direct impacts on water quantity in Egypt and lead to indirect effects on Mediterranean saltwater intrusion to groundwater,which exposes agriculture to vulnerability.This study investigated i... Climate change might have direct impacts on water quantity in Egypt and lead to indirect effects on Mediterranean saltwater intrusion to groundwater,which exposes agriculture to vulnerability.This study investigated impacts of climate change on agriculture,with particular regard to food security and socioeconomy,and quantified the effectiveness of cropping pattern adaptation measures by integrating three mathematical models.The BlueM model was used for hydrological simulations of Nasser Lake under flooding scenarios to predict the water supply from the High Aswan Dam.The water and salinity balance(WB-SAL)model was adopted to estimate the water salinity in the Nile Delta.The simulated results from the BlueM and WB-SAL models were integrated with the agricultural simulation model for Egypt(ASME)to project cropping patterns,food security,and socioeconomy throughout the country.The results showed that future climate change will directly affect the total crop area;crop areas for 13 crop types;the self-sufficiency of wheat,rice,cereal,and maize supplies;and socioeconomic indicators.The proposed cropping pattern adaptation measures focus on fixing the crop areas of rice and orchards and providing half of the population with lentils,maize,onion,vegetables,milk,and meat.The adaptation measures have the potential to promote food security without causing deterioration of the socioeconomic situation.However,water availability has much more significant effects on food security and socioeconomy than cropping pattern adaptation measures do.Accordingly,the country should rationalize water use efficiency and increase water supply.©2021 Hohai University.Production and hosting by Elsevier B.V.This is an open access article under the CC BY-NC-ND license(http://creativecommons.org/licenses/by-nc-nd/4.0/). 展开更多
关键词 Climate change Water quantity SALINITY Cropping pattern adaptation measures Food security Socioeconomy
下载PDF
A Hybrid Intrusion Detection System for Smart Home Security Based on Machine Learning and User Behavior 被引量:1
11
作者 Faisal Alghayadh Debatosh Debnath 《Advances in Internet of Things》 2021年第1期10-25,共16页
With technology constantly becoming present in people’s lives, smart homes are increasing in popularity. A smart home system controls lighting, temperature, security camera systems, and appliances. These devices and ... With technology constantly becoming present in people’s lives, smart homes are increasing in popularity. A smart home system controls lighting, temperature, security camera systems, and appliances. These devices and sensors are connected to the internet, and these devices can easily become the target of attacks. To mitigate the risk of using smart home devices, the security and privacy thereof must be artificially smart so they can adapt based on user behavior and environments. The security and privacy systems must accurately analyze all actions and predict future actions to protect the smart home system. We propose a Hybrid Intrusion Detection (HID) system using machine learning algorithms, including random forest, X gboost, decision tree, K -nearest neighbors, and misuse detection technique. 展开更多
关键词 Anomaly Detection Smart Home Systems Behavioral patterns security Threats
下载PDF
Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems 被引量:1
12
作者 Faisal Nabi Jianming Yong +3 位作者 Xiaohui Tao Muhammad Saqib Malhi Muhammad Farhan Umar Mahmood 《Journal of Information Security》 2021年第3期189-211,共23页
Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code err... Security practices such as Audits that often focus on penetration testing are performed to find flaws in some types of vulnerability & use tools, which have been tailored to resolve certain risks based on code errors, code conceptual <span style="font-family:Verdana;">assumptions bugs</span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;">,</span></span></span><span style="font-family:Verdana;"><span style="font-family:Verdana;"><span style="font-family:Verdana;"> etc. Most existing security practices in e-Commerce are</span></span></span><span><span><span style="font-family:;" "=""><span style="font-family:Verdana;"> dealt with as an auditing activity. They may have policies of security, which are enforced by auditors who enable a particular set of items to be reviewed, but </span><span style="font-family:Verdana;">also fail to find vulnerabilities, which have been established in complianc</span><span style="font-family:Verdana;">e </span><span style="font-family:Verdana;">with application logic. In this paper, we will investigate the problem of business</span><span style="font-family:Verdana;"> logic vulnerability in the component-based rapid development of e-commerce applications while reusing design specification of component. We propose secure application functional processing Logic Security technique for compo</span><span style="font-family:Verdana;">nent-based e-commerce application, based on security requirement of</span><span style="font-family:Verdana;"> e-business </span><span style="font-family:Verdana;">process and security assurance logical component behaviour specification</span><span style="font-family:Verdana;"> ap</span><span style="font-family:Verdana;">proach to formulize and design a solution for business logic vulnerability</span><span style="font-family:Verdana;"> phenomena.</span></span></span></span> 展开更多
关键词 Business Logic Design Flaws Components Integration Flaws E-Commerce System Assurance & security Model Based Design Business Logic Attacks Attack pattern
下载PDF
Landscape Ecological Security Assessment of Low-Slope Hilly Region in Lu County,China
13
作者 王旭熙 彭立 +1 位作者 苏春江 徐定德 《Journal of Donghua University(English Edition)》 EI CAS 2017年第3期466-474,共9页
Low-slope hilly land( LSHL) refers to regions with relatively lower altitude,smaller topographic changes and gentler slopes. Exploitation and utilization of such areas is acting as an efficient approach to release the... Low-slope hilly land( LSHL) refers to regions with relatively lower altitude,smaller topographic changes and gentler slopes. Exploitation and utilization of such areas is acting as an efficient approach to release the intensity in land utilization for mountainous areas in China, and needs further study. By summarizing related domestic concepts regarding LSHL,and taking Lu County of Sichuan province as the sample,this paper defined the scope of LSHL and extracted a total coverage of 331. 71 km2 LSHL.Then based on the landscape ecological security patterns theory,we have established the landscape ecological security pattern of Lu County by the minimum cumulative resistance model,targeting to achieve ecological land protection. Moreover,LSHL of different landscape security levels is further classified through overlay analysis on the current utilization status of the LSHL. The LSHL is classified into four categories, including prioritized development type,moderate development type, limited development type and prohibited development type. Their scopes of areas are 108. 72,97. 03,68. 36 and 57. 60 km2 respectively. In addition,respective land utilization and exploitation plan for LSHL are proposed according to the analysis of characteristics of each type. The result has provided scientific references for the definition,establishment of landscape ecological security pattern as well as the appropriate exploitation and utilization of the LSHL. 展开更多
关键词 low-slope hilly land(LSHL) landscape security pattern minimum cumulative resistance model land resources development
下载PDF
Perimeter Security System Based on Ultra-Weak Fiber Bragg Grating Array
14
作者 Zhihui Luo Hao Xiang +1 位作者 Yu Zhang Bing Xu 《Optics and Photonics Journal》 2022年第6期156-169,共14页
A perimeter security system based on ultra-weak fiber Bragg grating high-speed wavelength demodulation was proposed. The demodulation system for signal acquisition and high-speed wavelength calculation was designed ba... A perimeter security system based on ultra-weak fiber Bragg grating high-speed wavelength demodulation was proposed. The demodulation system for signal acquisition and high-speed wavelength calculation was designed based on field programmable gate array (FPGA) platform. The principle of ultra-weak fiber Bragg grating high-speed demodulation and signal recognition method were analyzed theoretically, and the Support Vector Machine model was introduced to optimize the event recognition accuracy of the system. A perimeter security experimental system containing 1000 ultra-weak fiber Bragg gratings, ultra-weak fiber Bragg grating sense optical cables with a diameter of 2.0 mm and a reflectivity of 0.01%, steel space frames and demodulation equipments was built to recognize four typical events such as knocking, shaking, wind blowing and rainfall. The experimental resulted show that the system has a spatial resolution of 1m and an acquisition frequency of 200 Hz. The joint time-frequency domain detection method is used to achieve 99.2% alarm accuracy, and 98% recognition accuracy of two intrusion events, which has good anti-interference performance. 展开更多
关键词 Perimeter security Ultra-Weak Fiber Bragg Grating Vibration Sensor pattern Recognition
下载PDF
Severity Based Light-Weight Encryption Model for Secure Medical Information System
15
作者 Firas Abedi Subhi R.M.Zeebaree +10 位作者 Zainab Salih Ageed Hayder M.A.Ghanimi Ahmed Alkhayyat Mohammed A.M.Sadeeq Sarmad Nozad Mahmood Ali S.Abosinnee Zahraa H.Kareem Ali Hashim Abbas Waleed Khaild Al-Azzawi Mustafa Musa Jaber Mohammed Dauwed 《Computers, Materials & Continua》 SCIE EI 2023年第3期5691-5704,共14页
As the amount of medical images transmitted over networks and kept on online servers continues to rise,the need to protect those images digitally is becoming increasingly important.However,due to the massive amounts o... As the amount of medical images transmitted over networks and kept on online servers continues to rise,the need to protect those images digitally is becoming increasingly important.However,due to the massive amounts of multimedia and medical pictures being exchanged,low computational complexity techniques have been developed.Most commonly used algorithms offer very little security and require a great deal of communication,all of which add to the high processing costs associated with using them.First,a deep learning classifier is used to classify records according to the degree of concealment they require.Medical images that aren’t needed can be saved by using this method,which cuts down on security costs.Encryption is one of the most effective methods for protecting medical images after this step.Confusion and dispersion are two fundamental encryption processes.A new encryption algorithm for very sensitive data is developed in this study.Picture splitting with image blocks is nowdeveloped by using Zigzag patterns,rotation of the image blocks,and random permutation for scrambling the blocks.After that,this research suggests a Region of Interest(ROI)technique based on selective picture encryption.For the first step,we use an active contour picture segmentation to separate the ROI from the Region of Background(ROB).Permutation and diffusion are then carried out using a Hilbert curve and a Skew Tent map.Once all of the blocks have been encrypted,they are combined to create encrypted images.The investigational analysis is carried out to test the competence of the projected ideal with existing techniques. 展开更多
关键词 Deep learning ENCRYPTION medical images SCRAMBLING security skew tent map rotation zigzag pattern
下载PDF
Spatial Pattern and Distribution of Crime in Suleja Lga, Niger State, Nigeria
16
作者 Isaac Utenwojo Ocholi Paul Ojochenemi Abuh +1 位作者 Ademu Samuel Aminu Musa 《Journal of Geographic Information System》 2023年第4期379-390,共12页
The study examines the Spatial Pattern and Distribution of Crime in Suleja LGA, Niger State, Nigeria. The study used GIS and statistical methods to analyse the pattern and distribution of crime incidence in the study ... The study examines the Spatial Pattern and Distribution of Crime in Suleja LGA, Niger State, Nigeria. The study used GIS and statistical methods to analyse the pattern and distribution of crime incidence in the study area. The records of each crime incidence were geocoded. Microsoft Excel was used to collate and organise the crime entries before they were imported into the ArcGIS Pro 2.0 environment. A geodatabase was created where the spatial and aspatial data were encoded and geospatial analysis was performed. The study reveals that the crime distribution pattern is generally clustered with a Global Moran’s I index of 0.097, a Z-score of 1.87, and a P-value < 0.06. Furthermore, the study reveals that armed robbery (61), kidnapping (40), car theft (33), culpable homicide (31), rape (29), and robbery (13) cases rank the highest in crime rate. Equally, findings of the study show that Chaza, Kwamba, Madalla, Suleja central, and Gaboda are the major crime hotspot zones at 90% confidence, as analysed using the Getis-Ord Gi* (Hot spot analysis) spatial statistics tool in ArcGIS Pro 2.0. The research therefore recommends that more effort be put into fighting crime, especially in areas where there are low-security formations, as they mostly have the highest record of crimes committed. Also, the patrol units should be equipped with GPS for better surveillance and real-time tracking of criminal activities. 展开更多
关键词 Urban security Spatial pattern CRIME GIS HOTSPOT INsecurity
下载PDF
数智技术赋能统战工作发展透视 被引量:1
17
作者 王飞 《西华大学学报(哲学社会科学版)》 2024年第2期23-33,共11页
数智技术与统战工作在价值理念和政治定位等层面具有高度契合性,前者可以满足后者信息化、智能化、精准化、动态化等发展需求,为后者高质量发展提供持续动能。数智技术能有效支撑和服务于统战工作、开拓统战工作数据应用新空间、激发统... 数智技术与统战工作在价值理念和政治定位等层面具有高度契合性,前者可以满足后者信息化、智能化、精准化、动态化等发展需求,为后者高质量发展提供持续动能。数智技术能有效支撑和服务于统战工作、开拓统战工作数据应用新空间、激发统战工作新活力。当前我国数智统战工作取得了一些进展,但也面临数字化平台和工具应用不足、数据共享和协同体系不完善以及数智化人才短缺和统战干部理念更新不足等问题。因此,未来数智统战应综合运用数智技术,通过构建面向统战对象的大数据智能分析平台、开发数智化统战工作工具、丰富宣传内容和形式,推动统战工作凝聚人心、汇聚力量;通过制定统一的数智统战顶层设计和规划、构建统一开放的统战云平台、完善数智安全保障体系,赋能大统战工作格局的构建;通过推进协商数智化体系构建、建立政协系统数智人才培训与考核机制、加大新技术在协商业务流程中的应用,深化协商民主。 展开更多
关键词 统战工作 大统战工作格局 协商民主 数智技术 数据共享 数据安全
下载PDF
四川省大豆生产格局变化及驱动因素研究
18
作者 常洁 林正雨 +1 位作者 高文波 杜兴端 《中国生态农业学报(中英文)》 CAS CSCD 北大核心 2024年第3期476-489,共14页
四川省是我国13个粮食主产区之一,也是我国大豆种植的新兴地区和西南产区的重要组成,研究大豆生产格局对四川省落实粮食安全战略、推动西南地区大豆产业发展具有重大意义。文章基于2000—2020年四川省183个区市县的面板数据,运用空间基... 四川省是我国13个粮食主产区之一,也是我国大豆种植的新兴地区和西南产区的重要组成,研究大豆生产格局对四川省落实粮食安全战略、推动西南地区大豆产业发展具有重大意义。文章基于2000—2020年四川省183个区市县的面板数据,运用空间基尼指数、地理集中度系数、空间转移系数、探索性空间数据分析、最优地理探测器分析了大豆生产的时空格局变化及驱动因素。研究结果发现:1)2000—2020年,四川省大豆产能波动上升,空间分布极不均衡,聚集水平逐步上升,并逐步向川中丘陵区集中;2)大豆生产存在较强的正向空间相关性,总体表现为高-高聚集和低-低聚集;3)资源要素、比较收益、地理气候、经济社会等因素对大豆生产格局变化的影响均高度显著,且呈现非线性增强、双因子增强的交互效应。资源要素投入、比较收益、海拔高程长期以来对大豆生产格局的影响较为显著且呈波动上升趋势,气温、乡村家庭规模的影响力提升较快,交通条件、地区GDP的影响力则总体呈下降趋势,耕作制度长期以来驱动力最弱。基于此,四川省大豆生产应着力破解耕地资源细碎化与劳动力短缺等资源环境约束,大力发展生产性服务业,全面提升大豆生产机械化水平。通过强化科技创新提升川豆单产,并进一步优化大豆生产、农机、服务、保险等环节的政策保障。同时,应重点关注气候变化引发的干旱等自然风险,健全农业领域自然灾害风险预警与防范机制,以进一步强化大豆产业的综合风险抵御能力。 展开更多
关键词 大豆产量 粮食安全 时空格局 驱动因素 四川省
下载PDF
基于生态安全格局的云南世居民族所在地生态韧性评价研究
19
作者 杨欣 葛海龙 +4 位作者 陆宇 张楚璇 邢雅娇 唐雪琼 张卓亚 《云南大学学报(自然科学版)》 CAS CSCD 北大核心 2024年第3期586-600,共15页
云南世居民族所在地是基于传统生态智慧世代延续,以自然系统与社会系统相互嵌套为特点的自然–文化遗产,而现代性和社会经济的快速发展使得世居民族所在地不断被蚕食和消解.研究基于韧性理念,利用多源数据,从稳定性、适宜性、冗余度、... 云南世居民族所在地是基于传统生态智慧世代延续,以自然系统与社会系统相互嵌套为特点的自然–文化遗产,而现代性和社会经济的快速发展使得世居民族所在地不断被蚕食和消解.研究基于韧性理念,利用多源数据,从稳定性、适宜性、冗余度、多样性4个层面构建云南世居民族所在地生态安全格局和生态韧性耦合框架,对藏、彝、傣族所在地2000—2020年生态韧性进行评价研究.结果表明,近20 a来,世居民族所在地总体生态韧性水平为中等,呈现逐年降低的趋势.高水平韧性区多分布于林地,存在连续但细碎化的分布特征.低水平生态韧性多分布于道路缓冲区2 km以内,路网的社会扰动内涵很大程度上影响生态韧性强度.20 a来平均生态韧性指数傣族所在地(0.6420)>彝族所在地(0.5602)>藏族所在地(0.5344).影响各世居民族所在地生态韧性的原因存在差异,地质灾害防护格局和水生环境安全格局是影响生态韧性的主要因素. 展开更多
关键词 生态安全格局 生态韧性 云南世居民族 多源数据
下载PDF
基于“源地-阻力-廊道”的三江源区生态安全格局构建
20
作者 王晓峰 朱梦娜 +7 位作者 张欣蓉 马嘉豪 周继涛 程通 郑媛元 涂又 尧文洁 马娟 《生态学报》 CAS CSCD 北大核心 2024年第11期4609-4623,共15页
三江源区是青藏高原生态屏障的重要组成部分,科学构建生态安全格局对筑牢三江源区生态安全屏障、维护可持续发展具有重要意义。耦合层次分析法(AHP)与熵权法,基于生态系统服务、形态学空间格局分析(MSPA)、景观连通性等方法识别不同等... 三江源区是青藏高原生态屏障的重要组成部分,科学构建生态安全格局对筑牢三江源区生态安全屏障、维护可持续发展具有重要意义。耦合层次分析法(AHP)与熵权法,基于生态系统服务、形态学空间格局分析(MSPA)、景观连通性等方法识别不同等级生态源地,利用土地利用类型并综合生态敏感性与地形位指数构建生态阻力面,基于Linkage Mapper工具识别不同类别生态廊道,构建三江源区生态安全格局。结果表明:(1)三江源区生态源地约52371.30km2,占研究区总面积13.70%,多为大尺度不规则斑块,呈现东多西少的空间分布格局;其中一级生态源地面积约为48290.06km2,占生态源地总面积的92.21%,集中分布在生态系统服务重要性较高的中部与东南部地区。(2)识别生态廊道共328条,廊道分布呈现中东部密集,西部稀疏的蜘蛛网状空间格局,整体呈东西向波状延伸态势。(3)识别生态夹点1796km2、生态障碍点2490km2,主要分布于研究区中南部的杂多县;提取生态断裂点61处,集中分布于治多县东南部。(4)构建“三区三带多点”生态安全格局,以生态维育发展区、中部修复关键区、西部生态保护区为“三区”,以绿水青山维护带、生物保护关键带、河源安全建设带为“三带”,识别核心修复点为“多点”,考虑不同小区域内的生态状况,因地制宜进行生态建设。研究结果可以为三江源区生态保护地优化提供科学建议。 展开更多
关键词 生态安全格局 Linkage Mapper(LM) 生态源地 生态廊道 三江源区
下载PDF
上一页 1 2 77 下一页 到第
使用帮助 返回顶部