期刊文献+
共找到1,070篇文章
< 1 2 54 >
每页显示 20 50 100
A Review on Security and Privacy Issues Pertaining to Cyber-Physical Systems in the Industry 5.0 Era
1
作者 Abdullah Alabdulatif Navod Neranjan Thilakarathne Zaharaddeen Karami Lawal 《Computers, Materials & Continua》 SCIE EI 2024年第9期3917-3943,共27页
The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems(CPSs)seamlessly integrate physical processes with advanced digital technologies.However,as industries become increasingly interconnect... The advent of Industry 5.0 marks a transformative era where Cyber-Physical Systems(CPSs)seamlessly integrate physical processes with advanced digital technologies.However,as industries become increasingly interconnected and reliant on smart digital technologies,the intersection of physical and cyber domains introduces novel security considerations,endangering the entire industrial ecosystem.The transition towards a more cooperative setting,including humans and machines in Industry 5.0,together with the growing intricacy and interconnection of CPSs,presents distinct and diverse security and privacy challenges.In this regard,this study provides a comprehensive review of security and privacy concerns pertaining to CPSs in the context of Industry 5.0.The review commences by providing an outline of the role of CPSs in Industry 5.0 and then proceeds to conduct a thorough review of the different security risks associated with CPSs in the context of Industry 5.0.Afterward,the study also presents the privacy implications inherent in these systems,particularly in light of the massive data collection and processing required.In addition,the paper delineates potential avenues for future research and provides countermeasures to surmount these challenges.Overall,the study underscores the imperative of adopting comprehensive security and privacy strategies within the context of Industry 5.0. 展开更多
关键词 Cyber-physical systems CPS Industry 5.0 security data privacy human-machine collaboration data protection
下载PDF
Adaptive Learning-Based Delay-Sensitive and Secure Edge-End Collaboration for Multi-Mode Low-Carbon Power IoT 被引量:3
2
作者 Haijun Liao Zehan Jia +6 位作者 Ruiqiuyu Wang Zhenyu Zhou Fei Wang Dongsheng Han Guangyuan Xu Zhenti Wang Yan Qin 《China Communications》 SCIE CSCD 2022年第7期324-336,共13页
Multi-mode power internet of things(PIoT)combines various communication media to provide spatio-temporal coverage for low-carbon operation in smart park.Edge-end collaboration is feasible to achieve the full utilizati... Multi-mode power internet of things(PIoT)combines various communication media to provide spatio-temporal coverage for low-carbon operation in smart park.Edge-end collaboration is feasible to achieve the full utilization of heterogeneous resources and anti-eavesdropping.However,edge-end collaboration-based multi-mode PIoT faces challenges of mutual contradiction in communication and security quality of service(QoS)guarantee,inadaptability of resource management,and multi-mode access conflict.We propose an Adaptive learning based delAysensitive and seCure Edge-End Collaboration algorithm(ACE_(2))to optimize multi-mode channel selection and split device power into artificial noise(AN)transmission and data transmission for secure data delivery.ACE_(2) can achieve multi-attribute QoS guarantee,adaptive resource management and security enhancement,and access conflict elimination with the combined power of deep actor-critic(DAC),“win or learn fast(WoLF)”mechanism,and edge-end collaboration.Simulations demonstrate its superior performance in queuing delay,energy consumption,secrecy capacity,and adaptability to differentiated low-carbon services. 展开更多
关键词 multi-mode low-carbon PIoT edge-end collaboration multi-attribute QoS guarantee security enhancement adaptive deep actor-critic
下载PDF
Food Security through Community Food Bank and Employment Generation: A Study in the North-Eastern Bangladesh
3
作者 M. N. Islam B. T. Rumsby 《Journal of Agricultural Science and Technology(A)》 2011年第5期713-721,共9页
About twenty percent people in Bangladesh are poor and ultra-poor, and they face severe food insecurity every year. Since food deficit is a recurring phenomenon especially in the northern area of Bangladesh, due to sc... About twenty percent people in Bangladesh are poor and ultra-poor, and they face severe food insecurity every year. Since food deficit is a recurring phenomenon especially in the northern area of Bangladesh, due to scarcity of jobs in agriculture dilring the lean period, there is a necessity for creating employment opportunities in non-crop agriculture and off-farm services. This action research program is therefore planned and offered skill development training in different trades to the target beneficiaries in the study area for employment generation. It is observed from the field survey that introduction of self-employment opportunities of the poor farmers by conducting skill development training program in different income generating economic activities enabling them to acquire necessary skills, and helping them to choose self-employment in off-farm sectors. In addition, education and advocacy programs also helped them to ensure food security by depositing their money/foods in a community food bank aiming to use during crisis period. 展开更多
关键词 Monga food security SELF-EMPLOYMENT commtmity food bank.
下载PDF
When Will" Foreign Securities Brokerages" Land in China?
4
《China's Foreign Trade》 2001年第3期33-33,共1页
关键词 Land in China When Will Foreign securities Brokerages Bank
下载PDF
一种基于行为的Android重打包应用检测方案 被引量:3
5
作者 桓自强 倪宏 +1 位作者 胡琳琳 郭志川 《计算机应用与软件》 CSCD 2016年第8期298-301,307,共5页
重打包类型的恶意应用是通过将恶意代码注入正常应用来生成的,在Android平台已发现的恶意应用中占了很大的比例。针对此类恶意应用,提出一种基于行为的恶意应用检测方案。方案采用云端协作的软件架构,在云端对正常应用进行基于系统短序... 重打包类型的恶意应用是通过将恶意代码注入正常应用来生成的,在Android平台已发现的恶意应用中占了很大的比例。针对此类恶意应用,提出一种基于行为的恶意应用检测方案。方案采用云端协作的软件架构,在云端对正常应用进行基于系统短序列的行为模式分析,从而形成正常行为模式库;在终端,从云端下载系统已安装应用的正常行为模式库,监测已安装应用的系统调用序列,并计算其异常率。实验结果表明,该方法是有效的,可以准确地识别出重打包的恶意应用。 展开更多
关键词 重打包应用 android安全 系统调用 短序列 云端协作
下载PDF
Blockchain Security Threats and Collaborative Defense:A Literature Review 被引量:1
6
作者 Xiulai Li Jieren Cheng +5 位作者 Zhaoxin Shi Jingxin Liu Bin Zhang Xinbing Xu Xiangyan Tang Victor S.Sheng 《Computers, Materials & Continua》 SCIE EI 2023年第9期2597-2629,共33页
As a distributed database,the system security of the blockchain is of great significance to prevent tampering,protect privacy,prevent double spending,and improve credibility.Due to the decentralized and trustless natu... As a distributed database,the system security of the blockchain is of great significance to prevent tampering,protect privacy,prevent double spending,and improve credibility.Due to the decentralized and trustless nature of blockchain,the security defense of the blockchain system has become one of the most important measures.This paper comprehensively reviews the research progress of blockchain security threats and collaborative defense,and we first introduce the overview,classification,and threat assessment process of blockchain security threats.Then,we investigate the research status of single-node defense technology and multi-node collaborative defense technology and summarize the blockchain security evaluation indicators and evaluation methods.Finally,we discuss the challenges of blockchain security and future research directions,such as parallel detection and federated learning.This paper aims to stimulate further research and discussion on blockchain security,providing more reliable security guarantees for the use and development of blockchain technology to face changing threats and challenges through continuous updating and improvement of defense technologies. 展开更多
关键词 Blockchain threat assessment collaborative defense security evaluation
下载PDF
Evolving National Security: A Roadmap from Present to Future in Renewable and Nonrenewable Energy Policies (A Technical Review) 被引量:1
7
作者 Bahman Zohuri 《Journal of Energy and Power Engineering》 2023年第3期102-108,共7页
This comprehensive exploration delves into the intricate dynamics of national security policies in the realm of renewable and nonrenewable energy sources.From the present landscape characterized by the diversification... This comprehensive exploration delves into the intricate dynamics of national security policies in the realm of renewable and nonrenewable energy sources.From the present landscape characterized by the diversification of energy portfolios to the long-term vision encompassing nuclear fusion,this article navigates through the nuanced interplay of technology,resilience,and environmental responsibility.The synthesis of established nuclear fission technologies and evolving renewable sources forms the cornerstone of a strategic approach,addressing challenges and opportunities to ensure a secure,sustainable energy future. 展开更多
关键词 National security policy renewable energy nonrenewable energy nuclear fission nuclear fusion energy resilience sustainability technological innovation environmental responsibility global collaboration.
下载PDF
Security Policies for Web Service Invocation of Automotive Industry Chain Collaboration Platform
8
作者 韩敏 《Journal of Southwest Jiaotong University(English Edition)》 2007年第3期192-196,共5页
To meet the actual requirements of an automotive industry chain collaboration platform (AICCP), this paper offers several simple but effective security policies based upon the traditional security mechanism of data ... To meet the actual requirements of an automotive industry chain collaboration platform (AICCP), this paper offers several simple but effective security policies based upon the traditional security mechanism of data transfer, including user ID verification with SOAP (simple object access protocol), header, SOAP message encryption with SOAP extension and XML (extensible markup language) file encryption and decryption. Application of these policies to the AICCP for more than one year proves the effectiveness of the data exchange practice between the AICCP and enterprise Intranet. 展开更多
关键词 Security policies Automotive industry chain collaboration platform (AICCP) Web service XML SOAP header SOAP extension
下载PDF
Down the Bumpy Road to Market Economy
9
《Contemporary International Relations》 1994年第9期7-10,共4页
China has all along emphasized gradual,carefully sequenced reform.Follow-ing 15 years of practice and exploration,China’s reform is finally proceedingin a clear direction:the Socialist market economy.The Third Plenum... China has all along emphasized gradual,carefully sequenced reform.Follow-ing 15 years of practice and exploration,China’s reform is finally proceedingin a clear direction:the Socialist market economy.The Third Plenum of the Chi-nese Communist Party’s 14th Central Committee in November 1993 endorsed ma-jor reforms of the banking and financial systems,the conversion of state enterprisesinto joint-stock companies and introduction of securities market.All these mea-sures accelerated movement toward a genuine market economy. 展开更多
关键词 BANKING companies INFLATION carefully sequenced securities emphasized STOCK PLANNED toward
下载PDF
Impact of International Networks on Standardization Process in Banking Industry: Example of Secure Electronic Transaction (SET) Initiative
10
作者 Paul Marc Collin Hana Machkova 《Journal of Modern Accounting and Auditing》 2013年第11期1469-1482,共14页
The purpose of this article is to present and interpret the case study of the secure electronic transaction (SET) scheme of Internet security, as an illustration of the necessary construction of interoperability sol... The purpose of this article is to present and interpret the case study of the secure electronic transaction (SET) scheme of Internet security, as an illustration of the necessary construction of interoperability solutions for financial services. The interpretation of case data with actor network theory (ANT) provides an illustration of power coalitions among banks to create a de facto standard for transnational electronic payment security on the Internet. After a step of protecting its political interests and well-known technological solutions, the coalition understands that its mission becomes a matter of life and death for its members: Brand-new currency has been invented on the Web and one could develop business and monetary transactions without the banks. This interpretative stage tells us much about the transnational mechanisms of regulation and standardization as well as the "translation" steps regarding these transnational organizations. However, an additional step has to be added to this interpretative step, a step of framework construction. The aim is to help managers of the transnational firms involved in regulations and standardization to anticipate the evolutions and make relevant decisions. The framework has three distinctive characteristics: the ability to help conception, the ability to help conceive problems "ex ante", and the ability to facilitate collective conception of strategic maneuvers. 展开更多
关键词 cyber payments bank cards deterritorialization financial markets secure electronic transaction (SET)specification
下载PDF
Novel Architecture of Security Orchestration, Automation and Response in Internet of Blended Environment
11
作者 Minkyung Lee Julian Jang-Jaccard Jin Kwak 《Computers, Materials & Continua》 SCIE EI 2022年第10期199-223,共25页
New technologies that take advantage of the emergence of massive Internet of Things(IoT)and a hyper-connected network environment have rapidly increased in recent years.These technologies are used in diverse environme... New technologies that take advantage of the emergence of massive Internet of Things(IoT)and a hyper-connected network environment have rapidly increased in recent years.These technologies are used in diverse environments,such as smart factories,digital healthcare,and smart grids,with increased security concerns.We intend to operate Security Orchestration,Automation and Response(SOAR)in various environments through new concept definitions as the need to detect and respond automatically to rapidly increasing security incidents without the intervention of security personnel has emerged.To facilitate the understanding of the security concern involved in this newly emerging area,we offer the definition of Internet of Blended Environment(IoBE)where various convergence environments are interconnected and the data analyzed in automation.We define Blended Threat(BT)as a security threat that exploits security vulnerabilities through various attack surfaces in the IoBE.We propose a novel SOAR-CUBE architecture to respond to security incidents with minimal human intervention by automating the BT response process.The Security Orchestration,Automation,and Response(SOAR)part of our architecture is used to link heterogeneous security technologies and the threat intelligence function that collects threat data and performs a correlation analysis of the data.SOAR is operated under Collaborative Units of Blended Environment(CUBE)which facilitates dynamic exchanges of data according to the environment applied to the IoBE by distributing and deploying security technologies for each BT type and dynamically combining them according to the cyber kill chain stage to minimize the damage and respond efficiently to BT. 展开更多
关键词 Blended threat(BT) collaborative units for blended environment(CUBE) internet of blended environment(IoBE) security orchestration automation and response(SOAR)
下载PDF
Socio-Economic and Environmental Impacts Assessment of Using Different Rainwater Harvesting Techniques in Sarida Catchment, West Bank, Palestine
12
作者 Marwan Ghaleb Ghanem Wasim Ahmed +1 位作者 Sameer Shadeed Michel Riksen 《Journal of Geographical Research》 2020年第2期1-5,共5页
A statistically representative questionnaire targeted people using rainwater harvesting(RWH)techniques in rural communities of Sarida catchment,West Bank,Palestine was distributed and analyzed.The main objective of th... A statistically representative questionnaire targeted people using rainwater harvesting(RWH)techniques in rural communities of Sarida catchment,West Bank,Palestine was distributed and analyzed.The main objective of this study is to assess the social,economic,and environmental impacts of adopting RWH techniques(e.g.cisterns,concrete and clay ponds,Wadi ponds,earth dams,and stone terraces)in different uses to increase water availability.The results showed a simple sharing of the female component among beneficiaries,while concrete ponds and cisterns were the most used techniques.Actually,social impacts were noticeable by sharing the same RWH structure and reflected to responsibility skills and role exchange increases.On the other hand,RWH techniques showed a significant economic impact for end users represented by enhancing domestic,agricultural,and recreational activities leading to good profit increase.In addition to food security as output,the most important environmental impact was water wasting prevention,which in turn could be linked to sustainable water management and considered as universal challenge for future generations. 展开更多
关键词 Rainwater harvesting SOCIAL ECONOMIC ENVIRONMENT Food security Sarida West Bank Palestine
下载PDF
The Value Choice for Legal Regulation of Financial Risks in Shadow Banking
13
作者 Liao Jingyi 《Contemporary Social Sciences》 2021年第5期55-67,共13页
It is of vital importance for shadow banking supervision to have correct targets for the curtailment of financial risks.In fact,the process of selecting legal regulation targets for shadow banking financial risks is e... It is of vital importance for shadow banking supervision to have correct targets for the curtailment of financial risks.In fact,the process of selecting legal regulation targets for shadow banking financial risks is equivalent to a process of achieving specific goals or objectives by means of legal regulation.The establishment of a regulatory system for shadow banking should consider the objective and practical needs of the sector,prioritize security as the desired value,and reasonably establish a value system for risk control. 展开更多
关键词 shadow banking financial risk development of security value choice
下载PDF
碳达峰碳中和视域下我国生态安全的现状、难点及进路 被引量:5
14
作者 于文轩 冯瀚元 《新疆师范大学学报(哲学社会科学版)》 CSSCI 北大核心 2024年第4期70-79,共10页
实现碳达峰碳中和、保障生态安全是生态文明建设的重要内容。目前,我国适应碳达峰碳中和的生态安全保障体系已基本形成,但在理念融合、治理体系、发展模式、法治保障等方面仍存在难点。为此,应以整体主义为基本立场,以协同治理为进路,... 实现碳达峰碳中和、保障生态安全是生态文明建设的重要内容。目前,我国适应碳达峰碳中和的生态安全保障体系已基本形成,但在理念融合、治理体系、发展模式、法治保障等方面仍存在难点。为此,应以整体主义为基本立场,以协同治理为进路,完善生态安全保障体系。在理念层面,生态安全观与低碳发展理念的融合基础在于主体的生态理性实践。在治理层面,政府、企业和公众在现代环境治理体系中承担不同的角色和功能,应结合碳达峰碳中和的特点,注重实现主体之间的协同。在发展方式层面,应将生态安全作为发展与转型的底线,实现减污降碳协同增效。在法治层面,应从立法、执法、司法三个方面完善以碳达峰碳中和为导向的生态安全法治保障体系,实现碳达峰碳中和与生态安全的协同共进。 展开更多
关键词 碳达峰碳中和 生态安全 整体主义 协同治理
下载PDF
黄河流域两大区域的土地生态安全动态评价及比较 被引量:4
15
作者 韩琭 陶德鑫 史鲁彦 《水土保持学报》 CSCD 北大核心 2024年第1期255-266,277,共13页
[目的]探究山东半岛与黄河几字弯两大区域的土地生态安全水平差异,为实现黄河流域生态保护与高质量发展,推动“共同抓好大保护,协同推进大治理”战略提供现实依据。[方法]运用熵值法、核密度估计、马尔科夫链与障碍因子模型等方法,对黄... [目的]探究山东半岛与黄河几字弯两大区域的土地生态安全水平差异,为实现黄河流域生态保护与高质量发展,推动“共同抓好大保护,协同推进大治理”战略提供现实依据。[方法]运用熵值法、核密度估计、马尔科夫链与障碍因子模型等方法,对黄河流域两大区域的土地生态安全进行动态评价。[结果](1)在水平变化上,两大区域的土地生态安全增速均呈“倒U”形态势,山东半岛的土地生态安全水平明显高于黄河几字弯,但黄河几字弯的增长速度更快。(2)在时间上,两大区域土地生态安全均呈现“单核”演变特征,山东半岛区域差异有扩大态势,几字弯区域差异则有缩小态势。在空间上,两大区域均呈现出“东中部高—西部低”的空间分布态势。(3)动态演化特征上,两大区域土地生态安全等级演变具有“路径依赖”与“自身锁定”效应。(4)山东半岛土地生态安全受人均耕地面积、地均化肥农药施用量等影响;黄河几字弯土地生态安全受景观破碎度、森林覆盖率等影响。[结论]未来山东半岛与黄河几字弯既要根据区域优势分类施策,也要从流域全局出发,协同提升黄河流域土地生态安全水平。 展开更多
关键词 高质量发展 土地生态安全 时空特征 障碍因子 协同治理
下载PDF
数据合规协同激励体系的构建与完善 被引量:3
16
作者 齐英程 《东方法学》 CSSCI 北大核心 2024年第2期98-108,共11页
企业是否选择合规是一个典型的权衡问题。现阶段,我国数据合规秩序的构建受困于反向激励欠缺刚性、正向激励供给不足等问题,合规激励机制的孱弱难以促动企业自觉建立全流程数据合规管理体系。法律作为“一套具备激励功能的机制”,应基... 企业是否选择合规是一个典型的权衡问题。现阶段,我国数据合规秩序的构建受困于反向激励欠缺刚性、正向激励供给不足等问题,合规激励机制的孱弱难以促动企业自觉建立全流程数据合规管理体系。法律作为“一套具备激励功能的机制”,应基于实体法与程序法双重维度,持续开展数据合规协同激励的体系性作业:厘清数据合规实体标准,以明确数据合规激励措施的适用前提;明晰数据合规从宽的制度原理与实体法依据,以全面释放合规激励效应;增加数据合规程序性激励机制供给,以确保合规激励效果落地。通过实体法与程序法在数据合规领域的呼应与联动,共同打造完备的数据合规协同激励体系。 展开更多
关键词 数据合规 企业合规 数据安全 协同激励 实体法 程序法
下载PDF
新型能源体系发展思考与建议 被引量:2
17
作者 谢克昌 《中国工程科学》 CSCD 北大核心 2024年第4期1-8,共8页
加快规划和建设新型能源体系,构建能源体系发展新格局,对保障国家能源安全、实现绿色低碳转型具有重要意义。本文在回顾10年来我国能源体系发展历程,把握当前国际能源领域形势和我国能源发展新目标的基础上,明晰了由安全高效、清洁低碳... 加快规划和建设新型能源体系,构建能源体系发展新格局,对保障国家能源安全、实现绿色低碳转型具有重要意义。本文在回顾10年来我国能源体系发展历程,把握当前国际能源领域形势和我国能源发展新目标的基础上,明晰了由安全高效、清洁低碳、多元协同、智能普惠构成的新型能源体系的内涵,深化了对包括能源消费总量与结构演变、煤炭安全兜底、油气增储上产、非化石能源降本增效在内的新型能源体系的认识。进一步,提出了坚持系统思维、坚持创新引领、坚持深化改革的新型能源体系发展思路,凝练了面向2035年、2050年的新型能源体系建设目标,梳理出稳妥有序推进能源绿色低碳转型、推动城乡能源体系协同发展、构建多轮驱动能源供给体系、加强关键核心技术攻关、构建新型能源评估体系等新型能源体系建设的重点举措。相关内容提供了建设新型能源体系所需的理论引导与实践支持,可为新时期新型能源体系发展研究提供参考。 展开更多
关键词 新型能源体系 安全高效 清洁低碳 多元协同 智能普惠
下载PDF
国家金融安全视域下金融科技的风险应对与法治保障 被引量:2
18
作者 郭雳 《现代法学》 CSSCI 北大核心 2024年第3期21-33,共13页
在数字化时代,科技深度赋能金融服务的同时,也易引发国家金融安全风险,包括与传统金融活动结合、构建新型金融网络系统及新兴科技直接应用等场景。金融科技引发国家安全风险的生成机理在于,随着金融体系的中介类型增多、金融风险传导渠... 在数字化时代,科技深度赋能金融服务的同时,也易引发国家金融安全风险,包括与传统金融活动结合、构建新型金融网络系统及新兴科技直接应用等场景。金融科技引发国家安全风险的生成机理在于,随着金融体系的中介类型增多、金融风险传导渠道增加,新金融网络体系会产生基于“关联”的风险。金融科技“破坏性创新”的特征,会从金融监管立法与实施两个方面冲击传统金融监管框架,从而加剧监管失灵。国家金融安全的法治保障亟须理论层面的反思与重构,进而形成金融科技的“动态协同”治理模式,从外层金融网络与基础设施安全、中层金融科技创新活动和内层金融服务行为三个层面,构建多层次的金融科技法治保障体系。 展开更多
关键词 金融科技 国家金融安全 数据治理和保护 金融法治 动态协同模式
下载PDF
基于文本计算的我国数据安全政策与科研主题协同研究
19
作者 张涛 王瀚功 +1 位作者 于同同 马海群 《现代情报》 CSSCI 北大核心 2024年第11期99-107,共9页
[目的/意义]随着我国数据要素市场从无序自发的探索阶段进入有序规范的正式探索阶段,在此过程中,数据安全问题尤为突出,并已上升至国家战略层面,而探究我国数据安全政策与科研的协同情况,能够为推动我国数据安全科学研究和完善我国数据... [目的/意义]随着我国数据要素市场从无序自发的探索阶段进入有序规范的正式探索阶段,在此过程中,数据安全问题尤为突出,并已上升至国家战略层面,而探究我国数据安全政策与科研的协同情况,能够为推动我国数据安全科学研究和完善我国数据安全政策提供重要的参考与借鉴。[方法/过程]本文以我国数据安全领域的547部政策和2466篇科研论文为样本,结合NMF主题模型和Word2vec模型,分别对政策文本和科研论文进行主题识别,并通过相似度计算方法探究我国数据安全政策和科研主题演进与协同的情况。[结果/结论]数据分析发现,我国数据安全政策与科研主题呈现出协同一致、协同演进的关系,并且在数据要素和跨境数据流动主题中出现了明显的科研推动政策的协同趋势。 展开更多
关键词 数据安全政策 协同研究 主题识别 主题协同 NMF
下载PDF
黄河流域水-能源-粮食关联系统协同安全时空特征及驱动因素
20
作者 李刚 康迪 +2 位作者 郝铭 梁流涛 贺来喜 《地理与地理信息科学》 CSCD 北大核心 2024年第5期84-91,142,共9页
水、能源、粮食是实现黄河流域国家战略的关键要素与有力支撑。在分析水-能源-粮食关联系统协同安全机理的基础上构建协同安全度评价指标体系,基于2000-2019年黄河流域85个地级市面板数据,采用改进的耦合协调度模型测度水-能源-粮食关... 水、能源、粮食是实现黄河流域国家战略的关键要素与有力支撑。在分析水-能源-粮食关联系统协同安全机理的基础上构建协同安全度评价指标体系,基于2000-2019年黄河流域85个地级市面板数据,采用改进的耦合协调度模型测度水-能源-粮食关联系统的协同安全度,利用核密度函数、空间计量模型探讨其时空特征及影响因素。结果表明:①2000-2019年黄河流域水-能源-粮食关联系统综合安全水平总体表现为上升态势,空间上整体呈现从东向西递减的态势;②研究期内黄河流域水-能源-粮食关联系统协同安全度的空间差异变化较明显,空间格局由研究初期“下游>上游>中游”向研究末期“下游>中游>上游”演变;③社会发展水平、教育状况、创新投入水平和投资水平对协同安全度产生正向影响,经济运行水平、贸易水平和环境污染程度则产生负向影响。 展开更多
关键词 水-能源-粮食关联系统 协同安全 时空特征 黄河流域
下载PDF
上一页 1 2 54 下一页 到第
使用帮助 返回顶部