期刊文献+
共找到12,802篇文章
< 1 2 250 >
每页显示 20 50 100
Eco-Environmental Vulnerability Evaluation in the Yellow River Basin,China 被引量:51
1
作者 WANG Si-Yuan LIU Jing-Shi YANG Cun-Jian 《Pedosphere》 SCIE CAS CSCD 2008年第2期171-182,共12页
Using remote sensing(RS)data and geographical information system(GIS),eco-environmental vulnerability and its changes were analyzed for the Yellow River Basin,China.The objective of this study was to improve our under... Using remote sensing(RS)data and geographical information system(GIS),eco-environmental vulnerability and its changes were analyzed for the Yellow River Basin,China.The objective of this study was to improve our understanding of eco-environmental changes so that a strategy of sustainable land use could be established.An environmental numerical model was developed using spatial principal component analysis(SPCA)model.The model contains twelve factors that include variables of land use,soil erosion,topography,climate,and vegetation.Using this model,synthetic eco- environmental vulnerability index(SEVI)was computed for 1990 and 2000 for the Yellow River Basin.The SEVI was classified into six levels,potential,slight,light,medium,heavy,and very heavy,following the natural breaks classification. The eco-environmental vulnerability distribution and its changes over the ten years from 1990 to 2000 were analyzed and the driving factors of eco-environmental changes were investigated.The results show that the eco-environmental vulnerability in the study area was at medium level,and the eco-environmental quality had been gradually improved on the whole.However,the eco-environmental quality had become worse over the ten years in some regions.In the study area,population growth,vegetation degradation,and governmental policies for eco-environmental protection were found to be the major factors that caused the eco-environmental changes over the ten years. 展开更多
关键词 生态环境 弱点 地理信息系统 遥感
下载PDF
Natural Barriers to Eco-environmental Vulnerability in a Complex Ecosystem
2
作者 C.B. Hyandye I.B. Katega 《Journal of Environmental Science and Engineering》 2010年第9期32-39,共8页
关键词 生态环境脆弱性 天然屏障 生态系统 MICROSOFT ARCGIS 土壤侵蚀 自然特征 生态环境恶化
下载PDF
Socio-economic vulnerability level in the Jeneberang watershed in Gowa Regency,South Sulawesi Province,Indonesia
3
作者 Andi Rachmat ARFADLY Hazairin ZUBAIR +1 位作者 MAHYUDDIN Andang Suryana SOMA 《Regional Sustainability》 2024年第1期69-79,共11页
Jeneberang watershed is vital,particularly for people living in Gowa Regency(South Sulawesi Province,Indonesia),who benefit from its many advantages.Landslides and floods occur every year in the Jeneberang watershed,s... Jeneberang watershed is vital,particularly for people living in Gowa Regency(South Sulawesi Province,Indonesia),who benefit from its many advantages.Landslides and floods occur every year in the Jeneberang watershed,so it is imperative to understand the socio-economic vulnerability of this region.This research aims to identify the vulnerability level of the Jeneberang watershed so that the government can prioritize areas with high vulnerability level and formulate effective strategies to reduce these the vulnerability.Specifically,this study was conducted in 12 districts located in the Jeneberang watershed.The primary data were collected from questionnaires completed by community members,community leaders,and various stakeholders,and the secondary data were from the Landsat satellite imagery in 2020,the Badan Push Statistic of Gowa Regency,and some governmental agencies.The socio-economic vulnerability variables were determined using the Multiple Criteria Decision Analysis(MCDA)method,and each variable was weighted and analyzed using the Geographical Information System(GIS).The study reveals that the levels of socio-economic vulnerability are affected by variables such as population density,vulnerable groups(disabled people,elderly people,and young people),road network and settlement,percentage of poor people,and productive land area in the Jeneberang watershed.Moreover,all of the 12 districts in the Jeneberang watershed are included in the medium vulnerability level,with the mean percentage of socio-economic vulnerability around 50.92%.The socio-economic vulnerability of Bajeng,Pallangga,and Somba Opu districts is categorized at high level,the socio-economic vulnerability of Bungaya,Parangloe,and Tombolo Pao districts is classified as medium level,and the remaining 6 districts(Barombong,Bontolempangan,Bontomarannu,Manuju,Parigi,and Tinggimoncong)are ranked as low socio-economic vulnerability.This study can help policy-makers to formulate strategy that contributes to the protection of biodiversity and sustainable development of the Jeneberang watershed,while improving disaster resilience and preparedness of the watershed. 展开更多
关键词 Socio vulnerability Economic vulnerability Population density vulnerable groups Road network and settlement Productive land area Jeneberang watershed
下载PDF
Systematic Security Guideline Framework through Intelligently Automated Vulnerability Analysis
4
作者 Dahyeon Kim Namgi Kim Junho Ahn 《Computers, Materials & Continua》 SCIE EI 2024年第3期3867-3889,共23页
This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world sof... This research aims to propose a practical framework designed for the automatic analysis of a product’s comprehensive functionality and security vulnerabilities,generating applicable guidelines based on real-world software.The existing analysis of software security vulnerabilities often focuses on specific features or modules.This partial and arbitrary analysis of the security vulnerabilities makes it challenging to comprehend the overall security vulnerabilities of the software.The key novelty lies in overcoming the constraints of partial approaches.The proposed framework utilizes data from various sources to create a comprehensive functionality profile,facilitating the derivation of real-world security guidelines.Security guidelines are dynamically generated by associating functional security vulnerabilities with the latest Common Vulnerabilities and Exposure(CVE)and Common Vulnerability Scoring System(CVSS)scores,resulting in automated guidelines tailored to each product.These guidelines are not only practical but also applicable in real-world software,allowing for prioritized security responses.The proposed framework is applied to virtual private network(VPN)software,wherein a validated Level 2 data flow diagram is generated using the Spoofing,Tampering,Repudiation,Information Disclosure,Denial of Service,and Elevation of privilege(STRIDE)technique with references to various papers and examples from related software.The analysis resulted in the identification of a total of 121 vulnerabilities.The successful implementation and validation demonstrate the framework’s efficacy in generating customized guidelines for entire systems,subsystems,and selected modules. 展开更多
关键词 FRAMEWORK AUTOMATION vulnerability analysis SECURITY GUIDELINES
下载PDF
Understanding livelihood vulnerability:a perspective from Western Sichuan’s ethnic rural settings
5
作者 YU Yongqian JING Zheng +3 位作者 WANG Yan QIU Xiaoping YANG Xueting XU Yun 《Journal of Mountain Science》 SCIE CSCD 2024年第2期380-396,共17页
To explore the livelihood status and key influencing factors of rural households in the minority areas,we collected flat data from 284 rural households in 32 villages across 12 counties of Western Sichuan from 2021 to... To explore the livelihood status and key influencing factors of rural households in the minority areas,we collected flat data from 284 rural households in 32 villages across 12 counties of Western Sichuan from 2021 to 2022.We conducted participatory household survey on the livelihood status of the rural households and try to identify the key factors to influence their livelihood vulnerability using multiple linear regression.The results showed that:the livelihood situation of the rural households is relatively vulnerable.The vulnerability varies significantly with the income levels,education levels,and income sources.The vulnerability of farm households,categorized from low to high livelihood types,follows the sequence:non-agricultural dominant households,non-agricultural households,agricultural dominant households,and pure agricultural households.The degree of damage to the natural environment,education costs,loan opportunities,the proportion of agricultural income to annual household income,and the presence of sick people in the household have significant positive effects on the livelihood vulnerability index(LVI)of rural households;while help from relatives and friends,net income per capita,household size,household education,agricultural land area,participation in industrial organizations,number of livestock,purchase of commercial houses,drinking water source,and self-supply of food have significant negative effects.Based on the findings,we believe that local rural households operate in a complex livelihood system and recommend continuous interventions targeting key influences to provide empirical research support for areas facing similar situations. 展开更多
关键词 LIVELIHOOD vulnerability Rural households Ethnic areas
下载PDF
Vulnerability assessment of UAV engine to laser based on improved shotline method
6
作者 Le Liu Chengyang Xu +3 位作者 Changbin Zheng Sheng Cai Chunrui Wang Jin Guo 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第3期588-600,共13页
Laser anti-drone technology is entering the sequence of actual combat,and it is necessary to consider the vulnerability of typical functional parts of UAVs.Since the concept of"vulnerability"was proposed,a v... Laser anti-drone technology is entering the sequence of actual combat,and it is necessary to consider the vulnerability of typical functional parts of UAVs.Since the concept of"vulnerability"was proposed,a variety of analysis programs for battlefield targets to traditional weapons have been developed,but a comprehensive assessment methodology for targets'vulnerability to laser is still missing.Based on the shotline method,this paper proposes a method that equates laser beam to shotline array,an efficient vulnerability analysis program of target to laser is established by this method,and the program includes the circuit board and the wire into the vulnerability analysis category,which improves the precision of the vulnerability analysis.Taking the UAV engine part as the target of vulnerability analysis,combine with the"life-death unit method"to calculate the laser penetration rate of various materials of the UAV,and the influence of laser weapon system parameters and striking orientation on the killing probability is quantified after introducing the penetration rate into the vulnerability analysis program.The quantitative analysis method proposed in this paper has certain general expansibility,which can provide a fresh idea for the vulnerability analysis of other targets to laser. 展开更多
关键词 Laser weapon Laser damage vulnerability UAV ENGINE Killing probability
下载PDF
A Review of Deep Learning-Based Vulnerability Detection Tools for Ethernet Smart Contracts
7
作者 Huaiguang Wu Yibo Peng +1 位作者 Yaqiong He Jinlin Fan 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期77-108,共32页
In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerabi... In recent years,the number of smart contracts deployed on blockchain has exploded.However,the issue of vulnerability has caused incalculable losses.Due to the irreversible and immutability of smart contracts,vulnerability detection has become particularly important.With the popular use of neural network model,there has been a growing utilization of deep learning-based methods and tools for the identification of vulnerabilities within smart contracts.This paper commences by providing a succinct overview of prevalent categories of vulnerabilities found in smart contracts.Subsequently,it categorizes and presents an overview of contemporary deep learning-based tools developed for smart contract detection.These tools are categorized based on their open-source status,the data format and the type of feature extraction they employ.Then we conduct a comprehensive comparative analysis of these tools,selecting representative tools for experimental validation and comparing them with traditional tools in terms of detection coverage and accuracy.Finally,Based on the insights gained from the experimental results and the current state of research in the field of smart contract vulnerability detection tools,we suppose to provide a reference standard for developers of contract vulnerability detection tools.Meanwhile,forward-looking research directions are also proposed for deep learning-based smart contract vulnerability detection. 展开更多
关键词 Smart contract vulnerability detection deep learning
下载PDF
Binary Program Vulnerability Mining Based on Neural Network
8
作者 Zhenhui Li Shuangping Xing +5 位作者 Lin Yu Huiping Li Fan Zhou Guangqiang Yin Xikai Tang Zhiguo Wang 《Computers, Materials & Continua》 SCIE EI 2024年第2期1861-1879,共19页
Software security analysts typically only have access to the executable program and cannot directly access the source code of the program.This poses significant challenges to security analysis.While it is crucial to i... Software security analysts typically only have access to the executable program and cannot directly access the source code of the program.This poses significant challenges to security analysis.While it is crucial to identify vulnerabilities in such non-source code programs,there exists a limited set of generalized tools due to the low versatility of current vulnerability mining methods.However,these tools suffer from some shortcomings.In terms of targeted fuzzing,the path searching for target points is not streamlined enough,and the completely random testing leads to an excessively large search space.Additionally,when it comes to code similarity analysis,there are issues with incomplete code feature extraction,which may result in information loss.In this paper,we propose a cross-platform and cross-architecture approach to exploit vulnerabilities using neural network obfuscation techniques.By leveraging the Angr framework,a deobfuscation technique is introduced,along with the adoption of a VEX-IR-based intermediate language conversion method.This combination allows for the unified handling of binary programs across various architectures,compilers,and compilation options.Subsequently,binary programs are processed to extract multi-level spatial features using a combination of a skip-gram model with self-attention mechanism and a bidirectional Long Short-Term Memory(LSTM)network.Finally,the graph embedding network is utilized to evaluate the similarity of program functionalities.Based on these similarity scores,a target function is determined,and symbolic execution is applied to solve the target function.The solved content serves as the initial seed for targeted fuzzing.The binary program is processed by using the de-obfuscation technique and intermediate language transformation method,and then the similarity of program functions is evaluated by using a graph embedding network,and symbolic execution is performed based on these similarity scores.This approach facilitates cross-architecture analysis of executable programs without their source codes and concurrently reduces the risk of symbolic execution path explosion. 展开更多
关键词 vulnerability mining de-obfuscation neural network graph embedding network symbolic execution
下载PDF
Groundwater vulnerability assessment using a GIS-based DRASTIC method in the Erbil Dumpsite area (Kani Qirzhala), Central Erbil Basin, North Iraq
9
作者 Masoud H Hamed Rebwar N Dara Marios C Kirlas 《Journal of Groundwater Science and Engineering》 2024年第1期16-33,共18页
Groundwater vulnerability assessment is a crucial step in the efficient management of groundwater resources,especially in areas with intensive anthropogenic activities and groundwater pollution.In the present study,th... Groundwater vulnerability assessment is a crucial step in the efficient management of groundwater resources,especially in areas with intensive anthropogenic activities and groundwater pollution.In the present study,the DRASTIC method was applied using Geographic Information System(GIS)to delineate groundwater vulnerability zones in the Erbil Dumpsite area,Central Erbil Basin,North Iraq.Results showed that the area was classified into four vulnerability classes:Very low(16.97%),low(27.67%),moderate(36.55%)and high(18.81%).The southern,south-eastern and northern parts of the study area exhibited the highest vulnerability potential,while the central-northern,northern and north-western regions displayed the lowest vulnerability potential.Moreover,results of the single-parameter sensitivity analysis indicated that amongst the seven DRASTIC parameters,the unsaturated zone and the aquifer media were the most influencing parameters.In conclustion,the correlation of 25 nitrate concentration values with the final vulnerability map,assessed using the Pearson correlation coefficient,yielded a satisfactory result of R=0.72. 展开更多
关键词 DRASTIC Erbil Iraq Groundwater vulnerability assessment NITRATE POLLUTION Sensitivity analysis
下载PDF
Security Vulnerability Analyses of Large Language Models (LLMs) through Extension of the Common Vulnerability Scoring System (CVSS) Framework
10
作者 Alicia Biju Vishnupriya Ramesh Vijay K. Madisetti 《Journal of Software Engineering and Applications》 2024年第5期340-358,共19页
Large Language Models (LLMs) have revolutionized Generative Artificial Intelligence (GenAI) tasks, becoming an integral part of various applications in society, including text generation, translation, summarization, a... Large Language Models (LLMs) have revolutionized Generative Artificial Intelligence (GenAI) tasks, becoming an integral part of various applications in society, including text generation, translation, summarization, and more. However, their widespread usage emphasizes the critical need to enhance their security posture to ensure the integrity and reliability of their outputs and minimize harmful effects. Prompt injections and training data poisoning attacks are two of the most prominent vulnerabilities in LLMs, which could potentially lead to unpredictable and undesirable behaviors, such as biased outputs, misinformation propagation, and even malicious content generation. The Common Vulnerability Scoring System (CVSS) framework provides a standardized approach to capturing the principal characteristics of vulnerabilities, facilitating a deeper understanding of their severity within the security and AI communities. By extending the current CVSS framework, we generate scores for these vulnerabilities such that organizations can prioritize mitigation efforts, allocate resources effectively, and implement targeted security measures to defend against potential risks. 展开更多
关键词 Common vulnerability Scoring System (CVSS) Large Language Models (LLMs) DALL-E Prompt Injections Training Data Poisoning CVSS Metrics
下载PDF
Application of Hazard Vulnerability Analysis Based on Kaiser Model in Neonatal Breast Milk Management
11
作者 Bingqing Zheng Wenqing Zhang Xiaoxia Huang 《Journal of Clinical and Nursing Research》 2024年第1期152-161,共10页
Objective:To analyze the existing risks in breast milk management at the neonatal department and provide corresponding countermeasures.Methods:22 risk events were identified in 7 risk links in the process of bottle-fe... Objective:To analyze the existing risks in breast milk management at the neonatal department and provide corresponding countermeasures.Methods:22 risk events were identified in 7 risk links in the process of bottle-feeding of breast milk.Hazard Vulnerability Analysis based on the Kaiser model was applied to investigate and evaluate the risk events.Results:High-risk events include breast milk quality inspection,hand hygiene during collection,disinfection of collectors,cold chain management,hand hygiene during the reception,breast milk closed-loop management,and post-collection disposal.Root cause analysis of high-risk events was conducted and breast milk management strategies outside the hospital and within the neonatal department were proposed.Conclusion:Hazard Vulnerability Analysis based on the Kaiser model can identify and assess neonatal breast milk management risks effectively,which helps improve the management of neonatal breast milk.It is conducive to the safe development and promotion of bottle feeding of breast milk for neonates,ensuring the quality of medical services and the safety of children. 展开更多
关键词 Breast milk management The Kaiser model Hazard vulnerability analysis risk assessment
下载PDF
Eco-environmental vulnerability assessment for large drinking water resource: a case study of Qiandao Lake Area, China 被引量:2
12
作者 Qing GU Jun LI +5 位作者 Jinsong DENG Yi LIN LigangMA Chaofan WU Ke WANG Yang HONG 《Frontiers of Earth Science》 SCIE CAS CSCD 2015年第3期578-589,共12页
The Qiandao Lake Area (QLA) is of great significance in terms of drinking water supply in East Coast China as well as a nationally renowned tourist attraction. A series of laws and regulations regarding the QLA envi... The Qiandao Lake Area (QLA) is of great significance in terms of drinking water supply in East Coast China as well as a nationally renowned tourist attraction. A series of laws and regulations regarding the QLA environment have been enacted and implemented throughout the past decade with the aim of negating the harmful effects associated with expanding urbanization and industrialization. In this research, an assessment framework was developed to analyze the eco-environ- mental vulnerability of the QLA from 1990-2010 by integrating fuzzy analytic hierarchy process (FAHP) and geographical information systems (GIS) in an attempt to gain insights into the status quo of the QLA so as to review and evaluate the effectiveness of the related policies. After processing and analyzing the temporal and spatial variation of eco-environmental vulnerability and major environ- mental issues in the QLA, we found that the state of eco- environmental vulnerability of the QLA was acceptable, though a moderate deterioration was detected during the study period. Furthermore, analysis of the combination of vulnerability and water quality indicated that the water quality showed signs of declination, though the overall status remained satisfactory. It was hence concluded that the collective protection and treatment actions were effective over the study period, whereas immediately stricter measures would be required for protecting the drinking water quality from domestic sewage and industrial wastewater. Finally, the spatial variation of the eco-environmental vulnerability assessment also implied that specifically more targeted measures should be adoptedin respective regions for long-term sustainable develop- ment of the QLA. 展开更多
关键词 eco-environment vulnerability assessment drinking water source fuzzy AHP GIS Qiandao Lake Area
原文传递
Evaluation model of the grey fuzzy on eco-environment vulnerability 被引量:1
13
作者 SHI Qing LU Zhao-hua LIU Zhi-mei MIAO Ying XIA Meng-jing 《Journal of Forestry Research》 SCIE CAS CSCD 2007年第3期187-192,共6页
The basic theory and evaluation index system of eco-environment vulnerability were reviewed. Based on the grey theory and fuzzy mathematics, a new comprehensive evaluation method from qualitative to quantitative, call... The basic theory and evaluation index system of eco-environment vulnerability were reviewed. Based on the grey theory and fuzzy mathematics, a new comprehensive evaluation method from qualitative to quantitative, called grey-fuzzy evaluation, was proposed for evaluating eco-environment vulnerability. It was integrated of Association for Healthcare Philanthropy (AHP), grey correlation analysis, grey statistics and fuzzy judgment. The constitutional principle and method of the new evaluation method were given and its feasibility and effectiveness were proved by the practical example. 展开更多
关键词 eco-environmental vulnerability Grey theory Fuzzy mathematics Comprehensive evaluation
下载PDF
Spatial-temporal changes and driving factors of eco-environmental quality in the Three-North region of China 被引量:2
14
作者 LONG Yi JIANG Fugen +2 位作者 DENG Muli WANG Tianhong SUN Hua 《Journal of Arid Land》 SCIE CSCD 2023年第3期231-252,共22页
Eco-environmental quality is a measure of the suitability of the ecological environment for human survival and socioeconomic development.Understanding the spatial-temporal distribution and variation trend of eco-envir... Eco-environmental quality is a measure of the suitability of the ecological environment for human survival and socioeconomic development.Understanding the spatial-temporal distribution and variation trend of eco-environmental quality is essential for environmental protection and ecological balance.The remote sensing ecological index(RSEI)can quickly and objectively quantify eco-environmental quality and has been extensively utilized in regional ecological environment assessment.In this paper,Moderate Resolution Imaging Spectroradiometer(MODIS)images during the growing period(July-September)from 2000 to 2020 were obtained from the Google Earth Engine(GEE)platform to calculate the RSEI in the three northern regions of China(the Three-North region).The Theil-Sen median trend method combined with the Mann-Kendall test was used to analyze the spatial-temporal variation trend of eco-environmental quality,and the Hurst exponent and the Theil-Sen median trend were superimposed to predict the future evolution trend of eco-environmental quality.In addition,ten variables from two categories of natural and anthropogenic factors were analyzed to determine the drivers of the spatial differentiation of eco-environmental quality by the geographical detector.The results showed that from 2000 to 2020,the RSEI in the Three-North region exhibited obvious regional characteristics:the RSEI values in Northwest China were generally between 0.2 and 0.4;the RSEI values in North China gradually increased from north to south,ranging from 0.2 to 0.8;and the RSEI values in Northeast China were mostly above 0.6.The average RSEI value in the Three-North region increased at an average growth rate of 0.0016/a,showing the spatial distribution characteristics of overall improvement and local degradation in eco-environmental quality,of which the areas with improved,basically stable and degraded eco-environmental quality accounted for 65.39%,26.82%and 7.79%of the total study area,respectively.The Hurst exponent of the RSEI ranged from 0.20 to 0.76 and the future trend of eco-environmental quality was generally consistent with the trend over the past 21 years.However,the areas exhibiting an improvement trend in eco-environmental quality mainly had weak persistence,and there was a possibility of degradation in eco-environmental quality without strengthening ecological protection.Average relative humidity,accumulated precipitation and land use type were the dominant factors driving the spatial distribution of eco-environmental quality in the Three-North region,and two-factor interaction also had a greater influence on eco-environmental quality than single factors.The explanatory power of meteorological factors on the spatial distribution of eco-environmental quality was stronger than that of topographic factors.The effect of anthropogenic factors(such as population density and land use type)on eco-environmental quality gradually increased over time.This study can serve as a reference to protect the ecological environment in arid and semi-arid regions. 展开更多
关键词 eco-environmental quality remote sensing ecological index Google Earth Engine Hurst exponent geographical detector Three-North region of China
下载PDF
Comprehensive Assessment of Eco-environment Vulnerability in Hebei Province Based on ArcGIS 被引量:2
15
作者 WANG Rui-jun1,LIU Han2,JIANG Hong-jun1,YANG Xiao-lan1,ZHANG Ru-chun1,LI Zhi-qiang1 1.Institute of Geographical Science,Hebei Academy of Sciences,Shijiazhuang 050011,China 2.School of Geographic and Oceanographic Sciences,Nanjing University,Nanjing 210046,China 《Meteorological and Environmental Research》 CAS 2011年第10期84-90,共7页
[Objective] This study aimed to assess the vulnerability of ecological environment in Hebei Province.[Method] Based on ArcGIS,by using the dominant factor and maximum limits factor method,we established the sensitivit... [Objective] This study aimed to assess the vulnerability of ecological environment in Hebei Province.[Method] Based on ArcGIS,by using the dominant factor and maximum limits factor method,we established the sensitivity-reality indicator system and assessment model of the eco-environment vulnerability in Hebei Province to quantitatively evaluate its eco-environment vulnerability,and analyzed its spatial distribution.[Result] The status quo of environmental degradation was inconsistent with the sensitivity of eco-environment in Hebei Province.The area of severely vulnerable region accounted for only 4.1% of total area in Hebei Province,mainly distributed in nine counties or districts of Baxia region,Zhangjiakou,northwestern Hebei,which was covered with mountains and basins,showing bands,which resulted from the vulnerability of soil erosion and land desertification.In addition,the moderately vulnerable region made up 38.4%,having the largest proportion,and mainly distributed in the mountain and basin region in northwestern Hebei,Yanshan Mountain and the most regions of Taihang Mountain,due to the vulnerability of soil erosion.At the same time,there were also large patches of moderately vulnerable region in Bashang and Baxia of Zhangjiakou,owning to the vulnerability of land desertification.Besides,most plains were mildly vulnerable and slightly vulnerable regions,and their areas accounted for 25.1% and 32.4% respectively of total area.[Conclusion] The research could provide scientific references for safeguarding the ecological security and main functional district planing of Hebei Province. 展开更多
关键词 ARCGIS Sensitivity of ecological environment vulnerability assessment Hebei Province China
下载PDF
Agricultural Vulnerability to Drought in China's Agro-pastoral Ecotone:A Case Study of Yulin City,Shaanxi Province
16
作者 LI Yuheng CHENG Wenjing +1 位作者 ZUO Wenjie ZHANG Lingyue 《Chinese Geographical Science》 SCIE CSCD 2023年第5期934-945,共12页
Agro-pastoral ecotone of northern China is the prominent area for agricultural production,but it is also the most typical ecological fragile area with frequent drought disasters.Taking Yulin City at Shaanxi Province i... Agro-pastoral ecotone of northern China is the prominent area for agricultural production,but it is also the most typical ecological fragile area with frequent drought disasters.Taking Yulin City at Shaanxi Province in China as the case area,the paper aims to investigate the spatio-temporal changes of agricultural vulnerability to drought in China’s agro-pastoral ecotone in the period 2000 to2020.The results show that:1)the agricultural vulnerability to drought in Yulin City has shifted from high vulnerability in the period2000–2010 to low vulnerability in the period 2011–2020.2)There exist obvious spatio-temporal differences of the agricultural vulnerability to drought in Yulin City during the research period.3)Four sensitive events and 14 resilient events were identified in the research and the crops of Yulin had become more resilient to drought.Finally,the paper put forward with policy implications to make adaptive strategies of agriculture to climate change in China’s agro-pastoral ecotone in the future,e.g.,carrying out agricultural zoning based on agricultural production conditions,intensifying the construction of disaster prevention and relief system,and integrating with modern agricultural technology to develop new type agriculture. 展开更多
关键词 climate change agricultural vulnerability DROUGHT agro-pastoral ecotone Yulin City China
下载PDF
Coastal Vulnerability Assessment of Rapu-Rapu and the West Coast of Albay Province, Philippines
17
作者 Angelo P. Candelaria Christian L. Baiño 《Journal of Geoscience and Environment Protection》 2023年第10期227-256,共30页
Coastal vulnerability assessment using the Integrated Sensitivity, Exposure, and Adaptive Capacity to Climate Change Vulnerability Assessment (ICSEA-C-Change) tool provides a deeper understanding of the potential impa... Coastal vulnerability assessment using the Integrated Sensitivity, Exposure, and Adaptive Capacity to Climate Change Vulnerability Assessment (ICSEA-C-Change) tool provides a deeper understanding of the potential impacts of climate change on coastal zones. Vulnerability ratings were obtained using rubrics that were presented to the stakeholders during focused group discussions. Derived scores were then averaged and consolidated to come up with the overall vulnerability rating. These ratings were based on the resource and status of coastal habitats’ reliance on near-shore fishing and other quality measures like fisheries ecosystem dependency, population, and water quality of the coastal habitats in the barangays. Ratings resulted in identifying 12 barangays out of 23 that are highly vulnerable to climate change impacts such as waves, storm surges, sea level rise, increase in surface temperature, and extreme rainfall. These are Buenavista and Basicao (Pioduran), Catburawan (Ligao), Tapel, Nagas and Maramba (Oas), Talin-Talin, Pantao, Macabugos, and Tambo (Libon) and Buhatan and Villa Hermosa (Rapu-Rapu). Assessment results were highly influenced by the absence of three major marine habitats, i.e., coral reefs, seagrass/seaweeds, and mangroves in the coastal areas. Likewise, 11 barangays out of 23, which were Marigondon and Malidong (Pioduran), Maonon and Cabarian (Ligao), Badian and Cagmanaba (Oas), Apud and Rawis (Libon), and Galicia, Hamorawon, and Poblacion (Rapu-Rapu) obtained moderate vulnerability scores. This was attributed to the presence of marine habitats that although in poor state, may serve their ecological functioning when properly protected. Highly vulnerable barangays must be prioritized in coastal rehabilitation and disaster risk reduction management planning. Parameters encompassing the sensitivity and adaptive capacity of each barangay must be taken into consideration to reduce potential impacts brought by factors attributed to climate change. Vital information from the assessment will serve as basis for developing strategic plans for improving the climate change adaptation strategies of the local government units. 展开更多
关键词 Coastal vulnerability Climate Change Sensitivity EXPOSURE Adaptive Capacity
下载PDF
Gender Perspectives of Vulnerability to Climate Change: A Descriptive Evidence from Farming Households at Ikpayongo Community in Gwer Lga, Benue State, Nigeria
18
作者 Monday Akpegi Onah Elizabeth Jeiyol +1 位作者 Odeh Adimanyi Chiviter Ukange 《American Journal of Climate Change》 2023年第1期116-139,共24页
Climate change impact and risks on agricultural livelihood affect women and men disproportionately and often to the disadvantage of women and girls. Consequently, this study assessed gender perspectives of vulnerabili... Climate change impact and risks on agricultural livelihood affect women and men disproportionately and often to the disadvantage of women and girls. Consequently, this study assessed gender perspectives of vulnerability to climate change of farming households at Ikpayongo community in Gwer local government area, Benue State, Nigeria using descriptive approach. The study identified a total of 120 male-headed and female-headed farming households across four neighbourhoods and administered structured questionnaire on them using simple random sampling method, while data analysis was done using descriptive statistics. The results indicate lower education and income status among female-headed households, though male-headed households have high household size. Both sexes have relatively equal access to land for farming, however men have large farm size compared to women. The major crops cultivated by men were rice and yam, while women cultivated largely groundnut and cassava. Women are more exposed and sensitive to climate-related hazards such as floods and heat stress due to the location of their farms. The result further shows that males possess better adaptive capacity given their higher incomes, social networks and more access to training/capacity building programmes and credit facilities. The study concludes that female-headed farming households are more vulnerable to climate change and variability than male-headed farming households due to higher exposure and a lower adaptive capacity. Programme and policies to improve women access to credit facilities and relevant training to boost their adaptive capacity and build resilience are highly recommended. This would also limit exposure with attendant reduction in vulnerability. 展开更多
关键词 Climate Change GENDER Farming Households vulnerability Adaptive Capacity
下载PDF
Vulnerability assessment of coastal wetlands in Minjiang River Estuary based on cloud model under sea level rise
19
作者 Xiaohe Lai Chuqing Zeng +4 位作者 Yan Su Shaoxiang Huang Jianping Jia Cheng Chen Jun Jiang 《Acta Oceanologica Sinica》 SCIE CAS CSCD 2023年第7期160-174,共15页
The change of coastal wetland vulnerability affects the ecological environment and the economic development of the estuary area.In the past,most of the assessment studies on the vulnerability of coastal ecosystems sta... The change of coastal wetland vulnerability affects the ecological environment and the economic development of the estuary area.In the past,most of the assessment studies on the vulnerability of coastal ecosystems stayed in static qualitative research,lacking predictability,and the qualitative and quantitative relationship was not objective enough.In this study,the“Source-Pathway-Receptor-Consequence”model and the Intergovernmental Panel on Climate Change vulnerability definition were used to analyze the main impact of sea level rise caused by climate change on coastal wetland ecosystem in Minjiang River Estuary.The results show that:(1)With the increase of time and carbon emission,the area of high vulnerability and the higher vulnerability increased continuously,and the area of low vulnerability and the lower vulnerability decreased.(2)The eastern and northeastern part of the Culu Island in the Minjiang River Estuary of Fujian Province and the eastern coastal wetland of Meihua Town in Changle District are areas with high vulnerability risk.The area of high vulnerability area of coastal wetland under high emission scenario is wider than that under low emission scenario.(3)Under different sea level rise scenarios,elevation has the greatest impact on the vulnerability of coastal wetlands,and slope has less impact.The impact of sea level rise caused by climate change on the coastal wetland ecosystem in the Minjiang River Estuary is mainly manifested in the sea level rise,which changes the habitat elevation and daily flooding time of coastal wetlands,and then affects the survival and distribution of coastal wetland ecosystems. 展开更多
关键词 vulnerability assessment cloud model coastal wetland Minjiang River Estuary
下载PDF
Dis-NDVW: Distributed Network Asset Detection and Vulnerability Warning Platform
20
作者 Leilei Li Yansong Wang +5 位作者 Dongjie Zhu Xiaofang Li Haiwen Du Yixuan Lu Rongning Qu Russell Higgs 《Computers, Materials & Continua》 SCIE EI 2023年第7期771-791,共21页
With the rapid development of Internet technology,the issues of network asset detection and vulnerability warning have become hot topics of concern in the industry.However,most existing detection tools operate in a si... With the rapid development of Internet technology,the issues of network asset detection and vulnerability warning have become hot topics of concern in the industry.However,most existing detection tools operate in a single-node mode and cannot parallelly process large-scale tasks,which cannot meet the current needs of the industry.To address the above issues,this paper proposes a distributed network asset detection and vulnerability warning platform(Dis-NDVW)based on distributed systems and multiple detection tools.Specifically,this paper proposes a distributed message sub-scription and publication system based on Zookeeper and Kafka,which endows Dis-NDVW with the ability to parallelly process large-scale tasks.Meanwhile,Dis-NDVW combines the RangeAssignor,RoundRobinAssignor,and StickyAssignor algorithms to achieve load balancing of task nodes in a distributed detection cluster.In terms of a large-scale task processing strategy,this paper proposes a task partitioning method based on First-In-First-Out(FIFO)queue.This method realizes the parallel operation of task producers and task consumers by dividing pending tasks into different queues according to task types.To ensure the data reliability of the task cluster,Dis-NDVW provides a redundant storage strategy for master-slave partition replicas.In terms of distributed storage,Dis-NDVW utilizes a distributed elastic storage service based on ElasticSearch to achieve distributed storage and efficient retrieval of big data.Experimental verification shows that Dis-NDVW can better meet the basic requirements of ultra-large-scale detection tasks. 展开更多
关键词 Distributed network security network asset detection vulnerability warning
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部