期刊文献+
共找到149,259篇文章
< 1 2 250 >
每页显示 20 50 100
基于SRP模型的江西省生态脆弱性变化及驱动机制
1
作者 秦金波 齐述华 +1 位作者 胡梅 张起明 《环境科学》 北大核心 2026年第2期999-1010,共12页
江西省作为首批国家生态文明试验区之一,在生态保护与可持续发展方面肩负着重要使命,生态脆弱性评估对江西省的生态保护与修复具有重要指导价值.基于小流域和栅格评价单元,结合遥感影像数据、土地利用数据、土壤数据、气象数据和社会经... 江西省作为首批国家生态文明试验区之一,在生态保护与可持续发展方面肩负着重要使命,生态脆弱性评估对江西省的生态保护与修复具有重要指导价值.基于小流域和栅格评价单元,结合遥感影像数据、土地利用数据、土壤数据、气象数据和社会经济数据等,采用生态敏感性-恢复力-压力度(SRP)模型构建生态脆弱性评价指标体系,评价2000~2020年江西省生态脆弱性时空变化特征,并利用可解释的机器学习模型(XGBoost-SHAP)揭示其生态脆弱性变化的驱动因素.结果表明:①江西省生态脆弱性较低的区域主要分布在东北部、西北部以及南部山区,而脆弱性较高的区域则集中在人类活动密集的平原及河流沿岸,如鄱阳湖平原区.整体呈现微度和轻度脆弱为主的格局.②2000年、2010年和2020年的生态脆弱性指数平均值分别为0.224、0.219和0.206,表明生态脆弱性指数呈下降趋势.其中,生态脆弱性指数降低的区域占总面积的75.75%.③土壤侵蚀强度、植被覆盖度、中度以上土壤侵蚀强度占比和土地利用变化是导致生态脆弱性变化的关键因子,其重要性占比分别为34.66%、25.99%、10.83%和10.63%,且不同因子的贡献度存在显著的空间差异.研究结果可为江西省生态环境保护提供理论支持,同时为将机器学习方法应用于生态脆弱性研究中提供重要的参考和借鉴. 展开更多
关键词 srp模型 生态脆弱性 驱动机制 XGBoost-SHAP模型 江西省
原文传递
基于SRP模型的银川市生态脆弱性评价
2
作者 王宝萱 杨丽媛 《河南科技》 2026年第2期110-114,共5页
【目的】探究银川市生态脆弱性在时空尺度上的变化趋势,为区域环境保护与生态恢复提供参考。【方法】以2005—2020年银川市生态脆弱性变化趋势为研究对象,利用生态脆弱性(Sensitivity-Resilience-Pressure,SRP)评价模型,对地形地貌、自... 【目的】探究银川市生态脆弱性在时空尺度上的变化趋势,为区域环境保护与生态恢复提供参考。【方法】以2005—2020年银川市生态脆弱性变化趋势为研究对象,利用生态脆弱性(Sensitivity-Resilience-Pressure,SRP)评价模型,对地形地貌、自然环境、社会环境等主要因子进行计算,构建生态脆弱性评价指标体系,并对其进行空间聚类分析。【结果】结果显示:在空间尺度上,以轻度与微度脆弱区为主,占区域面积的75%,重度与极度脆弱区面积较少,仅占区域面积的2%。在时间尺度上,轻度、微度脆弱区呈先增加后降低的波动趋势,中度、重度脆弱区呈略微上升趋势,生态脆弱性总体降低。【结论】研究区整体生态环境质量良好,以微度与轻度脆弱性为主,极度和重度生态脆弱性始终聚集于研究区西北部贺兰山脉,且自西向东、自北向南生态环境质量呈逐步向好趋势。 展开更多
关键词 生态脆弱性 srp模型 空间自相关 时空变化
在线阅读 下载PDF
国家安全情报研究核心著者群体画像与研究洞察——基于Intelligence and National Security期刊的分析
3
作者 胡雅萍 肖咏歌 《科技情报研究》 2026年第1期12-22,共11页
[目的/意义]梳理国际国家安全情报研究发展脉络与知识生产特征,揭示关键学者的群体画像、职业发展模式、合作网络结构与核心研究议题演进,以期为推动我国安全情报学科建设提供借鉴。[方法/过程]基于发文量标准,从Intelligence and Natio... [目的/意义]梳理国际国家安全情报研究发展脉络与知识生产特征,揭示关键学者的群体画像、职业发展模式、合作网络结构与核心研究议题演进,以期为推动我国安全情报学科建设提供借鉴。[方法/过程]基于发文量标准,从Intelligence and National Security期刊中筛选出核心著者,运用履历分析法将国外核心著者履历划分为学科背景、研究方向、科研成果和工作经历4个核心类属进行比较分析,采用LDA主题模型对发文进行主题挖掘,系统识别出情报研究者关注的核心议题。[结果/结论]核心著者群体呈现显著的男性主导、中老年资深学者为主、机构高度集中、学科背景偏重传统人文社科的特征;安全情报研究面临跨学科深度融合不足、学界与实践存在隔阂、技术伦理与法律探讨滞后等问题。 展开更多
关键词 履历分析 核心著者 情报研究 LDA主题挖掘 国家安全情报 群体画像
在线阅读 下载PDF
Design and implementation of a computer endpoint security baseline verification system based on MLPS 2.0
4
作者 Fan Miao YaQiong Xu +3 位作者 ZiYang Wan YingJie Zhuang Yang Li JiaPeng Ren 《Railway Sciences》 2026年第1期136-152,共17页
Purpose-Amidst an increasingly severe cybersecurity landscape,the widespread adoption of Xinchuang endpoints has become a strategic imperative.Governments and enterprises have established terminal localization as a cr... Purpose-Amidst an increasingly severe cybersecurity landscape,the widespread adoption of Xinchuang endpoints has become a strategic imperative.Governments and enterprises have established terminal localization as a critical objective,aiming for comprehensive indigenous replacement through rapid technological iteration.Consequently,Xinchuang systems and Windows platforms are expected to coexist over an extended period.This study seeks to establish an automated verification framework for multi-version operating systems and validate the efficacy of baseline hardening in mitigating security risks.Design/methodology/approach-Based on the Classified Protection 2.0 framework and relevant national standards for endpoint security,this study proposes an endpoint security baseline verification scheme applicable to multiple operating systems.The scheme addresses divergent security policies and implementation methodologies across heterogeneous environments.It automates the inspection of core baselines,including account password complexity,default shared service status and patch installation status.Furthermore,a comprehensive scoring model is established by incorporating differentiated weights for account security,patch management and log auditing,ultimately generating visualized risk reports to facilitate remediation prioritization.Findings-This study reveals that baseline configuration serves as the fundamental prerequisite in endpoint security practices.Through a scalable detection engine and quantitative scoring model,the system can promptly identify and remediate potential risks,thereby reducing the attack surface and mitigating intrusion risks.However,on certain domestic chip architectures,compatibility issues persist in detecting specific configuration items.Further improvement in hardware-software co-adaptation for domestic platforms is required to advance the development of localized security protection systems.Originality/value-Through in-depth research on security baseline configurations across multiple operating systems,this study implements an automated and visualized baseline verification methodology.This approach significantly strengthens the security posture of domestic operating systems and supports the establishment of a more robust,national-level cybersecurity defense framework. 展开更多
关键词 Windows security baseline Endpoint security Baseline inspection Xinchuang system security baseline
在线阅读 下载PDF
Pathways to improved food and nutrition security:The role of farm production diversity in household dietary outcomes in rural areas of Pakistan
5
作者 Muhammad Waseem Erbao Cao +2 位作者 Ihsan Jamil Bushra Mughal Mi Yu 《Journal of Integrative Agriculture》 2026年第1期377-389,共13页
Malnutrition remains a significant global challenge,particularly in developing countries.Policymakers have increasingly focused on improving household food security and nutrition through farm production diversity(FPD)... Malnutrition remains a significant global challenge,particularly in developing countries.Policymakers have increasingly focused on improving household food security and nutrition through farm production diversity(FPD).While research indicates that FPD correlates positively with reduced malnutrition,other studies emphasize the importance of market access for improved nutritional outcomes.However,this evidence varies by region and remains inconsistent.To address this knowledge gap,this study analyzed survey data from 450 smallholder farmers in Punjab,Pakistan,using regression models to examine the relationship between FPD and dietary diversity,as well as the underlying impact pathways.The findings demonstrate that FPD significantly correlates with increased household dietary diversity score(HDDS).FPD influences dietary diversification through both own-farm production and market food consumption pathways,with the ownfarm production pathway showing greater impact.The increase in food expenditure through own-farm production yielded a marginal return of 8% in household dietary diversity compared to 5.3% through marketing.Gender differences emerged as significant,with male-headed households showing relatively lower dietary diversity.These findings have substantial implications for countries with smallholder farming systems,providing valuable insights for the formation of agricultural policies,resource optimization,and rural development initiatives. 展开更多
关键词 food security nutrition security FPD HHDS smallholder farmers
在线阅读 下载PDF
A Nexus for East Africa--China-supported projects help East Africans to boost energy, water and food security
6
作者 RICHARD WETAYA 《ChinAfrica》 2026年第1期44-45,共2页
Andrew Wangota,a 48-year-old Ugandan farmer,has been using agrivoltaics technology,a solar technology that uses agricultural land for both food production and solar power generation,on his farm in Bunashimolo Parish,B... Andrew Wangota,a 48-year-old Ugandan farmer,has been using agrivoltaics technology,a solar technology that uses agricultural land for both food production and solar power generation,on his farm in Bunashimolo Parish,Bukyiende Subcounty in Uganda where he has been cultivating plantain,coffee and Irish potatoes for the past 16 years. 展开更多
关键词 water security solar technology NEXUS irish potatoes East Africa energy security China supported projects agrivoltaics technologya
原文传递
Quantum Secure Multiparty Computation:Bridging Privacy,Security,and Scalability in the Post-Quantum Era
7
作者 Sghaier Guizani Tehseen Mazhar Habib Hamam 《Computers, Materials & Continua》 2026年第4期1-25,共25页
The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreser... The advent of quantum computing poses a significant challenge to traditional cryptographic protocols,particularly those used in SecureMultiparty Computation(MPC),a fundamental cryptographic primitive for privacypreserving computation.Classical MPC relies on cryptographic techniques such as homomorphic encryption,secret sharing,and oblivious transfer,which may become vulnerable in the post-quantum era due to the computational power of quantum adversaries.This study presents a review of 140 peer-reviewed articles published between 2000 and 2025 that used different databases like MDPI,IEEE Explore,Springer,and Elsevier,examining the applications,types,and security issues with the solution of Quantum computing in different fields.This review explores the impact of quantum computing on MPC security,assesses emerging quantum-resistant MPC protocols,and examines hybrid classicalquantum approaches aimed at mitigating quantum threats.We analyze the role of Quantum Key Distribution(QKD),post-quantum cryptography(PQC),and quantum homomorphic encryption in securing multiparty computations.Additionally,we discuss the challenges of scalability,computational efficiency,and practical deployment of quantumsecure MPC frameworks in real-world applications such as privacy-preserving AI,secure blockchain transactions,and confidential data analysis.This review provides insights into the future research directions and open challenges in ensuring secure,scalable,and quantum-resistant multiparty computation. 展开更多
关键词 Quantum computing secure multiparty computation(MPC) post-quantum cryptography(PQC) quantum key distribution(QKD) privacy-preserving computation quantum homomorphic encryption quantum network security federated learning blockchain security quantum cryptography
在线阅读 下载PDF
基于SSC-SRP-PHAT算法的实时低功耗空中声目标定位系统设计
8
作者 杨智勇 刘佳欣 +1 位作者 肖仲喆 黄敏 《声学技术》 北大核心 2026年第1期155-163,共9页
声源定位系统长期面临准确率低、实时性差的问题。针对这两个问题,文章提出了一种基于软硬件协同设计的方法,使声源定位算法能够应用在低功耗的嵌入式场景中。针对定位精度较高但复杂度也较高的可控响应功率和相位变换(steered response... 声源定位系统长期面临准确率低、实时性差的问题。针对这两个问题,文章提出了一种基于软硬件协同设计的方法,使声源定位算法能够应用在低功耗的嵌入式场景中。针对定位精度较高但复杂度也较高的可控响应功率和相位变换(steered response power phase transform,SRP-PHAT)的声源定位算法,引入搜索空间收缩的方式对其进行优化,进而提出了一种搜索空间收缩的可控响应功率和相位变换(search space contraction steered response power phase transform,SSC-SRP-PHAT)的声源定位方法。首先,设计了软硬件协同框架,使用Vivado HLS实现了硬件加速器IP核的设计与封装,充分利用现场可编程门阵列(field programmable gate array,FPGA)的高度并行性优势;同时,编写了相应的驱动软件,分别实现了数据预处理、数据控制、IP核驱动与运算计时等功能;最后,基于Zynq UltraScale+MPSoC XCZU7EV硬件平台,搭建了软硬件协同声源定位系统。该系统的实时定位分辨率为5°,整体功耗为4.55 W,达到了实时、低功耗定位的目的。 展开更多
关键词 声源定位 可控响应功率和相位变换 软硬件协同 硬件加速
在线阅读 下载PDF
Design of a Patrol and Security Robot with Semantic Mapping and Obstacle Avoidance System Using RGB-D Camera and LiDAR
9
作者 Shu-Yin Chiang Shin-En Huang 《Computers, Materials & Continua》 2026年第4期1735-1753,共19页
This paper presents an intelligent patrol and security robot integrating 2D LiDAR and RGB-D vision sensors to achieve semantic simultaneous localization and mapping(SLAM),real-time object recognition,and dynamic obsta... This paper presents an intelligent patrol and security robot integrating 2D LiDAR and RGB-D vision sensors to achieve semantic simultaneous localization and mapping(SLAM),real-time object recognition,and dynamic obstacle avoidance.The system employs the YOLOv7 deep-learning framework for semantic detection and SLAM for localization and mapping,fusing geometric and visual data to build a high-fidelity 2D semantic map.This map enables the robot to identify and project object information for improved situational awareness.Experimental results show that object recognition reached 95.4%mAP@0.5.Semantic completeness increased from 68.7%(single view)to 94.1%(multi-view)with an average position error of 3.1 cm.During navigation,the robot achieved 98.0%reliability,avoided moving obstacles in 90.0%of encounters,and replanned paths in 0.42 s on average.The integration of LiDAR-based SLAMwith deep-learning–driven semantic perception establishes a robust foundation for intelligent,adaptive,and safe robotic navigation in dynamic environments. 展开更多
关键词 RGB-D semantic mapping object recognition obstacle avoidance security robot
在线阅读 下载PDF
Integration of Large Language Models(LLMs)and Static Analysis for Improving the Efficacy of Security Vulnerability Detection in Source Code
10
作者 JoséArmando Santas Ciavatta Juan Ramón Bermejo Higuera +3 位作者 Javier Bermejo Higuera Juan Antonio Sicilia Montalvo Tomás Sureda Riera Jesús Pérez Melero 《Computers, Materials & Continua》 2026年第3期351-390,共40页
As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processin... As artificial Intelligence(AI)continues to expand exponentially,particularly with the emergence of generative pre-trained transformers(GPT)based on a transformer’s architecture,which has revolutionized data processing and enabled significant improvements in various applications.This document seeks to investigate the security vulnerabilities detection in the source code using a range of large language models(LLM).Our primary objective is to evaluate the effectiveness of Static Application Security Testing(SAST)by applying various techniques such as prompt persona,structure outputs and zero-shot.To the selection of the LLMs(CodeLlama 7B,DeepSeek coder 7B,Gemini 1.5 Flash,Gemini 2.0 Flash,Mistral 7b Instruct,Phi 38b Mini 128K instruct,Qwen 2.5 coder,StartCoder 27B)with comparison and combination with Find Security Bugs.The evaluation method will involve using a selected dataset containing vulnerabilities,and the results to provide insights for different scenarios according to the software criticality(Business critical,non-critical,minimum effort,best effort)In detail,the main objectives of this study are to investigate if large language models outperform or exceed the capabilities of traditional static analysis tools,if the combining LLMs with Static Application Security Testing(SAST)tools lead to an improvement and the possibility that local machine learning models on a normal computer produce reliable results.Summarizing the most important conclusions of the research,it can be said that while it is true that the results have improved depending on the size of the LLM for business-critical software,the best results have been obtained by SAST analysis.This differs in“NonCritical,”“Best Effort,”and“Minimum Effort”scenarios,where the combination of LLM(Gemini)+SAST has obtained better results. 展开更多
关键词 AI+SAST secure code LLM benchmarking LLM vulnerability detection
在线阅读 下载PDF
Intrusion Detection and Security Attacks Mitigation in Smart Cities with Integration of Human-Computer Interaction
11
作者 Abeer Alnuaim 《Computers, Materials & Continua》 2026年第1期711-743,共33页
The rapid digitalization of urban infrastructure has made smart cities increasingly vulnerable to sophisticated cyber threats.In the evolving landscape of cybersecurity,the efficacy of Intrusion Detection Systems(IDS)... The rapid digitalization of urban infrastructure has made smart cities increasingly vulnerable to sophisticated cyber threats.In the evolving landscape of cybersecurity,the efficacy of Intrusion Detection Systems(IDS)is increasingly measured by technical performance,operational usability,and adaptability.This study introduces and rigorously evaluates a Human-Computer Interaction(HCI)-Integrated IDS with the utilization of Convolutional Neural Network(CNN),CNN-Long Short Term Memory(LSTM),and Random Forest(RF)against both a Baseline Machine Learning(ML)and a Traditional IDS model,through an extensive experimental framework encompassing many performance metrics,including detection latency,accuracy,alert prioritization,classification errors,system throughput,usability,ROC-AUC,precision-recall,confusion matrix analysis,and statistical accuracy measures.Our findings consistently demonstrate the superiority of the HCI-Integrated approach utilizing three major datasets(CICIDS 2017,KDD Cup 1999,and UNSW-NB15).Experimental results indicate that the HCI-Integrated model outperforms its counterparts,achieving an AUC-ROC of 0.99,a precision of 0.93,and a recall of 0.96,while maintaining the lowest false positive rate(0.03)and the fastest detection time(~1.5 s).These findings validate the efficacy of incorporating HCI to enhance anomaly detection capabilities,improve responsiveness,and reduce alert fatigue in critical smart city applications.It achieves markedly lower detection times,higher accuracy across all threat categories,reduced false positive and false negative rates,and enhanced system throughput under concurrent load conditions.The HCIIntegrated IDS excels in alert contextualization and prioritization,offering more actionable insights while minimizing analyst fatigue.Usability feedback underscores increased analyst confidence and operational clarity,reinforcing the importance of user-centered design.These results collectively position the HCI-Integrated IDS as a highly effective,scalable,and human-aligned solution for modern threat detection environments. 展开更多
关键词 Anomaly detection smart cities Internet of Things(IoT) HCI CNN LSTM random forest intelligent secure solutions
在线阅读 下载PDF
基于SRP模型的黄河流域中段生态脆弱性评价及驱动因素分析 被引量:1
12
作者 张艳 苏兰欣 《环境科学》 北大核心 2025年第8期5134-5144,共11页
生态环境脆弱性深刻制约区域经济的可持续发展,进行生态脆弱性评价是生态治理和修复的重要前提.在多源数据的支撑下,以典型生态敏感区黄河流域中段为研究区,针对其生态本底特征选取地形、气象、地表、土壤、植被、生物丰度、人口密度和... 生态环境脆弱性深刻制约区域经济的可持续发展,进行生态脆弱性评价是生态治理和修复的重要前提.在多源数据的支撑下,以典型生态敏感区黄河流域中段为研究区,针对其生态本底特征选取地形、气象、地表、土壤、植被、生物丰度、人口密度和GDP等13种指标构建SRP模型评价指标体系,基于全局Moran.s I指数以及LISA聚类图对2000年、2010年和2020年研究区生态脆弱性进行评价,同时借助地理探测器对其驱动因素进行分析.结果表明:(1)黄河流域中段生态环境以重度脆弱性和中度脆弱性为主,占比超过50%,空间分布上呈现明显“西北高东南低”的格局,2000~2020年生态脆弱性综合指数依次为2.84、2.79和2.58,生态脆弱性等级呈稳中下降的趋势;(2)生态脆弱性表现出较为明显的空间聚集特征,高高聚集区主要分布在人口活动相对剧烈的极度脆弱区和重度脆弱区,低低聚集区主要集中在生态状况较好的一般脆弱区;(3)影响黄河流域中段生态脆弱性的空间分异的主导因素包括植被覆盖度、植被净初级生产力、气温、生物丰度和GDP,各驱动因子交互作用后的q值均表现为不同程度地增大.研究结果可以为黄河流域中段的生态保护与环境治理提供借鉴. 展开更多
关键词 生态脆弱性 srp模型 地理探测器 空间自相关 黄河流域中段
原文传递
基于SRP的长江经济带江苏段生态脆弱性评价与分析 被引量:1
13
作者 汪媛媛 臧协超 +4 位作者 许伟伟 阳昌霞 金洋 任静华 贺新星 《自然资源遥感》 北大核心 2025年第3期170-182,共13页
随着社会经济发展和城镇化率不断提高,人类赖以生存的生态环境受到影响,尤其是长江经济带江苏段受城市化和土地开发等影响,生态质量面临严峻挑战,生态脆弱性评价已成为研究热点之一。该文以长江经济带江苏段2005—2020年4个时期生态脆... 随着社会经济发展和城镇化率不断提高,人类赖以生存的生态环境受到影响,尤其是长江经济带江苏段受城市化和土地开发等影响,生态质量面临严峻挑战,生态脆弱性评价已成为研究热点之一。该文以长江经济带江苏段2005—2020年4个时期生态脆弱性为研究对象,采用灵敏度弹性压力(sensitivity resilience pressure,SRP)模型,选取生态恢复力、生态压力度和生态敏感性3类16项指标,基于结合层次分析法与空间主成分分析法(analytic hierarchy process-spatial principal component analysis,AHP-SPCA)权重计算方法和地理探测器,研究生态脆弱性特征和影响因素。研究发现:(1)研究区生态脆弱性呈现出从南京向南通逐渐增加趋势;(2)生态脆弱性等级之间转变主要发生在相邻等级之间,中度和重度脆弱性减小,轻度、微度和潜在脆弱性增加;(3)耕地占比、人口密度和生物丰度是主要驱动因素,植被覆盖与耕地占比的交互作用具有最大解释力。研究结果对江苏省长江沿岸生态环境保护和可持续发展提供了重要参考。 展开更多
关键词 长江经济带 生态敏感性-生态恢复力-生态压力度模型 地理探测器 生态脆弱性 驱动力
在线阅读 下载PDF
基于SRP模型的金沙江流域生态脆弱性评价及驱动力分析
14
作者 朱李英 史雯雨 +1 位作者 王巧霞 卫仁娟 《四川水利》 2025年第1期15-19,共5页
金沙江是长江上游一级支流,研究金沙江流域生态脆弱性可为流域生态修复及环境保护提供科学依据。本次从生态敏感性、生态恢复力、生态压力度等3个方面出发,利用主成分分析法,选择21个评价指标,基于SRP模型,构建金沙江流域生态脆弱性评... 金沙江是长江上游一级支流,研究金沙江流域生态脆弱性可为流域生态修复及环境保护提供科学依据。本次从生态敏感性、生态恢复力、生态压力度等3个方面出发,利用主成分分析法,选择21个评价指标,基于SRP模型,构建金沙江流域生态脆弱性评价指标体系,分析金沙江流域2020年生态脆弱性空间分布;并通过地理探测器研究生态脆弱性驱动力因素。结果表明:(1)金沙江流域生态脆弱性以重度脆弱为主,面积比重42.50%,主要分布在流域上游地区,轻度脆弱区和微度脆弱区集中分布在流域中下游区域;(2)影响研究区生态环境脆弱性空间分布变化的主要驱动因素包括高程、地形起伏度、气温和人均GDP,且多因子之间的交互作用对金沙江流域生态脆弱性空间分异特征起到了明显的增强作用。 展开更多
关键词 srp模型 金沙江 生态脆弱性 地理探测器 主成分分析
在线阅读 下载PDF
基于SRP模型的中原城市群生态脆弱性分析与预测 被引量:6
15
作者 赵宗泽 马倩 +2 位作者 王一 马超 王宏涛 《环境科学》 北大核心 2025年第3期1621-1632,共12页
中原城市群作为绿色生态发展示范规划区,研究其生态脆弱性对于了解该地区生态环境的现状和未来发展趋势具有重要意义.基于“敏感性-恢复力-压力”模型,选取多源遥感空间统计数据,采用熵权法求取各指标的权重,构建中原城市群生态脆弱性... 中原城市群作为绿色生态发展示范规划区,研究其生态脆弱性对于了解该地区生态环境的现状和未来发展趋势具有重要意义.基于“敏感性-恢复力-压力”模型,选取多源遥感空间统计数据,采用熵权法求取各指标的权重,构建中原城市群生态脆弱性评价指标体系;分析研究区2005~2020年的生态脆弱性的空间分布和时间变化特征;借助地理探测器模型,探究研究区生态脆弱性的驱动因素;并结合CA-Markov模型预测2025年的生态脆弱性状况.结果表明:①中原城市群以轻度脆弱性为主,在空间上呈现西北高、东南低的趋势,在时间上,呈现先增加后下降的演变趋势.②无论生态脆弱性的等级是上升还是下降,各等级都倾向于向最近的等级方向大规模转变,且重度脆弱性等级变化最为剧烈.③建成区占比、生物丰度、植被覆盖度、人口密度和国内生产总值是造成中原城市群生态脆弱性的主要影响因素,且所有指标之间的交互作用明显增强.④2025年的预测结果表明生态脆弱性呈下降趋势,生态环境有所改善. 展开更多
关键词 生态脆弱性 srp评价 地理探测器 动态度 CA-Markov模型
原文传递
前后端分离环境下Spring Security权限系统构建与实现
16
作者 何立富 《电脑编程技巧与维护》 2025年第10期3-7,共5页
通过引入JWT认证机制,解决了前后端分离架构下Spring Security在跨域、兼容性及分布式部署中的认证和授权难题,构建了一套动态权限管理系统,实现了用户身份的精准识别与验证。在系统架构设计层面,通过自定义登录接口、缓存技术、拦截器... 通过引入JWT认证机制,解决了前后端分离架构下Spring Security在跨域、兼容性及分布式部署中的认证和授权难题,构建了一套动态权限管理系统,实现了用户身份的精准识别与验证。在系统架构设计层面,通过自定义登录接口、缓存技术、拦截器及自定义表达式逻辑权限控制等规划,有效提升了系统的性能、安全性与灵活性。基于角色的访问控制权限(RBAC)的功能设计,借助可视化配置界面进一步增强了系统的易操作性。经测试验证,该系统具备高度的稳定性与有效性,能够精准地控制访问权限,为相关应用系统的权限管理提供了切实可靠的解决方案。 展开更多
关键词 Spring security工具 前后端分离架构 动态化权限管理 JWT标准 基于角色的访问控制权限
在线阅读 下载PDF
基于SRP模型的高寒区生态脆弱性评价与影响因素分析——以雅鲁藏布江泽当宽谷为例 被引量:2
17
作者 刘申怡 《河南科学》 2025年第5期673-684,共12页
全球气候变化与人类活动对高寒区生态系统结构和功能的胁迫作用逐渐加强,剖析高寒区生态脆弱性的时空演变特征及其影响因素,对于实现区域高质量、可持续发展至关重要。以雅鲁藏布江泽当宽谷为研究区,通过敏感性-恢复力-压力度(SRP)模型... 全球气候变化与人类活动对高寒区生态系统结构和功能的胁迫作用逐渐加强,剖析高寒区生态脆弱性的时空演变特征及其影响因素,对于实现区域高质量、可持续发展至关重要。以雅鲁藏布江泽当宽谷为研究区,通过敏感性-恢复力-压力度(SRP)模型构建了具有高寒特色的生态脆弱性评价指标体系,运用Sen-MK趋势分析法分析了2000—2022年研究区生态脆弱性的时空变化特征,运用残差分析法定量剖析了气候变化与人类活动对研究区生态脆弱性变化的影响。结果表明:①2000—2022年研究区生态脆弱性指数整体呈波动下降趋势,说明研究区生态环境质量在不断提升。②研究区生态脆弱性空间分异显著,除了流域南部河谷农业带及其周边地区和北部景观破碎程度高的零星地区的生态脆弱性呈显著升高趋势外,研究区其余大部分区域的生态脆弱性呈降低趋势。③研究区生态脆弱性升高的大部分区域主要受气候变化与人类活动的共同影响,人类活动对流域南部河谷生态脆弱性升高的影响更加显著;气候变化是研究区生态脆弱性降低的主要因素,大范围影响人类活动较少的高海拔地区。④根据气候变化与人类活动对研究区生态脆弱性变化的贡献率,将研究区划分为生态保育区、生态巩固区、生态控制区、生态修复区,并针对性地提出了生态环境保护与修复建议。研究结果可为经济快速发展的高寒区生态环境综合治理与区域可持续发展提供参考和决策依据。 展开更多
关键词 生态脆弱性 srp模型 气候变化 人类活动 高寒区
在线阅读 下载PDF
A Survey on Security Control and Estimation for Cyber-Physical Systems Under Cyber-Attacks:Advances,Challenges and Future Directions 被引量:1
18
作者 Haoyang YU Zidong WANG +1 位作者 Lei ZOU Yezheng WANG 《Artificial Intelligence Science and Engineering》 2025年第1期1-16,共16页
Cyber-physical systems(CPSs)are regarded as the backbone of the fourth industrial revolution,in which communication,physical processes,and computer technology are integrated.In modern industrial systems,CPSs are widel... Cyber-physical systems(CPSs)are regarded as the backbone of the fourth industrial revolution,in which communication,physical processes,and computer technology are integrated.In modern industrial systems,CPSs are widely utilized across various domains,such as smart grids,smart healthcare systems,smart vehicles,and smart manufacturing,among others.Due to their unique spatial distribution,CPSs are highly vulnerable to cyber-attacks,which may result in severe performance degradation and even system instability.Consequently,the security concerns of CPSs have attracted significant attention in recent years.In this paper,a comprehensive survey on the security issues of CPSs under cyber-attacks is provided.Firstly,mathematical descriptions of various types of cyberattacks are introduced in detail.Secondly,two types of secure estimation and control processing schemes,including robust methods and active methods,are reviewed.Thirdly,research findings related to secure control and estimation problems for different types of CPSs are summarized.Finally,the survey is concluded by outlining the challenges and suggesting potential research directions for the future. 展开更多
关键词 cyber-physical systems cyber-attacks robust methods active methods secure estimation secure control
在线阅读 下载PDF
On large language models safety,security,and privacy:A survey 被引量:3
19
作者 Ran Zhang Hong-Wei Li +2 位作者 Xin-Yuan Qian Wen-Bo Jiang Han-Xiao Chen 《Journal of Electronic Science and Technology》 2025年第1期1-21,共21页
The integration of artificial intelligence(AI)technology,particularly large language models(LLMs),has become essential across various sectors due to their advanced language comprehension and generation capabilities.De... The integration of artificial intelligence(AI)technology,particularly large language models(LLMs),has become essential across various sectors due to their advanced language comprehension and generation capabilities.Despite their transformative impact in fields such as machine translation and intelligent dialogue systems,LLMs face significant challenges.These challenges include safety,security,and privacy concerns that undermine their trustworthiness and effectiveness,such as hallucinations,backdoor attacks,and privacy leakage.Previous works often conflated safety issues with security concerns.In contrast,our study provides clearer and more reasonable definitions for safety,security,and privacy within the context of LLMs.Building on these definitions,we provide a comprehensive overview of the vulnerabilities and defense mechanisms related to safety,security,and privacy in LLMs.Additionally,we explore the unique research challenges posed by LLMs and suggest potential avenues for future research,aiming to enhance the robustness and reliability of LLMs in the face of emerging threats. 展开更多
关键词 Large language models Privacy issues Safety issues security issues
在线阅读 下载PDF
When Software Security Meets Large Language Models:A Survey 被引量:4
20
作者 Xiaogang Zhu Wei Zhou +3 位作者 Qing-Long Han Wanlun Ma Sheng Wen Yang Xiang 《IEEE/CAA Journal of Automatica Sinica》 2025年第2期317-334,共18页
Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, ... Software security poses substantial risks to our society because software has become part of our life. Numerous techniques have been proposed to resolve or mitigate the impact of software security issues. Among them, software testing and analysis are two of the critical methods, which significantly benefit from the advancements in deep learning technologies. Due to the successful use of deep learning in software security, recently,researchers have explored the potential of using large language models(LLMs) in this area. In this paper, we systematically review the results focusing on LLMs in software security. We analyze the topics of fuzzing, unit test, program repair, bug reproduction, data-driven bug detection, and bug triage. We deconstruct these techniques into several stages and analyze how LLMs can be used in the stages. We also discuss the future directions of using LLMs in software security, including the future directions for the existing use of LLMs and extensions from conventional deep learning research. 展开更多
关键词 Large language models(LLMs) software analysis software security software testing
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部