期刊文献+
共找到766篇文章
< 1 2 39 >
每页显示 20 50 100
Privacy Protection Based Access Control Scheme in Cloud-Based Services 被引量:3
1
作者 Kai Fan Qiong Tian +2 位作者 Junxiong Wang Hui Li Yintang Yang 《China Communications》 SCIE CSCD 2017年第1期61-71,共11页
With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issu... With the rapid development of computer technology, cloud-based services have become a hot topic. They not only provide users with convenience, but also bring many security issues, such as data sharing and privacy issue. In this paper, we present an access control system with privilege separation based on privacy protection(PS-ACS). In the PS-ACS scheme, we divide users into private domain(PRD) and public domain(PUD) logically. In PRD, to achieve read access permission and write access permission, we adopt the Key-Aggregate Encryption(KAE) and the Improved Attribute-based Signature(IABS) respectively. In PUD, we construct a new multi-authority ciphertext policy attribute-based encryption(CP-ABE) scheme with efficient decryption to avoid the issues of single point of failure and complicated key distribution, and design an efficient attribute revocation method for it. The analysis and simulation result show that our scheme is feasible and superior to protect users' privacy in cloud-based services. 展开更多
关键词 access control data sharing privacy protection cloud-based services
在线阅读 下载PDF
An Efficient and Secure Multi-Secret Sharing Scheme with General Access Structures 被引量:2
2
作者 PANG Liaojun LI Huixian WANG Yumin 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1649-1652,共4页
A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n... A multiple secret sharing scheme can share a group of secrets in each sharing session, which is very useful especially in sharing large secrets. However, most of the existing multiple secret sharing schemes are (t, n) threshold schemes, so they are fit for only threshold applications and unfit for the applications of general access structures. Due to the fact that a (t, n) threshold scheme could only handle a small fraction of the secret sharing idea, a novel multi-secret sharing scheme is proposed, which is designed based on general access structures. The security of this scheme is the same as that of Shamir's threshold secret sharing scheme. Compared with the existing multiple secret sharing schemes, the proposed scheme can provide greater capabilities for many applications because it is able to deal with applications of general access structures. 展开更多
关键词 CRYPTOGRAPHY information security secret sharing access structure
在线阅读 下载PDF
A Summary of the Large-Scale Access Convergence Network Structure
3
作者 LAN Julong ZHANG Xiaohui +5 位作者 SHEN Juan HU Yuxiang WANG Xiang MAO Zhenshan WANG Lingqiang LIANG Dong 《China Communications》 SCIE CSCD 2016年第S1期1-5,共5页
Under the requirement of everything over IP, network service shows the following characteristics:(1) network service increases its richness;(2) broadband streaming media becomes the mainstream. To achieve unified mult... Under the requirement of everything over IP, network service shows the following characteristics:(1) network service increases its richness;(2) broadband streaming media becomes the mainstream. To achieve unified multi-service bearing in the IP network, the largescale access convergence network architecture is proposed. This flat access convergence structure with ultra-small hops, which shortens the service transmission path, reduces the complexity of the edge of the network, and achieves IP strong waist model with the integration of computation, storage and transmission. The key technologies are also introduced in this paper, including endto-end performance guarantee for real time interactive services, fog storing mechanism, and built-in safety transmission with integration of aggregation and control. 展开更多
关键词 network architecture LARGE-SCALE access CONVERGENCE flat structure ultra-small HOPS
在线阅读 下载PDF
Identity-Based Threshold Decryption on Access Structure
4
作者 秦华旺 朱晓华 戴跃伟 《Journal of Shanghai Jiaotong university(Science)》 EI 2011年第4期485-489,共5页
For the applied limitation of the existing threshold decryption schemes based on the(t,n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through desig... For the applied limitation of the existing threshold decryption schemes based on the(t,n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through designing a special distribution algorithm of the private key shares.The generation and distribution of private key shares,the encryption,the decryption and the combination are introduced in detail.The validity and security of the scheme are proved and analyzed.Comparisons with the existing schemes show that the proposed scheme is more flexible. 展开更多
关键词 threshold decryption access structure IDENTITY CRYPTOGRAPHY information security
原文传递
Design and Implementation of Memory Access Fast Switching Structure in Cluster-Based Reconfigurable Array Processor
5
作者 Rui Shan Lin Jiang +2 位作者 Junyong Deng Xueting Li Xubang Shen 《Journal of Beijing Institute of Technology》 EI CAS 2017年第4期494-504,共11页
Memory access fast switching structures in cluster are studied,and three kinds of fast switching structures( FS,LR2 SS,and LAPS) are proposed. A mixed simulation test bench is constructed and used for statistic of d... Memory access fast switching structures in cluster are studied,and three kinds of fast switching structures( FS,LR2 SS,and LAPS) are proposed. A mixed simulation test bench is constructed and used for statistic of data access delay among these three structures in various cases. Finally these structures are realized on Xilinx FPGA development board and DCT,FFT,SAD,IME,FME,and de-blocking filtering algorithms are mapped onto the structures. Compared with available architectures,our proposed structures have lower data access delay and lower area. 展开更多
关键词 array processor distributed memory memory access switching structure
在线阅读 下载PDF
A Group Oriented Cryptosystem for the Vector Space Access Structure
6
作者 许春香 马华 +1 位作者 周军会 肖国铮 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期184-187,共4页
A group oriented cryptosystem for the vector space access structure was proposed. This cryptosystem adopts self-certified public keys. It allows the participants of an authorized subset to cooperatively access an encr... A group oriented cryptosystem for the vector space access structure was proposed. This cryptosystem adopts self-certified public keys. It allows the participants of an authorized subset to cooperatively access an encrypted message. All data delivered in the cryptosystem are public. Therefore it does not need a partial decrypting results combiner and any secure communication channel. The security of the group oriented cryptosystem is based on the intractability of the discrete log problem and difficulty of factoring large integers. The suspected attacks can not break it. 展开更多
关键词 group oriented cryptosystems sell-certified public keys vector space access structure
在线阅读 下载PDF
Study of the impacts of upstream natural gas market reform in China on infrastructure deployment and social welfare using an SVM-based rolling horizon stochastic game analysis 被引量:3
7
作者 Yan Li Ge Wang +2 位作者 Benjamin Mclellan Si-Yuan Chen Qi Zhang 《Petroleum Science》 SCIE CAS CSCD 2018年第4期898-911,共14页
Natural gas is expected to play a much more important role in China in future decades, and market reform is crucial for its rapid market penetration. At present, the main gas fields, pipelines and liquefied natural ga... Natural gas is expected to play a much more important role in China in future decades, and market reform is crucial for its rapid market penetration. At present, the main gas fields, pipelines and liquefied natural gas(LNG) infrastructure are mainly monopolized by large state-owned companies, and one of the important market reform policies is to open up LNG import rights to smaller private companies and traders. Therefore, in the present study, a game theoretical model is proposed to analyze and compare the impacts of different market structures on infrastructure deployment and social welfare. Moreover, a support vector machine-based rolling horizon stochastic method is adopted in the model to simulate real LNG price fluctuations. Four market reform scenarios are proposed considering different policies such as business separation, third-party access(TPA) and their combinations. The results indicate that, with third-party access(TPA)entrance into the LNG market, the construction of LNG infrastructure will be promoted and more gas will be provided at lower prices, and thus the total social welfare will be improved greatly. 展开更多
关键词 LNG market reform Market structure Third-party access Rolling horizon stochastic method Game theory
原文传递
Mem Brain: An Easy-to-Use Online Webserver for Transmembrane Protein Structure Prediction 被引量:3
8
作者 Xi Yin Jing Yang +2 位作者 Feng Xiao Yang Yang Hong-Bin Shen 《Nano-Micro Letters》 SCIE EI CAS 2018年第1期12-19,共8页
Membrane proteins are an important kind of proteins embedded in the membranes of cells and play crucial roles in living organisms, such as ion channels,transporters, receptors. Because it is difficult to determinate t... Membrane proteins are an important kind of proteins embedded in the membranes of cells and play crucial roles in living organisms, such as ion channels,transporters, receptors. Because it is difficult to determinate the membrane protein's structure by wet-lab experiments,accurate and fast amino acid sequence-based computational methods are highly desired. In this paper, we report an online prediction tool called Mem Brain, whose input is the amino acid sequence. Mem Brain consists of specialized modules for predicting transmembrane helices, residue–residue contacts and relative accessible surface area of a-helical membrane proteins. Mem Brain achieves aprediction accuracy of 97.9% of ATMH, 87.1% of AP,3.2 ± 3.0 of N-score, 3.1 ± 2.8 of C-score. Mem BrainContact obtains 62%/64.1% prediction accuracy on training and independent dataset on top L/5 contact prediction,respectively. And Mem Brain-Rasa achieves Pearson correlation coefficient of 0.733 and its mean absolute error of13.593. These prediction results provide valuable hints for revealing the structure and function of membrane proteins.Mem Brain web server is free for academic use and available at www.csbio.sjtu.edu.cn/bioinf/Mem Brain/. 展开更多
关键词 Transmembrane a-helices structure prediction Machine learning Contact map prediction Relative accessible surface area
在线阅读 下载PDF
Analysis of the Spatial Structure of Tourism Resources in Ji'an City 被引量:2
9
作者 ZHU Jian SONG Juan 《Journal of Landscape Research》 2013年第Z3期35-38,共4页
This paper analyzed characteristics of tourism resources in Ji'an City,and carried out quantitative analysis of local tourism resources based on agglomeration effect of resources,connectivity analysis,and accessib... This paper analyzed characteristics of tourism resources in Ji'an City,and carried out quantitative analysis of local tourism resources based on agglomeration effect of resources,connectivity analysis,and accessibility analysis. The results showed that the city has poor loop of tourism network,major scenic areas(spots) have moderate network accessibility,in view of this,suggestions for the optimum development of local tourism industry were proposed. 展开更多
关键词 Ji’an CITY TOURISM resources Spatial structure AGGLOMERATION effect CONNECTIVITY ANALYSIS accessIBILITY ANALYSIS
在线阅读 下载PDF
Examples for Application of Gravitational Model in the Investigation of Spatial Structure
10
作者 Aron Kincses Geza Toth 《Journal of Mathematics and System Science》 2013年第10期477-490,共14页
In this paper the authors wish to introduce an application of the gravitational model through two concrete examples. In their investigation the gravitational model was transformed to analyze the spatial structure of E... In this paper the authors wish to introduce an application of the gravitational model through two concrete examples. In their investigation the gravitational model was transformed to analyze the spatial structure of Europe, and the impact of accessibility in Hungary. In this analysis not only the size of gravitational forces but their direction can also be measured. Displacements were illustrated by a bi-dimensional regression, which gives a new perspective to the investigation of spatial structure. 展开更多
关键词 Gravitational model bi-dimensional regression accessIBILITY spatial structure EUROPE Hungary.
在线阅读 下载PDF
Tunable Super-Structured Fiber Bragg Gratings with Perfect Sequences Based on m-Sequence
11
作者 Joao S.Pereira Marco P.M.Ferreira Marko Gasparovic 《Journal of Electronic Science and Technology》 CAS CSCD 2017年第4期358-363,共6页
Recently, a tunable fiber Bragg grating(FBG) was developed by using stress-responsive colloidal crystals. In this paper, we have simulated the application of these nanoparticles into the super-structured fiber Bragg g... Recently, a tunable fiber Bragg grating(FBG) was developed by using stress-responsive colloidal crystals. In this paper, we have simulated the application of these nanoparticles into the super-structured fiber Bragg grating(SSFBG) written with perfect sequences derived from a short maximal-length sequence. A tunable SSFBG will be available to overcome the prohibitive temperature variation of the optical codecs. Nevertheless,we presented a method to implement coherent time spreading optical code-division multiple-access(OCDMA) where a unique code(or perfect sequence) can be reused and mixed with different wavelengths to obtain a tunable wavelength-division multiplexing(WDM)system. In order to maximize the binary throughput, we have selected a unique short maximal-length sequence composed of 7 chips that can be tuned with 7 different optical wavelengths. We found thousands of different tunable combinations that presented power contrast ratios(P/C) higher than 12 dB. When a WDM-OCDMA system used 2 different combinations simultaneously, the perfect binary detection with error correction codes was achieved successfully. The tunable SSFBG with colloidal crystals will be a simple and good alternative choice for fiber-to-the-home(FTTH) communications. 展开更多
关键词 Optical code-division multiple-access(OCDMA) super-structured fiber Bragg grating(SSFBG) wavelength-division multiplexing OCDMA(WDM-OCDMA)
在线阅读 下载PDF
基于Access数据库及NET结构的通用社区体育管理系统框架设计 被引量:6
12
作者 刘忠举 《自动化与仪器仪表》 2016年第10期173-174,共2页
针对社区体育场馆动态化和信息化管理需求,本文介绍了一种基于Access数据库及NET结构的通用社区管理系统的设计方案,首先重点分析了系统需求,并据此应用.NET体系结构、ASP语言及Dreamweaver工具完成了系统框架设计,同时,采用ADO技术实... 针对社区体育场馆动态化和信息化管理需求,本文介绍了一种基于Access数据库及NET结构的通用社区管理系统的设计方案,首先重点分析了系统需求,并据此应用.NET体系结构、ASP语言及Dreamweaver工具完成了系统框架设计,同时,采用ADO技术实现与后台Access数据库的连接,从而确定了系统的结构模式和实现功能,以期为社区体育管理的信息化发展提供一些助益。 展开更多
关键词 access数据库 NET结构 社区体育 管理系统
原文传递
电气教学虚拟实验室云端权限访问控制方法
13
作者 林羽 《计算机应用文摘》 2026年第3期206-208,211,共4页
为适应电气教学虚拟实验室云端资源的安全高效管理需求,针对传统访问控制方法难以应对动态用户行为与复杂教学场景的不足,提出一种面向电气教学虚拟实验室的云端权限访问控制方法。首先在访问结构设计中依据时间维度将用户信任证据区分... 为适应电气教学虚拟实验室云端资源的安全高效管理需求,针对传统访问控制方法难以应对动态用户行为与复杂教学场景的不足,提出一种面向电气教学虚拟实验室的云端权限访问控制方法。首先在访问结构设计中依据时间维度将用户信任证据区分为近期行为与历史行为,实现动态更新,整体架构涵盖实验室配置、权限分配、资源访问及行为评估4个模块;在计算访问权限综合信任值时,对各类行为属性进行细粒度量化,通过逐层计算得到最终的综合信任评估结果;在权限控制环节,结合节点信任相似度计算、身份验证等多维因素,应用角色激活与权限分配机制实现动态、精准的权限调控。 展开更多
关键词 电气教学 虚拟实验室 云端访问结构 权限控制 用户信任值
在线阅读 下载PDF
Development history and accessibility evolution of land transportation network in Beijing-Tianjin-Hebei region over the past century 被引量:9
14
作者 陈娱 金凤君 +2 位作者 陆玉麒 陈卓 杨宇 《Journal of Geographical Sciences》 SCIE CSCD 2018年第10期1500-1518,共19页
From the development of modern transportation to the current era of high-speed transportation networks, the Beijing-Tianjin-Hebei(BTH) region has always played a national leading role in land transportation developmen... From the development of modern transportation to the current era of high-speed transportation networks, the Beijing-Tianjin-Hebei(BTH) region has always played a national leading role in land transportation development of China. In order to explore the long-term evolutionary characteristics of land transportation in the BTH region, this paper utilized a temporal scale of 100 years to systematically interpret the development process of the land transportation network. Taking 13 cities within the BTH region as research anchor cities, we took into account "leaping" mode of transportation in order to investigate the evolution of accessibility. Our research shows the following results:(1) The land transportation network in the BTH region has undergone five stages of development: the initial period of modernization(1881–1937); the period of stagnation of transportation development(1937–1949); the network expansion period(1949–1980); the period of trunk construction(1980–1995), and the period of high-speed transportation network development(1995–present). The network structure centered around Beijing has existed from the outset of modern transportation development.(2) The accessibility spatial pattern of land transportation in BTH region has evolved from expansion along traffic corridors to the formation of concentric circles. The stratified circular structure of transportation in anchor cities has gradually developed into a contiguous development pattern.(3) There are clear hierarchical differences in the transportation structures of anchor cities. Beijing has always been at the top of this hierarchy, while the hierarchical position of Zhangjiakou has fallen noticeably since 1949. The Beijing-Tianjin region was the first region to form a short-duration transportation circle structure, while the transportation advantages of the central part of Hebei Province, which is located in the center of the BTH transportation region, have yet to be realized. 展开更多
关键词 Beijing-Tianjin-Hebei region land transportation network historical evulution accessIBILITY circle structure
原文传递
Sequence based prediction of relative solvent accessibility using two-stage support vector regression with confidence values
15
作者 Ke Chen Michal Kurgan Lukasz Kurgan 《Journal of Biomedical Science and Engineering》 2008年第1期1-9,共9页
Predicted relative solvent accessibility (RSA) provides useful information for prediction of binding sites and reconstruction of the 3D-structure based on a protein sequence. Recent years observed development of sever... Predicted relative solvent accessibility (RSA) provides useful information for prediction of binding sites and reconstruction of the 3D-structure based on a protein sequence. Recent years observed development of several RSA prediction methods including those that generate real values and those that predict discrete states (buried vs. exposed). We propose a novel method for real value prediction that aims at minimizing the prediction error when compared with six existing methods. The proposed method is based on a two-stage Support Vector Regression (SVR) predictor. The improved prediction quality is a result of the developed composite sequence representation, which includes a custom-selected subset of features from the PSI-BLAST profile, secondary structure predicted with PSI-PRED, and binary code that indicates position of a given residue with respect to sequence termini. Cross validation tests on a benchmark dataset show that our method achieves 14.3 mean absolute error and 0.68 correlation. We also propose a confidence value that is associated with each predicted RSA values. The confidence is computed based on the difference in predictions from the two-stage SVR and a second two-stage Linear Regression (LR) predictor. The confidence values can be used to indicate the quality of the output RSA predictions. 展开更多
关键词 RELATIVE SOLVENT accessIBILITY support vector regression PSI-BLAST PSI-PRED SECONDARY protein structure
暂未订购
Accelerating structure relaxation in chemically disordered materials with a chemistry-driven model
16
作者 Liying An Huan Ma +2 位作者 Jinjia Liu Wenping Guo Xiaodong Wen 《npj Computational Materials》 2025年第1期2437-2446,共10页
Chemically disordered materials are widely utilized,yet establishing structure-property relationship remains challenging due to their vast configurational space.Identifying thermal accessible low energy configurations... Chemically disordered materials are widely utilized,yet establishing structure-property relationship remains challenging due to their vast configurational space.Identifying thermal accessible low energy configurations of these materials through standard ab initio calculations is computationally expensive for doping induced structure changes.In this work,we propose a straightforward algorithm to optimize random structures into ground state configurations by matching chemical subgraphs.This algorithm constructs harmonic potential with chemistry-driven parameterization,without relying on iterative training to accelerate the relaxation process.It can completely bypass the need for relaxation with ab initio calculations in rigid systems and reduce computational costs by 30%in flexible systems.Leveraging its exceptional structural relaxation capabilities,we have also developed a generalized workflow for screening low-energy structures in disordered materials,aimed at expediting the screening process and accelerating new material discovery. 展开更多
关键词 accelerating structure relaxation harmonic potential matching chemical subgraphsthis optimize random structures ground state configurations standard ab initio calculations chemically disordered materials chemistry driven model thermal accessible low energy configurations
原文传递
基于句法测度的区域交通网络可达性评价研究 被引量:1
17
作者 张晓瑞 朱慧莲 +1 位作者 郭龙坤 王振波 《山东理工大学学报(自然科学版)》 2025年第3期9-17,共9页
基于区域交通网络研究现状,以休宁县域国道、省道、县道和乡道构成的交通网络为数据源,根据空间句法理论,利用Ucl Depthmap软件平台从整体路网、分等级路网、各建成区路网3个方面多视角综合测度和量化描述休宁县域交通网络;通过对整合... 基于区域交通网络研究现状,以休宁县域国道、省道、县道和乡道构成的交通网络为数据源,根据空间句法理论,利用Ucl Depthmap软件平台从整体路网、分等级路网、各建成区路网3个方面多视角综合测度和量化描述休宁县域交通网络;通过对整合度、连接度、平均深度值等指标的解读,分析休宁县域的空间可达性及其分布特点,并计算出各路段的指标数值,判断各等级道路结构的合理性。结果表明,休宁县域道路呈自由放射路网布局形式,整合度、空间智能度较低,道路系统形态缺乏合理性,可达性一般。对现存的问题进行总结,并提出相应的调控及优化策略,以期为城市的空间发展交流、规划建设提供参考。 展开更多
关键词 空间句法 可达性 路网结构 优化策略
在线阅读 下载PDF
县域数字接入与农业经济韧性提升 被引量:1
18
作者 廖祖君 曲天天 《山西财经大学学报》 北大核心 2025年第9期15-28,共14页
基于2014—2022年647个县级行政单元的数据,实证检验县域数字接入对农业经济韧性的影响和作用机制。研究发现:县域数字接入可以有效提升农业经济韧性,且该提升作用会随着农业社会化服务程度的提高而增强;农业技术效率提高、农业劳动效... 基于2014—2022年647个县级行政单元的数据,实证检验县域数字接入对农业经济韧性的影响和作用机制。研究发现:县域数字接入可以有效提升农业经济韧性,且该提升作用会随着农业社会化服务程度的提高而增强;农业技术效率提高、农业劳动效率提高和县域产业结构优化是县域数字接入提升农业经济韧性的重要传导机制;县域数字接入对农业经济韧性的提升作用在经济区域、农业规模、时间区间层面均存在异质性,而对不同农业功能区的影响则不存在显著差异。 展开更多
关键词 县域经济 数字技术接入 数字场景接入 农业经济韧性 农业技术效率 农业劳动效率 县域产业结构 农业现代化
原文传递
市场准入管制放松与产业结构升级 被引量:1
19
作者 蔡兴 刘洁琼 《产经评论》 北大核心 2025年第1期20-33,共14页
打破市场准入壁垒能有效提升资源配置效率、激发市场主体活力,是我国加快建设全国统一大市场和高标准市场体系的重要任务之一。基于2016年起分阶段实施的市场准入负面清单制度,利用2012—2022年中国287个地级市样本,实证考察市场准入管... 打破市场准入壁垒能有效提升资源配置效率、激发市场主体活力,是我国加快建设全国统一大市场和高标准市场体系的重要任务之一。基于2016年起分阶段实施的市场准入负面清单制度,利用2012—2022年中国287个地级市样本,实证考察市场准入管制放松对产业结构升级的影响及作用路径。结果表明:市场准入负面清单制度的推行显著促进了城市产业结构升级。进一步的机制探讨揭示,市场准入负面清单制度会通过提升区域创新创业水平和资源配置效率促进产业结构升级。异质性分析显示,市场准入负面清单制度对产业结构升级的促进作用主要体现在人力资本水平、金融发展水平及基础设施发展水平较高的城市。因此,应完善市场准入负面清单动态调整机制,加快建设全国统一大市场和高标准市场体系,为产业结构升级与经济高质量发展提供制度保障。 展开更多
关键词 产业结构升级 市场准入负面清单制度 区域创新创业水平 资源配置效率
在线阅读 下载PDF
纵向生态保护补偿与产业结构升级 被引量:1
20
作者 王业强 罗杨帆 《统计与信息论坛》 北大核心 2025年第8期51-61,共11页
产业结构升级有利于生态保护地区的经济增长和环境保护,纵向生态保护补偿对生态保护地区产业结构升级的影响更为直接和迅速,考察纵向生态保护补偿对产业结构升级的影响更具有现实意义。从地方政府视角对产业规制背景下纵向生态保护补偿... 产业结构升级有利于生态保护地区的经济增长和环境保护,纵向生态保护补偿对生态保护地区产业结构升级的影响更为直接和迅速,考察纵向生态保护补偿对产业结构升级的影响更具有现实意义。从地方政府视角对产业规制背景下纵向生态保护补偿与产业结构升级的关系进行理论分析,基于2010—2022年县域面板数据,利用国家重点生态功能区实行产业准入负面清单制度的准自然实验,以双重差分模型识别产业规制背景下纵向生态保护补偿对产业结构升级的影响。研究结果证实,产业规制背景下纵向生态保护补偿能够促进产业结构升级,但重点生态功能区转移支付与产业准入负面清单制度的“磨合”使得政策效果具有两年滞后。机制分析显示,产业规制背景下纵向生态保护补偿通过抑制生态保护地区的工业发展,促进生态保护地区的服务业发展,从而推动产业结构升级。异质性研究发现,经济状况更差、财政压力更大的县域的政策效果更好,资源型县域的政策效果优于非资源型县域。因此,要提高重点生态功能区转移支付与产业准入负面清单制度的协同性,强化纵向生态保护补偿的政策效果;优化纵向生态保护补偿资金使用制度,推动纵向生态保护补偿资金向服务业倾斜;持续增加欠发达地区的纵向生态保护补偿资金,促进经济水平差、财政压力大和资源型地区的产业结构升级。 展开更多
关键词 纵向生态保护补偿 产业结构升级 产业规制 产业准入负面清单制度 重点生态功能区转移支付
在线阅读 下载PDF
上一页 1 2 39 下一页 到第
使用帮助 返回顶部