期刊文献+
共找到2,002篇文章
< 1 2 101 >
每页显示 20 50 100
A Collaborative Protection Mechanism for System-on-Chip Functional Safety and Information Security in Autonomous Driving
1
作者 Zhongyi Xu Lei Xin +1 位作者 Zhongbai Huang Deguang Wei 《Journal of Electronic Research and Application》 2025年第2期226-232,共7页
This article takes the current autonomous driving technology as the research background and studies the collaborative protection mechanism between its system-on-chip(SoC)functional safety and information security.It i... This article takes the current autonomous driving technology as the research background and studies the collaborative protection mechanism between its system-on-chip(SoC)functional safety and information security.It includes an introduction to the functions and information security of autonomous driving SoCs,as well as the main design strategies for the collaborative prevention and control mechanism of SoC functional safety and information security in autonomous driving.The research shows that in the field of autonomous driving,there is a close connection between the functional safety of SoCs and their information security.In the design of the safety collaborative protection mechanism,the overall collaborative protection architecture,SoC functional safety protection mechanism,information security protection mechanism,the workflow of the collaborative protection mechanism,and its strategies are all key design elements.It is hoped that this analysis can provide some references for the collaborative protection of SoC functional safety and information security in the field of autonomous driving,so as to improve the safety of autonomous driving technology and meet its practical application requirements. 展开更多
关键词 Autonomous driving SoC functional safety Information security Collaborative protection mechanism Collaborative protection architecture
在线阅读 下载PDF
Quantum-Resistant Cryptographic Primitives Using Modular Hash Learning Algorithms for Enhanced SCADA System Security
2
作者 Sunil K.Singh Sudhakar Kumar +5 位作者 Manraj Singh Savita Gupta Razaz Waheeb Attar Varsha Arya Ahmed Alhomoud Brij B.Gupta 《Computers, Materials & Continua》 2025年第8期3927-3941,共15页
As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)system... As quantum computing continues to advance,traditional cryptographic methods are increasingly challenged,particularly when it comes to securing critical systems like Supervisory Control andData Acquisition(SCADA)systems.These systems are essential for monitoring and controlling industrial operations,making their security paramount.A key threat arises from Shor’s algorithm,a powerful quantum computing tool that can compromise current hash functions,leading to significant concerns about data integrity and confidentiality.To tackle these issues,this article introduces a novel Quantum-Resistant Hash Algorithm(QRHA)known as the Modular Hash Learning Algorithm(MHLA).This algorithm is meticulously crafted to withstand potential quantum attacks by incorporating advanced mathematical and algorithmic techniques,enhancing its overall security framework.Our research delves into the effectiveness ofMHLA in defending against both traditional and quantum-based threats,with a particular emphasis on its resilience to Shor’s algorithm.The findings from our study demonstrate that MHLA significantly enhances the security of SCADA systems in the context of quantum technology.By ensuring that sensitive data remains protected and confidential,MHLA not only fortifies individual systems but also contributes to the broader efforts of safeguarding industrial and infrastructure control systems against future quantumthreats.Our evaluation demonstrates that MHLA improves security by 38%against quantumattack simulations compared to traditional hash functionswhilemaintaining a computational efficiency ofO(m⋅n⋅k+v+n).The algorithm achieved a 98%success rate in detecting data tampering during integrity testing.These findings underline MHLA’s effectiveness in enhancing SCADA system security amidst evolving quantum technologies.This research represents a crucial step toward developing more secure cryptographic systems that can adapt to the rapidly changing technological landscape,ultimately ensuring the reliability and integrity of critical infrastructure in an era where quantum computing poses a growing risk. 展开更多
关键词 Hash functions post-quantum cryptography quantum-resistant hash functions network security supervisory control and data acquisition(SCADA)
在线阅读 下载PDF
Introduction to Wireless Endogenous Security and Safety:Problems, Attributes, Structures and Functions 被引量:12
3
作者 Liang Jin Xiaoyan Hu +4 位作者 Yangming Lou Zhou Zhong Xiaoli Sun Huiming Wang Jiangxing Wu 《China Communications》 SCIE CSCD 2021年第9期88-99,共12页
The information security and functional safety are fundamental issues of wireless communications sytems.The endogenous security principle based on Dynamic Heterogeneous Redundancy provides a direction for the developm... The information security and functional safety are fundamental issues of wireless communications sytems.The endogenous security principle based on Dynamic Heterogeneous Redundancy provides a direction for the development of wireless communication security and safety technology.This paper introduces the concept of wireless endogenous security from the following four aspects.First,we sorts out the endogenous security problems faced by the current wireless communications system,and then analyzes the endogenous security and safety attributes of the wireless channel.After that,the endogenous security and safety structure of the wireless communications system is given,and finally the applications of the existing wireless communication endogenous security and safety functions are listed. 展开更多
关键词 wireless communication endogenous security information security functional safety
在线阅读 下载PDF
Providing Customized Security Based on Network Function Composition and Reconfiguration 被引量:2
4
作者 HU Yuxiang LI Yufeng +1 位作者 XING Chiqiang LIAO Jianxin 《China Communications》 SCIE CSCD 2016年第S1期177-189,共13页
Real-time multimedia sharing in Consumer-centric Multimedia Network(CMN) requires usability anywhere, anytime and from any device. However, CMNs are usually located or implemented on application layer, which makes CMN... Real-time multimedia sharing in Consumer-centric Multimedia Network(CMN) requires usability anywhere, anytime and from any device. However, CMNs are usually located or implemented on application layer, which makes CMNs subjected to their fixed substrate security framework. A fundamental diversifying attribute for the customized security experiences of CMNs is pressing. This paper proposes a programmable network structure which is named Service Processing Chain(SPC) based on network function combination. The SPC is established by the ordinal combination of network functions in substrate switches dynamically, and therefore constructs a special channel for each CMN with required security. The construction and reconfiguration algorithms of SPC are also discussed in this paper. Evaluations and implementation show that above approaches are effective in providing multilevel security with flexibility and expansibility. It is believed that the SPC could provide customized security service and drive participative real-time multimedia sharing for CMNs. 展开更多
关键词 consumer-centric MULTIMEDIA NETWORK customized security NETWORK function combination service processing CHAIN
在线阅读 下载PDF
A Practical Regular LDPC Coded Scheme for Physical-Layer Information Security
5
作者 Du Junyi 《China Communications》 SCIE CSCD 2024年第5期190-201,共12页
In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured L... In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes. 展开更多
关键词 extrinsic information transfer function physical layer scheme secure open channel security gap
在线阅读 下载PDF
Advancing 5G Network Applications Lifecycle Security:An ML-Driven Approach
6
作者 Ana Hermosilla Jorge Gallego-Madrid +3 位作者 Pedro Martinez-Julia Jordi Ortiz Ved P.Kafle Antonio Skarmeta 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第11期1447-1471,共25页
As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof pa... As 5th Generation(5G)and Beyond 5G(B5G)networks become increasingly prevalent,ensuring not only networksecurity but also the security and reliability of the applications,the so-called network applications,becomesof paramount importance.This paper introduces a novel integrated model architecture,combining a networkapplication validation framework with an AI-driven reactive system to enhance security in real-time.The proposedmodel leverages machine learning(ML)and artificial intelligence(AI)to dynamically monitor and respond tosecurity threats,effectively mitigating potential risks before they impact the network infrastructure.This dualapproach not only validates the functionality and performance of network applications before their real deploymentbut also enhances the network’s ability to adapt and respond to threats as they arise.The implementation ofthis model,in the shape of an architecture deployed in two distinct sites,demonstrates its practical viability andeffectiveness.Integrating application validation with proactive threat detection and response,the proposed modeladdresses critical security challenges unique to 5G infrastructures.This paper details the model,architecture’sdesign,implementation,and evaluation of this solution,illustrating its potential to improve network securitymanagement in 5G environments significantly.Our findings highlight the architecture’s capability to ensure boththe operational integrity of network applications and the security of the underlying infrastructure,presenting asignificant advancement in network security. 展开更多
关键词 Network application network function virtualization machine learning security 5G
在线阅读 下载PDF
Security Enhancement of Arbiter-Based Physical Unclonable Function on FPGA 被引量:1
7
作者 WANG Jun LIU Shubo +1 位作者 XIONG Xingxing LIANG Cai 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2017年第2期127-133,共7页
In order to reduce physical unclonable fixnction (PUF) response instability and imbalance caused by the metastability and the bias of arbiter, this paper uses an improved balanced D flip-plop (DFF) based on the un... In order to reduce physical unclonable fixnction (PUF) response instability and imbalance caused by the metastability and the bias of arbiter, this paper uses an improved balanced D flip-plop (DFF) based on the unbalanced DFF to reduce the bias in response output and enhances the security of PUF by adopting two balanced DFFs in series. The experimental results show that two cascaded balanced DFFs improve the stability of the DFF, and the output of two balanced DFFs is more reliable. The entropy of output is fixed at 98.7%. 展开更多
关键词 physical unclonable function METASTABILITY balanced D flip-flop field programmable gate arrays (FPGA) security
原文传递
A Security Sensitive Function Mining Approach Based on Precondition Pattern Analysis
8
作者 Zhongxu Yin Yiran Song +1 位作者 Huiqin Chen Yan Cao 《Computers, Materials & Continua》 SCIE EI 2020年第5期1013-1029,共17页
Security-sensitive functions are the basis for building a taint-style vulnerability model.Current approaches for extracting security-sensitive functions either don’t analyze data flow accurately,or not conducting pat... Security-sensitive functions are the basis for building a taint-style vulnerability model.Current approaches for extracting security-sensitive functions either don’t analyze data flow accurately,or not conducting pattern analyzing of conditions,resulting in higher false positive rate or false negative rate,which increased manual confirmation workload.In this paper,we propose a security sensitive function mining approach based on preconditon pattern analyzing.Firstly,we propose an enhanced system dependency graph analysis algorithm for precisely extracting the conditional statements which check the function parameters and conducting statistical analysis of the conditional statements for selecting candidate security sensitive functions of the target program.Then we adopt a precondition pattern mining method based on conditional statements nomalizing and clustering.Functions with fixed precondition patterns are regarded as security-sensitive functions.The experimental results on four popular open source codebases of different scales show that the approach proposed is effective in reducing the false positive rate and false negative rate for detecting security sensitive functions. 展开更多
关键词 Code mining security sensitive function function preconditions single-linkage clustering
在线阅读 下载PDF
Security investment and information sharing for complementary firms with heterogeneous monetary loss
9
作者 蔡传晰 梅姝娥 仲伟俊 《Journal of Southeast University(English Edition)》 EI CAS 2017年第2期241-248,共8页
Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which a... Two complementary firms' information sharing and security investment are investigated. When two complementary firms with heterogeneous assets are both breached, it is assumed that they suffer different losses which are associated with their information assets. Some insights about optimal strategies for the firms and the attacker are obtained by the game theory, which forms a comparison with those derived from substitutable firms, and those derived from complementary firms with homogenous loss. In addition, both the unit transform cost of investment and the extent of firms'loss affect the optimal strategies.Assuming that firms can control information sharing, security investments and both of them, respectively, the effect of the social planner is further analyzed on the information sharing, firms' aggregate defence, the aggregate attack and social total cost. Finally, some policy advice is provided through numerical simulation. Results show that firms are willing to choose security investment centrally rather than individually, but an intervention in information sharing by the social planner may not necessarily be preferable. 展开更多
关键词 complementary firm contest success function security investment information sharing leakage cost
在线阅读 下载PDF
A survey of joint security-safety for function,information and human in industry 5.0 被引量:2
10
作者 Yang Hong Jun Wu Xinping Guan 《Security and Safety》 2025年第1期56-106,共51页
Industry 5.0 blows the whistle on a new industrial revolution,aiming to refocus industrial development by reintegrating the human factor into the technological equation.On the eve of the revolution,the comprehensive s... Industry 5.0 blows the whistle on a new industrial revolution,aiming to refocus industrial development by reintegrating the human factor into the technological equation.On the eve of the revolution,the comprehensive surveys for Industry 5.0 would provide important support for future development.However,current surveys for Industry 5.0 are still in their infancy and some gaps remain.(ⅰ)Current work lacks a comprehensive technical architecture for Industry 5.0 and an in-depth analysis of the enabling technologies that will drive Industry 5.0;(ⅱ)There is no comprehensive survey on security issues of Industry 5.0,which will directly hinder its development;(ⅲ)As Industry 5.0 introduces people into the technological equation,then it will also further consider the broader human interests in its security equation.It is an open issue that traditional security classifications cannot summarize these new security threats in Industry 5.0.Therefore,this survey starts by reviewing the latest key enabling technologies and proposing an overall technology hierarchical structure for Industry 5.0.Second,we investigate the triad of security issues in Industry 5.0,which includes threats and countermeasures for functional safety,information security,and humanized security.Among them,we define the third security issue in Industry 5.0,humanized security,which includes safeguarding the broader interests and rights of individuals,machines,and society.Finally,we summarize future challenges and research trends.To the best of our knowledge,this is the first comprehensive overview of security in Industry 5.0,in which humanized security is defined for the first time. 展开更多
关键词 Industry 5.0 function safety Information security Humanized security
原文传递
Security Risk Assessment of Cyber Physical Power System Based on Rough Set and Gene Expression Programming 被引量:3
11
作者 Song Deng Dong Yue +1 位作者 Xiong Fu Aihua Zhou 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI 2015年第4期431-439,共9页
Risk assessment is essential for the safe and reliable operation of cyber physical power system. Traditional security risk assessment methods do not take integration of cyber system and physical system of power grid i... Risk assessment is essential for the safe and reliable operation of cyber physical power system. Traditional security risk assessment methods do not take integration of cyber system and physical system of power grid into account. In order to solve this problem, security risk assessment algorithm of cyber physical power system based on rough set and gene expression programming is proposed. Firstly, fast attribution reduction based on binary search algorithm is presented. Secondly, security risk assessment function for cyber physical power system is mined based on gene expression programming. Lastly, security risk levels of cyber physical power system are predicted and analyzed by the above function model. Experimental results show that security risk assessment function model based on the proposed algorithm has high efficiency of function mining, accuracy of security risk level prediction and strong practicality. © 2014 Chinese Association of Automation. 展开更多
关键词 Algorithms Electric power system security Gene expression GENES Rough set theory
在线阅读 下载PDF
An Efficient and Practical Quantum Blind Signature Protocol with Relaxed Security Model
12
作者 Jun Zhang Hao Xiao +1 位作者 Hongqun Zhai Xiaoli Meng 《Computers, Materials & Continua》 SCIE EI 2020年第4期301-313,共13页
Blind signature has a wide range of applications in the fields of E-commerce and block-chain because it can effectively prevent the blind signer from getting the original message with its blindness.Owing to the potent... Blind signature has a wide range of applications in the fields of E-commerce and block-chain because it can effectively prevent the blind signer from getting the original message with its blindness.Owing to the potential unconditional security,quantum blind signature(QBS)is more advantageous than the classical ones.In this paper,an efficient and practical quantum blind signature scheme relaxed security model is presented,where quantum superposition,decoy qubits and hash function are used for the purpose of blindness.Compared with previous QBS scheme,the presented scheme is more efficient and practical with a relaxed security model,in which the signer’s dishonest behavior can be detected other than being prevented as in other QBS schemes. 展开更多
关键词 Blind signature quantum superposition decoy qubit hash function relaxed security model
在线阅读 下载PDF
A Study of Secure Multi-Party Elementary Function Computation Protocols 被引量:1
13
作者 Wenjun Luo Xiang Li 《通讯和计算机(中英文版)》 2005年第5期32-40,共9页
关键词 安全系统 操作系统 基础功能 计算机设备安全
在线阅读 下载PDF
Dynamic Security SFC Branching Path Selection Using Deep Reinforcement Learning
14
作者 Shuangxing Deng Man Li Huachun Zhou 《Intelligent Automation & Soft Computing》 SCIE 2023年第9期2919-2939,共21页
Security service function chaining(SFC)based on software-defined networking(SDN)and network function virtualization(NFV)technology allows traffic to be forwarded sequentially among different security service functions... Security service function chaining(SFC)based on software-defined networking(SDN)and network function virtualization(NFV)technology allows traffic to be forwarded sequentially among different security service functions to achieve a combination of security functions.Security SFC can be deployed according to requirements,but the current SFC is not flexible enough and lacks an effective feedback mechanism.The SFC is not traffic aware and the changes of traffic may cause the previously deployed security SFC to be invalid.How to establish a closed-loop mechanism to enhance the adaptive capability of the security SFC to malicious traffic has become an important issue.Our contribution is threefold.First,we propose a secure SFC path selection framework.The framework can accept the feedback results of traffic and security service functions in SFC,and dynamically select the opti-mal path for SFC based on the feedback results.It also realizes the automatic deployment of paths,forming a complete closed loop.Second,we expand the protocol of SFC to realize the security SFC with branching path,which improve flexibility of security SFC.Third,we propose a deep reinforcement learning-based dynamic path selection method for security SFC.It infers the optimal branching path by analyzing feedback from the security SFC.We have experimented with Distributed Denial of Service(DDoS)attack detection modules as security service functions.Experimental results show that our proposed method can dynamically select the optimal branching path for a security SFC based on traffic features and the state of the SFC.And it improves the accuracy of the overall malicious traffic detection of the security SFC and significantly reduces the latency and overall load of the SFC. 展开更多
关键词 Service function chaining deep reinforcement learning security service
在线阅读 下载PDF
Function and Role of China's Securities Market
15
作者 Wenxian Zhang 《Chinese Business Review》 2004年第11期14-17,共4页
The article discusses the determinant factor of the function of the securities market at first and then proposes that the basic factor is the inherent need of social economic operation and development process itself. ... The article discusses the determinant factor of the function of the securities market at first and then proposes that the basic factor is the inherent need of social economic operation and development process itself. In addition, the primary factor of mature securities market is perfect and integrated function of the securities market. Afterwards, the article analyses the static and dynamic function of the securities market. At last, it probes into the government role in the securities market briefly and proposes that China needs to carry out the essential change on government role, market function location, development goal and the mode of securities market if the function of China's securities market is to be exerted properly. 展开更多
关键词 securITIES market government role function
在线阅读 下载PDF
Concepts of Safety Critical Systems Unification Approach &Security Assurance Process
16
作者 Faisal Nabi Jianming Yong +3 位作者 Xiaohui Tao Muhammad Saqib Malhi Umar Mahmood Usman Iqbal 《Journal of Information Security》 2020年第4期292-303,共12页
The security assurance of computer-based systems that rely on safety and security</span><span style="font-family:'Minion Pro Capt','serif';"> </span><span style="fon... The security assurance of computer-based systems that rely on safety and security</span><span style="font-family:'Minion Pro Capt','serif';"> </span><span style="font-family:Verdana;">assurance, such as consistency, durability, efficiency and accessibility, require or need resources. This target</span><span style="font-family:Verdana;">s</span><span style="font-family:Verdana;"> the System-of-Systems (SoS) problems with the exception of difficulties and concerns that apply similarly to subsystem interactions on a single system and system-as-component interactions on a large information</span><span style="font-family:'Minion Pro Capt','serif';"> </span><span style="font-family:Verdana;">system. This research addresses security and information assurance for safety-critical systems, where security and safety </span><span style="font-family:Verdana;">are</span><span style="font-family:Verdana;"> addressed before going to actual implementation/development phase for component-based systems. For this purpose, require a conceptual idea or strategy that deals with the application logic security assurance issues. This may explore the vulnerability in single component or a reuse of specification in existing logic in component-based system. Keeping in view this situation, we have defined seven concepts of security assurance and security assurance design strategy for safety-critical systems. 展开更多
关键词 System security Assurance of Component function Safety-Critical Software Software Assurance
在线阅读 下载PDF
Finding Food Security through Changing the Agricultural Model to Sustain Insect Biodiversity
17
作者 Astrid Jankielsohn 《Advances in Entomology》 2021年第3期122-130,共9页
Worldwide biodiversity is being threatened by human activities to a greater level wherein the natural ecosystems are reaching the verge of collapsing. We are faced with four major interrelated challenges namely a chan... Worldwide biodiversity is being threatened by human activities to a greater level wherein the natural ecosystems are reaching the verge of collapsing. We are faced with four major interrelated challenges namely a changing climate, biodiversity loss, human population growth and food production for this growing population. Agricultural intensification contributes significantly to biodiversity loss. The agricultural model for our current food production systems is mainly based on the Green Revolution, which promoted the cultivation of crops in extensive monoculture fields and intensified external inputs of agrochemicals. This model resulted in biodiversity loss, particularly in insect populations. A model based on ecological intensification as an alternative to agricultural intensification with minimized use of agro-inputs may slow the rate of biodiversity loss resulting in more sustainable agricultural ecosystems. 展开更多
关键词 Food security Agricultural Model Biodiversity Loss Climate Change Ecological Intensification INSECTS Ecosystem functioning Human Population Increase
在线阅读 下载PDF
A Probing Model of Secret Key Generation Based on Channel Autocorrelation Function
18
作者 Xia Enjun Hu Binjie Shen Qiaoqiao 《China Communications》 SCIE CSCD 2024年第6期163-175,共13页
Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,ther... Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,there is a lack of research on the optimization of the probing process.This study investigates how to optimize correlated parameters to maximize the SKG rate(SKGR)in the time-division duplex(TDD)mode.First,we build a probing model which includes the effects of transmitting power,the probing period,and the dimension of sample vectors.Based on the model,the analytical expression of the SKGR is given.Next,we formulate an optimization problem for maximizing the SKGR and give an algorithm to solve it.We conclude the SKGR monotonically increases as the transmitting power increases.Relevant mathematical proofs are given in this study.From the simulation results,increasing appropriately the probing period and the dimension of the sample vector could increase the SKGR dramatically compared to a yardstick,which indicates the importance of optimizing the parameters related to the channel probing phase. 展开更多
关键词 channel autocorrelation function channel probing optimization problem physical layer security secret key generation
在线阅读 下载PDF
粮食安全韧性评价:体系构建、发展差异及障碍度分析 被引量:4
19
作者 郭耀辉 谢蕾 杜兴端 《农村经济》 北大核心 2025年第1期29-37,共9页
粮食安全韧性反映粮食产业链对风险和冲击的抵抗能力、恢复能力和变革能力,是新时期粮食安全观的重要体现。从产业链韧性视角构建粮食安全评价体系,考察测算各省(区、市)粮食安全系统韧性水平和粮食产销区区域差异及障碍度。研究发现:... 粮食安全韧性反映粮食产业链对风险和冲击的抵抗能力、恢复能力和变革能力,是新时期粮食安全观的重要体现。从产业链韧性视角构建粮食安全评价体系,考察测算各省(区、市)粮食安全系统韧性水平和粮食产销区区域差异及障碍度。研究发现:我国粮食安全韧性总体呈波动上升趋势,有7个省份达到高韧性水平;粮食安全韧性的功能区间差异及省域差异均在扩大,应以省域为基本单元制定相应的政策;抵抗能力和变革能力不足是制约粮食安全韧性的主要障碍,具体体现在人多地少矛盾、农村空心化及农业基础设施薄弱等方面。未来应针对不同区域和省际采取差异化的策略,结合各省实际粮食贡献研究制定粮食产销区省际横向利益补偿机制,区域政策应更关注粮食产销平衡区;不同功能区应围绕自身面临的主要障碍补齐短板;稳粮价、提单产和绿色发展仍是未来政策关注的着力点。 展开更多
关键词 粮食功能区 粮食安全韧性 泰尔指数 产销区差异 障碍度
原文传递
农业生产社会-生态系统韧性:维度与度量 被引量:1
20
作者 陈有华 卢欣雨 +1 位作者 张壮 陈彬 《生态学报》 北大核心 2025年第9期4548-4560,共13页
学者们已开始从韧性的角度对经济学理论进行系统性反思,社会-生态系统理论的提出更是对经济学思想形成了巨大冲击,农业生产作为典型的社会-生态系统,更需要韧性思想。基于社会-生态系统理论,界定农业生产基本功能的基础上,并对农业生产... 学者们已开始从韧性的角度对经济学理论进行系统性反思,社会-生态系统理论的提出更是对经济学思想形成了巨大冲击,农业生产作为典型的社会-生态系统,更需要韧性思想。基于社会-生态系统理论,界定农业生产基本功能的基础上,并对农业生产系统多维度韧性进行了定性分析与拓展;实证上,结合FAO和《中国农业统计年鉴》等数据库,综合采用局部加权回归散点平滑法、香农熵方法以及广义据估计方法,为分析农业生产综合韧性和各维度韧性提供了衡量指标。理论分析表明,当前理论界应当高度重视农业韧性的复杂性,重新反思和刻画农业生产系统韧性;实证结果表明,1990—2020年全国农业综合韧性呈“W”型演化趋势,即分别在2004和2016年出现最低值,2016年后出现快速增长的趋势;粮食生产波动韧性在2016年以前较为稳定,并无明显的趋势,但在这之后则呈现出快速提高的趋势;生态韧性总体呈现倒“V”型趋势,2003年后下降趋势明显;2001—2019年期间,中国农业发展韧性则呈现“N”型上升趋势,其中上海、北京、天津、广东、浙江、辽宁的增幅较为明显。三大韧性的耦合协调度自2004年之后趋于稳定,在2016后得到明显提升,这体现了农业生产的各维度韧性关系的进一步优化改进。研究结果一定程度上解决了有关韧性概念的争论,完善和拓展了韧性理论的应用与框架,揭示了农业生产系统韧性演化路径和规律,为农业高质量发展提供了理论与现实依据。 展开更多
关键词 韧性 农业生产 农业功能 粮食安全 社会-生态系统
在线阅读 下载PDF
上一页 1 2 101 下一页 到第
使用帮助 返回顶部