Evaluation of industrial ecological security in industrial transformation demonstration area based on spatiotemporal differentiation
نویسندگان
چکیده
Evaluating the state of China's industrial transformation and its ecological protection is essential to addressing security. In this study, nine cities in Wanjiang Demonstration Zone were selected for analysis using normal cloud model spatial autocorrelation model. The study results showed that (1) security an upward trend from 2012 2019, development among was unbalanced; (2) level northeast demonstration zone higher than other cities; (3) correlation within area positive, degree agglomeration strong initially but subsequently attenuated. This indicates enhancing city will have a backflow effect attenuate connection with surrounding cities. elucidates area, following recommendations are made based on research results: improving strategic planning regional ecosystems, creating new governance pattern featuring coordinated regions, innovating business forms models inter-city linkage.
منابع مشابه
Security in Industrial Ethernet
Ethernet has become increasingly popular in automation, due to its easy integration with other networks but also for its low costs and commercial availability. Characteristics like real-time capabilities required in automation have also been added and now form Industrial Ethernet allowing its deployment in application areas formerly reserved for dedicated fieldbus systems. Due to the vertical i...
متن کاملEcological Perspectives on Industrial Decline And Resurgence
Over the last twenty-five years, research in organizational ecology has given rise to a proliferation of mechanisms that seek to explain processes of decline and resurgence in mature industries. In this paper, I consider four of these mechanisms – including arguments concerning competitive intensity, temporal heterogeneity, population inertia, and community ecology – and apply them to explain t...
متن کاملEvaluation of the CORAL Approach for Risk-driven Security Testing based on an Industrial Case Study
The CORAL approach is a model-based method to security testing employing risk assessment to help security testers select and design test cases based on the available risk picture. In this paper we present experiences from using CORAL in an industrial case. The results indicate that CORAL supports security testers in producing risk models that are valid and threat scenarios that are directly tes...
متن کاملCyber Security of Industrial Networks
SCADA stands for Supervisory Control and Data Acquisition, a communication technology which collects data from distant facilities and sends control signals to actuators. There are several factors which increase the risk associated with SCADA systems. SCADA components are considered to be profoundly privileged targets for cyber attacks through which hackers can easily hit the nation’s critical i...
متن کاملOn BAN Logics for Industrial Security Protocols
This paper reports on two case-studies of applying BAN logic to industrial strength security protocols. These studies demonstrate the flexibility of the BAN language, as it caters for the addition of appropriate constructs and rules. We argue that, although a semantical foundation of the formalism is lacking, BAN logic provides an intuitive and powerful technique for security analysis.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Geomatics, Natural Hazards and Risk
سال: 2022
ISSN: ['1947-5705', '1947-5713']
DOI: https://doi.org/10.1080/19475705.2022.2075284