Evaluation of industrial ecological security in industrial transformation demonstration area based on spatiotemporal differentiation

نویسندگان

چکیده

Evaluating the state of China's industrial transformation and its ecological protection is essential to addressing security. In this study, nine cities in Wanjiang Demonstration Zone were selected for analysis using normal cloud model spatial autocorrelation model. The study results showed that (1) security an upward trend from 2012 2019, development among was unbalanced; (2) level northeast demonstration zone higher than other cities; (3) correlation within area positive, degree agglomeration strong initially but subsequently attenuated. This indicates enhancing city will have a backflow effect attenuate connection with surrounding cities. elucidates area, following recommendations are made based on research results: improving strategic planning regional ecosystems, creating new governance pattern featuring coordinated regions, innovating business forms models inter-city linkage.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Security in Industrial Ethernet

Ethernet has become increasingly popular in automation, due to its easy integration with other networks but also for its low costs and commercial availability. Characteristics like real-time capabilities required in automation have also been added and now form Industrial Ethernet allowing its deployment in application areas formerly reserved for dedicated fieldbus systems. Due to the vertical i...

متن کامل

Ecological Perspectives on Industrial Decline And Resurgence

Over the last twenty-five years, research in organizational ecology has given rise to a proliferation of mechanisms that seek to explain processes of decline and resurgence in mature industries. In this paper, I consider four of these mechanisms – including arguments concerning competitive intensity, temporal heterogeneity, population inertia, and community ecology – and apply them to explain t...

متن کامل

Evaluation of the CORAL Approach for Risk-driven Security Testing based on an Industrial Case Study

The CORAL approach is a model-based method to security testing employing risk assessment to help security testers select and design test cases based on the available risk picture. In this paper we present experiences from using CORAL in an industrial case. The results indicate that CORAL supports security testers in producing risk models that are valid and threat scenarios that are directly tes...

متن کامل

Cyber Security of Industrial Networks

SCADA stands for Supervisory Control and Data Acquisition, a communication technology which collects data from distant facilities and sends control signals to actuators. There are several factors which increase the risk associated with SCADA systems. SCADA components are considered to be profoundly privileged targets for cyber attacks through which hackers can easily hit the nation’s critical i...

متن کامل

On BAN Logics for Industrial Security Protocols

This paper reports on two case-studies of applying BAN logic to industrial strength security protocols. These studies demonstrate the flexibility of the BAN language, as it caters for the addition of appropriate constructs and rules. We argue that, although a semantical foundation of the formalism is lacking, BAN logic provides an intuitive and powerful technique for security analysis.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Geomatics, Natural Hazards and Risk

سال: 2022

ISSN: ['1947-5705', '1947-5713']

DOI: https://doi.org/10.1080/19475705.2022.2075284