Landscape Security Pattern Analysis

Source: Internet
Author: User
Landscape Security Pattern Analysis

In 1995, Yu kongjian proposed the Ecological Security Pattern of landscape ecology planning. This method applies the landscape process (including the urban expansion, the spatial movement of species, the flow of water and wind, and the spread of the disaster process) as a process to achieve landscape control and coverage by overcoming spatial resistance. To effectively implement control and coverage, it is necessary to occupy a strategic critical space location and connection. The Landscape Ecological Security Pattern formed by this strategic position and link has an extremely important significance for maintaining and controlling the ecological process. Identify and design the Ecological Security Pattern Based on the dynamics and trends of the landscape process. The Security Pattern at different security levels provides a defense strategy for landscape changes of urban and rural construction decision makers. Therefore, the landscape ecology security pattern theory not only considers the horizontal and vertical ecological processes, but also meets the requirements that can be defended in the planning. Landscape Security Pattern Theory, especially in regard to landscape planning as an operational, defensive, rather than natural deterministic process, shows its significance in dealing with the level process.

In many cases, security patterns cannot be identified directly by experience. In this case, the identification of strategic components of the landscape must be achieved through simulation of the dynamics and trends of the ecological process. The Strategic Significance of Security Pattern components for controlling the ecological process can be reflected in the following three aspects: (1) Initiative ): once a Security Pattern component is occupied by an ecological process, it has the primary advantage and is conducive to global or local landscape control of the process. (2) co-ordination: Once a Security Pattern component is occupied by an ecological process, it facilitates the establishment of spatial relationships between isolated landscape elements. (3) Efficiency: Once a Security Pattern component is occupied by an ecological process, the ecological process is controlled in a global or local landscape, efficient and economical in material and energy. In a sense, the advantage of efficiency is the overall feature of SP, which is also included in the active advantages and spatial connection advantages. Taking biological protection as an example, a typical security pattern includes the following landscape components:

Source: The existing native species habitat, which is the first point of species proliferation and maintenance.

② Buffer zone: the surrounding area of the source. It is a low resistance zone for species to spread.

③ Inter-source linkage: the most easily connected low-resistance channel between adjacent sources.

④ Radiating routes: A low-resistance channel radiating from the source to the peripheral landscape.

⑤ Strategic point: a stepping stone that is critical to communication between adjacent sources ). In addition to radiation channels and strategic points, other landscape components of security patterns are discussed in Landscape Ecology and biological protection.

The steps to identify the Landscape Ecological Security Pattern are as follows:

Step 1: determine the source. In most cases, the protection objects of Landscape Ecological Planning are multiple species and groups. They should be widely representative and fully reflect the diversity of habitat features of protected areas. Based on the investigation of regional composition, we can determine the species and corresponding habitat as the main protected object.

Step 2: establish the resistance plane. The use of landscape by species is regarded as a competitive control and coverage of space. This control and coverage must be achieved by overcoming the resistance. Therefore, the resistance plane reflects the spatial movement trend of species. As mentioned above, there are multiple models that may be used to establish the resistance plane (Trend Plane. Generally, the minimum cumulative resistance (MCR) is used to establish the resistance surface. This model takes three factors into account: source, distance, and landscape interface features. The basic formula is as follows:


This formula is based on the commonly used cost distance in the geographic information system. WhereFIs an unknown positive function that reflects the positive correlation between the minimum resistance of any point in the space and its distance to all sources and landscape base surface features.DijIt is the base surface of a landscape that species travel from source J to a certain point in space.ISpatial distance;RiLandscapeIResistance to the movement of a species. Although function f is generally unknown (Dij×Ri) The cumulative value can be considered to be the relative accessibility of a specific path from the source to the space of a species. The minimum value of resistance from all sources to the point is used to measure the accessibility of the point. Therefore, the resistance surface reflects the potential possibility and trend of species movement.

Step 3: Identify the Security Pattern Based on the resistance. The resistance surface is a time-space continuous body that reflects the movement of species, similar to the terrain surface. The resistance surface can be expressed as a vector with an equal resistance line. Based on the resistance surface, spatial analysis can identify the buffer zone, source-to-source connections, radiation channels, and strategic points. Corresponding to the spatial pattern, the valid boundary of the buffer zone can be determined based on these thresholds. This can enable the effectiveness of buffer partitioning. Source-to-source connections are actually the low point of resistance between two adjacent sources on the resistance surface. Based on different security levels. There can be one or more connections between sources. They are efficient channels and links between ecological streams. Radiation channels can be understood as low resistance channels for species to spread outward. Here, species movement is regarded as a dynamic process of landscape control, rather than passive object protection. This is necessary to protect the future development and evolution of objects, and the evolutionary process of protected organisms is of great significance in biological protection. There are many identification methods for strategic points, among which the tangent points of the same resistance line centered on the adjacent source are directly reflected from the resistance surface. It is of vital significance to control the ecological flow.

Combining the above various existing and potential landscape structural components to form a bio-Protection Security Pattern at a certain security level. different security levels require their respective security patterns. However, the security pattern at each layer is determined based on the dynamics of the ecological process and certain threshold values of the trend, these thresholds can be obtained by analyzing the spatial characteristics of the resistance (figure 4 ).

The Landscape Security Pattern Theory refers to the defense strategy of game theory, the threshold value of urban science, the carrying capacity of ecological and environmental science, and the minimum security standard in Ecological Economics, in this way, the security and continuity problems of the landscape process are further studied using the graphic and geometric language or the spatial analysis model of the theoretical geography, which is consistent with the landscape planning language.

Multi-level Landscape Security Pattern helps to coordinate the relationship between different types of land use more effectively, and provides a basis for space transactions between different land development and utilization. The Landscape Security Pattern in some ecological processes can also be used as a strategic spatial pattern for controlling sudden disasters, such as floods and fires. The theory and method of Landscape Security Pattern is to solve the problem of how to maintain the health and security of the ecological process with the most economic and efficient landscape pattern in a limited land area, and control the disastrous process, A new thinking model is provided to achieve the sustainability of the living environment, and to achieve a good land use pattern, a safe and healthy living environment under the conditions of limited land resources, in particular, it has potential theoretical and practical significance to restore and reconstruct the urban and rural landscape ecosystem and effectively prevent the deterioration of the ecological environment.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.