Promoting the green development of the logistics industry has become a focal point of attention in China. This study combines an improved gravity model and social network analysis method, focusing on the nineteen provinces of the Yangtze Economic Belt and Yellow River Basin. It constructs a spatial correlation network of carbon emissions in the logistics industry from 2010 to 2021, exploring its formation mechanism and spatial evolution characteristics. The study utilizes a quadratic assignment procedure model to investigate internal driving factors. Building upon this, the study employs an improved STIRPAT model to predict the emission reduction path of the future logistics industry. Results are as follows: (1) Carbon consumption is most pronounced in Shandong, Jiangsu, and Shanghai. The carbon emission shows the characteristics of larger downstream; (2) The bridges of carbon emission-related networks gradually shift from Shandong to Shanxi, Anhui, and Sichuan. Carbon emissions in each sector and spatial spillover effects exhibit dynamic correlations and interactive influences; (3) Energy intensity, freight volume, and the spatial correlation network of the logistics industry are highly correlated; (4) The overall carbon emissions from the logistics industry show a decreasing trend in the future. Anhui and Shaanxi provinces will have high carbon emissions in 2035. The conclusions aim to provide policy suggestions for the region's low-carbon transformation.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1016/j.jenvman.2024.121916 | DOI Listing |
J Public Health Policy
January 2025
Indian Council of Medical Research, V. Ramalingaswami Bhawan, Ansari Nagar, New Delhi, 110029, India.
Collaborative initiatives of the drone industry and healthcare sector are becoming a pivotal step in restructuring healthcare service delivery in India. This paper documents knowledge and perceptions of healthcare workers from various districts of Manipur and Nagaland towards the use of drones for medical supply in the region. The study utilized 27 in-depth interviews with healthcare workers to collect qualitative data, which was then analyzed using NVivo 14 for thematic and content analysis.
View Article and Find Full Text PDFAAPS PharmSciTech
January 2025
School of Pharmaceutical Sciences, Delhi Pharmaceutical Sciences and Research University, New Delhi, India, 110017.
The biopharmaceutical industry has witnessed significant growth in the development and approval of biosimilars. These biosimilars aim to provide cost-effective alternatives to expensive originator biosimilars, alleviating financial pressures within healthcare. The manufacturing of biosimilars is a highly complex process that involves several stages, each of which must meet strict regulatory standards to ensure that the final product is highly similar to the reference biologic.
View Article and Find Full Text PDFPLoS One
January 2025
School of Information and Communication Engineering, Beijing University of Information Science and Technology, Bei Jing City, China.
To enhance the intelligent classification of computer vulnerabilities and improve the efficiency and accuracy of network security management, this study delves into the application of a comprehensive classification system that integrates the Memristor Neural Network (MNN) and an improved Temporal Convolutional Neural Network (TCNN) in network security management. This system not only focuses on the precise classification of vulnerability data but also emphasizes its core role in strengthening the network security management framework. Firstly, the study designs and implements a neural network model based on memristors.
View Article and Find Full Text PDFPLoS One
January 2025
Department of Electrical Engineering, College of Engineering, Taif University, Taif, Saudi Arabia.
Modernizing power systems into smart grids has introduced numerous benefits, including enhanced efficiency, reliability, and integration of renewable energy sources. However, this advancement has also increased vulnerability to cyber threats, particularly False Data Injection Attacks (FDIAs). Traditional Intrusion Detection Systems (IDS) often fall short in identifying sophisticated FDIAs due to their reliance on predefined rules and signatures.
View Article and Find Full Text PDFPLoS One
January 2025
Department of Industrial and Management Engineering, Incheon National University (INU), Incheon, South Korea.
As blockchain has been actively applied in various services, a tool for visualizing the complex service processes reflecting the characteristics of blockchain has been required. A service blueprint is a tool to visualize all key systems and encounters in service delivery. Although several blueprints already exist, they have limitations to systematically visualize and analyze blockchain service processes.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!