Biodiv Sci ›› 2018, Vol. 26 ›› Issue (1): 36-43.  DOI: 10.17520/biods.2017124

• Methodologies • Previous Articles     Next Articles

Algorithm improvements and applications for biological conservation security patterns

Jie Chen, Nianxing Zhou*(), Zhuomin Tao   

  1. School of Geography Science, Nanjing Normal University, Nanjing 210023
  • Received:2017-04-19 Accepted:2017-12-04 Online:2018-01-20 Published:2018-05-05
  • Contact: Zhou Nianxing
  • About author:# Co-first authors


Using biological movement as a basis, landscape security patterns are an effective approach to biological conservation. This study probes the recognition technique to buffer zones with the aid of utility formulas, and improves the method of recognition of ecological corridors with the help of gradient descent algorithms. These habit islets, which are located within low-resistance areas outside the buffer zone and of a certain distance from suitable sources for the subsistence of targeted protected species, can be considered source candidates. Regions, which are situated within high-resistance areas inside the buffer zone and close to unsuitable sources for maintaining targeted protected species, can be categorized in ecological restoration areas. The intersection between ecological corridors and high-resistance areas should be identified as a key point for ecological restoration. Taking the Wulingyuan Scenic and Historic Interest Area (WSA) as an empirical case, the study formulates the landscape security pattern of Macaca mulatta, in which the core area of the reserve is comprised of four discrete source Macaca mulatta habitats and is supplemented by three source candidates. A few ecological corridors and connections between sources that aimed to improve connectivity of the inter-population were delimited, and strategic points of ecological restoration are discerned. This study not only identifies buffer zones and ecological corridors in landscape security patterns but also attaches great practical significance to biological conservation exemplified by the Macaca mulatta population in WSA.

Key words: landscape security pattern, algorithm, Wulingyuan Scenic and Historic Interest Area, Macaca mulatta