Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system...Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in cloud environment and to verify which outsourced service leads to the problem. Similarly, the cloud service provider cannot simply trust the data computation applications. At last,the verification data itself may also leak the sensitive information from the cloud service provider and data owner. We propose a new three-level definition of the verification, threat model, corresponding trusted policies based on different roles for outsourced big data system in cloud. We also provide two policy enforcement methods for building trusted data computation environment by measuring both the Map Reduce application and its behaviors based on trusted computing and aspect-oriented programming. To prevent sensitive information leakage from verification process,we provide a privacy-preserved verification method. Finally, we implement the TPTVer, a Trusted third Party based Trusted Verifier as a proof of concept system. Our evaluation and analysis show that TPTVer can provide trusted verification for multi-layered outsourced big data system in the cloud with low overhead.展开更多
In the whole earth, people increased dramatically from generation to generation which had created a large scale of broken environment so that people are facing more various types of garbage. Most of garbages are not u...In the whole earth, people increased dramatically from generation to generation which had created a large scale of broken environment so that people are facing more various types of garbage. Most of garbages are not useful and as a matter of fact, they are used to be neglected. Furthermore, many efforts have been conducted to change it by many types of recycled methods. Here, a simple technique is proposed with and without using fires to transform the useless natural or man-made rubbish things to be a superfiber as well as thin film with multitasking applications in human daily life. Since most of earth environment is covered by oceans, here the authors show how the ocean related garbage such as the crab skins, broken coral reefs and beach stones were changed to be superfiber and a multitasking device prototype.展开更多
This work is to observe the performance of PC based robot manipulator under general purpose (Windows), Soft (Linux) and Hard (RT Linux) Real Time Operating Systems (OS). The same open loop control system is ob...This work is to observe the performance of PC based robot manipulator under general purpose (Windows), Soft (Linux) and Hard (RT Linux) Real Time Operating Systems (OS). The same open loop control system is observed in different operating systems with and without multitasking environment. The Data Acquisition (DAQ, PLC-812PG) card is used as a hardware interface. From the experiment, it could be seen that in the non real time operating system (Windows), the delay of the control system is larger than the Soft Real Time OS (Linux). Further, the authors observed the same control system under Hard Real Time OS (RT-Linux). At this point, the experiment showed that the real time error (jitter) is minimum in RT-Linux OS than the both of the previous OS. It is because the RT-Linux OS kernel can set the priority level and the control system was given the highest priority. The same experiment was observed under multitasking environment and the comparison of delay was similar to the preceding evaluation.展开更多
In the light of the defect of web vulnerability detection system, combined with the characteristics of high efficient and sharing in the cloud environment, a design proposal is presented based on cloud environment, wh...In the light of the defect of web vulnerability detection system, combined with the characteristics of high efficient and sharing in the cloud environment, a design proposal is presented based on cloud environment, which analyses the key technology of gaining the URL, task allocation and scheduling and the design of attack detection. Experiment shows its feasibility and effectiveness in this paper.展开更多
Corporate social responsibility (CSR) is becoming more and more frequently emphasized part of management in the structure of Polish enterprises. These results from the fact that growing awareness of consumers, destr...Corporate social responsibility (CSR) is becoming more and more frequently emphasized part of management in the structure of Polish enterprises. These results from the fact that growing awareness of consumers, destructive impact of industry on the natural environment, economic scandals, unethical behavior among entrepreneurs, bring about redefining the principles of a business activity on the market by entrepreneurs. As a result of the above, such values as honesty, trust, or responsibility take on greater importance. Additionally, more and more often, Polish entrepreneurs pay attention to the influence of the company on the environment, the way the stakeholders are treated, while striving to maximize profit. The present paper looks into the subject of social responsibility from the point of view of Polish enterprises. To verify this objective, there was the analysis of the due literature performed, and also carried out the survey among 174 entrepreneurs running their business activity in the area of Southern Poland. The research tool used in the research was the questionnaire (PAPI and CAWI). In the conducted research, there were factors analyzed referring to knowledge of social responsibility among the people holding both managerial and lower-level positions, in particular opinion, is it important for enterprises to be driven by ethical standards? How to implement CSR in their structures? How to understood concept of CSR? What are the reasons for the implementation of CSR in the strategy of the company? The considerations (both the theoretical and practical ones) confirmed that the Polish enterprises feel the increased need to implement the activities in the field of social responsibility, which, in the present conditions, constitutes an important part of running a business activity.展开更多
基金partially supported by grants from the China 863 High-tech Program (Grant No. 2015AA016002)the Specialized Research Fund for the Doctoral Program of Higher Education (Grant No. 20131103120001)+2 种基金the National Key Research and Development Program of China (Grant No. 2016YFB0800204)the National Science Foundation of China (No. 61502017)the Scientific Research Common Program of Beijing Municipal Commission of Education (KM201710005024)
文摘Cloud computing is very useful for big data owner who doesn't want to manage IT infrastructure and big data technique details. However, it is hard for big data owner to trust multi-layer outsourced big data system in cloud environment and to verify which outsourced service leads to the problem. Similarly, the cloud service provider cannot simply trust the data computation applications. At last,the verification data itself may also leak the sensitive information from the cloud service provider and data owner. We propose a new three-level definition of the verification, threat model, corresponding trusted policies based on different roles for outsourced big data system in cloud. We also provide two policy enforcement methods for building trusted data computation environment by measuring both the Map Reduce application and its behaviors based on trusted computing and aspect-oriented programming. To prevent sensitive information leakage from verification process,we provide a privacy-preserved verification method. Finally, we implement the TPTVer, a Trusted third Party based Trusted Verifier as a proof of concept system. Our evaluation and analysis show that TPTVer can provide trusted verification for multi-layered outsourced big data system in the cloud with low overhead.
文摘In the whole earth, people increased dramatically from generation to generation which had created a large scale of broken environment so that people are facing more various types of garbage. Most of garbages are not useful and as a matter of fact, they are used to be neglected. Furthermore, many efforts have been conducted to change it by many types of recycled methods. Here, a simple technique is proposed with and without using fires to transform the useless natural or man-made rubbish things to be a superfiber as well as thin film with multitasking applications in human daily life. Since most of earth environment is covered by oceans, here the authors show how the ocean related garbage such as the crab skins, broken coral reefs and beach stones were changed to be superfiber and a multitasking device prototype.
文摘This work is to observe the performance of PC based robot manipulator under general purpose (Windows), Soft (Linux) and Hard (RT Linux) Real Time Operating Systems (OS). The same open loop control system is observed in different operating systems with and without multitasking environment. The Data Acquisition (DAQ, PLC-812PG) card is used as a hardware interface. From the experiment, it could be seen that in the non real time operating system (Windows), the delay of the control system is larger than the Soft Real Time OS (Linux). Further, the authors observed the same control system under Hard Real Time OS (RT-Linux). At this point, the experiment showed that the real time error (jitter) is minimum in RT-Linux OS than the both of the previous OS. It is because the RT-Linux OS kernel can set the priority level and the control system was given the highest priority. The same experiment was observed under multitasking environment and the comparison of delay was similar to the preceding evaluation.
文摘In the light of the defect of web vulnerability detection system, combined with the characteristics of high efficient and sharing in the cloud environment, a design proposal is presented based on cloud environment, which analyses the key technology of gaining the URL, task allocation and scheduling and the design of attack detection. Experiment shows its feasibility and effectiveness in this paper.
文摘Corporate social responsibility (CSR) is becoming more and more frequently emphasized part of management in the structure of Polish enterprises. These results from the fact that growing awareness of consumers, destructive impact of industry on the natural environment, economic scandals, unethical behavior among entrepreneurs, bring about redefining the principles of a business activity on the market by entrepreneurs. As a result of the above, such values as honesty, trust, or responsibility take on greater importance. Additionally, more and more often, Polish entrepreneurs pay attention to the influence of the company on the environment, the way the stakeholders are treated, while striving to maximize profit. The present paper looks into the subject of social responsibility from the point of view of Polish enterprises. To verify this objective, there was the analysis of the due literature performed, and also carried out the survey among 174 entrepreneurs running their business activity in the area of Southern Poland. The research tool used in the research was the questionnaire (PAPI and CAWI). In the conducted research, there were factors analyzed referring to knowledge of social responsibility among the people holding both managerial and lower-level positions, in particular opinion, is it important for enterprises to be driven by ethical standards? How to implement CSR in their structures? How to understood concept of CSR? What are the reasons for the implementation of CSR in the strategy of the company? The considerations (both the theoretical and practical ones) confirmed that the Polish enterprises feel the increased need to implement the activities in the field of social responsibility, which, in the present conditions, constitutes an important part of running a business activity.