With the rapid development of lnternet technology, the volume of data has increased exponentially. As the large amounts of data are no longer easy to be managed and secured by the owners, big data security and privacy...With the rapid development of lnternet technology, the volume of data has increased exponentially. As the large amounts of data are no longer easy to be managed and secured by the owners, big data security and privacy has become a hot issue. One of the most popular research fields for solving the data security and data privacy is within the scope of big data governance and security, In this paper, we introduce the basic concepts of data governance and security. Then, all the state-of-the-art open source frameworks for data governance and security, including Apache Falcon, Apache Atlas, Apache Ranger, Apache Sentry and Kerberos, are detailed and discussed with descriptions of their implementation principles and possible applications.展开更多
The subjects of ecological compensation involve the nation, society, development enterprises of wa-ter-energy resources, as well as the location of resource itself. This paper systematically studies on how to make “w...The subjects of ecological compensation involve the nation, society, development enterprises of wa-ter-energy resources, as well as the location of resource itself. This paper systematically studies on how to make “water energy sources market compensation policy”, “the economic compensation policy for relevant interest subjects” and “the ecological compensation policy of basin ecological water.” So, it is necessary to exert the complementary function between market compensation and government compensation by the means of economic compensation and to establish the ecological compensation policy of basin ecological water, which is beneficial to coordinating the stakeholders’ interests of cross-region or inter-basin. And it is important and significant to establish constantly perfected ecological compensation policy among the micro subjects on water energy resources development, so as to coordinate interest relationships among various subjects and finally reach the aim of sustainable use of water energy resources and environmental protection as possible.展开更多
By analyzing disposal status of unexpected environmental incidents by government,public and enterprise,and combining the characteristics of unexpected environmental incidents,specific measures of responding to unexpec...By analyzing disposal status of unexpected environmental incidents by government,public and enterprise,and combining the characteristics of unexpected environmental incidents,specific measures of responding to unexpected environmental incidents are proposed from the aspects of perfecting guarantee system of emergency nomocracy,enhancing information disclosure,encouraging public participation,enhancing the construction of emergency response capability,and enhancing post-event management,to improve the ability of defending environmental risk.展开更多
There are several methods and technologies for comparing the statements, comments, strings, identifiers, and other visible elements of source code in order to efficiently identify similarity. In a prior paper we found...There are several methods and technologies for comparing the statements, comments, strings, identifiers, and other visible elements of source code in order to efficiently identify similarity. In a prior paper we found that comparing the whitespace patterns was not precise enough to identify copying by itself. However, several possible methods for improving the precision of a whitespace pattern comparison were presented, the most promising of which was an examination of the sequences of lines with matching whitespace patterns. This paper demonstrates a method of evaluating the sequences of matching whitespace patterns and a detailed study of the method’s reliability.展开更多
文摘With the rapid development of lnternet technology, the volume of data has increased exponentially. As the large amounts of data are no longer easy to be managed and secured by the owners, big data security and privacy has become a hot issue. One of the most popular research fields for solving the data security and data privacy is within the scope of big data governance and security, In this paper, we introduce the basic concepts of data governance and security. Then, all the state-of-the-art open source frameworks for data governance and security, including Apache Falcon, Apache Atlas, Apache Ranger, Apache Sentry and Kerberos, are detailed and discussed with descriptions of their implementation principles and possible applications.
文摘The subjects of ecological compensation involve the nation, society, development enterprises of wa-ter-energy resources, as well as the location of resource itself. This paper systematically studies on how to make “water energy sources market compensation policy”, “the economic compensation policy for relevant interest subjects” and “the ecological compensation policy of basin ecological water.” So, it is necessary to exert the complementary function between market compensation and government compensation by the means of economic compensation and to establish the ecological compensation policy of basin ecological water, which is beneficial to coordinating the stakeholders’ interests of cross-region or inter-basin. And it is important and significant to establish constantly perfected ecological compensation policy among the micro subjects on water energy resources development, so as to coordinate interest relationships among various subjects and finally reach the aim of sustainable use of water energy resources and environmental protection as possible.
文摘By analyzing disposal status of unexpected environmental incidents by government,public and enterprise,and combining the characteristics of unexpected environmental incidents,specific measures of responding to unexpected environmental incidents are proposed from the aspects of perfecting guarantee system of emergency nomocracy,enhancing information disclosure,encouraging public participation,enhancing the construction of emergency response capability,and enhancing post-event management,to improve the ability of defending environmental risk.
文摘There are several methods and technologies for comparing the statements, comments, strings, identifiers, and other visible elements of source code in order to efficiently identify similarity. In a prior paper we found that comparing the whitespace patterns was not precise enough to identify copying by itself. However, several possible methods for improving the precision of a whitespace pattern comparison were presented, the most promising of which was an examination of the sequences of lines with matching whitespace patterns. This paper demonstrates a method of evaluating the sequences of matching whitespace patterns and a detailed study of the method’s reliability.