A new concept, the security level difference of a covert channel, is presented, which means the security level span from the sender to the receiver of the covert channel. Based on this, the integrated criteria for cov...A new concept, the security level difference of a covert channel, is presented, which means the security level span from the sender to the receiver of the covert channel. Based on this, the integrated criteria for covert channel auditing are given. Whereas TCSEC (Trusted Computer System Evaluation Criteria) or CC (Common Criteria for Information Technology Security Evaluation) only use the bandwidth to evaluate the threat of covert channels, our new criteria integrate the security level difference, the bandwidth sensitive parameter, bandwidth, duration and instantaneous time of covert channels, so as to give a comprehensive evaluation of the threat of covert channels in a multilevel security system.展开更多
The development of computer information technology makes the information of the audited unit more and more high. The introduction of accounting computerization information system makes the processing of enterprise eco...The development of computer information technology makes the information of the audited unit more and more high. The introduction of accounting computerization information system makes the processing of enterprise economic business more convenient and efficient. Here came the computer controlled environment audit new risks, of course, the computer technology applied to the audit work to improve the audit efficiency by a lot, but also increased the complex information technology environment audit risk. Starting from the concept of computer audit risk, this paper analyzes and discusses the new risks and causes of audit under the computer condition, and puts forward some constructive risk control measures.展开更多
In financial investment planning,a large number of components that interact in varying and complexways are involved.This leads to complex behavior that is difficult to understand,predict and manage.Asingle intelligent...In financial investment planning,a large number of components that interact in varying and complexways are involved.This leads to complex behavior that is difficult to understand,predict and manage.Asingle intelligent technique can not solve the complicated and elaborate investment planning problems.Itis necessary to study those problems synthetically by combining the multiple intelligent techniques.Weemployed fussy algorithms,genetic algorithms,etc.to solve complicated financial portfolio managementin this paper.We analyse and design an agent-based hybrid intelligent system by following the methodolo-gy for constructing agent-based hybrid intelligent system(MAHIS).The system starts with the financialrisk tolerance evaluation based on fussy algorithms.Asset allocation,portfolio selections,interest predic-tions,and ordered weighted averaging can be conducted by using hybrid intelligent techniques.The plan-ning agent in the system can easily access all the intelligent processing agents,including the agents of fi-nancial risk tolerance assessment,asset allocation,portfolio selection,interest prediction,and decisionaggregation.Overall system robustness is facilitated.展开更多
The rapid development of informational accessibility, virtual commutability, and their impacts on cities are becoming parts of the very core of concerns of contemporary urban design theories and methodologies. The lev...The rapid development of informational accessibility, virtual commutability, and their impacts on cities are becoming parts of the very core of concerns of contemporary urban design theories and methodologies. The level of access to the new means of cybermobility is becoming a formative factor for socio-spatial gradients and demographic patterns in urban and suburban settings. While the new hyper drive towards the ubiquitous virtual mobility is becoming the dominant mode of our being, it is exposing disparate consequences to cultural experiences, economic conditions, and socio-spatial networks of communities The paper is devoted to elaborate the transformational role of cybernomadic experiences on social interaction for a resilient design of urban communities. The ultimate goal is to identify the applicability of new technological opportunities to empowering the urban poor and finding out the challenges facing urban design territories. The paper also reflects on Jane Jacobs' urban vision for the future and its specific lens展开更多
The paper describes information technologies (IT) role in organization---especially its influence on organizational structure. Article concerns the importance of analyzing IT acceptance, while describing IT in organ...The paper describes information technologies (IT) role in organization---especially its influence on organizational structure. Article concerns the importance of analyzing IT acceptance, while describing IT in organization and points out that inadequate variable choice may influence validity of IT analysis. First part of the article describes both variables analyzed in presented research--IT dissemination and IT acceptance. It also presents how in theory IT can influence organizational structure. The main part of the article describes empirical studies conducted in order to verify if the influence of IT on the organizational structure exists. First, the main goal and methodology of the empirical studies are presented. Variables used to assess IT and organizational structure in organizations are discussed. Then, there is a description of research results--statistical correlation between analyzed variables and regression models is shown. Conclusion of the article is that IT can influence organizational structure, but the most important factor ensuring this influence is the actual use of IT by employees of the organization--their access to IT is not enough.展开更多
This study proposesan over all framework for applying wireless manufacturing(WM)technologies in a smart factory and establishes a smart factory data computing and information using system (dc-IUS). Several plug-and-pl...This study proposesan over all framework for applying wireless manufacturing(WM)technologies in a smart factory and establishes a smart factory data computing and information using system (dc-IUS). Several plug-and-play (PnP) application modules of the dc-IUS are presented in the fields of machining process and quality control,material flow and inventory control,and factory resource tracking. Different schemes are discussed about how and where to apply these functions. Then some running examples are studied to demonstrate the feasibility and reliability of dc-IUS. At last,the challenges of applying WM are discussed and a conclusion is given.展开更多
基金the National Natural Science Foundation of China (No. 60773049)the Natural Science Foundation of Jiangsu Province (No. BK2007086)+1 种基金the Fundamental Research Project of the Natural Science in Colleges of Jiangsu Province (No. 07KJB520016)the Person with Ability Project of Jiangsu University (No. 07JDG053), China
文摘A new concept, the security level difference of a covert channel, is presented, which means the security level span from the sender to the receiver of the covert channel. Based on this, the integrated criteria for covert channel auditing are given. Whereas TCSEC (Trusted Computer System Evaluation Criteria) or CC (Common Criteria for Information Technology Security Evaluation) only use the bandwidth to evaluate the threat of covert channels, our new criteria integrate the security level difference, the bandwidth sensitive parameter, bandwidth, duration and instantaneous time of covert channels, so as to give a comprehensive evaluation of the threat of covert channels in a multilevel security system.
文摘The development of computer information technology makes the information of the audited unit more and more high. The introduction of accounting computerization information system makes the processing of enterprise economic business more convenient and efficient. Here came the computer controlled environment audit new risks, of course, the computer technology applied to the audit work to improve the audit efficiency by a lot, but also increased the complex information technology environment audit risk. Starting from the concept of computer audit risk, this paper analyzes and discusses the new risks and causes of audit under the computer condition, and puts forward some constructive risk control measures.
基金the Overseas Scholar Research Foundation of Heilongjiang,China(No.LC0609)
文摘In financial investment planning,a large number of components that interact in varying and complexways are involved.This leads to complex behavior that is difficult to understand,predict and manage.Asingle intelligent technique can not solve the complicated and elaborate investment planning problems.Itis necessary to study those problems synthetically by combining the multiple intelligent techniques.Weemployed fussy algorithms,genetic algorithms,etc.to solve complicated financial portfolio managementin this paper.We analyse and design an agent-based hybrid intelligent system by following the methodolo-gy for constructing agent-based hybrid intelligent system(MAHIS).The system starts with the financialrisk tolerance evaluation based on fussy algorithms.Asset allocation,portfolio selections,interest predic-tions,and ordered weighted averaging can be conducted by using hybrid intelligent techniques.The plan-ning agent in the system can easily access all the intelligent processing agents,including the agents of fi-nancial risk tolerance assessment,asset allocation,portfolio selection,interest prediction,and decisionaggregation.Overall system robustness is facilitated.
文摘The rapid development of informational accessibility, virtual commutability, and their impacts on cities are becoming parts of the very core of concerns of contemporary urban design theories and methodologies. The level of access to the new means of cybermobility is becoming a formative factor for socio-spatial gradients and demographic patterns in urban and suburban settings. While the new hyper drive towards the ubiquitous virtual mobility is becoming the dominant mode of our being, it is exposing disparate consequences to cultural experiences, economic conditions, and socio-spatial networks of communities The paper is devoted to elaborate the transformational role of cybernomadic experiences on social interaction for a resilient design of urban communities. The ultimate goal is to identify the applicability of new technological opportunities to empowering the urban poor and finding out the challenges facing urban design territories. The paper also reflects on Jane Jacobs' urban vision for the future and its specific lens
文摘The paper describes information technologies (IT) role in organization---especially its influence on organizational structure. Article concerns the importance of analyzing IT acceptance, while describing IT in organization and points out that inadequate variable choice may influence validity of IT analysis. First part of the article describes both variables analyzed in presented research--IT dissemination and IT acceptance. It also presents how in theory IT can influence organizational structure. The main part of the article describes empirical studies conducted in order to verify if the influence of IT on the organizational structure exists. First, the main goal and methodology of the empirical studies are presented. Variables used to assess IT and organizational structure in organizations are discussed. Then, there is a description of research results--statistical correlation between analyzed variables and regression models is shown. Conclusion of the article is that IT can influence organizational structure, but the most important factor ensuring this influence is the actual use of IT by employees of the organization--their access to IT is not enough.
基金National Natural Science Foundation of China(No.50875204)National Basic Research "973" Project(No.2011CB706805)
文摘This study proposesan over all framework for applying wireless manufacturing(WM)technologies in a smart factory and establishes a smart factory data computing and information using system (dc-IUS). Several plug-and-play (PnP) application modules of the dc-IUS are presented in the fields of machining process and quality control,material flow and inventory control,and factory resource tracking. Different schemes are discussed about how and where to apply these functions. Then some running examples are studied to demonstrate the feasibility and reliability of dc-IUS. At last,the challenges of applying WM are discussed and a conclusion is given.