Study on the Design of Trusted Secure Cloud System Structure

2013 ◽  
Vol 416-417 ◽  
pp. 1444-1449
Author(s):  
Xue Li Wang

The ordinary cloud system is confronted with various threats in trust and security perspective, which have influenced the extensive use of cloud system. Aiming at the defects in the trusted secure design of the ordinary cloud system frame, a trusted secure cloud system has been designed.

2014 ◽  
Vol 610 ◽  
pp. 699-702
Author(s):  
Hong Wang ◽  
Ming Yan Wang

In this paper, the current problems and demands of campus information system was analyzed and the desktop virtualization solutions were probed. Thus, under the cloud system structure, the user can simply login by the client in desktop systems of data center, as well as traditional computer operating. As a result, the flexibility and security in application of resources are enhanced. More over, schools can avoid the repeated investment and reduce the pressure on hardware and software maintenance, and improve the working efficiency.


2020 ◽  
Vol 64 (1-4) ◽  
pp. 1495-1504
Author(s):  
Fangchao Xu ◽  
Yongquan Guo ◽  
Ran Zhou ◽  
Junjie Jin ◽  
Chuan Zhao ◽  
...  

To solve the problem of reduction of suspension force of permanent magnet system with variable magnetic flux path control, according to the structure of the system, suspension principle of the permanent magnet system with variable magnetic flux path control and the generation principle of the load torque, the influence of the mechanical structure of the system on the suspension force is analyzed by changing part of parameters of the system structure. The results show that the existence of magnetic isolation plate is the main reason for the decrease of suspension force, the permanent magnet ring can be thickened to 11.91 mm, the annular gap can be reduced to 1 mm, thickness of the “F” shaped magnetizer can be increased to 9 mm to increase the suspension force.


Author(s):  
Chaimae Saadi ◽  
Habiba Chaoui
Keyword(s):  

Author(s):  
Sergei Soldatenko ◽  
Sergei Soldatenko ◽  
Genrikh Alekseev ◽  
Genrikh Alekseev ◽  
Alexander Danilov ◽  
...  

Every aspect of human operations faces a wide range of risks, some of which can cause serious consequences. By the start of 21st century, mankind has recognized a new class of risks posed by climate change. It is obvious, that the global climate is changing, and will continue to change, in ways that affect the planning and day to day operations of businesses, government agencies and other organizations and institutions. The manifestations of climate change include but not limited to rising sea levels, increasing temperature, flooding, melting polar sea ice, adverse weather events (e.g. heatwaves, drought, and storms) and a rise in related problems (e.g. health and environmental). Assessing and managing climate risks represent one of the most challenging issues of today and for the future. The purpose of the risk modeling system discussed in this paper is to provide a framework and methodology to quantify risks caused by climate change, to facilitate estimates of the impact of climate change on various spheres of human activities and to compare eventual adaptation and risk mitigation strategies. The system integrates both physical climate system and economic models together with knowledge-based subsystem, which can help support proactive risk management. System structure and its main components are considered. Special attention is paid to climate risk assessment, management and hedging in the Arctic coastal areas.


2018 ◽  
Vol 28 (6) ◽  
pp. 1887-1891
Author(s):  
Todor Kalinov

Management and Command253 are two different words and terms, but military structures use them as synonyms. Military commanders’ authorities are almost equal in meaning to civilian managers’ privileges and power. Comparison between military command and the civilian management system structure, organization, and way of work shows almost full identity and overlapping. The highest in scale and size military systems are national ministries of defense and multinational military alliances and coalitions. Military systems at this level combine military command structures with civilian political leadership and support elements. Therefore, they incorporate both military command and civilian management organizations without any complications, because their nature originated from same source and have similar framework and content. Management of organizations requires communication in order to plan, coordinate, lead, control, and conduct all routine or extraordinary activities. Immediate long-distance communications originated from telegraphy, which was firstly applied in 19th century. Later, long-distance communications included telephony, aerial transmitting, satellite, and last but not least internet data exchange. They allowed immediate exchange of letters, voice and images, bringing to new capabilities of the managers. Their sophisticated technical base brought to new area of the military command and civilian management structures. These area covered technical and operational parts of communications, and created engineer sub-field of science, that has become one of the most popular educations, worldwide. Communications were excluded from the military command and moved to separate field, named Computers and Communications. A historic overview and analysis of the command and management structures and requirements shows their relationships, common origin, and mission. They have significant differences: management and control are based on humanities, natural and social sciences, while communications are mainly based on engineering and technology. These differences do not create enough conditions for defragmentation of communications from the management structures. They exist together in symbiosis and management structures need communications in order to exist and multiply their effectiveness and efficiency. Future defragmentation between military command and communications will bring risks of worse coordination, need for more human resources, and worse end states. These risks are extremely negative for nations and should be avoided by wide appliance of the education and science among nowadays and future leaders, managers, and commanders.


Author(s):  
Olexandr Grebenuk ◽  
Volodymyr Pavlenko

The application of ports and adapters architecture (other names bulbous, layered, hexagonal) in iterative software development is considered in accordance with the requirements that come in chronological order in the practical example. Each iteration is supported by the schema architecture, problems encountered and their solution. The expediency of using the considered architecture in the iterative development of software with time constraints is shown. The system of collecting data on the concentration of carbon dioxide of the environment and air temperature in real time from a distributed network of sensors with a predetermined geolocation for medical institutions was developed. Put sensor information (ID, commissioning date and end date) in the Google Sheets spreadsheet. The data from the sensors should be collected on the server by REST service. The process of PPP in a specific project with significant time constraints is investigated, applying the rules and principles laid down in the architecture of ports and adapters, using the basic metrics to evaluate the complexity of adding new functionality, testing, concurrent development, speed and ease of development; draw conclusions about the conditions when it is appropriate to apply the chosen software design approach, and the ability of such an approach to perceive software requirements changes. The architecture of ports and adapters is useful if the system has many external integrations (mail service, push messages, databases, reporting system, etc.). The one-way communication with adapters guarantees the integrity of the main algorithmic part of the program. A thorough knowledge of the domain allows you to immediately determine the domain layer. Building a system structure that optimally reflects the domain requires the most time, and it will be costly in the future to correct errors made during the process of defining system layers (interfaces and systems). Domain logic testing is fast due to Unit tests, other tests are easy to write due to the small connectivity between layers. This architecture is not a completely new approach, but it takes the best of OOP, SOLID, DDD and determines how to apply these principles in the best way.


Sign in / Sign up

Export Citation Format

Share Document