Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by w...Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by which a trusted computer assures a remote computer whose platform is not tampered with. There are two protocols that implement attestation without disclosing the platform's real identity, which are Privacy CA-based protocol and direct anonymous attestation (DAA) protocol. However, in the first protocol the privacy CA is the bottleneck and the platform's identity will be disclosed if the privacy CA is compromise, while DAA protocol can do profiling when dealing with rogue hardware device. In this paper, we propose a DAA-extended new approach to ensure full anonymous attestation that can not only detect a rogue TPM, but also reveal rogue TPM's real identity.展开更多
Trusted Computing technology is quickly developing in recent years. This technology manages to improve the computer security and archive a trusted computing environment. The core of trusted computing technology is cry...Trusted Computing technology is quickly developing in recent years. This technology manages to improve the computer security and archive a trusted computing environment. The core of trusted computing technology is cryptology. In this paper, we analyze the key and credential mechanism which is two basic aspects in the cryptology application of trusted computing. We give an example application to illustrate that the TPM enabled key and credential mechanism can improve the security of computer system.展开更多
Lack of efficiency in the initial key generation process is a serious shortcoming of Merkle tree signature scheme with a large number of possible signatures. Based on two kinds of Merkle trees, a new tree type signatu...Lack of efficiency in the initial key generation process is a serious shortcoming of Merkle tree signature scheme with a large number of possible signatures. Based on two kinds of Merkle trees, a new tree type signature scheme is constructed, and it is provably existentially unforgeable under adaptive chosen message attack. By decentralizing the initial key generation process of the original scheme within the signature process, a large Merkle tree with 6.87×10^10 possible signatures can be initialized in 590 milliseconds. Storing some small Merkle trees in hard disk and memory can speed up Merkle tree signature scheme. Mekle tree signature schemes are fit for trusted computing platform in most scenarios.展开更多
Objective:To dig deeper into the traditional Chinese medicine treatment rules of chemotherapy-induced diarrhea with traditional Chinese medicine(TCM)inheritance computing platform system.Methods:Taking“traditional Ch...Objective:To dig deeper into the traditional Chinese medicine treatment rules of chemotherapy-induced diarrhea with traditional Chinese medicine(TCM)inheritance computing platform system.Methods:Taking“traditional Chinese medicine”,“chemotherapy”and“diarrhea”as the theme words,comprehensive search of the database of CNKI,Wanfang and VIP from its inception to November 2020 was conduct-ed.The formulas of external treatment of traditional Chinese medicine for chemotherapy-induced diarrhea were included and the association rule,clustering and factor analysis were carried out.Results:A total of 145 papers,57 prescriptions meeting the inclusion criteria were collected,among which high-frequency drugs including Baizhu(Atractylodis macrocephalae rhizoma),Fuling(Poria),Dangshen(Codonopsisradix),Huanglian(Coptidis rhizoma),Zhigancao(Glycyrrhizae radix et rhizoma praeparata cum melle)were the most commonly used.The confidence level was set as 0.7 and the support level was set as 10,12 core compatibility groups were obtained,and 6 categories were cluster analyzed.Conclusion:The principle of external treatment of chemotherapy-induced diarrhea is mainly“restore deficiency and benefiting qi”,“benefiting water infiltration and dampness”,“clearing heat”and“inducing astringency”.Prescription combination and new prescription combination based on traditional Chinese medicine(TCM)inheritance computing platform system can be used as reference for clinicians and applied in primary hospitals.展开更多
Economic Management Professional Academic Education are increasingly becoming personalization,intelligence and application.Colleges and universities should actively use cloud computing and big data.Also Internet of Th...Economic Management Professional Academic Education are increasingly becoming personalization,intelligence and application.Colleges and universities should actively use cloud computing and big data.Also Internet of Things and other advanced information technologies to build an economics and management ERP virtual simulation experiment teaching platform.Cloud computing and big data,virtual simulation experiment teaching resources with"resource library+project library+enterprise management simulation sandbox training"as the core can build an online and offline collaborative and practical experiment teaching platform.It is expected to achieve the ideal effect of integration of three spaces.Such as physics and resources and social digital teaching.Moreover,it can also benefit human-computer collaboration and interactive teaching and inquiry learning.展开更多
Current delegation mechanism of grid security infrastructure (GSI) can't satisfy the requirement of dynamic, distributed and practical security in grid virtual organization. To improve this situation, a TC-enabled ...Current delegation mechanism of grid security infrastructure (GSI) can't satisfy the requirement of dynamic, distributed and practical security in grid virtual organization. To improve this situation, a TC-enabled GSI is discussed in this paper. With TC-enabled GSI, a practical delegation solution is proposed in this paper through enforcing fine granularity policy over distributed platforms with the emerging trusted computing technologies. Here trusted platform module is treated as a tamper-resistance module to improve grid security infrastructure. With the implement of Project Daonity, it is demonstrated that the solution could gain dynamic and distributed security in grid environment.展开更多
In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relation...In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relationship among these objects in a trusted system according to trusted computing specifications. Inference rules of trusted relation are given too. With the semantics proposed, some trusted computing models are formalized and verified, which shows that Predicate calculus logic provides a general and effective method for modeling and reasoning trusted computing systems.展开更多
In this paper, we propose a trusted mobile payment environment (TMPE) based on trusted computing and virtualization technology. There are a normal operating system (OS) and a trusted OS (TOS) in TMPE. We store t...In this paper, we propose a trusted mobile payment environment (TMPE) based on trusted computing and virtualization technology. There are a normal operating system (OS) and a trusted OS (TOS) in TMPE. We store the image of TOS in a memory card to hinder tampering. The integrity of TOS is protected by means of a trusted platform module (TPM). TOS can only be updated through a trusted third party. In addition, virtualization technology is applied to isolate TOS from normal OS. Users complete ordinary affairs in normal OS and security-sensitive affairs in TOS. TMPE can offer users a highly protected environment for mobile payment. Moreover, TMPE has good compatibility in different hardware architectures of mobile platforms. As the evaluation shows, TMPE satisfies the requirement of mobile payment well.展开更多
Discrete element method can effectively simulate the discontinuity,inhomogeneity and large deformation and failure of rock and soil.Based on the innovative matrix computing of the discrete element method,the highperfo...Discrete element method can effectively simulate the discontinuity,inhomogeneity and large deformation and failure of rock and soil.Based on the innovative matrix computing of the discrete element method,the highperformance discrete element software MatDEM may handle millions of elements in one computer,and enables the discrete element simulation at the engineering scale.It supports heat calculation,multi-field and fluidsolid coupling numerical simulations.Furthermore,the software integrates pre-processing,solver,postprocessing,and powerful secondary development,allowing recompiling new discrete element software.The basic principles of the DEM,the implement and development of the MatDEM software,and its applications are introduced in this paper.The software and sample source code are available online(http://matdem.com).展开更多
A user-programmable computational/control platform was developed at the University of Toronto that offers real-time hybrid simulation (RTHS) capabilities. The platform was verified previously using several linear ph...A user-programmable computational/control platform was developed at the University of Toronto that offers real-time hybrid simulation (RTHS) capabilities. The platform was verified previously using several linear physical substructures. The study presented in this paper is focused on further validating the RTHS platform using a nonlinear viscoelastic-plastic damper that has displacement, frequency and temperature-dependent properties. The validation study includes damper component characterization tests, as well as RTHS of a series of single-degree-of-freedom (SDOF) systems equipped with viscoelastic-plastic dampers that represent different structural designs. From the component characterization tests, it was found that for a wide range of excitation frequencies and friction slip loads, the tracking errors are comparable to the errors in RTHS of linear spring systems. The hybrid SDOF results are compared to an independently validated thermal- mechanical viscoelastic model to further validate the ability for the platform to test nonlinear systems. After the validation, as an application study, nonlinear SDOF hybrid tests were used to develop performance spectra to predict the response of structures equipped with damping systems that are more challenging to model analytically. The use of the experimental performance spectra is illustrated by comparing the predicted response to the hybrid test response of 2DOF systems equipped with viscoelastic-plastic dampers.展开更多
- In this paper, an engineering method is employed to calculate the horizontal and vertical wave forces on the mat of the submersible platform under Froude-Krylov hypothesis. According to some model tests, appropriate...- In this paper, an engineering method is employed to calculate the horizontal and vertical wave forces on the mat of the submersible platform under Froude-Krylov hypothesis. According to some model tests, appropriate diffraction coefficients are selected. And the results of the formulae given in the paper agree satisfactorily with those experimental data now available. The proposed computational method is effective and convenient to use in evaluating the horizontal and vertical wave forces on the mat. An exmaple is also given in this paper. Finally, the effects of the vertical wave force on the platorm's sit-on-bottom stability are analyzed.展开更多
Cloud computing is one of the main issues of interest to the scientific community of the spatial data. A cloud is referred to computing infrastructure for a representation of network. From the perspective of providers...Cloud computing is one of the main issues of interest to the scientific community of the spatial data. A cloud is referred to computing infrastructure for a representation of network. From the perspective of providers, the main characteristics of cloud computing is being dynamic, high power in computing and storage. Also cloud computing is a cost benefit and effective way for representation of web-based spatial data and complex analysis. Furthermore, cloud computing is a way to facilitate distributed computing and store different data. One of the main features of cloud computing is ability in powerful computing and dynamic storage with an affordable expense and secure web. In this paper we further investigate the methodologies, services, issues and deployed techniques also, about situation of cloud computing in the past, present and future is probed and some issues concerning the security is expressed. Undoubtedly cloud computing is vital for spatial data infrastructure and consequently the cloud computing is able to expand the interactions for spatial data infrastructure in the future.展开更多
Model driven architecture(MDA) is an evolutionary step in software development.Model transformation forms a key part of MDA.The transformation from computation independent model(CIM) to platform independent model(PIM)...Model driven architecture(MDA) is an evolutionary step in software development.Model transformation forms a key part of MDA.The transformation from computation independent model(CIM) to platform independent model(PIM) is the first step of the transformation.This paper proposes an approach for this transformation with pattern.In this approach, we take advantage of"reuse"from various standpoints.Feature model is used to describe the requirement of the application.This can help us bring"reuse"into effect at requirement level.Moreover we use pattern to transform CIM to PIM.This can help us bring"reuse"into effect at development level.Meanwhile, pattern was divided into four hierarchies.Different hierarchies of pattern are used to help us utilize reuse at different phase of development.From another standpoint, feature model describes the problem of a domain while pattern describe the problem across domains.This can help us reuse the element in and across domains.Finally, the detailed process of the transformation is given.展开更多
In this paper a simplified computation method of natural frequency of jacket platforms is given. Shear, bending and rotary inertia effects are considered in the equation, while the jacket shape, rotary inertia and cen...In this paper a simplified computation method of natural frequency of jacket platforms is given. Shear, bending and rotary inertia effects are considered in the equation, while the jacket shape, rotary inertia and centralized mass of the platform top are all determined by using a coefficient-revising method.展开更多
Virtualization and distributed parallel architecture are typical cloud computing technologies. In the area of virtuatization technology, this article discusses physical resource pooling, resource pool management and u...Virtualization and distributed parallel architecture are typical cloud computing technologies. In the area of virtuatization technology, this article discusses physical resource pooling, resource pool management and use, cluster fault location and maintenance, resource pool grouping, and construction and application of heterogeneous virtualization platforms. In the area of distributed technology, distributed file system and KeyNalue storage engine are discussed. A solution is proposed for the host bottleneck problem, and a standard storage interface is proposed for the distributed file system. A directory-based storage scheme for Key/Value storage engine is also proposed.展开更多
This survey paper provides a general overview on Cloud Computing. The topics that are discussed include characteristics, deployment and service models as well drawbacks. Major aspects of Cloud Computing are explained ...This survey paper provides a general overview on Cloud Computing. The topics that are discussed include characteristics, deployment and service models as well drawbacks. Major aspects of Cloud Computing are explained to give the reader a clearer understanding on the complexity of the platform. Following this, several security issues and countermeasures are also discussed to show the major issues and obstacles that Cloud Computing faces as it is being implemented further. The major part of countermeasures focuses on Intrusion Detection Systems. Moving towards Mobile Cloud Computing and Internet of Things, this survey paper gives a general explanation on the applications and potential that comes with the integration of Cloud Computing with any device that has Internet connectivity as well as the challenges that are before it.展开更多
This paper analyzes the characteristics of cloud computing and IOT (internet of things), introduce a logistics operation based on cloud computing and IOT, which establish a logistics information interchange, data exch...This paper analyzes the characteristics of cloud computing and IOT (internet of things), introduce a logistics operation based on cloud computing and IOT, which establish a logistics information interchange, data exchange to meet the business requirements of the various types of logistics public information platform.展开更多
基金Supported by the National High Technology Research and Development Program of China (2005AA145110)
文摘Trusted computing (TC) technology is brought out by trusted computing group (TCG) to make computing as safe and reliable as people expect. Attestation is one main function specified by TCG, which is the means by which a trusted computer assures a remote computer whose platform is not tampered with. There are two protocols that implement attestation without disclosing the platform's real identity, which are Privacy CA-based protocol and direct anonymous attestation (DAA) protocol. However, in the first protocol the privacy CA is the bottleneck and the platform's identity will be disclosed if the privacy CA is compromise, while DAA protocol can do profiling when dealing with rogue hardware device. In this paper, we propose a DAA-extended new approach to ensure full anonymous attestation that can not only detect a rogue TPM, but also reveal rogue TPM's real identity.
基金Supported by the National Natural Science Foun-dation of China (60373087 ,60473023 ,90104005) HP Laborato-ry of China
文摘Trusted Computing technology is quickly developing in recent years. This technology manages to improve the computer security and archive a trusted computing environment. The core of trusted computing technology is cryptology. In this paper, we analyze the key and credential mechanism which is two basic aspects in the cryptology application of trusted computing. We give an example application to illustrate that the TPM enabled key and credential mechanism can improve the security of computer system.
基金Supported by the National Natural Science Foun-dation of China (60403027)
文摘Lack of efficiency in the initial key generation process is a serious shortcoming of Merkle tree signature scheme with a large number of possible signatures. Based on two kinds of Merkle trees, a new tree type signature scheme is constructed, and it is provably existentially unforgeable under adaptive chosen message attack. By decentralizing the initial key generation process of the original scheme within the signature process, a large Merkle tree with 6.87×10^10 possible signatures can be initialized in 590 milliseconds. Storing some small Merkle trees in hard disk and memory can speed up Merkle tree signature scheme. Mekle tree signature schemes are fit for trusted computing platform in most scenarios.
基金National Natural Science Foundation of China Youth Science Foundation Project(No.81904001)Capital Health Development Scientific Research Project(No.first issue 2018-1-4061)+1 种基金State Administration of Traditional Chinese Medicine Clinical Collaboration Project of TCM and Western Medicine for Major and Intractable Diseases(No.2019-ZX-005)In-Hospital Project of China-Japan Friendship Hospital(No.2019-1-QN-56)。
文摘Objective:To dig deeper into the traditional Chinese medicine treatment rules of chemotherapy-induced diarrhea with traditional Chinese medicine(TCM)inheritance computing platform system.Methods:Taking“traditional Chinese medicine”,“chemotherapy”and“diarrhea”as the theme words,comprehensive search of the database of CNKI,Wanfang and VIP from its inception to November 2020 was conduct-ed.The formulas of external treatment of traditional Chinese medicine for chemotherapy-induced diarrhea were included and the association rule,clustering and factor analysis were carried out.Results:A total of 145 papers,57 prescriptions meeting the inclusion criteria were collected,among which high-frequency drugs including Baizhu(Atractylodis macrocephalae rhizoma),Fuling(Poria),Dangshen(Codonopsisradix),Huanglian(Coptidis rhizoma),Zhigancao(Glycyrrhizae radix et rhizoma praeparata cum melle)were the most commonly used.The confidence level was set as 0.7 and the support level was set as 10,12 core compatibility groups were obtained,and 6 categories were cluster analyzed.Conclusion:The principle of external treatment of chemotherapy-induced diarrhea is mainly“restore deficiency and benefiting qi”,“benefiting water infiltration and dampness”,“clearing heat”and“inducing astringency”.Prescription combination and new prescription combination based on traditional Chinese medicine(TCM)inheritance computing platform system can be used as reference for clinicians and applied in primary hospitals.
基金the 2020 University Innovation and Entrepreneurship Project of Guangdong University of Foreign Studies.
文摘Economic Management Professional Academic Education are increasingly becoming personalization,intelligence and application.Colleges and universities should actively use cloud computing and big data.Also Internet of Things and other advanced information technologies to build an economics and management ERP virtual simulation experiment teaching platform.Cloud computing and big data,virtual simulation experiment teaching resources with"resource library+project library+enterprise management simulation sandbox training"as the core can build an online and offline collaborative and practical experiment teaching platform.It is expected to achieve the ideal effect of integration of three spaces.Such as physics and resources and social digital teaching.Moreover,it can also benefit human-computer collaboration and interactive teaching and inquiry learning.
基金Supported by the National Natural Science Foun-dation of China (60373087 ,60473023 and 90104005)HP Labo-ratories of China
文摘Current delegation mechanism of grid security infrastructure (GSI) can't satisfy the requirement of dynamic, distributed and practical security in grid virtual organization. To improve this situation, a TC-enabled GSI is discussed in this paper. With TC-enabled GSI, a practical delegation solution is proposed in this paper through enforcing fine granularity policy over distributed platforms with the emerging trusted computing technologies. Here trusted platform module is treated as a tamper-resistance module to improve grid security infrastructure. With the implement of Project Daonity, it is demonstrated that the solution could gain dynamic and distributed security in grid environment.
基金Supported by the National High-Technology Re-search and Development Program ( 863 Program)China(2004AA113020)
文摘In this paper, a formal approach based on predicate logic is proposed for representing and reasoning of trusted computing models. Predicates are defined to represent the characteristics of the objects and the relationship among these objects in a trusted system according to trusted computing specifications. Inference rules of trusted relation are given too. With the semantics proposed, some trusted computing models are formalized and verified, which shows that Predicate calculus logic provides a general and effective method for modeling and reasoning trusted computing systems.
基金Supported by the National Basic Research Program of China(973 Program)(2014CB340600)the National Natural Science Foundation of China(61173138,61103628,61103220)the Intel Collaborative Research Project
文摘In this paper, we propose a trusted mobile payment environment (TMPE) based on trusted computing and virtualization technology. There are a normal operating system (OS) and a trusted OS (TOS) in TMPE. We store the image of TOS in a memory card to hinder tampering. The integrity of TOS is protected by means of a trusted platform module (TPM). TOS can only be updated through a trusted third party. In addition, virtualization technology is applied to isolate TOS from normal OS. Users complete ordinary affairs in normal OS and security-sensitive affairs in TOS. TMPE can offer users a highly protected environment for mobile payment. Moreover, TMPE has good compatibility in different hardware architectures of mobile platforms. As the evaluation shows, TMPE satisfies the requirement of mobile payment well.
基金Financial supports from the Natural Science Foundation of China(41761134089,41977218)Six Talent Peaks Project of Jiangsu Province(RJFW-003)the Fundamental Research Funds for the Central Universities(14380103)are gratefully acknowledged.
文摘Discrete element method can effectively simulate the discontinuity,inhomogeneity and large deformation and failure of rock and soil.Based on the innovative matrix computing of the discrete element method,the highperformance discrete element software MatDEM may handle millions of elements in one computer,and enables the discrete element simulation at the engineering scale.It supports heat calculation,multi-field and fluidsolid coupling numerical simulations.Furthermore,the software integrates pre-processing,solver,postprocessing,and powerful secondary development,allowing recompiling new discrete element software.The basic principles of the DEM,the implement and development of the MatDEM software,and its applications are introduced in this paper.The software and sample source code are available online(http://matdem.com).
基金NSERC Discovery under Grant 371627-2009 and NSERC RTI under Grant 374707-2009 EQPEQ programs
文摘A user-programmable computational/control platform was developed at the University of Toronto that offers real-time hybrid simulation (RTHS) capabilities. The platform was verified previously using several linear physical substructures. The study presented in this paper is focused on further validating the RTHS platform using a nonlinear viscoelastic-plastic damper that has displacement, frequency and temperature-dependent properties. The validation study includes damper component characterization tests, as well as RTHS of a series of single-degree-of-freedom (SDOF) systems equipped with viscoelastic-plastic dampers that represent different structural designs. From the component characterization tests, it was found that for a wide range of excitation frequencies and friction slip loads, the tracking errors are comparable to the errors in RTHS of linear spring systems. The hybrid SDOF results are compared to an independently validated thermal- mechanical viscoelastic model to further validate the ability for the platform to test nonlinear systems. After the validation, as an application study, nonlinear SDOF hybrid tests were used to develop performance spectra to predict the response of structures equipped with damping systems that are more challenging to model analytically. The use of the experimental performance spectra is illustrated by comparing the predicted response to the hybrid test response of 2DOF systems equipped with viscoelastic-plastic dampers.
文摘- In this paper, an engineering method is employed to calculate the horizontal and vertical wave forces on the mat of the submersible platform under Froude-Krylov hypothesis. According to some model tests, appropriate diffraction coefficients are selected. And the results of the formulae given in the paper agree satisfactorily with those experimental data now available. The proposed computational method is effective and convenient to use in evaluating the horizontal and vertical wave forces on the mat. An exmaple is also given in this paper. Finally, the effects of the vertical wave force on the platorm's sit-on-bottom stability are analyzed.
文摘Cloud computing is one of the main issues of interest to the scientific community of the spatial data. A cloud is referred to computing infrastructure for a representation of network. From the perspective of providers, the main characteristics of cloud computing is being dynamic, high power in computing and storage. Also cloud computing is a cost benefit and effective way for representation of web-based spatial data and complex analysis. Furthermore, cloud computing is a way to facilitate distributed computing and store different data. One of the main features of cloud computing is ability in powerful computing and dynamic storage with an affordable expense and secure web. In this paper we further investigate the methodologies, services, issues and deployed techniques also, about situation of cloud computing in the past, present and future is probed and some issues concerning the security is expressed. Undoubtedly cloud computing is vital for spatial data infrastructure and consequently the cloud computing is able to expand the interactions for spatial data infrastructure in the future.
基金supported by the National Natural Science Foundation of China (Grant No.601730301)the National BasicResearch Program of China (973 Program) (Grant No.2002CB312001)
文摘Model driven architecture(MDA) is an evolutionary step in software development.Model transformation forms a key part of MDA.The transformation from computation independent model(CIM) to platform independent model(PIM) is the first step of the transformation.This paper proposes an approach for this transformation with pattern.In this approach, we take advantage of"reuse"from various standpoints.Feature model is used to describe the requirement of the application.This can help us bring"reuse"into effect at requirement level.Moreover we use pattern to transform CIM to PIM.This can help us bring"reuse"into effect at development level.Meanwhile, pattern was divided into four hierarchies.Different hierarchies of pattern are used to help us utilize reuse at different phase of development.From another standpoint, feature model describes the problem of a domain while pattern describe the problem across domains.This can help us reuse the element in and across domains.Finally, the detailed process of the transformation is given.
基金The project is supported by the National Natural Science Foundation of China
文摘In this paper a simplified computation method of natural frequency of jacket platforms is given. Shear, bending and rotary inertia effects are considered in the equation, while the jacket shape, rotary inertia and centralized mass of the platform top are all determined by using a coefficient-revising method.
文摘Virtualization and distributed parallel architecture are typical cloud computing technologies. In the area of virtuatization technology, this article discusses physical resource pooling, resource pool management and use, cluster fault location and maintenance, resource pool grouping, and construction and application of heterogeneous virtualization platforms. In the area of distributed technology, distributed file system and KeyNalue storage engine are discussed. A solution is proposed for the host bottleneck problem, and a standard storage interface is proposed for the distributed file system. A directory-based storage scheme for Key/Value storage engine is also proposed.
文摘This survey paper provides a general overview on Cloud Computing. The topics that are discussed include characteristics, deployment and service models as well drawbacks. Major aspects of Cloud Computing are explained to give the reader a clearer understanding on the complexity of the platform. Following this, several security issues and countermeasures are also discussed to show the major issues and obstacles that Cloud Computing faces as it is being implemented further. The major part of countermeasures focuses on Intrusion Detection Systems. Moving towards Mobile Cloud Computing and Internet of Things, this survey paper gives a general explanation on the applications and potential that comes with the integration of Cloud Computing with any device that has Internet connectivity as well as the challenges that are before it.
文摘This paper analyzes the characteristics of cloud computing and IOT (internet of things), introduce a logistics operation based on cloud computing and IOT, which establish a logistics information interchange, data exchange to meet the business requirements of the various types of logistics public information platform.