The global financial crisis is spreading at an alarming rate across the world. The speed of the spreading and its tremendous impacts to economic is unprecedented in half a century. Through researching its impacts to f...The global financial crisis is spreading at an alarming rate across the world. The speed of the spreading and its tremendous impacts to economic is unprecedented in half a century. Through researching its impacts to finance, the authors can clearly find that to a large extent most enterprises went bankrupt and closed down because of the weak financial governance system and lack of effective control to internal financial operation Based on this background, the authors analyzed the problems of the traditional financial governance, and tried to find solutions. Applying the concept of COSO (The Committee of Sponsoring Organizations of The National Commission of Fraudulent Financial Reporting) framework into the financial governance system, the authors can reconstruct the embedded financial governance system based on COSO framework, and better control the company's financial activities. In this way, the enterprise can effectively improve its management level and operational efficiency, and promote its sound and sustainable development.展开更多
With the development of digital information technologies,robust watermarking framework is taken into real consideration as a challenging issue in the area of image processing,due to the large applicabilities and its u...With the development of digital information technologies,robust watermarking framework is taken into real consideration as a challenging issue in the area of image processing,due to the large applicabilities and its utilities in a number of academic and real environments.There are a wide range of solutions to provide image watermarking frameworks,while each one of them is attempted to address an efficient and applicable idea.In reality,the traditional techniques do not have sufficient merit to realize an accurate application.Due to the fact that the main idea behind the approach is organized based on contourlet representation,the only state-of-the-art materials that are investigated along with an integration of the aforementioned contourlet representation in line with watermarking framework are concentrated to be able to propose the novel and skilled technique.In a word,the main process of the proposed robust watermarking framework is organized to deal with both new embedding and de-embedding processes in the area of contourlet transform to generate watermarked image and the corresponding extracted logo image with high accuracy.In fact,the motivation of the approach is that the suggested complexity can be of novelty,which consists of the contourlet representation,the embedding and the corresponding de-embedding modules and the performance monitoring including an analysis of the watermarked image as well as the extracted logo image.There is also a scrambling module that is working in association with levels-directions decomposition in contourlet embedding mechanism,while a decision maker system is designed to deal with the appropriate number of sub-bands to be embedded in the presence of a series of simulated attacks.The required performance is tangibly considered through an integration of the peak signal-to-noise ratio and the structural similarity indices that are related to watermarked image.And the bit error rate and the normal correlation are considered that are related to the extracted logo analysis,as well.Subsequently,the outcomes are fully analyzed to be competitive with respect to the potential techniques in the image colour models including hue or tint in terms of their shade,saturation or amount of gray and their brightness via value or luminance and also hue,saturation and intensity representations,as long as the performance of the whole of channels are concentrated to be presented.The performance monitoring outcomes indicate that the proposed framework is of significance to be verified.展开更多
Cloud computing is a type of emerging computing technology that relies on shared computing resources rather than having local servers or personal devices to handle applications. It is an emerging technology that provi...Cloud computing is a type of emerging computing technology that relies on shared computing resources rather than having local servers or personal devices to handle applications. It is an emerging technology that provides services over the internet: Utilizing the online services of different software. Many works have been carried out and various security frameworks relating to the security issues of cloud computing have been proposed in numerous ways. But they do not propose a quantitative approach to analyze and evaluate privacy and security in cloud computing systems. In this research, we try to introduce top security concerns of cloud computing systems, analyze the threats and propose some countermeasures for them. We use a quantitative security risk assessment model to present a multilayer security framework for the solution of the security threats of cloud computing systems. For evaluating the performance of the proposed security framework we have utilized an Own-Cloud platform using a 64-bit quad-core processor based embedded system. Own-Cloud platform is quite literally as any analytics, machine learning algorithms or signal processing techniques can be implemented using the vast variety of Python libraries built for those purposes. In addition, we have proposed two algorithms, which have been deployed in the Own-Cloud for mitigating the attacks and threats to cloud-like reply attacks, DoS/DDoS, back door attacks, Zombie, etc. Moreover, unbalanced RSA based encryption is used to reduce the risk of authentication and authorization. This framework is able to mitigate the targeted attacks satisfactorily.展开更多
文摘The global financial crisis is spreading at an alarming rate across the world. The speed of the spreading and its tremendous impacts to economic is unprecedented in half a century. Through researching its impacts to finance, the authors can clearly find that to a large extent most enterprises went bankrupt and closed down because of the weak financial governance system and lack of effective control to internal financial operation Based on this background, the authors analyzed the problems of the traditional financial governance, and tried to find solutions. Applying the concept of COSO (The Committee of Sponsoring Organizations of The National Commission of Fraudulent Financial Reporting) framework into the financial governance system, the authors can reconstruct the embedded financial governance system based on COSO framework, and better control the company's financial activities. In this way, the enterprise can effectively improve its management level and operational efficiency, and promote its sound and sustainable development.
文摘With the development of digital information technologies,robust watermarking framework is taken into real consideration as a challenging issue in the area of image processing,due to the large applicabilities and its utilities in a number of academic and real environments.There are a wide range of solutions to provide image watermarking frameworks,while each one of them is attempted to address an efficient and applicable idea.In reality,the traditional techniques do not have sufficient merit to realize an accurate application.Due to the fact that the main idea behind the approach is organized based on contourlet representation,the only state-of-the-art materials that are investigated along with an integration of the aforementioned contourlet representation in line with watermarking framework are concentrated to be able to propose the novel and skilled technique.In a word,the main process of the proposed robust watermarking framework is organized to deal with both new embedding and de-embedding processes in the area of contourlet transform to generate watermarked image and the corresponding extracted logo image with high accuracy.In fact,the motivation of the approach is that the suggested complexity can be of novelty,which consists of the contourlet representation,the embedding and the corresponding de-embedding modules and the performance monitoring including an analysis of the watermarked image as well as the extracted logo image.There is also a scrambling module that is working in association with levels-directions decomposition in contourlet embedding mechanism,while a decision maker system is designed to deal with the appropriate number of sub-bands to be embedded in the presence of a series of simulated attacks.The required performance is tangibly considered through an integration of the peak signal-to-noise ratio and the structural similarity indices that are related to watermarked image.And the bit error rate and the normal correlation are considered that are related to the extracted logo analysis,as well.Subsequently,the outcomes are fully analyzed to be competitive with respect to the potential techniques in the image colour models including hue or tint in terms of their shade,saturation or amount of gray and their brightness via value or luminance and also hue,saturation and intensity representations,as long as the performance of the whole of channels are concentrated to be presented.The performance monitoring outcomes indicate that the proposed framework is of significance to be verified.
文摘Cloud computing is a type of emerging computing technology that relies on shared computing resources rather than having local servers or personal devices to handle applications. It is an emerging technology that provides services over the internet: Utilizing the online services of different software. Many works have been carried out and various security frameworks relating to the security issues of cloud computing have been proposed in numerous ways. But they do not propose a quantitative approach to analyze and evaluate privacy and security in cloud computing systems. In this research, we try to introduce top security concerns of cloud computing systems, analyze the threats and propose some countermeasures for them. We use a quantitative security risk assessment model to present a multilayer security framework for the solution of the security threats of cloud computing systems. For evaluating the performance of the proposed security framework we have utilized an Own-Cloud platform using a 64-bit quad-core processor based embedded system. Own-Cloud platform is quite literally as any analytics, machine learning algorithms or signal processing techniques can be implemented using the vast variety of Python libraries built for those purposes. In addition, we have proposed two algorithms, which have been deployed in the Own-Cloud for mitigating the attacks and threats to cloud-like reply attacks, DoS/DDoS, back door attacks, Zombie, etc. Moreover, unbalanced RSA based encryption is used to reduce the risk of authentication and authorization. This framework is able to mitigate the targeted attacks satisfactorily.