Beijing Development Area Co.

Beijing, China

Beijing Development Area Co.

Beijing, China
Time filter
Source Type

Chen B.,Beijing Normal University | He G.,Beijing Normal University | Qi J.,Beijing Normal University | Su M.,Beijing Normal University | And 2 more authors.
The Scientific World Journal | Year: 2013

Global climate change caused by greenhouse gas (GHG) emissions, which severely limits the development of human society and threatens the survival of humanity, has drawn the international community's long-term attention. Gathering the most important production factors in the region, an industrial park usually represents the development level of specific industries in the region. Therefore, the industrial park should be regarded as the base unit for developing a low-carbon economy and reducing GHG emissions. Focusing on a typical high-end industrial park in Beijing, we analyze the carbon sources within the system boundary and probe into the emission structure in view of life-cycle analysis. A GHG inventory is thereby set up to calculate all GHG emissions from the concerned park. Based on the results, suggestions are presented to guide the low-carbon development of the high-end industrial park. © 2013 Bin Chen et al.

Lu Y.,Beijing Normal University | Su M.,Beijing Normal University | Liu G.,Beijing Normal University | Chen B.,Beijing Normal University | And 3 more authors.
The Scientific World Journal | Year: 2012

Industrial sector is one of the indispensable contributors in global warming. Even if the occurrence of ecoindustrial parks (EIPs) seems to be a good improvement in saving ecological crises, there is still a lack of definitional clarity and in-depth researches on low-carbon industrial parks. In order to reveal the processes of carbon metabolism in a low-carbon high-tech industrial park, we selected Beijing Development Area (BDA) International Business Park in Beijing, China as case study, establishing a seven-compartment- model low-carbon metabolic network based on the methodology of Ecological Network Analysis (ENA). Integrating the Network Utility Analysis (NUA), Network Control Analysis (NCA), and system-wide indicators, we compartmentalized system sectors into ecological structure and analyzed dependence and control degree based on carbon metabolism. The results suggest that indirect flows reveal more mutuality and exploitation relation between system compartments and they are prone to positive sides for the stability of the whole system. The ecological structure develops well as an approximate pyramidal structure, and the carbon metabolism of BDA proves self-mutualistic and sustainable. Construction and waste management were found to be two active sectors impacting carbon metabolism, which was mainly regulated by internal and external environment. © 2012 Yi Lu et al.

Yang J.,Beijing Normal University | Chen B.,Beijing Normal University | Qi J.,Beijing Normal University | Zhou S.,Beijing Development Area Co. | Jiang M.,Beijing Development Area Co.
The Scientific World Journal | Year: 2012

Along with increasing concerns on environmental protection and global warming mitigation, new industrial organization modes such as "Ecoindustrial Park" and "Low Carbon Industrial Park" are emerging. Since ecoindustrial parks and low carbon industrial parks may offer multifaceted benefits to the users, it naturally follows that the sustainability assessment of the industrial parks ought to adopt a multicriteria methodology. In this paper, a multicriteria sustainable evaluation framework is proposed in combination with the life cycle analysis and applied to a low carbon and high end industrial park (LCHE) in Beijing, China. Results show that the LCHE industrial park can contribute to both energy-saving and greenhouse gas emission mitigations compared with other industrial parks. In terms of economic performance, although the economic profits are considerable, the investment per constructed area is relatively high. The results of sustainable analysis of the LCHE industrial park can thus shed light on future upgrading of industrial parks. © 2012 Jin Yang et al.

Zhang Y.,Beijing University of Technology | He J.,Beijing University of Technology | He J.,Beijing Development Area Co. | Zhao B.,Beijing University of Technology | And 2 more authors.
Computers and Security | Year: 2015

Access control is a core security technology which has been widely used in computer systems and networks to protect sensitive information and critical resources and to counter malicious attacks. Although many access control models have been developed in the past, such as discretionary access control (DAC), mandatory access control (MAC) and role-based access control (RBAC), these models are designed primarily as a defensive measure in that they are used for examining access requests and making authorization decisions based on established access control policies. As the result, even after a malicious access is identified, the requester can still keep issuing more malicious access requests without much fear of punitive consequences fromthe access control system in subsequent accesses. Such access control may be acceptable in closed systems and networks but is not adequate in open systems and networks where the real identities and other critical information about requesters may not be known to the systems and networks. In this paper, we propose to design pro-active access control so that access control systems can respond to malicious access pro-actively to suit the needs of open systems and networks. We will first apply some established principles in the Game Theory to analyze current access control models to identify the limitations that make them inadequate in open systems and networks. To design pro-active access control (PAC), we incorporate a constraint mechanism that includes feedback and evaluation components and show based on the Game Theory how to make such access control respond to malicious access in a pro-active manner. We also present a framework design of PAC and demonstrate through the implementation of trust-based access control the feasibility of design, implementation and application of pro-active access control. Such kind of models and mechanisms can serve as the foundation for the design of access control systems that will be made more effective in deterring malicious attacks in open systems and networks. © 2014 Elsevier Ltd. All rights reserved. S0167-4048(14)00181-3.

Yang M.,Beijing University of Technology | Yang M.,Hebei University of Science and Technology | He J.,Beijing University of Technology | Liu R.,Beijing Development Area Co.
Sensors and Transducers | Year: 2013

Wireless sensor networks (WSNs) play a very important role in the Internet of Things. But, how to save the energy of the wireless sensor nodes and prolong the lifetime of such networks is an emergent task for the wide adoption of the networks. Considering the characteristics of wireless sensor nodes where energy consumption for transmitting data is much more than that for computation, this paper presents method for precalculating a secure and efficient path before data transmission begins. The basic idea of the proposed method is that the path length based Floyd algorithm and trust degree between neighboring nodes are used as the reference for the selection of the routes. Data is then transmitted along the secure and efficient path in the WSNs. © 2013 by IFSA.

Huang N.,Beijing University of Technology | He J.,Beijing University of Technology | He J.,Beijing Development Area Co. | Zhao B.,Beijing University of Technology
International Journal of Security and its Applications | Year: 2015

To protect the data confidentiality of Android device users, this paper proposed a user-level secure data sanitization method which can make sensitive data stored in flash memory unrecoverable. The proposed method using reversed-scanning algorithm to reduce time and it don't need overwriting or erase the whole flash memory. After sensitive data pages are found, the program targetedly overwriting some blocks, erase them, and insert them into free block list waiting to be located again which means the blocks will be twice overwrited by new data. © 2015 SERSC.

Li W.,Beijing Development Area Co.
Procedia Environmental Sciences | Year: 2011

Low carbon architecture designed according to sustainable principles is becoming an important part of the journey towards achieving sustainable development of economy, society, natural environment and architecture itself simultaneously. The definition, principles and factors considered in design have been investigated in details in this paper. A Three Rings Models of sustainability proposed by author is useful for understanding mechanism of sustainable design. © 2011 Published by Elsevier Ltd.

He J.,Beijing University of Technology | He J.,Beijing Development Area Co. | Du J.,Beijing University of Technology | Zhang Y.,Beijing University of Technology | Zhou S.,Beijing Development Area Co.
PIC 2014 - Proceedings of 2014 IEEE International Conference on Progress in Informatics and Computing | Year: 2014

The current Web manifests the problem of information overload due to the success of the Web 2.0 paradigm in which users can provide new contents quickly. To help users find the most valuable information, a recommendation system is designed in which we use Euclidean formula to calculate the distance and Cosine formula to calculate the angle to distinguish between different kinds of users. Thus, similar users will receive related items. In the beginning, we will face some problems such as the cold start due to a small amount of data. We will advance some theories to solve the problem. With the proposed method, we can improve the quality of recommendation so that users can find the most valuable information. © 2014 IEEE.

Yu H.,Beijing University of Technology | He J.,Beijing University of Technology | Liu R.,Beijing Development Area Co. | Ji D.,Hebei Normal University
International Journal of Distributed Sensor Networks | Year: 2013

In the context of Internet of Things (IoT), multiple cooperative nodes in wireless sensor networks (WSNs) can be used to monitor an event, jointly generate a report and then send it to one or more Internet nodes for further processing. A primary security requirement in such applications is that every event data report be authenticated to intended Internet users and effectively filtered on its way to the Internet users to realize the security of data collection and transmission from the WSN. However, most present schemes developed for WSNs don't consider the Internet scenario while traditional mechanisms developed for the Internet are not suitable due to the resource constraint of sensor nodes. In this paper, we propose a scheme, which we refer to as Data Authentication and En-route Filtering (DAEF), for WSNs in the context of IoT. In DAEF, signature shares are generated and distributed based on verifiable secret sharing cryptography and an efficient ID-based signature algorithm. Our security analysis shows that DAEF can defend against node compromise attacks as well as denial of service (DoS) attacks in the form of report disruption and selective forwarding. We also analyze energy consumption to show the advantages of DAEF over some comparable schemes. © 2013 Hong Yu et al.

He J.,Beijing University of Technology | He J.,Beijing Development Area Co. | Zhou B.,Beijing University of Technology | Liu R.,Beijing Development Area Co.
International Journal of Security and its Applications | Year: 2014

This paper will first sum up the typical attacks and countermeasures in the network layer of Wireless Sensor Network (WSN), then it will classify the existing secure routing protocols according to the core secure schemes used by them, and emphatically introduce and analyze the typical ones among them. Finally this paper will propose some problems on secure routing, which requires further studying. © 2014 SERSC.

Loading Beijing Development Area Co. collaborators
Loading Beijing Development Area Co. collaborators