This paper analyzed the service supply chain of the domestic industry, tourist industry, information service industry in the mobile e-business environment, according to the function of different participators in suppl...This paper analyzed the service supply chain of the domestic industry, tourist industry, information service industry in the mobile e-business environment, according to the function of different participators in supply chain and their relationship between each other, this paper obtained different patterns of different industry in the mobile e-commerce environment.展开更多
This article takes the female community platform“Little Red Book”as an example to explore the optimization and innovation of mobile community e-commerce operation mode under Artificial Intelligence(AI)empowerment.Fi...This article takes the female community platform“Little Red Book”as an example to explore the optimization and innovation of mobile community e-commerce operation mode under Artificial Intelligence(AI)empowerment.Firstly,the relevant concepts were defined,and then the unique attributes of mobile community e-commerce were analyzed.As a typical representative of mobile community e-commerce,Little Red Book introduces the background and characteristics of its platform,analyzes its mobile community operation mode,and focuses on exploring how to establish a mobile community e-commerce platform and effective operation mode under the empowerment of AI technology,to provide some reference and inspiration for the development and operation of Little Red Book and other e-commerce platform enterprises.展开更多
By pushing computation,cache,and network control to the edge,mobile edge computing(MEC)is expected to play a leading role in fifth generation(5G)and future sixth generation(6G).Nevertheless,facing ubiquitous fast-grow...By pushing computation,cache,and network control to the edge,mobile edge computing(MEC)is expected to play a leading role in fifth generation(5G)and future sixth generation(6G).Nevertheless,facing ubiquitous fast-growing computational demands,it is impossible for a single MEC paradigm to effectively support high-quality intelligent services at end user equipments(UEs).To address this issue,we propose an air-ground collaborative MEC(AGCMEC)architecture in this article.The proposed AGCMEC integrates all potentially available MEC servers within air and ground in the envisioned 6G,by a variety of collaborative ways to provide computation services at their best for UEs.Firstly,we introduce the AGC-MEC architecture and elaborate three typical use cases.Then,we discuss four main challenges in the AGC-MEC as well as their potential solutions.Next,we conduct a case study of collaborative service placement for AGC-MEC to validate the effectiveness of the proposed collaborative service placement strategy.Finally,we highlight several potential research directions of the AGC-MEC.展开更多
In the last decade, technical advancements and faster Internet speeds have also led to an increasing number ofmobile devices and users. Thus, all contributors to society, whether young or old members, can use these mo...In the last decade, technical advancements and faster Internet speeds have also led to an increasing number ofmobile devices and users. Thus, all contributors to society, whether young or old members, can use these mobileapps. The use of these apps eases our daily lives, and all customers who need any type of service can accessit easily, comfortably, and efficiently through mobile apps. Particularly, Saudi Arabia greatly depends on digitalservices to assist people and visitors. Such mobile devices are used in organizing daily work schedules and services,particularly during two large occasions, Umrah and Hajj. However, pilgrims encounter mobile app issues such asslowness, conflict, unreliability, or user-unfriendliness. Pilgrims comment on these issues on mobile app platformsthrough reviews of their experiences with these digital services. Scholars have made several attempts to solve suchmobile issues by reporting bugs or non-functional requirements by utilizing user comments.However, solving suchissues is a great challenge, and the issues still exist. Therefore, this study aims to propose a hybrid deep learningmodel to classify and predict mobile app software issues encountered by millions of pilgrims during the Hajj andUmrah periods from the user perspective. Firstly, a dataset was constructed using user-generated comments fromrelevant mobile apps using natural language processing methods, including information extraction, the annotationprocess, and pre-processing steps, considering a multi-class classification problem. Then, several experimentswere conducted using common machine learning classifiers, Artificial Neural Networks (ANN), Long Short-TermMemory (LSTM), and Convolutional Neural Network Long Short-Term Memory (CNN-LSTM) architectures, toexamine the performance of the proposed model. Results show 96% in F1-score and accuracy, and the proposedmodel outperformed the mentioned models.展开更多
How to use a few defect samples to complete the defect classification is a key challenge in the production of mobile phone screens.An attention-relation network for the mobile phone screen defect classification is pro...How to use a few defect samples to complete the defect classification is a key challenge in the production of mobile phone screens.An attention-relation network for the mobile phone screen defect classification is proposed in this paper.The architecture of the attention-relation network contains two modules:a feature extract module and a feature metric module.Different from other few-shot models,an attention mechanism is applied to metric learning in our model to measure the distance between features,so as to pay attention to the correlation between features and suppress unwanted information.Besides,we combine dilated convolution and skip connection to extract more feature information for follow-up processing.We validate attention-relation network on the mobile phone screen defect dataset.The experimental results show that the classification accuracy of the attentionrelation network is 0.9486 under the 5-way 1-shot training strategy and 0.9039 under the 5-way 5-shot setting.It achieves the excellent effect of classification for mobile phone screen defects and outperforms with dominant advantages.展开更多
The trajectory tracking control performance of nonholonomic wheeled mobile robots(NWMRs)is subject to nonholonomic constraints,system uncertainties,and external disturbances.This paper proposes a barrier function-base...The trajectory tracking control performance of nonholonomic wheeled mobile robots(NWMRs)is subject to nonholonomic constraints,system uncertainties,and external disturbances.This paper proposes a barrier function-based adaptive sliding mode control(BFASMC)method to provide high-precision,fast-response performance and robustness for NWMRs.Compared with the conventional adaptive sliding mode control,the proposed control strategy can guarantee that the sliding mode variables converge to a predefined neighborhood of origin with a predefined reaching time independent of the prior knowledge of the uncertainties and disturbances bounds.Another advantage of the proposed algorithm is that the control gains can be adaptively adjusted to follow the disturbances amplitudes thanks to the barrier function.The benefit is that the overestimation of control gain can be eliminated,resulting in chattering reduction.Moreover,a modified barrier function-like control gain is employed to prevent the input saturation problem due to the physical limit of the actuator.The stability analysis and comparative experiments demonstrate that the proposed BFASMC can ensure the prespecified convergence performance of the NWMR system output variables and strong robustness against uncertainties/disturbances.展开更多
In this paper,we consider mobile edge computing(MEC)networks against proactive eavesdropping.To maximize the transmission rate,IRS assisted UAV communications are applied.We take the joint design of the trajectory of ...In this paper,we consider mobile edge computing(MEC)networks against proactive eavesdropping.To maximize the transmission rate,IRS assisted UAV communications are applied.We take the joint design of the trajectory of UAV,the transmitting beamforming of users,and the phase shift matrix of IRS.The original problem is strong non-convex and difficult to solve.We first propose two basic modes of the proactive eavesdropper,and obtain the closed-form solution for the boundary conditions of the two modes.Then we transform the original problem into an equivalent one and propose an alternating optimization(AO)based method to obtain a local optimal solution.The convergence of the algorithm is illustrated by numerical results.Further,we propose a zero forcing(ZF)based method as sub-optimal solution,and the simulation section shows that the proposed two schemes could obtain better performance compared with traditional schemes.展开更多
Various mobile devices and applications are now used in daily life.These devices require high-speed data processing,low energy consumption,low communication latency,and secure data transmission,especially in 5G and 6G...Various mobile devices and applications are now used in daily life.These devices require high-speed data processing,low energy consumption,low communication latency,and secure data transmission,especially in 5G and 6G mobile networks.High-security cryptography guarantees that essential data can be transmitted securely;however,it increases energy consumption and reduces data processing speed.Therefore,this study proposes a low-energy data encryption(LEDE)algorithm based on the Advanced Encryption Standard(AES)for improving data transmission security and reducing the energy consumption of encryption in Internet-of-Things(IoT)devices.In the proposed LEDE algorithm,the system time parameter is employed to create a dynamic S-Box to replace the static S-Box of AES.Tests indicated that six-round LEDE encryption achieves the same security level as 10-round conventional AES encryption.This reduction in encryption time results in the LEDE algorithm having a 67.4%lower energy consumption and 43.9%shorter encryption time than conventional AES;thus,the proposed LEDE algorithm can improve the performance and the energy consumption of IoT edge devices.展开更多
We develop a policy of observer-based dynamic event-triggered state feedback control for distributed parameter systems over a mobile sensor-plus-actuator network.It is assumed that the mobile sensing devices that prov...We develop a policy of observer-based dynamic event-triggered state feedback control for distributed parameter systems over a mobile sensor-plus-actuator network.It is assumed that the mobile sensing devices that provide spatially averaged state measurements can be used to improve state estimation in the network.For the purpose of decreasing the update frequency of controller and unnecessary sampled data transmission, an efficient dynamic event-triggered control policy is constructed.In an event-triggered system, when an error signal exceeds a specified time-varying threshold, it indicates the occurrence of a typical event.The global asymptotic stability of the event-triggered closed-loop system and the boundedness of the minimum inter-event time can be guaranteed.Based on the linear quadratic optimal regulator, the actuator selects the optimal displacement only when an event occurs.A simulation example is finally used to verify that the effectiveness of such a control strategy can enhance the system performance.展开更多
Rapidly expanding studies investigate the effects of e-commerce on company operations in the retail market.However,the interaction between agri-food e-commerce(AEC)and the traditional agri-food wholesale industry(AWI)...Rapidly expanding studies investigate the effects of e-commerce on company operations in the retail market.However,the interaction between agri-food e-commerce(AEC)and the traditional agri-food wholesale industry(AWI)has not received enough attention in the existing literature.Based on the provincial panel data from 2013 to 2020 in China,this paper examines the effect of AEC on AWI,comprising three dimensions:digitalization(DIGITAL),agrifood e-commerce infrastructure and supporting services(AECI),and agri-food e-commerce economy(AECE).First,AWI and AEC are measured using an entropy-based combination of indicators.The results indicate that for China as a whole,AWI has remained practically unchanged,whereas AEC exhibits a significant rising trend.Second,the findings of the fixed-effect regression reveal that DIGITAL and AECE tend to raise AWI,whereas AECI negatively affects AWI.Third,threshold regression results indicate that AECI tends to diminish AWI with three-stage inhibitory intensity,which manifests as a first increase and then a drop in the inhibition degree.These results suggest that with the introduction of e-commerce for agricultural product circulation,digital development will have catfish effects that tend to stimulate the vitality of the conventional wholesale industry and promote technical progress.Furthermore,the traditional wholesale industry benefits financially from e-commerce even while it diverts part of the traditional wholesale circulation for agricultural products.展开更多
Despite only being around for a few years, mobile devices have steadily risen to become the most extensively used computer devices. Given the number of people who rely on smartphones, which can install third-party app...Despite only being around for a few years, mobile devices have steadily risen to become the most extensively used computer devices. Given the number of people who rely on smartphones, which can install third-party apps, it has become an increasingly important issue for end-users and service providers to ensure that both the devices and the underlying network are secure. People will become more reliant on applications such as SMS, MMS, Internet Access, Online Transactions, and so on due to such features and capabilities. Thousands of devices ranging from low-cost phones to high-end luxury phones are powered by the Android operating system, which has dominated the smartphone marketplace. It is about making it possible for people from all socioeconomic backgrounds to get and use mobile devices in their daily activities. In response to this growing popularity, the number of new applications introduced to the Android market has skyrocketed. The recent appearance of a wide range of mobile malware has caught the attention of security professionals and scholars alike. In light of the ongoing expansion of the mobile phone industry, the likelihood of it being used in criminal activities will only continue to rise in the future. This article reviews the literature on malware detection and prevention in Android mobile devices, analyzes the existing literature on major studies and tasks, and covers articles, journals, and digital resources such as Internet security publications, scientific studies, and conferences.展开更多
Background and Objective: With the popularity and widespread use of mobile phones, the effects of mobile phone dependence and addiction on individuals’ physical and mental health have attracted more and more attentio...Background and Objective: With the popularity and widespread use of mobile phones, the effects of mobile phone dependence and addiction on individuals’ physical and mental health have attracted more and more attention. The present study aims to analyze the current state of mobile phone addiction and its impact on sleep quality within the population, while also exploring the influence of related factors on sleep quality. Ultimately, this research will provide a scientific foundation for targeted intervention measures and strategies. Methods: A total of 253 permanent residents in Nanjing were randomly selected as study subjects. The Mobile Phone Addiction Index (MPAI) and Pittsburgh Sleep Quality Index (PSQI) were used to evaluate the degree of smartphone addiction and sleep quality of the study subjects. Body mass index (BMI) was measured according to standardized procedures. Independent sample t-test, Chi-square test, rank sum test and multiple linear regression were used to analyze the correlation between mobile phone addiction and sleep quality, and P Results: 117 people (46.2%) were addicted to mobile phones. Chi-square test showed that the rate of mobile phone addiction in drinking group was significantly higher than that in non-drinking group (P P P P P P P P P P Conclusion: Mobile phone addiction may lead to shorter sleep duration and reduce sleep efficiency. The withdrawal of mobile phone addiction may have a negative impact on sleep quality. According to the characteristics of the population, appropriate comprehensive intervention measures should be taken to build an effective evaluation system, so as to reduce the impact of mobile phone addiction and withdrawal problems on sleep and improve sleep quality.展开更多
In this paper,we concentrate on a reconfigurable intelligent surface(RIS)-aided mobile edge computing(MEC)system to improve the offload efficiency with moving user equipments(UEs).We aim to minimize the energy consump...In this paper,we concentrate on a reconfigurable intelligent surface(RIS)-aided mobile edge computing(MEC)system to improve the offload efficiency with moving user equipments(UEs).We aim to minimize the energy consumption of all UEs by jointly optimizing the discrete phase shift of RIS,UEs’transmitting power,computing resources allocation,and the UEs’task offloading strategies for local computing and offloading.The formulated problem is a sequential decision making across multiple coherent time slots.Furthermore,the mobility of UEs brings uncertainties into the decision-making process.To cope with this challenging problem,the deep reinforcement learning-based Soft Actor-Critic(SAC)algorithm is first proposed to effectively optimize the discrete phase of RIS and the UEs’task offloading strategies.Then,the transmitting power and computing resource allocation can be determined based on the action.Numerical results demonstrate that the proposed algorithm can be trained more stably and perform approximately 14%lower than the deep deterministic policy gradient benchmark in terms of energy consumption.展开更多
Users and edge servers are not fullymutually trusted inmobile edge computing(MEC),and hence blockchain can be introduced to provide trustableMEC.In blockchain-basedMEC,each edge server functions as a node in bothMEC a...Users and edge servers are not fullymutually trusted inmobile edge computing(MEC),and hence blockchain can be introduced to provide trustableMEC.In blockchain-basedMEC,each edge server functions as a node in bothMEC and blockchain,processing users’tasks and then uploading the task related information to the blockchain.That is,each edge server runs both users’offloaded tasks and blockchain tasks simultaneously.Note that there is a trade-off between the resource allocation for MEC and blockchain tasks.Therefore,the allocation of the resources of edge servers to the blockchain and theMEC is crucial for the processing delay of blockchain-based MEC.Most of the existing research tackles the problem of resource allocation in either blockchain or MEC,which leads to unfavorable performance of the blockchain-based MEC system.In this paper,we study how to allocate the computing resources of edge servers to the MEC and blockchain tasks with the aimtominimize the total systemprocessing delay.For the problem,we propose a computing resource Allocation algorithmfor Blockchain-based MEC(ABM)which utilizes the Slater’s condition,Karush-Kuhn-Tucker(KKT)conditions,partial derivatives of the Lagrangian function and subgradient projection method to obtain the solution.Simulation results show that ABM converges and effectively reduces the processing delay of blockchain-based MEC.展开更多
In the groundbreaking study “The Contribution of AI-powered Mobile Apps to Smart City Ecosystems,” authored by Zaki Ali Bayashot, the transformative role of artificial intelligence (AI) in urban development is metic...In the groundbreaking study “The Contribution of AI-powered Mobile Apps to Smart City Ecosystems,” authored by Zaki Ali Bayashot, the transformative role of artificial intelligence (AI) in urban development is meticulously examined. This comprehensive research delineates the multifaceted ways in which AI-powered mobile applications can significantly enhance the efficiency, sustainability, and livability of urban environments, marking a pivotal step towards the realization of smart cities globally. Bayashot meticulously outlines the critical areas where AI-powered apps offer unprecedented advantages, including urban mobility, public safety, energy management, and environmental monitoring. By leveraging AI’s capabilities, these applications not only streamline city operations but also foster a more sustainable interaction between city dwellers and their environment. The paper emphasizes the importance of data-driven decision-making in urban planning, showcasing how AI analytics can predict and mitigate traffic congestion, optimize energy consumption, and enhance emergency response strategies. The author also explores the social implications of AI in urban settings, highlighting the potential for these technologies to bridge the gap between government entities and citizens. Through engaging case studies, Bayashot demonstrates how participatory governance models, enabled by AI apps, can promote transparency, accountability, and citizen engagement in urban management. A significant contribution of this research is its focus on the challenges and opportunities presented by the integration of AI into smart city ecosystems. Bayashot discusses the technical, ethical, and privacy concerns associated with AI applications, advocating for a balanced approach that ensures technological advancements do not come at the expense of civil liberties. The study calls for robust regulatory frameworks to govern the use of AI in public spaces, emphasizing the need for ethical AI practices that respect privacy and promote inclusivity. Furthermore, Bayashot’s research underscores the necessity of cross-disciplinary collaboration in the development and implementation of AI technologies in urban contexts. By bringing together experts from information technology, urban planning, environmental science, and social sciences, the author argues for a holistic approach to smart city development. This interdisciplinary strategy ensures that AI applications are not only technologically sound but also socially and environmentally responsible. The paper concludes with a visionary outlook on the future of smart cities, posited on the seamless integration of AI technologies. Bayashot envisions a world where AI-powered mobile apps not only facilitate smoother urban operations but also empower citizens to actively participate in the shaping of their urban environments. This research serves as a critical call to action for policymakers, technologists, and urban planners to embrace AI as a tool for creating more sustainable, efficient, and inclusive cities. By presenting a detailed analysis of the current state of AI in urban development, coupled with practical insights and forward-looking recommendations, “The Contribution of AI-powered Mobile Apps to Smart City Ecosystems” stands as a seminal work that is poised to inspire and guide the evolution of urban landscapes worldwide. Its comprehensive exploration of the subject matter, combined with its impactful conclusions, make it a must-read for anyone involved in the field of smart city development, AI technology, or urban policy-making.展开更多
With the rapid growth of the global digital economy, cross-border e-commerce, as an emerging form of trade, has gradually become a powerful engine to promote the development of global trade. BRICS is an important forc...With the rapid growth of the global digital economy, cross-border e-commerce, as an emerging form of trade, has gradually become a powerful engine to promote the development of global trade. BRICS is an important force in the global economy, and the progress of the BRICS countries' trade facilitation level has an important impact on the global trade environment. This paper conducts an in-depth study of the dynamic changes in BRICS trade facilitation from 2013 to 2022, and uses an extended gravity model to analyze the specific impact of this change on China's exports using cross-border e-commerce. The results show that although the BRICS countries have made some progress in trade facilitation, the overall level still needs to be improved, and there are obvious differences among member countries. However, the improvement of trade facilitation among BRICS countries has undoubtedly brought significant positive effects to China's exports using cross-border e-commerce.展开更多
The RPL(IPv6 Routing Protocol for Low-Power and Lossy Networks)protocol is essential for efficient communi-cation within the Internet of Things(IoT)ecosystem.Despite its significance,RPL’s susceptibility to attacks r...The RPL(IPv6 Routing Protocol for Low-Power and Lossy Networks)protocol is essential for efficient communi-cation within the Internet of Things(IoT)ecosystem.Despite its significance,RPL’s susceptibility to attacks remains a concern.This paper presents a comprehensive simulation-based analysis of the RPL protocol’s vulnerability to the decreased rank attack in both static andmobilenetwork environments.We employ the Random Direction Mobility Model(RDM)for mobile scenarios within the Cooja simulator.Our systematic evaluation focuses on critical performance metrics,including Packet Delivery Ratio(PDR),Average End to End Delay(AE2ED),throughput,Expected Transmission Count(ETX),and Average Power Consumption(APC).Our findings illuminate the disruptive impact of this attack on the routing hierarchy,resulting in decreased PDR and throughput,increased AE2ED,ETX,and APC.These results underscore the urgent need for robust security measures to protect RPL-based IoT networks.Furthermore,our study emphasizes the exacerbated impact of the attack in mobile scenarios,highlighting the evolving security requirements of IoT networks.展开更多
A dynamical model is constructed to depict the spatial-temporal evolution of malware in mobile wireless sensor networks(MWSNs). Based on such a model, we design a hybrid control scheme combining parameter perturbation...A dynamical model is constructed to depict the spatial-temporal evolution of malware in mobile wireless sensor networks(MWSNs). Based on such a model, we design a hybrid control scheme combining parameter perturbation and state feedback to effectively manipulate the spatiotemporal dynamics of malware propagation. The hybrid control can not only suppress the Turing instability caused by diffusion factor but can also adjust the occurrence of Hopf bifurcation induced by time delay. Numerical simulation results show that the hybrid control strategy can efficiently manipulate the transmission dynamics to achieve our expected desired properties, thus reducing the harm of malware propagation to MWSNs.展开更多
Crowdsourcing technology is widely recognized for its effectiveness in task scheduling and resource allocation.While traditional methods for task allocation can help reduce costs and improve efficiency,they may encoun...Crowdsourcing technology is widely recognized for its effectiveness in task scheduling and resource allocation.While traditional methods for task allocation can help reduce costs and improve efficiency,they may encounter challenges when dealing with abnormal data flow nodes,leading to decreased allocation accuracy and efficiency.To address these issues,this study proposes a novel two-part invalid detection task allocation framework.In the first step,an anomaly detection model is developed using a dynamic self-attentive GAN to identify anomalous data.Compared to the baseline method,the model achieves an approximately 4%increase in the F1 value on the public dataset.In the second step of the framework,task allocation modeling is performed using a twopart graph matching method.This phase introduces a P-queue KM algorithm that implements a more efficient optimization strategy.The allocation efficiency is improved by approximately 23.83%compared to the baseline method.Empirical results confirm the effectiveness of the proposed framework in detecting abnormal data nodes,enhancing allocation precision,and achieving efficient allocation.展开更多
文摘This paper analyzed the service supply chain of the domestic industry, tourist industry, information service industry in the mobile e-business environment, according to the function of different participators in supply chain and their relationship between each other, this paper obtained different patterns of different industry in the mobile e-commerce environment.
基金Phased Research Key Project of Shanghai China Vocational Education Association“Research on Digital Transformation Path of Vocational Education Driven by AIGC from the Perspective of New Quality Productivity”,Phased Research Project of Shanghai Computer Industry Association“The Reform and Exploration of Cross-border E-commerce Talent Cultivation in Vocational Colleges from the Perspective of Industry Education Integration”(Project No.sctakt202404)。
文摘This article takes the female community platform“Little Red Book”as an example to explore the optimization and innovation of mobile community e-commerce operation mode under Artificial Intelligence(AI)empowerment.Firstly,the relevant concepts were defined,and then the unique attributes of mobile community e-commerce were analyzed.As a typical representative of mobile community e-commerce,Little Red Book introduces the background and characteristics of its platform,analyzes its mobile community operation mode,and focuses on exploring how to establish a mobile community e-commerce platform and effective operation mode under the empowerment of AI technology,to provide some reference and inspiration for the development and operation of Little Red Book and other e-commerce platform enterprises.
基金supported in part by the National Natural Science Foundation of China under Grant 62171465,62072303,62272223,U22A2031。
文摘By pushing computation,cache,and network control to the edge,mobile edge computing(MEC)is expected to play a leading role in fifth generation(5G)and future sixth generation(6G).Nevertheless,facing ubiquitous fast-growing computational demands,it is impossible for a single MEC paradigm to effectively support high-quality intelligent services at end user equipments(UEs).To address this issue,we propose an air-ground collaborative MEC(AGCMEC)architecture in this article.The proposed AGCMEC integrates all potentially available MEC servers within air and ground in the envisioned 6G,by a variety of collaborative ways to provide computation services at their best for UEs.Firstly,we introduce the AGC-MEC architecture and elaborate three typical use cases.Then,we discuss four main challenges in the AGC-MEC as well as their potential solutions.Next,we conduct a case study of collaborative service placement for AGC-MEC to validate the effectiveness of the proposed collaborative service placement strategy.Finally,we highlight several potential research directions of the AGC-MEC.
文摘In the last decade, technical advancements and faster Internet speeds have also led to an increasing number ofmobile devices and users. Thus, all contributors to society, whether young or old members, can use these mobileapps. The use of these apps eases our daily lives, and all customers who need any type of service can accessit easily, comfortably, and efficiently through mobile apps. Particularly, Saudi Arabia greatly depends on digitalservices to assist people and visitors. Such mobile devices are used in organizing daily work schedules and services,particularly during two large occasions, Umrah and Hajj. However, pilgrims encounter mobile app issues such asslowness, conflict, unreliability, or user-unfriendliness. Pilgrims comment on these issues on mobile app platformsthrough reviews of their experiences with these digital services. Scholars have made several attempts to solve suchmobile issues by reporting bugs or non-functional requirements by utilizing user comments.However, solving suchissues is a great challenge, and the issues still exist. Therefore, this study aims to propose a hybrid deep learningmodel to classify and predict mobile app software issues encountered by millions of pilgrims during the Hajj andUmrah periods from the user perspective. Firstly, a dataset was constructed using user-generated comments fromrelevant mobile apps using natural language processing methods, including information extraction, the annotationprocess, and pre-processing steps, considering a multi-class classification problem. Then, several experimentswere conducted using common machine learning classifiers, Artificial Neural Networks (ANN), Long Short-TermMemory (LSTM), and Convolutional Neural Network Long Short-Term Memory (CNN-LSTM) architectures, toexamine the performance of the proposed model. Results show 96% in F1-score and accuracy, and the proposedmodel outperformed the mentioned models.
文摘How to use a few defect samples to complete the defect classification is a key challenge in the production of mobile phone screens.An attention-relation network for the mobile phone screen defect classification is proposed in this paper.The architecture of the attention-relation network contains two modules:a feature extract module and a feature metric module.Different from other few-shot models,an attention mechanism is applied to metric learning in our model to measure the distance between features,so as to pay attention to the correlation between features and suppress unwanted information.Besides,we combine dilated convolution and skip connection to extract more feature information for follow-up processing.We validate attention-relation network on the mobile phone screen defect dataset.The experimental results show that the classification accuracy of the attentionrelation network is 0.9486 under the 5-way 1-shot training strategy and 0.9039 under the 5-way 5-shot setting.It achieves the excellent effect of classification for mobile phone screen defects and outperforms with dominant advantages.
基金the China Scholarship Council(202106690037)the Natural Science Foundation of Anhui Province(19080885QE194)。
文摘The trajectory tracking control performance of nonholonomic wheeled mobile robots(NWMRs)is subject to nonholonomic constraints,system uncertainties,and external disturbances.This paper proposes a barrier function-based adaptive sliding mode control(BFASMC)method to provide high-precision,fast-response performance and robustness for NWMRs.Compared with the conventional adaptive sliding mode control,the proposed control strategy can guarantee that the sliding mode variables converge to a predefined neighborhood of origin with a predefined reaching time independent of the prior knowledge of the uncertainties and disturbances bounds.Another advantage of the proposed algorithm is that the control gains can be adaptively adjusted to follow the disturbances amplitudes thanks to the barrier function.The benefit is that the overestimation of control gain can be eliminated,resulting in chattering reduction.Moreover,a modified barrier function-like control gain is employed to prevent the input saturation problem due to the physical limit of the actuator.The stability analysis and comparative experiments demonstrate that the proposed BFASMC can ensure the prespecified convergence performance of the NWMR system output variables and strong robustness against uncertainties/disturbances.
基金This work was supported by the Key Scientific and Technological Project of Henan Province(Grant Number 222102210212)Doctoral Research Start Project of Henan Institute of Technology(Grant Number KQ2005)Key Research Projects of Colleges and Universities in Henan Province(Grant Number 23B510006).
文摘In this paper,we consider mobile edge computing(MEC)networks against proactive eavesdropping.To maximize the transmission rate,IRS assisted UAV communications are applied.We take the joint design of the trajectory of UAV,the transmitting beamforming of users,and the phase shift matrix of IRS.The original problem is strong non-convex and difficult to solve.We first propose two basic modes of the proactive eavesdropper,and obtain the closed-form solution for the boundary conditions of the two modes.Then we transform the original problem into an equivalent one and propose an alternating optimization(AO)based method to obtain a local optimal solution.The convergence of the algorithm is illustrated by numerical results.Further,we propose a zero forcing(ZF)based method as sub-optimal solution,and the simulation section shows that the proposed two schemes could obtain better performance compared with traditional schemes.
基金This work was supported by the National Science and Technology Council,Taiwan,under Project NSTC 112-2221-E-029-015.
文摘Various mobile devices and applications are now used in daily life.These devices require high-speed data processing,low energy consumption,low communication latency,and secure data transmission,especially in 5G and 6G mobile networks.High-security cryptography guarantees that essential data can be transmitted securely;however,it increases energy consumption and reduces data processing speed.Therefore,this study proposes a low-energy data encryption(LEDE)algorithm based on the Advanced Encryption Standard(AES)for improving data transmission security and reducing the energy consumption of encryption in Internet-of-Things(IoT)devices.In the proposed LEDE algorithm,the system time parameter is employed to create a dynamic S-Box to replace the static S-Box of AES.Tests indicated that six-round LEDE encryption achieves the same security level as 10-round conventional AES encryption.This reduction in encryption time results in the LEDE algorithm having a 67.4%lower energy consumption and 43.9%shorter encryption time than conventional AES;thus,the proposed LEDE algorithm can improve the performance and the energy consumption of IoT edge devices.
基金Project supported by the National Natural Science Foundation of China (Grant No.62073045)。
文摘We develop a policy of observer-based dynamic event-triggered state feedback control for distributed parameter systems over a mobile sensor-plus-actuator network.It is assumed that the mobile sensing devices that provide spatially averaged state measurements can be used to improve state estimation in the network.For the purpose of decreasing the update frequency of controller and unnecessary sampled data transmission, an efficient dynamic event-triggered control policy is constructed.In an event-triggered system, when an error signal exceeds a specified time-varying threshold, it indicates the occurrence of a typical event.The global asymptotic stability of the event-triggered closed-loop system and the boundedness of the minimum inter-event time can be guaranteed.Based on the linear quadratic optimal regulator, the actuator selects the optimal displacement only when an event occurs.A simulation example is finally used to verify that the effectiveness of such a control strategy can enhance the system performance.
基金supported by the Leading Talent Support Program for Agricultural Talents of the Chinese Academy of Agricultural Sciences(TCS2022020)the General program of National Natural Science Foundation of China(1573263)。
文摘Rapidly expanding studies investigate the effects of e-commerce on company operations in the retail market.However,the interaction between agri-food e-commerce(AEC)and the traditional agri-food wholesale industry(AWI)has not received enough attention in the existing literature.Based on the provincial panel data from 2013 to 2020 in China,this paper examines the effect of AEC on AWI,comprising three dimensions:digitalization(DIGITAL),agrifood e-commerce infrastructure and supporting services(AECI),and agri-food e-commerce economy(AECE).First,AWI and AEC are measured using an entropy-based combination of indicators.The results indicate that for China as a whole,AWI has remained practically unchanged,whereas AEC exhibits a significant rising trend.Second,the findings of the fixed-effect regression reveal that DIGITAL and AECE tend to raise AWI,whereas AECI negatively affects AWI.Third,threshold regression results indicate that AECI tends to diminish AWI with three-stage inhibitory intensity,which manifests as a first increase and then a drop in the inhibition degree.These results suggest that with the introduction of e-commerce for agricultural product circulation,digital development will have catfish effects that tend to stimulate the vitality of the conventional wholesale industry and promote technical progress.Furthermore,the traditional wholesale industry benefits financially from e-commerce even while it diverts part of the traditional wholesale circulation for agricultural products.
文摘Despite only being around for a few years, mobile devices have steadily risen to become the most extensively used computer devices. Given the number of people who rely on smartphones, which can install third-party apps, it has become an increasingly important issue for end-users and service providers to ensure that both the devices and the underlying network are secure. People will become more reliant on applications such as SMS, MMS, Internet Access, Online Transactions, and so on due to such features and capabilities. Thousands of devices ranging from low-cost phones to high-end luxury phones are powered by the Android operating system, which has dominated the smartphone marketplace. It is about making it possible for people from all socioeconomic backgrounds to get and use mobile devices in their daily activities. In response to this growing popularity, the number of new applications introduced to the Android market has skyrocketed. The recent appearance of a wide range of mobile malware has caught the attention of security professionals and scholars alike. In light of the ongoing expansion of the mobile phone industry, the likelihood of it being used in criminal activities will only continue to rise in the future. This article reviews the literature on malware detection and prevention in Android mobile devices, analyzes the existing literature on major studies and tasks, and covers articles, journals, and digital resources such as Internet security publications, scientific studies, and conferences.
文摘Background and Objective: With the popularity and widespread use of mobile phones, the effects of mobile phone dependence and addiction on individuals’ physical and mental health have attracted more and more attention. The present study aims to analyze the current state of mobile phone addiction and its impact on sleep quality within the population, while also exploring the influence of related factors on sleep quality. Ultimately, this research will provide a scientific foundation for targeted intervention measures and strategies. Methods: A total of 253 permanent residents in Nanjing were randomly selected as study subjects. The Mobile Phone Addiction Index (MPAI) and Pittsburgh Sleep Quality Index (PSQI) were used to evaluate the degree of smartphone addiction and sleep quality of the study subjects. Body mass index (BMI) was measured according to standardized procedures. Independent sample t-test, Chi-square test, rank sum test and multiple linear regression were used to analyze the correlation between mobile phone addiction and sleep quality, and P Results: 117 people (46.2%) were addicted to mobile phones. Chi-square test showed that the rate of mobile phone addiction in drinking group was significantly higher than that in non-drinking group (P P P P P P P P P P Conclusion: Mobile phone addiction may lead to shorter sleep duration and reduce sleep efficiency. The withdrawal of mobile phone addiction may have a negative impact on sleep quality. According to the characteristics of the population, appropriate comprehensive intervention measures should be taken to build an effective evaluation system, so as to reduce the impact of mobile phone addiction and withdrawal problems on sleep and improve sleep quality.
基金supported by the National Natural Science Foundation of China(No.62101277 and No.U20B2039)the Natural Science Foundation on Frontier Leading Technology Basic Research Project of Jiangsu(No.BK20212001)。
文摘In this paper,we concentrate on a reconfigurable intelligent surface(RIS)-aided mobile edge computing(MEC)system to improve the offload efficiency with moving user equipments(UEs).We aim to minimize the energy consumption of all UEs by jointly optimizing the discrete phase shift of RIS,UEs’transmitting power,computing resources allocation,and the UEs’task offloading strategies for local computing and offloading.The formulated problem is a sequential decision making across multiple coherent time slots.Furthermore,the mobility of UEs brings uncertainties into the decision-making process.To cope with this challenging problem,the deep reinforcement learning-based Soft Actor-Critic(SAC)algorithm is first proposed to effectively optimize the discrete phase of RIS and the UEs’task offloading strategies.Then,the transmitting power and computing resource allocation can be determined based on the action.Numerical results demonstrate that the proposed algorithm can be trained more stably and perform approximately 14%lower than the deep deterministic policy gradient benchmark in terms of energy consumption.
基金supported by the Key Research and Development Project in Anhui Province of China(Grant No.202304a05020059)the Fundamental Research Funds for the Central Universities of China(Grant No.PA2023GDSK0055)the Project of Anhui Province Economic and Information Bureau(Grant No.JB20099).
文摘Users and edge servers are not fullymutually trusted inmobile edge computing(MEC),and hence blockchain can be introduced to provide trustableMEC.In blockchain-basedMEC,each edge server functions as a node in bothMEC and blockchain,processing users’tasks and then uploading the task related information to the blockchain.That is,each edge server runs both users’offloaded tasks and blockchain tasks simultaneously.Note that there is a trade-off between the resource allocation for MEC and blockchain tasks.Therefore,the allocation of the resources of edge servers to the blockchain and theMEC is crucial for the processing delay of blockchain-based MEC.Most of the existing research tackles the problem of resource allocation in either blockchain or MEC,which leads to unfavorable performance of the blockchain-based MEC system.In this paper,we study how to allocate the computing resources of edge servers to the MEC and blockchain tasks with the aimtominimize the total systemprocessing delay.For the problem,we propose a computing resource Allocation algorithmfor Blockchain-based MEC(ABM)which utilizes the Slater’s condition,Karush-Kuhn-Tucker(KKT)conditions,partial derivatives of the Lagrangian function and subgradient projection method to obtain the solution.Simulation results show that ABM converges and effectively reduces the processing delay of blockchain-based MEC.
文摘In the groundbreaking study “The Contribution of AI-powered Mobile Apps to Smart City Ecosystems,” authored by Zaki Ali Bayashot, the transformative role of artificial intelligence (AI) in urban development is meticulously examined. This comprehensive research delineates the multifaceted ways in which AI-powered mobile applications can significantly enhance the efficiency, sustainability, and livability of urban environments, marking a pivotal step towards the realization of smart cities globally. Bayashot meticulously outlines the critical areas where AI-powered apps offer unprecedented advantages, including urban mobility, public safety, energy management, and environmental monitoring. By leveraging AI’s capabilities, these applications not only streamline city operations but also foster a more sustainable interaction between city dwellers and their environment. The paper emphasizes the importance of data-driven decision-making in urban planning, showcasing how AI analytics can predict and mitigate traffic congestion, optimize energy consumption, and enhance emergency response strategies. The author also explores the social implications of AI in urban settings, highlighting the potential for these technologies to bridge the gap between government entities and citizens. Through engaging case studies, Bayashot demonstrates how participatory governance models, enabled by AI apps, can promote transparency, accountability, and citizen engagement in urban management. A significant contribution of this research is its focus on the challenges and opportunities presented by the integration of AI into smart city ecosystems. Bayashot discusses the technical, ethical, and privacy concerns associated with AI applications, advocating for a balanced approach that ensures technological advancements do not come at the expense of civil liberties. The study calls for robust regulatory frameworks to govern the use of AI in public spaces, emphasizing the need for ethical AI practices that respect privacy and promote inclusivity. Furthermore, Bayashot’s research underscores the necessity of cross-disciplinary collaboration in the development and implementation of AI technologies in urban contexts. By bringing together experts from information technology, urban planning, environmental science, and social sciences, the author argues for a holistic approach to smart city development. This interdisciplinary strategy ensures that AI applications are not only technologically sound but also socially and environmentally responsible. The paper concludes with a visionary outlook on the future of smart cities, posited on the seamless integration of AI technologies. Bayashot envisions a world where AI-powered mobile apps not only facilitate smoother urban operations but also empower citizens to actively participate in the shaping of their urban environments. This research serves as a critical call to action for policymakers, technologists, and urban planners to embrace AI as a tool for creating more sustainable, efficient, and inclusive cities. By presenting a detailed analysis of the current state of AI in urban development, coupled with practical insights and forward-looking recommendations, “The Contribution of AI-powered Mobile Apps to Smart City Ecosystems” stands as a seminal work that is poised to inspire and guide the evolution of urban landscapes worldwide. Its comprehensive exploration of the subject matter, combined with its impactful conclusions, make it a must-read for anyone involved in the field of smart city development, AI technology, or urban policy-making.
基金Supported by Western Project of National Social Science Fund of China(23XJY013)Project of Social Science Foundation of Shaanxi Province(2022D032).
文摘With the rapid growth of the global digital economy, cross-border e-commerce, as an emerging form of trade, has gradually become a powerful engine to promote the development of global trade. BRICS is an important force in the global economy, and the progress of the BRICS countries' trade facilitation level has an important impact on the global trade environment. This paper conducts an in-depth study of the dynamic changes in BRICS trade facilitation from 2013 to 2022, and uses an extended gravity model to analyze the specific impact of this change on China's exports using cross-border e-commerce. The results show that although the BRICS countries have made some progress in trade facilitation, the overall level still needs to be improved, and there are obvious differences among member countries. However, the improvement of trade facilitation among BRICS countries has undoubtedly brought significant positive effects to China's exports using cross-border e-commerce.
文摘The RPL(IPv6 Routing Protocol for Low-Power and Lossy Networks)protocol is essential for efficient communi-cation within the Internet of Things(IoT)ecosystem.Despite its significance,RPL’s susceptibility to attacks remains a concern.This paper presents a comprehensive simulation-based analysis of the RPL protocol’s vulnerability to the decreased rank attack in both static andmobilenetwork environments.We employ the Random Direction Mobility Model(RDM)for mobile scenarios within the Cooja simulator.Our systematic evaluation focuses on critical performance metrics,including Packet Delivery Ratio(PDR),Average End to End Delay(AE2ED),throughput,Expected Transmission Count(ETX),and Average Power Consumption(APC).Our findings illuminate the disruptive impact of this attack on the routing hierarchy,resulting in decreased PDR and throughput,increased AE2ED,ETX,and APC.These results underscore the urgent need for robust security measures to protect RPL-based IoT networks.Furthermore,our study emphasizes the exacerbated impact of the attack in mobile scenarios,highlighting the evolving security requirements of IoT networks.
基金Project supported by the National Natural Science Foundation of China (Grant No. 62073172)the Natural Science Foundation of Jiangsu Province of China (Grant No. BK20221329)。
文摘A dynamical model is constructed to depict the spatial-temporal evolution of malware in mobile wireless sensor networks(MWSNs). Based on such a model, we design a hybrid control scheme combining parameter perturbation and state feedback to effectively manipulate the spatiotemporal dynamics of malware propagation. The hybrid control can not only suppress the Turing instability caused by diffusion factor but can also adjust the occurrence of Hopf bifurcation induced by time delay. Numerical simulation results show that the hybrid control strategy can efficiently manipulate the transmission dynamics to achieve our expected desired properties, thus reducing the harm of malware propagation to MWSNs.
基金National Natural Science Foundation of China(62072392).
文摘Crowdsourcing technology is widely recognized for its effectiveness in task scheduling and resource allocation.While traditional methods for task allocation can help reduce costs and improve efficiency,they may encounter challenges when dealing with abnormal data flow nodes,leading to decreased allocation accuracy and efficiency.To address these issues,this study proposes a novel two-part invalid detection task allocation framework.In the first step,an anomaly detection model is developed using a dynamic self-attentive GAN to identify anomalous data.Compared to the baseline method,the model achieves an approximately 4%increase in the F1 value on the public dataset.In the second step of the framework,task allocation modeling is performed using a twopart graph matching method.This phase introduces a P-queue KM algorithm that implements a more efficient optimization strategy.The allocation efficiency is improved by approximately 23.83%compared to the baseline method.Empirical results confirm the effectiveness of the proposed framework in detecting abnormal data nodes,enhancing allocation precision,and achieving efficient allocation.