This paper presents the results of the development and creation of plasma-chemical reactors for mobile and stationary installations for the destruction and disposal of solid, liquid, gaseous and mixed medical waste ba...This paper presents the results of the development and creation of plasma-chemical reactors for mobile and stationary installations for the destruction and disposal of solid, liquid, gaseous and mixed medical waste based on the domestic plasma generator PUN-1, with air as the plasma-forming gas. The design and principle of operation of plasma-chemical reactors installed on mobile experimental and industrial plants “Plazmon-1,2,3”, as well as the main features of the plasma waste disposal process are described.展开更多
We investigated factors contributing to Internet addiction in 105 Japanese medical students. The subjects were administered by a self-reporting questionnaire designed to evaluate demographic factors, Internet addictio...We investigated factors contributing to Internet addiction in 105 Japanese medical students. The subjects were administered by a self-reporting questionnaire designed to evaluate demographic factors, Internet addiction, loneliness, health-related lifestyle factors, depressive state, patterns of behavior, and mobile phone dependence. Results of multivariate logistic regression analysis indicated that loneliness and mobile phone dependence were positively related to degree of addiction. Our findings suggest that Internet addiction is associated with loneliness and mobile phone dependence in Japanese students.展开更多
The Internet of Medical Things(Io MT) is regarded as a critical technology for intelligent healthcare in the foreseeable 6G era. Nevertheless, due to the limited computing power capability of edge devices and task-rel...The Internet of Medical Things(Io MT) is regarded as a critical technology for intelligent healthcare in the foreseeable 6G era. Nevertheless, due to the limited computing power capability of edge devices and task-related coupling relationships, Io MT faces unprecedented challenges. Considering the associative connections among tasks, this paper proposes a computing offloading policy for multiple-user devices(UDs) considering device-to-device(D2D) communication and a multi-access edge computing(MEC)technique under the scenario of Io MT. Specifically,to minimize the total delay and energy consumption concerning the requirement of Io MT, we first analyze and model the detailed local execution, MEC execution, D2D execution, and associated tasks offloading exchange model. Consequently, the associated tasks’ offloading scheme of multi-UDs is formulated as a mixed-integer nonconvex optimization problem. Considering the advantages of deep reinforcement learning(DRL) in processing tasks related to coupling relationships, a Double DQN based associative tasks computing offloading(DDATO) algorithm is then proposed to obtain the optimal solution, which can make the best offloading decision under the condition that tasks of UDs are associative. Furthermore, to reduce the complexity of the DDATO algorithm, the cacheaided procedure is intentionally introduced before the data training process. This avoids redundant offloading and computing procedures concerning tasks that previously have already been cached by other UDs. In addition, we use a dynamic ε-greedy strategy in the action selection section of the algorithm, thus preventing the algorithm from falling into a locally optimal solution. Simulation results demonstrate that compared with other existing methods for associative task models concerning different structures in the Io MT network, the proposed algorithm can lower the total cost more effectively and efficiently while also providing a tradeoff between delay and energy consumption tolerance.展开更多
Puncturing has been recognized as a promising technology to cope with the coexistence problem of enhanced mobile broadband(eMBB) and ultra-reliable low latency communications(URLLC)traffic. However, the steady perform...Puncturing has been recognized as a promising technology to cope with the coexistence problem of enhanced mobile broadband(eMBB) and ultra-reliable low latency communications(URLLC)traffic. However, the steady performance of eMBB traffic while meeting the requirements of URLLC traffic with puncturing is a major challenge in some realistic scenarios. In this paper, we pay attention to the timely and energy-efficient processing for eMBB traffic in the industrial Internet of Things(IIoT), where mobile edge computing(MEC) is employed for data processing. Specifically, the performance of eMBB traffic and URLLC traffic in a MEC-based IIoT system is ensured by setting the threshold of tolerable delay and outage probability, respectively. Furthermore,considering the limited energy supply, an energy minimization problem of eMBB device is formulated under the above constraints, by jointly optimizing the resource blocks(RBs) punctured by URLLC traffic, data offloading and transmit power of eMBB device. With Markov's inequality, the problem is reformulated by transforming the probabilistic outage constraint into a deterministic constraint. Meanwhile, an iterative energy minimization algorithm(IEMA) is proposed.Simulation results demonstrate that our algorithm has a significant reduction in the energy consumption for eMBB device and achieves a better overall effect compared to several benchmarks.展开更多
Mobile and Internet network coverage plays an important role in digital transformation and the exploitation of new services. The evolution of mobile networks from the first generation (1G) to the 5th generation is sti...Mobile and Internet network coverage plays an important role in digital transformation and the exploitation of new services. The evolution of mobile networks from the first generation (1G) to the 5th generation is still a long process. 2G networks have developed the messaging service, which complements the already operational voice service. 2G technology has rapidly progressed to the third generation (3G), incorporating multimedia data transmission techniques. It then progressed to fourth generation (4G) and LTE (Long Term Evolution), increasing the transmission speed to improve 3G. Currently, developed countries have already moved to 5G. In developing countries, including Burundi, a member of the East African Community (ECA) where more than 80% are connected to 2G technologies, 40% are connected to the 3G network and 25% to the 4G network and are not yet connected to the 5G network and then still a process. The objective of this article is to analyze the coverage of 2G, 3G and 4G networks in Burundi. This analysis will make it possible to identify possible deficits in order to reduce the digital divide between connected urban areas and remote rural areas. Furthermore, this analysis will draw the attention of decision-makers to the need to deploy networks and coverage to allow the population to access mobile and Internet services and thus enable the digitalization of the population. Finally, this article shows the level of coverage, the digital divide and an overview of the deployment of base stations (BTS) throughout the country to promote the transformation and digital inclusion of services.展开更多
We investigated factors contributing to mobile phone dependence. To 139 medical students, we administered a self-reporting questionnaire designed to evaluate mobile phone dependence, health-related lifestyle, patterns...We investigated factors contributing to mobile phone dependence. To 139 medical students, we administered a self-reporting questionnaire designed to evaluate mobile phone dependence, health-related lifestyle, patterns of behavior, and depressive state. Multivariate logistic regression analysis revealed that scores for poor health-related lifestyle, Type A behavior pattern, and presence of depression are independently associated with degree of mobile phone dependency. These findings suggest that persons with an unhealthy lifestyle, Type A behavior traits, or depression might benefit from mobile phone use guidance.展开更多
Mobile health apps (MHAs) and medical apps (MAs) are becoming increasinglypopular as digital interventions in a wide range of health-related applications inalmost all sectors of healthcare. The surge in demand for dig...Mobile health apps (MHAs) and medical apps (MAs) are becoming increasinglypopular as digital interventions in a wide range of health-related applications inalmost all sectors of healthcare. The surge in demand for digital medical solutionshas been accelerated by the need for new diagnostic and therapeutic methods inthe current coronavirus disease 2019 pandemic. This also applies to clinicalpractice in gastroenterology, which has, in many respects, undergone a recentdigital transformation with numerous consequences that will impact patients andhealth care professionals in the near future. MHAs and MAs are considered tohave great potential, especially for chronic diseases, as they can support the selfmanagementof patients in many ways. Despite the great potential associated withthe application of MHAs and MAs in gastroenterology and health care in general,there are numerous challenges to be met in the future, including both the ethicaland legal aspects of applying this technology. The aim of this article is to providean overview of the current status of MHA and MA use in the field ofgastroenterology, describe the future perspectives in this field and point out someof the challenges that need to be addressed.展开更多
A mobile medical information system (MMIS) is an integrated application (app) of traditional hospital information systems (HIS) which comprise a picture archiving and communications system (PACS), laboratory informati...A mobile medical information system (MMIS) is an integrated application (app) of traditional hospital information systems (HIS) which comprise a picture archiving and communications system (PACS), laboratory information system (LIS), pharmaceutical management information system (PMIS), radiology information system (RIS), and nursing information system (NIS). A dynamic resource allocation table is critical for optimizing the performance to the mobile system, including the doctors, nurses, or other relevant health workers. We have designed a smart dynamic resource allocation model by using the C4.5 algorithm and cumulative distribution for optimizing the weight of resource allocated for the five major attributes in a cooperation communications system. Weka is used in this study. The class of concept is the performance of the app, optimal or suboptimal. Three generations of optimization of the weight in accordance with the optimizing rate are shown.展开更多
An improved internetworking approach is proposed to enhance the Internet connectivity which is deteriorated due to unidirectional links and blind rebroadcasting of gateway discovery packets for mobile ad hoc networks....An improved internetworking approach is proposed to enhance the Internet connectivity which is deteriorated due to unidirectional links and blind rebroadcasting of gateway discovery packets for mobile ad hoc networks. The hybrid gateway discovery scheme that combined the advantages of a proactive and reactive gateway discovery approach is used to achieve high connectivity while keeping overhead costs low. By exchanging ad hoc on-demand distance vector (AODV) hello packet which includes additional fields named symmetric neighbor list and asymmetric neighbor list, unidirectional links are removed from route computation and broadcast storm can also be relieved simultaneously. Performance results using ns-2 simulations, under varying numbers of unidirectional links and node speeds, show that this improved Internet connectivity approach can provide better performance than others.展开更多
Reliable communication and intensive computing power cannot be provided effectively by temporary hot spots in disaster areas and complex terrain ground infrastructure.Mitigating this has greatly developed the applicat...Reliable communication and intensive computing power cannot be provided effectively by temporary hot spots in disaster areas and complex terrain ground infrastructure.Mitigating this has greatly developed the application and integration of UAV and Mobile Edge Computing(MEC)to the Internet of Things(loT).However,problems such as multi-user and huge data flow in large areas,which contradict the reality that a single UAV is constrained by limited computing power,still exist.Due to allowing UAV collaboration to accomplish complex tasks,cooperative task offloading between multiple UAVs must meet the interdependence of tasks and realize parallel processing,which reduces the computing power consumption and endurance pressure of terminals.Considering the computing requirements of the user terminal,delay constraint of a computing task,energy constraint,and safe distance of UAV,we constructed a UAV-Assisted cooperative offloading energy efficiency system for mobile edge computing to minimize user terminal energy consumption.However,the resulting optimization problem is originally nonconvex and thus,difficult to solve optimally.To tackle this problem,we developed an energy efficiency optimization algorithm using Block Coordinate Descent(BCD)that decomposes the problem into three convex subproblems.Furthermore,we jointly optimized the number of local computing tasks,number of computing offloaded tasks,trajectories of UAV,and offloading matching relationship between multi-UAVs and multiuser terminals.Simulation results show that the proposed approach is suitable for different channel conditions and significantly saves the user terminal energy consumption compared with other benchmark schemes.展开更多
This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the per...This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the perspective of blocking attacks. On this basis, the host protection mobile agent protection technology is selected, and a method to enhance the security protection of mobile agents (referred to as IEOP method) is proposed. The method first encrypts the mobile agent code using the encryption function, and then encapsulates the encrypted mobile agent with the improved EOP protocol IEOP, and then traces the suspicious execution result. Experiments show that using this method can block most malicious attacks on mobile agents, and can protect the integrity and confidentiality of mobile agents, but the increment of mobile agent tour time is not large.展开更多
Mobile agents is becoming a prosperous research field due to recent prevalence of Internet andJava. Although it brings great challenges to traditional distributed processing technologies, its attractive advantages sti...Mobile agents is becoming a prosperous research field due to recent prevalence of Internet andJava. Although it brings great challenges to traditional distributed processing technologies, its attractive advantages stimulate us to further the work on it with great ardor. This paper presents the basic concepts aboutthe Inchoate technique and describes current research status on it. Major obstacles and their possible solutions are discussed.展开更多
The development of Financial Technology(FinTech)in areas such as mobile Internet,cloud computing,big data,search engines,and blockchain technology have significantly changed the financial industry.FinTech is expected ...The development of Financial Technology(FinTech)in areas such as mobile Internet,cloud computing,big data,search engines,and blockchain technology have significantly changed the financial industry.FinTech is expected to overturn the traditional banking business model,forcing banks to upgrade and transform.This study adopts a comparative case study method to contrast and analyze the Industrial and Commercial Bank of China(ICBC)and Citibank.It analyzes the strategies,organizations,HR systems,and product innovations adopted by these two banks in response to the impact of FinTech.This paper proposes an“electric vehicle”mode for ICBC and an“airplane mode”for Citibank.Further,it describes the difficulties encountered by the Chinese banking industry and proposes some feasible ways to upgrade.“Technology power”will become the core competitive concept for the financial institutions of the future.展开更多
With the rapid development of mobile Internet, people pay increasing attention to the wireless network security problem. But due to the specificity of the wireless network, at present it is rare to see the research of...With the rapid development of mobile Internet, people pay increasing attention to the wireless network security problem. But due to the specificity of the wireless network, at present it is rare to see the research of wireless intrusion alerts clustering method for mobile Internet. This paper proposes a Wireless Intrusion Alert Clustering Method(WIACM) based on the information of the mobile terminal. The method includes alert formatting, alert reduction and alert classification. By introducing key information of the mobile terminal device, this method aggregates the original alerts into hyper alerts. The experimental results show that WIACM would be appropriate for real attack scenarios of mobile Internet, and reduce the amount of alerts with more accuracy of alert analysis.展开更多
Based on the analysis of developing target, function and constitution of cloth order system under wap gateway, the mobile communication principle of cloth order system under wap gateway is given out. The implementatio...Based on the analysis of developing target, function and constitution of cloth order system under wap gateway, the mobile communication principle of cloth order system under wap gateway is given out. The implementation method for information communication of cloth order system are elaborated by using programming technology of active server page (ASP)3.0 and wireless markup language (WML). The browsing and inquiry of cloth information, sending and receiving of cloth order can be easily realized by the developed order system on mobile internet according to user’s requirements.展开更多
Based on the analysis of application status in real network,the trace model of some typical mobile Internet applications data is given and their impact on 2G/3G network is discussed in this paper.Furthermore,in order ...Based on the analysis of application status in real network,the trace model of some typical mobile Internet applications data is given and their impact on 2G/3G network is discussed in this paper.Furthermore,in order to support the mobile Internet application efficiently in future,the issues including the impact on the Long Term Evolution (LTE-A) system and some potential solutions for performance optimization are studied.Based on the trace data model of IM traffic,the performacne evaluaiton of LTE-A system shows that some specific configuration machanisms can play an important role in improving network system efficiency in the case of IM traffic.展开更多
文摘This paper presents the results of the development and creation of plasma-chemical reactors for mobile and stationary installations for the destruction and disposal of solid, liquid, gaseous and mixed medical waste based on the domestic plasma generator PUN-1, with air as the plasma-forming gas. The design and principle of operation of plasma-chemical reactors installed on mobile experimental and industrial plants “Plazmon-1,2,3”, as well as the main features of the plasma waste disposal process are described.
文摘We investigated factors contributing to Internet addiction in 105 Japanese medical students. The subjects were administered by a self-reporting questionnaire designed to evaluate demographic factors, Internet addiction, loneliness, health-related lifestyle factors, depressive state, patterns of behavior, and mobile phone dependence. Results of multivariate logistic regression analysis indicated that loneliness and mobile phone dependence were positively related to degree of addiction. Our findings suggest that Internet addiction is associated with loneliness and mobile phone dependence in Japanese students.
基金supported by National Natural Science Foundation of China(Grant No.62071377,62101442,62201456)Natural Science Foundation of Shaanxi Province(Grant No.2023-YBGY-036,2022JQ-687)The Graduate Student Innovation Foundation Project of Xi’an University of Posts and Telecommunications under Grant CXJJDL2022003.
文摘The Internet of Medical Things(Io MT) is regarded as a critical technology for intelligent healthcare in the foreseeable 6G era. Nevertheless, due to the limited computing power capability of edge devices and task-related coupling relationships, Io MT faces unprecedented challenges. Considering the associative connections among tasks, this paper proposes a computing offloading policy for multiple-user devices(UDs) considering device-to-device(D2D) communication and a multi-access edge computing(MEC)technique under the scenario of Io MT. Specifically,to minimize the total delay and energy consumption concerning the requirement of Io MT, we first analyze and model the detailed local execution, MEC execution, D2D execution, and associated tasks offloading exchange model. Consequently, the associated tasks’ offloading scheme of multi-UDs is formulated as a mixed-integer nonconvex optimization problem. Considering the advantages of deep reinforcement learning(DRL) in processing tasks related to coupling relationships, a Double DQN based associative tasks computing offloading(DDATO) algorithm is then proposed to obtain the optimal solution, which can make the best offloading decision under the condition that tasks of UDs are associative. Furthermore, to reduce the complexity of the DDATO algorithm, the cacheaided procedure is intentionally introduced before the data training process. This avoids redundant offloading and computing procedures concerning tasks that previously have already been cached by other UDs. In addition, we use a dynamic ε-greedy strategy in the action selection section of the algorithm, thus preventing the algorithm from falling into a locally optimal solution. Simulation results demonstrate that compared with other existing methods for associative task models concerning different structures in the Io MT network, the proposed algorithm can lower the total cost more effectively and efficiently while also providing a tradeoff between delay and energy consumption tolerance.
基金supported by the Natural Science Foundation of China (No.62171051)。
文摘Puncturing has been recognized as a promising technology to cope with the coexistence problem of enhanced mobile broadband(eMBB) and ultra-reliable low latency communications(URLLC)traffic. However, the steady performance of eMBB traffic while meeting the requirements of URLLC traffic with puncturing is a major challenge in some realistic scenarios. In this paper, we pay attention to the timely and energy-efficient processing for eMBB traffic in the industrial Internet of Things(IIoT), where mobile edge computing(MEC) is employed for data processing. Specifically, the performance of eMBB traffic and URLLC traffic in a MEC-based IIoT system is ensured by setting the threshold of tolerable delay and outage probability, respectively. Furthermore,considering the limited energy supply, an energy minimization problem of eMBB device is formulated under the above constraints, by jointly optimizing the resource blocks(RBs) punctured by URLLC traffic, data offloading and transmit power of eMBB device. With Markov's inequality, the problem is reformulated by transforming the probabilistic outage constraint into a deterministic constraint. Meanwhile, an iterative energy minimization algorithm(IEMA) is proposed.Simulation results demonstrate that our algorithm has a significant reduction in the energy consumption for eMBB device and achieves a better overall effect compared to several benchmarks.
文摘Mobile and Internet network coverage plays an important role in digital transformation and the exploitation of new services. The evolution of mobile networks from the first generation (1G) to the 5th generation is still a long process. 2G networks have developed the messaging service, which complements the already operational voice service. 2G technology has rapidly progressed to the third generation (3G), incorporating multimedia data transmission techniques. It then progressed to fourth generation (4G) and LTE (Long Term Evolution), increasing the transmission speed to improve 3G. Currently, developed countries have already moved to 5G. In developing countries, including Burundi, a member of the East African Community (ECA) where more than 80% are connected to 2G technologies, 40% are connected to the 3G network and 25% to the 4G network and are not yet connected to the 5G network and then still a process. The objective of this article is to analyze the coverage of 2G, 3G and 4G networks in Burundi. This analysis will make it possible to identify possible deficits in order to reduce the digital divide between connected urban areas and remote rural areas. Furthermore, this analysis will draw the attention of decision-makers to the need to deploy networks and coverage to allow the population to access mobile and Internet services and thus enable the digitalization of the population. Finally, this article shows the level of coverage, the digital divide and an overview of the deployment of base stations (BTS) throughout the country to promote the transformation and digital inclusion of services.
文摘We investigated factors contributing to mobile phone dependence. To 139 medical students, we administered a self-reporting questionnaire designed to evaluate mobile phone dependence, health-related lifestyle, patterns of behavior, and depressive state. Multivariate logistic regression analysis revealed that scores for poor health-related lifestyle, Type A behavior pattern, and presence of depression are independently associated with degree of mobile phone dependency. These findings suggest that persons with an unhealthy lifestyle, Type A behavior traits, or depression might benefit from mobile phone use guidance.
文摘Mobile health apps (MHAs) and medical apps (MAs) are becoming increasinglypopular as digital interventions in a wide range of health-related applications inalmost all sectors of healthcare. The surge in demand for digital medical solutionshas been accelerated by the need for new diagnostic and therapeutic methods inthe current coronavirus disease 2019 pandemic. This also applies to clinicalpractice in gastroenterology, which has, in many respects, undergone a recentdigital transformation with numerous consequences that will impact patients andhealth care professionals in the near future. MHAs and MAs are considered tohave great potential, especially for chronic diseases, as they can support the selfmanagementof patients in many ways. Despite the great potential associated withthe application of MHAs and MAs in gastroenterology and health care in general,there are numerous challenges to be met in the future, including both the ethicaland legal aspects of applying this technology. The aim of this article is to providean overview of the current status of MHA and MA use in the field ofgastroenterology, describe the future perspectives in this field and point out someof the challenges that need to be addressed.
文摘A mobile medical information system (MMIS) is an integrated application (app) of traditional hospital information systems (HIS) which comprise a picture archiving and communications system (PACS), laboratory information system (LIS), pharmaceutical management information system (PMIS), radiology information system (RIS), and nursing information system (NIS). A dynamic resource allocation table is critical for optimizing the performance to the mobile system, including the doctors, nurses, or other relevant health workers. We have designed a smart dynamic resource allocation model by using the C4.5 algorithm and cumulative distribution for optimizing the weight of resource allocated for the five major attributes in a cooperation communications system. Weka is used in this study. The class of concept is the performance of the app, optimal or suboptimal. Three generations of optimization of the weight in accordance with the optimizing rate are shown.
基金The National Natural Science Foundation of China(No60362001)
文摘An improved internetworking approach is proposed to enhance the Internet connectivity which is deteriorated due to unidirectional links and blind rebroadcasting of gateway discovery packets for mobile ad hoc networks. The hybrid gateway discovery scheme that combined the advantages of a proactive and reactive gateway discovery approach is used to achieve high connectivity while keeping overhead costs low. By exchanging ad hoc on-demand distance vector (AODV) hello packet which includes additional fields named symmetric neighbor list and asymmetric neighbor list, unidirectional links are removed from route computation and broadcast storm can also be relieved simultaneously. Performance results using ns-2 simulations, under varying numbers of unidirectional links and node speeds, show that this improved Internet connectivity approach can provide better performance than others.
基金supported by the Jiangsu Provincial Key Research and Development Program(No.BE2020084-4)the National Natural Science Foundation of China(No.92067201)+2 种基金the National Natural Science Foundation of China(61871446)the Open Research Fund of Jiangsu Key Laboratory of Wireless Communications(710020017002)the Natural Science Foundation of Nanjing University of Posts and telecommunications(NY220047).
文摘Reliable communication and intensive computing power cannot be provided effectively by temporary hot spots in disaster areas and complex terrain ground infrastructure.Mitigating this has greatly developed the application and integration of UAV and Mobile Edge Computing(MEC)to the Internet of Things(loT).However,problems such as multi-user and huge data flow in large areas,which contradict the reality that a single UAV is constrained by limited computing power,still exist.Due to allowing UAV collaboration to accomplish complex tasks,cooperative task offloading between multiple UAVs must meet the interdependence of tasks and realize parallel processing,which reduces the computing power consumption and endurance pressure of terminals.Considering the computing requirements of the user terminal,delay constraint of a computing task,energy constraint,and safe distance of UAV,we constructed a UAV-Assisted cooperative offloading energy efficiency system for mobile edge computing to minimize user terminal energy consumption.However,the resulting optimization problem is originally nonconvex and thus,difficult to solve optimally.To tackle this problem,we developed an energy efficiency optimization algorithm using Block Coordinate Descent(BCD)that decomposes the problem into three convex subproblems.Furthermore,we jointly optimized the number of local computing tasks,number of computing offloaded tasks,trajectories of UAV,and offloading matching relationship between multi-UAVs and multiuser terminals.Simulation results show that the proposed approach is suitable for different channel conditions and significantly saves the user terminal energy consumption compared with other benchmark schemes.
基金supported by the National Natural Science Foundation of China (61772196 61472136)+3 种基金the Hunan Provincial Focus Social Science Fund (2016ZDB006)Hunan Provincial Social Science Achievement Review Committee results appraisal identification project (Xiang social assessment 2016JD05)Key Project of Hunan Provincial Social Science Achievement Review Committee (XSP 19ZD1005)the financial support provided by the Key Laboratory of Hunan Province for New Retail Virtual Reality Technology (2017TP1026)
文摘This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the perspective of blocking attacks. On this basis, the host protection mobile agent protection technology is selected, and a method to enhance the security protection of mobile agents (referred to as IEOP method) is proposed. The method first encrypts the mobile agent code using the encryption function, and then encapsulates the encrypted mobile agent with the improved EOP protocol IEOP, and then traces the suspicious execution result. Experiments show that using this method can block most malicious attacks on mobile agents, and can protect the integrity and confidentiality of mobile agents, but the increment of mobile agent tour time is not large.
文摘Mobile agents is becoming a prosperous research field due to recent prevalence of Internet andJava. Although it brings great challenges to traditional distributed processing technologies, its attractive advantages stimulate us to further the work on it with great ardor. This paper presents the basic concepts aboutthe Inchoate technique and describes current research status on it. Major obstacles and their possible solutions are discussed.
基金This manuscript has sponsored by(531-541009)from the Advanced Institute of Finance,Sun Yat-sen University.
文摘The development of Financial Technology(FinTech)in areas such as mobile Internet,cloud computing,big data,search engines,and blockchain technology have significantly changed the financial industry.FinTech is expected to overturn the traditional banking business model,forcing banks to upgrade and transform.This study adopts a comparative case study method to contrast and analyze the Industrial and Commercial Bank of China(ICBC)and Citibank.It analyzes the strategies,organizations,HR systems,and product innovations adopted by these two banks in response to the impact of FinTech.This paper proposes an“electric vehicle”mode for ICBC and an“airplane mode”for Citibank.Further,it describes the difficulties encountered by the Chinese banking industry and proposes some feasible ways to upgrade.“Technology power”will become the core competitive concept for the financial institutions of the future.
基金partially supported by the Zhejiang Provincial Natural Science Foundation of China(No.LY16F020010)the Zhejiang Key Discipline Fund of Computer Applied Technology(No.pd2013457)the Hangzhou Science&Technology Development Project of China(No.20140533B13)
文摘With the rapid development of mobile Internet, people pay increasing attention to the wireless network security problem. But due to the specificity of the wireless network, at present it is rare to see the research of wireless intrusion alerts clustering method for mobile Internet. This paper proposes a Wireless Intrusion Alert Clustering Method(WIACM) based on the information of the mobile terminal. The method includes alert formatting, alert reduction and alert classification. By introducing key information of the mobile terminal device, this method aggregates the original alerts into hyper alerts. The experimental results show that WIACM would be appropriate for real attack scenarios of mobile Internet, and reduce the amount of alerts with more accuracy of alert analysis.
文摘Based on the analysis of developing target, function and constitution of cloth order system under wap gateway, the mobile communication principle of cloth order system under wap gateway is given out. The implementation method for information communication of cloth order system are elaborated by using programming technology of active server page (ASP)3.0 and wireless markup language (WML). The browsing and inquiry of cloth information, sending and receiving of cloth order can be easily realized by the developed order system on mobile internet according to user’s requirements.
基金supported by the project"the Cross Layer Optimization Technique for IMT-Advanced " under Grant No.2010ZX03003-001-01-03
文摘Based on the analysis of application status in real network,the trace model of some typical mobile Internet applications data is given and their impact on 2G/3G network is discussed in this paper.Furthermore,in order to support the mobile Internet application efficiently in future,the issues including the impact on the Long Term Evolution (LTE-A) system and some potential solutions for performance optimization are studied.Based on the trace data model of IM traffic,the performacne evaluaiton of LTE-A system shows that some specific configuration machanisms can play an important role in improving network system efficiency in the case of IM traffic.