This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the per...This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the perspective of blocking attacks. On this basis, the host protection mobile agent protection technology is selected, and a method to enhance the security protection of mobile agents (referred to as IEOP method) is proposed. The method first encrypts the mobile agent code using the encryption function, and then encapsulates the encrypted mobile agent with the improved EOP protocol IEOP, and then traces the suspicious execution result. Experiments show that using this method can block most malicious attacks on mobile agents, and can protect the integrity and confidentiality of mobile agents, but the increment of mobile agent tour time is not large.展开更多
Based on the analysis of developing target, function and constitution of cloth order system under wap gateway, the mobile communication principle of cloth order system under wap gateway is given out. The implementatio...Based on the analysis of developing target, function and constitution of cloth order system under wap gateway, the mobile communication principle of cloth order system under wap gateway is given out. The implementation method for information communication of cloth order system are elaborated by using programming technology of active server page (ASP)3.0 and wireless markup language (WML). The browsing and inquiry of cloth information, sending and receiving of cloth order can be easily realized by the developed order system on mobile internet according to user’s requirements.展开更多
Mobile Internet will be the killer application of 3G.For the mobile Internet,the business model of telecom operators has to evolve to Teleco2.0.IP Multimedia Subsystem(IMS)will be used mainly for VIP and enterprise cu...Mobile Internet will be the killer application of 3G.For the mobile Internet,the business model of telecom operators has to evolve to Teleco2.0.IP Multimedia Subsystem(IMS)will be used mainly for VIP and enterprise customers.Mass-oriented entertainment and new media services will be based on the Intelligent Node Overlay Node(INON)/Distributed Service Network(DSN).The core network will be flat,with an evolution route from Internet High Speed Packet Access(I-HSPA)to System Architecture Evolution(SAE),and even the Internet can be used as the core network.The low-cost mobile phone can be accessed to HTTP Internet by using'client end software+portal'model with cloud computing.Flat rate will be the only fee model to be accepted by customers,and cheap and reasonable prices will contribute to the development of mobile Internet.展开更多
The present paper explores the ideological and political education work of university counselors in Xinjiang under the mobile Internet environment.It elaborates on the significant value of this work in adapting to con...The present paper explores the ideological and political education work of university counselors in Xinjiang under the mobile Internet environment.It elaborates on the significant value of this work in adapting to contemporary development trends,promoting cultural integration,and safeguarding regional stability.The study analyzes various challenges encountered,including difficulties in information screening,limitations in online communication,and insufficient digital literacy.Corresponding countermeasures are proposed with the aim of enhancing the effectiveness of ideological and political education in Xinjiang s higher education institutions,fostering healthy student development,and facilitating regional progress.展开更多
In mobile cloud computing,trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud.Aiming at the security and trust management...In mobile cloud computing,trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud.Aiming at the security and trust management of mobile agent system in mobile cloud computing environment,the Human Trust Mechanism(HTM)is used to study the subjective trust formation,trust propagation and trust evolution law,and the subjective trust dynamic management algorithm(MASTM)is proposed.Based on the interaction experience between the mobile agent and the execution host and the third-party recommendation information to collect the basic trust data,the public trust host selection algorithm is given.The isolated malicious host algorithm and the integrated trust degree calculation algorithm realize the function of selecting the trusted cluster and isolating the malicious host,so as to enhance the security interaction between the mobile agent and the host.Given algorithm simulation and verification were carried out to prove its feasibility and effectiveness.展开更多
This paper pays its attention on Chinese mobile Internet service( MIS). Chinese MIS is developing so rapidly that the research on the mechanism of the formation of MIS assessment makes significant sense and therefore ...This paper pays its attention on Chinese mobile Internet service( MIS). Chinese MIS is developing so rapidly that the research on the mechanism of the formation of MIS assessment makes significant sense and therefore the three layers construct of the artificial neural network( ANN) theory is applied to address the problem. The final research model contains MIS features including personalization,localization,reachability,connectivity,convenience and ubiquity as the input layer variables,perceived MIS quality and MIS satisfaction as the hidden layer variables and reuse intention as the output layer variable. MIS risk is identified as the mediating variable. Theoretically,the framework is robust and reveals the mechanism of how customers evaluate a certain mobile Internet service. Practically,the model based on ANN should shed some light on how to understand and improve customer perceived mobile Internet service for both MIS giants and new comers.展开更多
On the basis of an initial introduction to the status quo in the worldwide research on mobile Internet technologies,this paper presents the problems encountered during the research and points out some key points and r...On the basis of an initial introduction to the status quo in the worldwide research on mobile Internet technologies,this paper presents the problems encountered during the research and points out some key points and research goals in this field.It infers that it is necessary to perform research on issues such as new Internet routing theories and protocols,structural characteristics of changing networks,multicast theories in mobile Internet environment and IPv6-based wireless IP network theories.展开更多
The development of Financial Technology(FinTech)in areas such as mobile Internet,cloud computing,big data,search engines,and blockchain technology have significantly changed the financial industry.FinTech is expected ...The development of Financial Technology(FinTech)in areas such as mobile Internet,cloud computing,big data,search engines,and blockchain technology have significantly changed the financial industry.FinTech is expected to overturn the traditional banking business model,forcing banks to upgrade and transform.This study adopts a comparative case study method to contrast and analyze the Industrial and Commercial Bank of China(ICBC)and Citibank.It analyzes the strategies,organizations,HR systems,and product innovations adopted by these two banks in response to the impact of FinTech.This paper proposes an“electric vehicle”mode for ICBC and an“airplane mode”for Citibank.Further,it describes the difficulties encountered by the Chinese banking industry and proposes some feasible ways to upgrade.“Technology power”will become the core competitive concept for the financial institutions of the future.展开更多
The combination and application of the mobile internet techniques with the weather radar monitoring data and the numerical weather pre-diction data were introduced, and the smart phone weather routing application sof...The combination and application of the mobile internet techniques with the weather radar monitoring data and the numerical weather pre-diction data were introduced, and the smart phone weather routing application software for both land and aquatic traffic safety, which is equipped with the function of analysis and warning of disastrous weather, was developed to reduce potential weather risks encountered during the journey as much as possible.展开更多
In this paper, we conduct research on the service industry mobile marketing under the mobile Internet background. Marketing activities from scratch, never valued to the cherished, the Marketing Department in from scra...In this paper, we conduct research on the service industry mobile marketing under the mobile Internet background. Marketing activities from scratch, never valued to the cherished, the Marketing Department in from scratch, from the production of auxiliary department to the enterprise leading department of course have made indelible contribution to the development of the enterprise. Services marketing is not justfor external customers, at the same time also want to take a marketing gimmick to internal customers. External marketing is a pointer to a series of services provided by the customer, including all preferential foreign propaganda and sales promotion action plan, including personnel and more than the personnel communication skills, as well as the services provided by all service equipment. This paper analyzes this issue from theunique perspective that is meaningful.展开更多
With the rapid development of mobile Internet, people pay increasing attention to the wireless network security problem. But due to the specificity of the wireless network, at present it is rare to see the research of...With the rapid development of mobile Internet, people pay increasing attention to the wireless network security problem. But due to the specificity of the wireless network, at present it is rare to see the research of wireless intrusion alerts clustering method for mobile Internet. This paper proposes a Wireless Intrusion Alert Clustering Method(WIACM) based on the information of the mobile terminal. The method includes alert formatting, alert reduction and alert classification. By introducing key information of the mobile terminal device, this method aggregates the original alerts into hyper alerts. The experimental results show that WIACM would be appropriate for real attack scenarios of mobile Internet, and reduce the amount of alerts with more accuracy of alert analysis.展开更多
The mobile Intemet industry has exp- erienced dramatic changes as plenty of new applications and business models emerged. This study conducts a qualitative review on the changes through adopting business ecosystem app...The mobile Intemet industry has exp- erienced dramatic changes as plenty of new applications and business models emerged. This study conducts a qualitative review on the changes through adopting business ecosystem approaches. An analytical framework is estab- lished for reviewing the structure of mobile Internet business ecosystem. Then the core value, key actors, and inter-firm relationships of the mobile Internet ecosystem in the past and in the present are compared. It is found that the ecosystem structure has shifted from an MNO-centric model to a polycentric one with highly expanded value sources and di- versified keystone players. Accordingly some suggestions for regulatory policy makers are provided in terms of the roles of mobile Inter- net in social welfare improvement, the call for a convergent regulatory system, and chal- lenges for information security regulation.展开更多
Based on the analysis of application status in real network,the trace model of some typical mobile Internet applications data is given and their impact on 2G/3G network is discussed in this paper.Furthermore,in order ...Based on the analysis of application status in real network,the trace model of some typical mobile Internet applications data is given and their impact on 2G/3G network is discussed in this paper.Furthermore,in order to support the mobile Internet application efficiently in future,the issues including the impact on the Long Term Evolution (LTE-A) system and some potential solutions for performance optimization are studied.Based on the trace data model of IM traffic,the performacne evaluaiton of LTE-A system shows that some specific configuration machanisms can play an important role in improving network system efficiency in the case of IM traffic.展开更多
1.Introduction It has been almost 60 years since the launch of Intelsat-I,the world’s first commercial satellite communications system.Over the past few decades,the development of satellite communications has been dr...1.Introduction It has been almost 60 years since the launch of Intelsat-I,the world’s first commercial satellite communications system.Over the past few decades,the development of satellite communications has been driven by both technological advancements and growing application demands,which have given rise to three primary services:broadcast,fixed satellite,and mobile satellite services[1].展开更多
A wireless search system was integrated on Windows 2000 server.Based on the communication principle between wireless data and Internet,the object expression of search file,the automatic query of document information,t...A wireless search system was integrated on Windows 2000 server.Based on the communication principle between wireless data and Internet,the object expression of search file,the automatic query of document information,the segment browsing of result information,and the receiving and sending of user information were realized by using Active Server Page 3.0,VB Script,WML Script insert languages and object orient database technology.The requirement querying information of material processing through Internet by GPRS,WAP mobile handset and so on was accomplished.展开更多
This paper proposes that the business model of mobile Internet services is shifting from a walled garden to an open one.The service development model relies more on open Application Programme Interface(API);and the on...This paper proposes that the business model of mobile Internet services is shifting from a walled garden to an open one.The service development model relies more on open Application Programme Interface(API);and the online application software store is becoming an important platform for service delivery.The terminal platform has been the commanding point of the layout and competition of the mobile Inernet in the world.Based on the smart terminal,the competition for platform system from the hardware platform to the operation system,the middleware and the applications platform have been in shape globally.The competition in the terminal platform of mobile Internet is moving from close to open,from uni-controlled by one company to open and cooperated by the whole industry.China should forge a terminal platform system and the ecosystem for the mobile Internet industry,and seek to achieve an overall breakthrough in the whole value chain of the industry based on the huge mobile user market and the productivity of the terminal.The breakthrough should start from the application software,stepping from the top to the bottom platform,to extend the industry chain.展开更多
基金supported by the National Natural Science Foundation of China (61772196 61472136)+3 种基金the Hunan Provincial Focus Social Science Fund (2016ZDB006)Hunan Provincial Social Science Achievement Review Committee results appraisal identification project (Xiang social assessment 2016JD05)Key Project of Hunan Provincial Social Science Achievement Review Committee (XSP 19ZD1005)the financial support provided by the Key Laboratory of Hunan Province for New Retail Virtual Reality Technology (2017TP1026)
文摘This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the perspective of blocking attacks. On this basis, the host protection mobile agent protection technology is selected, and a method to enhance the security protection of mobile agents (referred to as IEOP method) is proposed. The method first encrypts the mobile agent code using the encryption function, and then encapsulates the encrypted mobile agent with the improved EOP protocol IEOP, and then traces the suspicious execution result. Experiments show that using this method can block most malicious attacks on mobile agents, and can protect the integrity and confidentiality of mobile agents, but the increment of mobile agent tour time is not large.
文摘Based on the analysis of developing target, function and constitution of cloth order system under wap gateway, the mobile communication principle of cloth order system under wap gateway is given out. The implementation method for information communication of cloth order system are elaborated by using programming technology of active server page (ASP)3.0 and wireless markup language (WML). The browsing and inquiry of cloth information, sending and receiving of cloth order can be easily realized by the developed order system on mobile internet according to user’s requirements.
文摘Mobile Internet will be the killer application of 3G.For the mobile Internet,the business model of telecom operators has to evolve to Teleco2.0.IP Multimedia Subsystem(IMS)will be used mainly for VIP and enterprise customers.Mass-oriented entertainment and new media services will be based on the Intelligent Node Overlay Node(INON)/Distributed Service Network(DSN).The core network will be flat,with an evolution route from Internet High Speed Packet Access(I-HSPA)to System Architecture Evolution(SAE),and even the Internet can be used as the core network.The low-cost mobile phone can be accessed to HTTP Internet by using'client end software+portal'model with cloud computing.Flat rate will be the only fee model to be accepted by customers,and cheap and reasonable prices will contribute to the development of mobile Internet.
基金Supported by Key Program of Natural Science Foundation of Xinjiang Hetian College"Spatial Heterogeneity of Soil Organic Carbon and Carbon Sequestration Potential in Hotan Farmland"(2025ZR003).
文摘The present paper explores the ideological and political education work of university counselors in Xinjiang under the mobile Internet environment.It elaborates on the significant value of this work in adapting to contemporary development trends,promoting cultural integration,and safeguarding regional stability.The study analyzes various challenges encountered,including difficulties in information screening,limitations in online communication,and insufficient digital literacy.Corresponding countermeasures are proposed with the aim of enhancing the effectiveness of ideological and political education in Xinjiang s higher education institutions,fostering healthy student development,and facilitating regional progress.
基金This work was supported by the National Natural Science Foundation of China(61772196,61472136)the Hunan Provincial Focus Social Science Fund(2016ZDB006)+2 种基金Hunan Provincial Social Science Achievement Review Committee results appraisal identification project(Xiang social assessment 2016JD05)Key Project of Hunan Provincial Social Science Achievement Review Committee(XSP 19ZD1005)The authors gratefully acknowledge the financial support provided by the Key Laboratory of Hunan Province for New Retail Virtual Reality Technology(2017TP1026).
文摘In mobile cloud computing,trust is a very important parameter in mobile cloud computing security because data storage and data processing are performed remotely in the cloud.Aiming at the security and trust management of mobile agent system in mobile cloud computing environment,the Human Trust Mechanism(HTM)is used to study the subjective trust formation,trust propagation and trust evolution law,and the subjective trust dynamic management algorithm(MASTM)is proposed.Based on the interaction experience between the mobile agent and the execution host and the third-party recommendation information to collect the basic trust data,the public trust host selection algorithm is given.The isolated malicious host algorithm and the integrated trust degree calculation algorithm realize the function of selecting the trusted cluster and isolating the malicious host,so as to enhance the security interaction between the mobile agent and the host.Given algorithm simulation and verification were carried out to prove its feasibility and effectiveness.
文摘This paper pays its attention on Chinese mobile Internet service( MIS). Chinese MIS is developing so rapidly that the research on the mechanism of the formation of MIS assessment makes significant sense and therefore the three layers construct of the artificial neural network( ANN) theory is applied to address the problem. The final research model contains MIS features including personalization,localization,reachability,connectivity,convenience and ubiquity as the input layer variables,perceived MIS quality and MIS satisfaction as the hidden layer variables and reuse intention as the output layer variable. MIS risk is identified as the mediating variable. Theoretically,the framework is robust and reveals the mechanism of how customers evaluate a certain mobile Internet service. Practically,the model based on ANN should shed some light on how to understand and improve customer perceived mobile Internet service for both MIS giants and new comers.
文摘On the basis of an initial introduction to the status quo in the worldwide research on mobile Internet technologies,this paper presents the problems encountered during the research and points out some key points and research goals in this field.It infers that it is necessary to perform research on issues such as new Internet routing theories and protocols,structural characteristics of changing networks,multicast theories in mobile Internet environment and IPv6-based wireless IP network theories.
基金This manuscript has sponsored by(531-541009)from the Advanced Institute of Finance,Sun Yat-sen University.
文摘The development of Financial Technology(FinTech)in areas such as mobile Internet,cloud computing,big data,search engines,and blockchain technology have significantly changed the financial industry.FinTech is expected to overturn the traditional banking business model,forcing banks to upgrade and transform.This study adopts a comparative case study method to contrast and analyze the Industrial and Commercial Bank of China(ICBC)and Citibank.It analyzes the strategies,organizations,HR systems,and product innovations adopted by these two banks in response to the impact of FinTech.This paper proposes an“electric vehicle”mode for ICBC and an“airplane mode”for Citibank.Further,it describes the difficulties encountered by the Chinese banking industry and proposes some feasible ways to upgrade.“Technology power”will become the core competitive concept for the financial institutions of the future.
基金Supported by Projects of Science Technology Department of Zhejiang Province(2014C23003,2015C02048,2017C03035)Major Projects of Zhejiang Meteorological Bureau(2015ZD10,2015ZD11)
文摘The combination and application of the mobile internet techniques with the weather radar monitoring data and the numerical weather pre-diction data were introduced, and the smart phone weather routing application software for both land and aquatic traffic safety, which is equipped with the function of analysis and warning of disastrous weather, was developed to reduce potential weather risks encountered during the journey as much as possible.
文摘In this paper, we conduct research on the service industry mobile marketing under the mobile Internet background. Marketing activities from scratch, never valued to the cherished, the Marketing Department in from scratch, from the production of auxiliary department to the enterprise leading department of course have made indelible contribution to the development of the enterprise. Services marketing is not justfor external customers, at the same time also want to take a marketing gimmick to internal customers. External marketing is a pointer to a series of services provided by the customer, including all preferential foreign propaganda and sales promotion action plan, including personnel and more than the personnel communication skills, as well as the services provided by all service equipment. This paper analyzes this issue from theunique perspective that is meaningful.
基金partially supported by the Zhejiang Provincial Natural Science Foundation of China(No.LY16F020010)the Zhejiang Key Discipline Fund of Computer Applied Technology(No.pd2013457)the Hangzhou Science&Technology Development Project of China(No.20140533B13)
文摘With the rapid development of mobile Internet, people pay increasing attention to the wireless network security problem. But due to the specificity of the wireless network, at present it is rare to see the research of wireless intrusion alerts clustering method for mobile Internet. This paper proposes a Wireless Intrusion Alert Clustering Method(WIACM) based on the information of the mobile terminal. The method includes alert formatting, alert reduction and alert classification. By introducing key information of the mobile terminal device, this method aggregates the original alerts into hyper alerts. The experimental results show that WIACM would be appropriate for real attack scenarios of mobile Internet, and reduce the amount of alerts with more accuracy of alert analysis.
基金supported by the China Fundamental Research Funds for the Central Universities under Grant No.BUPT2012RC1011
文摘The mobile Intemet industry has exp- erienced dramatic changes as plenty of new applications and business models emerged. This study conducts a qualitative review on the changes through adopting business ecosystem approaches. An analytical framework is estab- lished for reviewing the structure of mobile Internet business ecosystem. Then the core value, key actors, and inter-firm relationships of the mobile Internet ecosystem in the past and in the present are compared. It is found that the ecosystem structure has shifted from an MNO-centric model to a polycentric one with highly expanded value sources and di- versified keystone players. Accordingly some suggestions for regulatory policy makers are provided in terms of the roles of mobile Inter- net in social welfare improvement, the call for a convergent regulatory system, and chal- lenges for information security regulation.
基金supported by the project"the Cross Layer Optimization Technique for IMT-Advanced " under Grant No.2010ZX03003-001-01-03
文摘Based on the analysis of application status in real network,the trace model of some typical mobile Internet applications data is given and their impact on 2G/3G network is discussed in this paper.Furthermore,in order to support the mobile Internet application efficiently in future,the issues including the impact on the Long Term Evolution (LTE-A) system and some potential solutions for performance optimization are studied.Based on the trace data model of IM traffic,the performacne evaluaiton of LTE-A system shows that some specific configuration machanisms can play an important role in improving network system efficiency in the case of IM traffic.
基金supported in part by the National Key Research and Development Program of China(2023YFB2904703).
文摘1.Introduction It has been almost 60 years since the launch of Intelsat-I,the world’s first commercial satellite communications system.Over the past few decades,the development of satellite communications has been driven by both technological advancements and growing application demands,which have given rise to three primary services:broadcast,fixed satellite,and mobile satellite services[1].
基金Item Sponsored by Doctoral Program of Higher Education of China(97014515)
文摘A wireless search system was integrated on Windows 2000 server.Based on the communication principle between wireless data and Internet,the object expression of search file,the automatic query of document information,the segment browsing of result information,and the receiving and sending of user information were realized by using Active Server Page 3.0,VB Script,WML Script insert languages and object orient database technology.The requirement querying information of material processing through Internet by GPRS,WAP mobile handset and so on was accomplished.
文摘This paper proposes that the business model of mobile Internet services is shifting from a walled garden to an open one.The service development model relies more on open Application Programme Interface(API);and the online application software store is becoming an important platform for service delivery.The terminal platform has been the commanding point of the layout and competition of the mobile Inernet in the world.Based on the smart terminal,the competition for platform system from the hardware platform to the operation system,the middleware and the applications platform have been in shape globally.The competition in the terminal platform of mobile Internet is moving from close to open,from uni-controlled by one company to open and cooperated by the whole industry.China should forge a terminal platform system and the ecosystem for the mobile Internet industry,and seek to achieve an overall breakthrough in the whole value chain of the industry based on the huge mobile user market and the productivity of the terminal.The breakthrough should start from the application software,stepping from the top to the bottom platform,to extend the industry chain.