This study examined the relationship between loneliness and mobile phone addiction(MPA),and the mediating roles of social anxiety and self presentation in that relationship.The sample comprised 559 students(male=250,f...This study examined the relationship between loneliness and mobile phone addiction(MPA),and the mediating roles of social anxiety and self presentation in that relationship.The sample comprised 559 students(male=250,female=309,mean age=20.78 years,SD=1.13 years).Based on bias-corrected bootstrap method,our indicate loneliness to be associated with MPA of college students.Additionally,social anxiety and self-presentation,respectively,partially mediated the association between loneliness and college students’MPA.Specifically,as loneliness increased,both social anxiety and self-presentation rose,thereby increasing MPA.Social anxiety and self-presentation also sequentially mediated the relationship between loneliness and MPA among college students,such that greater loneliness heightened social anxiety,which subsequently enhanced self-presentation,ultimately resulting in increased MPA.These findings are consistent with Compensatory Internet Use Theory(CIUT).This study findings suggest for college students counselling and development services should alleviate loneliness and social anxiety through group activities,Cognitive-behavioral Therapy(CBT),and social skills training to foster belonging and reduce students’reliance on mobile phones.展开更多
1.Introduction It has been almost 60 years since the launch of Intelsat-I,the world’s first commercial satellite communications system.Over the past few decades,the development of satellite communications has been dr...1.Introduction It has been almost 60 years since the launch of Intelsat-I,the world’s first commercial satellite communications system.Over the past few decades,the development of satellite communications has been driven by both technological advancements and growing application demands,which have given rise to three primary services:broadcast,fixed satellite,and mobile satellite services[1].展开更多
The present paper explores the ideological and political education work of university counselors in Xinjiang under the mobile Internet environment.It elaborates on the significant value of this work in adapting to con...The present paper explores the ideological and political education work of university counselors in Xinjiang under the mobile Internet environment.It elaborates on the significant value of this work in adapting to contemporary development trends,promoting cultural integration,and safeguarding regional stability.The study analyzes various challenges encountered,including difficulties in information screening,limitations in online communication,and insufficient digital literacy.Corresponding countermeasures are proposed with the aim of enhancing the effectiveness of ideological and political education in Xinjiang s higher education institutions,fostering healthy student development,and facilitating regional progress.展开更多
At present,energy consumption is one of the main bottlenecks in autonomous mobile robot development.To address the challenge of high energy consumption in path planning for autonomous mobile robots navigating unknown ...At present,energy consumption is one of the main bottlenecks in autonomous mobile robot development.To address the challenge of high energy consumption in path planning for autonomous mobile robots navigating unknown and complex environments,this paper proposes an Attention-Enhanced Dueling Deep Q-Network(ADDueling DQN),which integrates a multi-head attention mechanism and a prioritized experience replay strategy into a Dueling-DQN reinforcement learning framework.A multi-objective reward function,centered on energy efficiency,is designed to comprehensively consider path length,terrain slope,motion smoothness,and obstacle avoidance,enabling optimal low-energy trajectory generation in 3D space from the source.The incorporation of a multihead attention mechanism allows the model to dynamically focus on energy-critical state features—such as slope gradients and obstacle density—thereby significantly improving its ability to recognize and avoid energy-intensive paths.Additionally,the prioritized experience replay mechanism accelerates learning from key decision-making experiences,suppressing inefficient exploration and guiding the policy toward low-energy solutions more rapidly.The effectiveness of the proposed path planning algorithm is validated through simulation experiments conducted in multiple off-road scenarios.Results demonstrate that AD-Dueling DQN consistently achieves the lowest average energy consumption across all tested environments.Moreover,the proposed method exhibits faster convergence and greater training stability compared to baseline algorithms,highlighting its global optimization capability under energy-aware objectives in complex terrains.This study offers an efficient and scalable intelligent control strategy for the development of energy-conscious autonomous navigation systems.展开更多
Due to the growth of smart cities,many real-time systems have been developed to support smart cities using Internet of Things(IoT)and emerging technologies.They are formulated to collect the data for environment monit...Due to the growth of smart cities,many real-time systems have been developed to support smart cities using Internet of Things(IoT)and emerging technologies.They are formulated to collect the data for environment monitoring and automate the communication process.In recent decades,researchers have made many efforts to propose autonomous systems for manipulating network data and providing on-time responses in critical operations.However,the widespread use of IoT devices in resource-constrained applications and mobile sensor networks introduces significant research challenges for cybersecurity.These systems are vulnerable to a variety of cyberattacks,including unauthorized access,denial-of-service attacks,and data leakage,which compromise the network’s security.Additionally,uneven load balancing between mobile IoT devices,which frequently experience link interferences,compromises the trustworthiness of the system.This paper introduces a Multi-Agent secured framework using lightweight edge computing to enhance cybersecurity for sensor networks,aiming to leverage artificial intelligence for adaptive routing and multi-metric trust evaluation to achieve data privacy and mitigate potential threats.Moreover,it enhances the efficiency of distributed sensors for energy consumption through intelligent data analytics techniques,resulting in highly consistent and low-latency network communication.Using simulations,the proposed framework reveals its significant performance compared to state-of-the-art approaches for energy consumption by 43%,latency by 46%,network throughput by 51%,packet loss rate by 40%,and denial of service attacks by 42%.展开更多
Mobile service robots(MSRs)in hospital environments require precise and robust trajectory tracking to ensure reliable operation under dynamic conditions,including model uncertainties and external disturbances.This stu...Mobile service robots(MSRs)in hospital environments require precise and robust trajectory tracking to ensure reliable operation under dynamic conditions,including model uncertainties and external disturbances.This study presents a cognitive control strategy that integrates a Numerical Feedforward Inverse Dynamic Controller(NFIDC)with a Feedback Radial Basis Function Neural Network(FRBFNN).The robot’s mechanical structure was designed in SolidWorks 2022 SP2.0 and validated under operational loads using finite element analysis in ANSYS 2022 R1.The NFIDC-FRBFNN framework merges proactive inverse dynamic compensation with adaptive neural learning to achieve smooth torque responses and accurate motion control.A two-stage simulation evaluation was conducted.In the first stage,the controller was tested in a simulated hospital environment under both ideal and non-ideal conditions.In the second,it was benchmarked against four established controllers-Neural Network Model Reference Adaptive(NNMRA),Z-number Fuzzy Logic(Z-FL),Adaptive Dynamic Controller(ADC),and Fuzzy Logic-PID(FL-PID)—using circular and lemniscate trajectories.Across ten runs,the proposed controller achieved the lowest tracking errors under all conditions.Under ideal conditions,it achieved average improvements of 55.24%,75.75%,and 55.20%in integral absolute error(IAE),integral squared error(ISE),and mean absolute error(MAE),respectively,with coefficient of variation(CV)reductions above 55%.Under non-ideal conditions,average improvements exceeded 64%in IAE,77%in ISE,and 66%in MAE,while maintaining CV reductions above 57%.These results confirm that the NFIDC-FRBFNN controller offers superior accuracy,robustness,and consistency for real-time path tracking in healthcare robotics.展开更多
As an essential element of intelligent trans-port systems,Internet of vehicles(IoV)has brought an immersive user experience recently.Meanwhile,the emergence of mobile edge computing(MEC)has enhanced the computational ...As an essential element of intelligent trans-port systems,Internet of vehicles(IoV)has brought an immersive user experience recently.Meanwhile,the emergence of mobile edge computing(MEC)has enhanced the computational capability of the vehicle which reduces task processing latency and power con-sumption effectively and meets the quality of service requirements of vehicle users.However,there are still some problems in the MEC-assisted IoV system such as poor connectivity and high cost.Unmanned aerial vehicles(UAVs)equipped with MEC servers have become a promising approach for providing com-munication and computing services to mobile vehi-cles.Hence,in this article,an optimal framework for the UAV-assisted MEC system for IoV to minimize the average system cost is presented.Through joint consideration of computational offloading decisions and computational resource allocation,the optimiza-tion problem of our proposed architecture is presented to reduce system energy consumption and delay.For purpose of tackling this issue,the original non-convex issue is converted into a convex issue and the alternat-ing direction method of multipliers-based distributed optimal scheme is developed.The simulation results illustrate that the presented scheme can enhance the system performance dramatically with regard to other schemes,and the convergence of the proposed scheme is also significant.展开更多
An improved internetworking approach is proposed to enhance the Internet connectivity which is deteriorated due to unidirectional links and blind rebroadcasting of gateway discovery packets for mobile ad hoc networks....An improved internetworking approach is proposed to enhance the Internet connectivity which is deteriorated due to unidirectional links and blind rebroadcasting of gateway discovery packets for mobile ad hoc networks. The hybrid gateway discovery scheme that combined the advantages of a proactive and reactive gateway discovery approach is used to achieve high connectivity while keeping overhead costs low. By exchanging ad hoc on-demand distance vector (AODV) hello packet which includes additional fields named symmetric neighbor list and asymmetric neighbor list, unidirectional links are removed from route computation and broadcast storm can also be relieved simultaneously. Performance results using ns-2 simulations, under varying numbers of unidirectional links and node speeds, show that this improved Internet connectivity approach can provide better performance than others.展开更多
The development of Financial Technology(FinTech)in areas such as mobile Internet,cloud computing,big data,search engines,and blockchain technology have significantly changed the financial industry.FinTech is expected ...The development of Financial Technology(FinTech)in areas such as mobile Internet,cloud computing,big data,search engines,and blockchain technology have significantly changed the financial industry.FinTech is expected to overturn the traditional banking business model,forcing banks to upgrade and transform.This study adopts a comparative case study method to contrast and analyze the Industrial and Commercial Bank of China(ICBC)and Citibank.It analyzes the strategies,organizations,HR systems,and product innovations adopted by these two banks in response to the impact of FinTech.This paper proposes an“electric vehicle”mode for ICBC and an“airplane mode”for Citibank.Further,it describes the difficulties encountered by the Chinese banking industry and proposes some feasible ways to upgrade.“Technology power”will become the core competitive concept for the financial institutions of the future.展开更多
This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the per...This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the perspective of blocking attacks. On this basis, the host protection mobile agent protection technology is selected, and a method to enhance the security protection of mobile agents (referred to as IEOP method) is proposed. The method first encrypts the mobile agent code using the encryption function, and then encapsulates the encrypted mobile agent with the improved EOP protocol IEOP, and then traces the suspicious execution result. Experiments show that using this method can block most malicious attacks on mobile agents, and can protect the integrity and confidentiality of mobile agents, but the increment of mobile agent tour time is not large.展开更多
With the rapid development of mobile Internet, people pay increasing attention to the wireless network security problem. But due to the specificity of the wireless network, at present it is rare to see the research of...With the rapid development of mobile Internet, people pay increasing attention to the wireless network security problem. But due to the specificity of the wireless network, at present it is rare to see the research of wireless intrusion alerts clustering method for mobile Internet. This paper proposes a Wireless Intrusion Alert Clustering Method(WIACM) based on the information of the mobile terminal. The method includes alert formatting, alert reduction and alert classification. By introducing key information of the mobile terminal device, this method aggregates the original alerts into hyper alerts. The experimental results show that WIACM would be appropriate for real attack scenarios of mobile Internet, and reduce the amount of alerts with more accuracy of alert analysis.展开更多
基金supported by The Xingdian Talent Support Program Project(41112080006/015)Yunnan University Graduate Research Innovation Fund Project(KC-252512463).
文摘This study examined the relationship between loneliness and mobile phone addiction(MPA),and the mediating roles of social anxiety and self presentation in that relationship.The sample comprised 559 students(male=250,female=309,mean age=20.78 years,SD=1.13 years).Based on bias-corrected bootstrap method,our indicate loneliness to be associated with MPA of college students.Additionally,social anxiety and self-presentation,respectively,partially mediated the association between loneliness and college students’MPA.Specifically,as loneliness increased,both social anxiety and self-presentation rose,thereby increasing MPA.Social anxiety and self-presentation also sequentially mediated the relationship between loneliness and MPA among college students,such that greater loneliness heightened social anxiety,which subsequently enhanced self-presentation,ultimately resulting in increased MPA.These findings are consistent with Compensatory Internet Use Theory(CIUT).This study findings suggest for college students counselling and development services should alleviate loneliness and social anxiety through group activities,Cognitive-behavioral Therapy(CBT),and social skills training to foster belonging and reduce students’reliance on mobile phones.
基金supported in part by the National Key Research and Development Program of China(2023YFB2904703).
文摘1.Introduction It has been almost 60 years since the launch of Intelsat-I,the world’s first commercial satellite communications system.Over the past few decades,the development of satellite communications has been driven by both technological advancements and growing application demands,which have given rise to three primary services:broadcast,fixed satellite,and mobile satellite services[1].
基金Supported by Key Program of Natural Science Foundation of Xinjiang Hetian College"Spatial Heterogeneity of Soil Organic Carbon and Carbon Sequestration Potential in Hotan Farmland"(2025ZR003).
文摘The present paper explores the ideological and political education work of university counselors in Xinjiang under the mobile Internet environment.It elaborates on the significant value of this work in adapting to contemporary development trends,promoting cultural integration,and safeguarding regional stability.The study analyzes various challenges encountered,including difficulties in information screening,limitations in online communication,and insufficient digital literacy.Corresponding countermeasures are proposed with the aim of enhancing the effectiveness of ideological and political education in Xinjiang s higher education institutions,fostering healthy student development,and facilitating regional progress.
文摘At present,energy consumption is one of the main bottlenecks in autonomous mobile robot development.To address the challenge of high energy consumption in path planning for autonomous mobile robots navigating unknown and complex environments,this paper proposes an Attention-Enhanced Dueling Deep Q-Network(ADDueling DQN),which integrates a multi-head attention mechanism and a prioritized experience replay strategy into a Dueling-DQN reinforcement learning framework.A multi-objective reward function,centered on energy efficiency,is designed to comprehensively consider path length,terrain slope,motion smoothness,and obstacle avoidance,enabling optimal low-energy trajectory generation in 3D space from the source.The incorporation of a multihead attention mechanism allows the model to dynamically focus on energy-critical state features—such as slope gradients and obstacle density—thereby significantly improving its ability to recognize and avoid energy-intensive paths.Additionally,the prioritized experience replay mechanism accelerates learning from key decision-making experiences,suppressing inefficient exploration and guiding the policy toward low-energy solutions more rapidly.The effectiveness of the proposed path planning algorithm is validated through simulation experiments conducted in multiple off-road scenarios.Results demonstrate that AD-Dueling DQN consistently achieves the lowest average energy consumption across all tested environments.Moreover,the proposed method exhibits faster convergence and greater training stability compared to baseline algorithms,highlighting its global optimization capability under energy-aware objectives in complex terrains.This study offers an efficient and scalable intelligent control strategy for the development of energy-conscious autonomous navigation systems.
基金supported by the Deanship of Graduate Studies and Scientific Research at Jouf University.
文摘Due to the growth of smart cities,many real-time systems have been developed to support smart cities using Internet of Things(IoT)and emerging technologies.They are formulated to collect the data for environment monitoring and automate the communication process.In recent decades,researchers have made many efforts to propose autonomous systems for manipulating network data and providing on-time responses in critical operations.However,the widespread use of IoT devices in resource-constrained applications and mobile sensor networks introduces significant research challenges for cybersecurity.These systems are vulnerable to a variety of cyberattacks,including unauthorized access,denial-of-service attacks,and data leakage,which compromise the network’s security.Additionally,uneven load balancing between mobile IoT devices,which frequently experience link interferences,compromises the trustworthiness of the system.This paper introduces a Multi-Agent secured framework using lightweight edge computing to enhance cybersecurity for sensor networks,aiming to leverage artificial intelligence for adaptive routing and multi-metric trust evaluation to achieve data privacy and mitigate potential threats.Moreover,it enhances the efficiency of distributed sensors for energy consumption through intelligent data analytics techniques,resulting in highly consistent and low-latency network communication.Using simulations,the proposed framework reveals its significant performance compared to state-of-the-art approaches for energy consumption by 43%,latency by 46%,network throughput by 51%,packet loss rate by 40%,and denial of service attacks by 42%.
基金supported by the Malaysia Ministry of Higher Education under Fundamental Research Grant Scheme with Project Code:FRGS/1/2024/TK07/USM/02/3.
文摘Mobile service robots(MSRs)in hospital environments require precise and robust trajectory tracking to ensure reliable operation under dynamic conditions,including model uncertainties and external disturbances.This study presents a cognitive control strategy that integrates a Numerical Feedforward Inverse Dynamic Controller(NFIDC)with a Feedback Radial Basis Function Neural Network(FRBFNN).The robot’s mechanical structure was designed in SolidWorks 2022 SP2.0 and validated under operational loads using finite element analysis in ANSYS 2022 R1.The NFIDC-FRBFNN framework merges proactive inverse dynamic compensation with adaptive neural learning to achieve smooth torque responses and accurate motion control.A two-stage simulation evaluation was conducted.In the first stage,the controller was tested in a simulated hospital environment under both ideal and non-ideal conditions.In the second,it was benchmarked against four established controllers-Neural Network Model Reference Adaptive(NNMRA),Z-number Fuzzy Logic(Z-FL),Adaptive Dynamic Controller(ADC),and Fuzzy Logic-PID(FL-PID)—using circular and lemniscate trajectories.Across ten runs,the proposed controller achieved the lowest tracking errors under all conditions.Under ideal conditions,it achieved average improvements of 55.24%,75.75%,and 55.20%in integral absolute error(IAE),integral squared error(ISE),and mean absolute error(MAE),respectively,with coefficient of variation(CV)reductions above 55%.Under non-ideal conditions,average improvements exceeded 64%in IAE,77%in ISE,and 66%in MAE,while maintaining CV reductions above 57%.These results confirm that the NFIDC-FRBFNN controller offers superior accuracy,robustness,and consistency for real-time path tracking in healthcare robotics.
基金in part by the National Natural Science Foundation of China(NSFC)under Grant 62371012in part by the Beijing Natural Science Foundation under Grant 4252001.
文摘As an essential element of intelligent trans-port systems,Internet of vehicles(IoV)has brought an immersive user experience recently.Meanwhile,the emergence of mobile edge computing(MEC)has enhanced the computational capability of the vehicle which reduces task processing latency and power con-sumption effectively and meets the quality of service requirements of vehicle users.However,there are still some problems in the MEC-assisted IoV system such as poor connectivity and high cost.Unmanned aerial vehicles(UAVs)equipped with MEC servers have become a promising approach for providing com-munication and computing services to mobile vehi-cles.Hence,in this article,an optimal framework for the UAV-assisted MEC system for IoV to minimize the average system cost is presented.Through joint consideration of computational offloading decisions and computational resource allocation,the optimiza-tion problem of our proposed architecture is presented to reduce system energy consumption and delay.For purpose of tackling this issue,the original non-convex issue is converted into a convex issue and the alternat-ing direction method of multipliers-based distributed optimal scheme is developed.The simulation results illustrate that the presented scheme can enhance the system performance dramatically with regard to other schemes,and the convergence of the proposed scheme is also significant.
基金The National Natural Science Foundation of China(No60362001)
文摘An improved internetworking approach is proposed to enhance the Internet connectivity which is deteriorated due to unidirectional links and blind rebroadcasting of gateway discovery packets for mobile ad hoc networks. The hybrid gateway discovery scheme that combined the advantages of a proactive and reactive gateway discovery approach is used to achieve high connectivity while keeping overhead costs low. By exchanging ad hoc on-demand distance vector (AODV) hello packet which includes additional fields named symmetric neighbor list and asymmetric neighbor list, unidirectional links are removed from route computation and broadcast storm can also be relieved simultaneously. Performance results using ns-2 simulations, under varying numbers of unidirectional links and node speeds, show that this improved Internet connectivity approach can provide better performance than others.
基金This manuscript has sponsored by(531-541009)from the Advanced Institute of Finance,Sun Yat-sen University.
文摘The development of Financial Technology(FinTech)in areas such as mobile Internet,cloud computing,big data,search engines,and blockchain technology have significantly changed the financial industry.FinTech is expected to overturn the traditional banking business model,forcing banks to upgrade and transform.This study adopts a comparative case study method to contrast and analyze the Industrial and Commercial Bank of China(ICBC)and Citibank.It analyzes the strategies,organizations,HR systems,and product innovations adopted by these two banks in response to the impact of FinTech.This paper proposes an“electric vehicle”mode for ICBC and an“airplane mode”for Citibank.Further,it describes the difficulties encountered by the Chinese banking industry and proposes some feasible ways to upgrade.“Technology power”will become the core competitive concept for the financial institutions of the future.
基金supported by the National Natural Science Foundation of China (61772196 61472136)+3 种基金the Hunan Provincial Focus Social Science Fund (2016ZDB006)Hunan Provincial Social Science Achievement Review Committee results appraisal identification project (Xiang social assessment 2016JD05)Key Project of Hunan Provincial Social Science Achievement Review Committee (XSP 19ZD1005)the financial support provided by the Key Laboratory of Hunan Province for New Retail Virtual Reality Technology (2017TP1026)
文摘This paper analyzes the reasons for the formation of security problems in mobile agent systems, and analyzes and compares the security mechanisms and security technologies of existing mobile agent systems from the perspective of blocking attacks. On this basis, the host protection mobile agent protection technology is selected, and a method to enhance the security protection of mobile agents (referred to as IEOP method) is proposed. The method first encrypts the mobile agent code using the encryption function, and then encapsulates the encrypted mobile agent with the improved EOP protocol IEOP, and then traces the suspicious execution result. Experiments show that using this method can block most malicious attacks on mobile agents, and can protect the integrity and confidentiality of mobile agents, but the increment of mobile agent tour time is not large.
基金partially supported by the Zhejiang Provincial Natural Science Foundation of China(No.LY16F020010)the Zhejiang Key Discipline Fund of Computer Applied Technology(No.pd2013457)the Hangzhou Science&Technology Development Project of China(No.20140533B13)
文摘With the rapid development of mobile Internet, people pay increasing attention to the wireless network security problem. But due to the specificity of the wireless network, at present it is rare to see the research of wireless intrusion alerts clustering method for mobile Internet. This paper proposes a Wireless Intrusion Alert Clustering Method(WIACM) based on the information of the mobile terminal. The method includes alert formatting, alert reduction and alert classification. By introducing key information of the mobile terminal device, this method aggregates the original alerts into hyper alerts. The experimental results show that WIACM would be appropriate for real attack scenarios of mobile Internet, and reduce the amount of alerts with more accuracy of alert analysis.