Research on Security Requirement and Improvement Recommendation of Smart Mobile Terminal

2013 ◽  
Vol 336-338 ◽  
pp. 1631-1634
Author(s):  
Zhuo Lv ◽  
Shuang Xia Niu ◽  
Zhi Gang Zhang

The rapid development of wireless technology has been a qualitative leap in the mobile network performance, allowing mobile network terminals to enjoy a variety of service types. But as the important personal information storage carrier to users, the own security of the smart mobile terminal is related to the safety of the entire mobile Internet. This paper introduces the security situation of the smart mobile terminals, analyzes the potential security threats and the security needs, and at last gives improvement recommendations of the smart mobile terminals protection.

2021 ◽  
Vol 2021 ◽  
pp. 1-7
Author(s):  
Jianmei Wang ◽  
Linhai Lei

The quality of English teaching cannot be separated from the students’s accumulation and mastery of vocabulary, and sufficient vocabulary can ensure that students feel easy and comfortable in the language application. However, there are still some problems in teaching English vocabulary in colleges and universities, such as single presentation method, lack of real context, and other difficulties. With the rapid development of mobile Internet, the share of smart mobile devices among college students has increased, which in turn has laid the foundation for the development of new learning modes. The mobile terminal-mediated learning mode in English classroom teaching has become a hot topic of research nowadays, of which English vocabulary teaching has become a typical example. This paper is designed as a system model of edge computing, in which the user terminal device can connect wirelessly with each MECS and offload the tasks to be processed on the MECS, which helps the user terminal device to process and return the results to the user terminal device. The research in this paper also provides a basis for students’ independent and lifelong learning of English words and for schools’ information technology to serve English vocabulary teaching and learning.


2014 ◽  
Vol 989-994 ◽  
pp. 5605-5608
Author(s):  
Zhi Hao Zhao ◽  
Ya Bing Chen

In this paper, according to the actual students management work in the school, and link to the student attendance work, we propose one design of the B/S structure system of student attendance management based on the Java EE framework. The system realizes performances such as request and approval leave online, students' attendance data summarize, and others which reduce the workload of student management and improve the working efficiency. With the rapid development of mobile network on campus, this system also has carried on the development of mobile terminal, to further expand the scope of application of the system with the desktop of the student management system transplantation.


Author(s):  
Ayisat Wuraola Yusuf-Asaju ◽  
Zulkhairi Md. Dahalin ◽  
Azman Ta’a

The increase in the usage of different mobile internet applications can cause deterioration in the mobile network performance. Such deterioration often declines the performance of the mobile network services that can influence the mobile Internet user’s experience, which can make the internet users switch between different mobile network operators to get good user experience. In this case, the success of mobile network operators primarily depends on the ability to ensure good quality of experience (QoE), which is a measure of users’ perceived quality of mobile Internet service. Traditionally, QoE is usually examined in laboratory experiments to enable a fixed contextual factor among the participants even though the results derived from these laboratory experiments presented an estimated mean opinion score representing perceived QoE. The use of user experience dataset involving time and location gathered from the mobile network traffic for modelling perceived QoE is still limited in the literature. The mobile Internet user experience dataset involving the time and location constituted in the mobile network can be used by the mobile network operators to make data-driven decisions to deal with disruptions observed in the network performance and provide an optimal solution based on the insights derived from the user experience data. Therefore, this paper proposed a framework for modelling mobile network QoE using the big data analytics approach. The proposed framework describes the process of estimating or predicting perceived QoE based on the datasets obtained or gathered from the mobile network to enable the mobile network operators effectively to manage the network performance and provide the users a satisfactory mobile Internet QoE.  


2013 ◽  
Vol 427-429 ◽  
pp. 2691-2695
Author(s):  
Zhi Qiang Wei ◽  
Xiao Cheng Yang ◽  
Hao Liu ◽  
Yan Xiu Sheng ◽  
Xi Wang

In recent years, with the rapid development of mobile communication technology, intelligent mobile terminal tendency is increasingly popular. People are stepping into the era of mobile networks. Information systems created for enterprise or individual gradually rely on mobile networks and mobile devices. Because the mobile network is often interrupted, data synchronization working on the mobile network is very difficult. We put forward a model of the data synchronization in mobile network. JSON and data compression with parallel processing are introduced into the model. Thus, the model has high efficiency. It was applied to a company's Warehouse Management System and solved the problem of data synchronization preferably.


2018 ◽  
Vol 2018 ◽  
pp. 1-8
Author(s):  
Xiaohe Li ◽  
Xingming Zhang ◽  
Haoxiang Wang

We explore how to leverage the performance of face feature points detection on mobile terminals from 3 aspects. First, we optimize the models used in SDM algorithms via PCA and Spectrum Clustering. Second, we propose an evaluation criterion using Linear Discriminative Analysis to choose the best local feature descriptions which plays a critical role in feature points detection. Third, we take advantage of multicore architecture of mobile terminal and parallelize the optimized SDM algorithm to improve the efficiency further. The experiment observations show that our final accomplished GPC-SDM (improved Supervised Descent Method using spectrum clustering, PCA, and GPU acceleration) suppresses the memory usage, which is beneficial and efficient to meet the real-time requirements.


Symmetry ◽  
2019 ◽  
Vol 11 (3) ◽  
pp. 361
Author(s):  
Jaeseung Lee ◽  
Jungho Kang ◽  
Moon-seog Jun ◽  
Jaekyung Han

The rapid development of Internet technology and the spread of various smart devices have enabled the creation of a convenient environment used by people all around the world. It has become increasingly popular, with the technology known as the Internet of Things (IoT). However, both the development and proliferation of IoT technology have caused various problems such as personal information leakage and privacy violations due to attacks by hackers. Furthermore, countless devices are connected to the network in the sense that all things are connected to the Internet, and network attacks that have thus far been exploited in the existing PC environment are now also occurring frequently in the IoT environment. In fact, there have been many security incidents such as DDoS attacks involving the hacking of IP cameras, which are typical IoT devices, leakages of personal information and the monitoring of numerous persons without their consent. While attacks in the existing Internet environment were PC-based, we have confirmed that various smart devices used in the IoT environment—such as IP cameras and tablets—can be utilized and exploited for attacks on the network. Even though it is necessary to apply security solutions to IoT devices in order to prevent potential problems in the IoT environment, it is difficult to install and execute security solutions due to the inherent features of small devices with limited memory space and computational power in this aforementioned IoT environment, and it is also difficult to protect certificates and encryption keys due to easy physical access. Accordingly, this paper examines potential security threats in the IoT environment and proposes a security design and the development of an intelligent security framework designed to prevent them. The results of the performance evaluation of this study confirm that the proposed protocol is able to cope with various security threats in the network. Furthermore, from the perspective of energy efficiency, it was also possible to confirm that the proposed protocol is superior to other cryptographic protocols. Thus, it is expected to be effective if applied to the IoT environment.


2020 ◽  
Vol 8 (3) ◽  
pp. 96-110
Author(s):  
Leo Sun ◽  
◽  
Chung Tin Fah ◽  

Over the past six years, (between the period 2014 -2019), China's electronic information industry and mobile Internet industry has morphed rapidly in line with its economic performance. This is attributable to the strong cooperation between smart phones and the mobile Internet, capitalizing on the rapid development of mobile terminal functions. The mobile Internet is the underlying contributor to the competitive environment of the entire Chinese smartphone industry. Xiaomi began its operations with the launch of its Android-based firmware MIUI (pronounced “Me You I”) in August 2010; a modified and hardcoded user interface, incorporating features from Apple’s IOS and Samsung’s TouchWizUI. As of 2018, Xiaomi is the world’s fourth largest smartphone manufacturer, and it has expanded its products and services to include a wider range of consumer electronics and a smart home device ecosystem. It is a company focused on developing newgeneration smartphone software, and Xiaomi operated a successful mobile Internet business. Xiaomi has three core products: Mi Chat, MIUI and Xiaomi smartphones. This paper will use business management models from PEST, Porter’s five forces and SWOT to analyze the internal and external environment of Xiaomi. Finally, the paper evaluates whether Xiaomi has a strategic model of sustainable development, strategic flaws and recommend some suggestions to overcome them.


2016 ◽  
Vol 8 (3) ◽  
pp. 1-10 ◽  
Author(s):  
Fenggang Sun ◽  
Lidong Zhai ◽  
Yuejin Du ◽  
Peng Wang ◽  
Jun Li

In recent years, botnet has become one of the most serious security threats to Internet. With the rapid development of mobile network and the popularity of smartphones, botnet began to spread to mobile platform. In order to counter mobile botnet, it is meaningful to study its constructive mechanism and reproduce it. In the past studies, researchers have designed several kinds of mobile botnet model based on various communication channels, such as SMS, Bluetooth, etc. This paper proposed a general mobile botnet model based on open service, and verified its feasibility by implementing it on Android platform. This paper also analyzed this model, and then proposed potential defense strategy in terms of its characteristic, which may provide reliable theoretical and technical support for future prevention and privacy protection.


With the rapid development of mobile Internet technology, mobile network data traffic presents an explosive growth trend. Especially, the proportion of mobile video business has become a large proportion in mobile Internet business. Mobile video business is considered as a typical business in the 5G network, such as in online education. The growth of video traffic poses a great challenge to mobile network. In order to provide users with better quality of experience (QoE), it requires mobile network to provide higher data transmission rate and lower network delay. This paper adopts a combined optimization to minimize total cost and maximize QoE simultaneously. The optimization problem is solved by ant colony algorithm. The effectiveness is verified on experiment.


2014 ◽  
Vol 511-512 ◽  
pp. 1244-1250
Author(s):  
Hao Hao Song ◽  
Qing Hong Shen ◽  
Xiao Xiao Zhang ◽  
Jian Gu

As information technology continues to develop, smart mobile terminal has become the electronic equipment most closely with people life and work. Meanwhile, the security threats are also increasing to smart mobile terminal when it conducts the business application. Based on the analysis of security assessment architecture for smart mobile terminals, the security risk assessment model for smart mobile terminals is proposed in this paper. The security of smart mobile terminals can be assessed based on the proposed security risk assessment model well.


Sign in / Sign up

Export Citation Format

Share Document