Learn More
With the development of Mobile Internet, the smart phones become more and more popular. So a lot of people choose to store personal information directly on the Smartphone. It usually leads to important personal information leakage because of the relatively weak security mechanism of the smart phone. Therefore, this paper presents a hierarchical file(More)
Nowadays, most reasonable software protection techniques are proposed only to resist static-only attacks. However, with the development of Hybrid Static-Dynamic Disassembly (HSDD), the techniques used to prevent static-only attacks can be easily detected and eliminated, and the difficulty of crack is greatly reduced. In this paper, in order to resist HSDD,(More)
This paper proposes an innovative way to organize the increasingly complicated and massive intrusion detection rules that caused by numerous variety of attacks for the IDS (Intrusion Detection System) such as Snort, which will largely enhance the detection efficiency in both space and time aspect. Being different from the traditional one-dimensional list or(More)
An elitist selection adaptive Genetic Algorithm is presented to select an optimal cloud service composite plan from a lot of composite plans on the basis of global Quality-of-Service (QoS) constraints. In this Algorithm, some strategies are provided to improve convergence and population diversity and raise fitness result. These strategies include an elitist(More)
With the development of terminal technology, OPhone platform is playing more and more influent role in people’s daily life. Taking chance of the prosperity of OPhone technology, this paper aims at bringing forth some explorations on cultivating OPhone technology talents in universities. Firstly, some inductions are given to illustrate the developing(More)
For the problem of cloud service selection, this paper gives a hybrid algorithm. The hybrid algorithm is composed mainly by Simplex Method and Genetic Algorithm. In this algorithm, a tree traversal sequence encoding scheme and some Simplex Method operations are proposed. The design of the tree traversal sequence encoding can support various types of service(More)
With the rapid development of mobile networks, mobile communication network optimization plays an increasingly important role, and the data collection before optimization is a very important process. This paper presents a distributed test data acquisition system, which is deployed in an Android-based cell phone that is conveniently carried. Our system uses(More)
OPhone is an open source platform in intelligent terminal released by China Mobile. With the increase of various applications based on the platform, OPhone education is becoming more and more important in colleges and universities. This paper introduces OPhone platform and OPhone education in the beginning. Then the necessity of setting up an experimental(More)
AODV routing protocol makes least hops as a principle when establishing routes. Nodes in Ad Hoc networks have limited energy. Node will exit the network and cannot provide service when its energy is depleted. In recent years, many works have been taken to save energy of ad hoc networks. This paper presents a method which can prolong network lifetime. In(More)
  • 1