Tiejun Pan

Learn More
Nowadays, along with mobile E-Commerce progress, mobile E-Commerce meets problems below: Firstly, the one is small Web bandwidth. Secondly, the other is high configuration of mobile telephone side. Furthermore user interface is also simple and unfriendly. “3G mobile E-commerce platform Based on Cloud Computing” have characteristics of high Web(More)
We present the induced intuitionistic fuzzy ordered weighted averaging-weighted average (I-IFOWAWA) operator. It is a new aggregation operator that uses the intuitionistic fuzzy weighted average (IFWA) and the induced intuitionistic fuzzy ordered weighted averaging (I-IFOWA) operator in the same formulation. We study some of its main properties and we have(More)
With the increase of the software complexity, the defect measurement becomes a task of high priority. We give a new software defect analytical methodology based on orthogonal classification. This method has two folds. Then a set of orthogonal defect classification (ODC) reference model is given which includes activity, trigger, severity, origin, content and(More)
Single nucleotide polymorphisms (SNPs) occurring in noncoding sequences have largely been ignored in genome-wide association studies (GWAS). Yet, amounting evidence suggests that many noncoding SNPs especially those that are in the vicinity of protein coding genes play important roles in shaping chromatin structure and regulate gene expression and, as such,(More)
Mobile E-commerce (M-commerce) service raises a number of security and privacy challenges. To address this, we propose an advanced mobile security solution and related security methodology based on distribute key without changing hardware configuration of the mobile devices. The solution consists of the UE (User Equipment), an electronic security key (eKey)(More)
Nowadays data security is making a way into market. New techniques of data security have gained interest of many researchers. Encryption-Decryption technique is one such way of data security. These techniques not only provide confidentiality, integrity of data but also help in authentication of user. Authentication is possible because encryption-decryption(More)
The Fourth Party Logistics (4PL) information system used today is comprised of disconnected legacy system, and lacks the support for interoperability for whole supply chain integration. This situation often prevents the 4PL provider from fully exploring market opportunities in a timely fashion. To address this problem, we propose an agent-based framework(More)