scispace - formally typeset
Search or ask a question

Showing papers on "Application software published in 2016"


Proceedings ArticleDOI
23 May 2016
TL;DR: This work explores the validity of browser fingerprinting in today's environment, and shows that innovations in HTML5 provide access to highly discriminating attributes, notably with the use of the Canvas API which relies on multiple layers of the user's system.
Abstract: Worldwide, the number of people and the time spent browsing the web keeps increasing. Accordingly, the technologies to enrich the user experience are evolving at an amazing pace. Many of these evolutions provide for a more interactive web (e.g., boom of JavaScript libraries, weekly innovations in HTML5), a more available web (e.g., explosion of mobile devices), a more secure web (e.g., Flash is disappearing, NPAPI plugins are being deprecated), and a more private web (e.g., increased legislation against cookies, huge success of extensions such as Ghostery and AdBlock). Nevertheless, modern browser technologies, which provide the beauty and power of the web, also provide a darker side, a rich ecosystem of exploitable data that can be used to build unique browser fingerprints. Our work explores the validity of browser fingerprinting in today's environment. Over the past year, we have collected 118,934 fingerprints composed of 17 attributes gathered thanks to the most recent web technologies. We show that innovations in HTML5 provide access to highly discriminating attributes, notably with the use of the Canvas API which relies on multiple layers of the user's system. In addition, we show that browser fingerprinting is as effective on mobile devices as it is on desktops and laptops, albeit for radically different reasons due to their more constrained hardware and software environments. We also evaluate how browser fingerprinting could stop being a threat to user privacy if some technological evolutions continue (e.g., disappearance of plugins) or are embraced by browser vendors (e.g., standard HTTP headers).

213 citations


Journal ArticleDOI
TL;DR: A new model that captures most abstract and generic technical aspects of mobile learning service quality is proposed, including availability, fast response times, flexibility, scalability, usability, maintainability, functionality, reliability, connectivity, performance, user interface and security.

121 citations


Patent
21 Jun 2016
TL;DR: In this paper, a web-based application development server in a cloud system that provides an application development framework (ADF) is used to create an application through the application development UI and configure it to be downloaded from a download location in the cloud system.
Abstract: A system creates an application. The system accesses an application development user interface (“UI”) through a browser. The application development UI is hosted by a web-based application development server in a cloud system that provides an application development framework (“ADF”). The system develops the application through the application development UI. The application is developed with the ADF and is configured to be downloaded from a download location in the cloud system. The application is configured to be downloaded on a device as a native application.

73 citations


Journal ArticleDOI
16 Mar 2016-PLOS ONE
TL;DR: This research contributes to an in-depth understanding of the types of terrestrial artefacts that are likely to remain after the use of instant messaging services and application software on a contemporary Windows operating system.
Abstract: Instant messaging (IM) has changed the way people communicate with each other. However, the interactive and instant nature of these applications (apps) made them an attractive choice for malicious cyber activities such as phishing. The forensic examination of IM apps for modern Windows 8.1 (or later) has been largely unexplored, as the platform is relatively new. In this paper, we seek to determine the data remnants from the use of two popular Windows Store application software for instant messaging, namely Facebook and Skype on a Windows 8.1 client machine. This research contributes to an in-depth understanding of the types of terrestrial artefacts that are likely to remain after the use of instant messaging services and application software on a contemporary Windows operating system. Potential artefacts detected during the research include data relating to the installation or uninstallation of the instant messaging application software, log-in and log-off information, contact lists, conversations, and transferred files.

71 citations


Patent
19 Feb 2016
TL;DR: In this article, an illustrative mobile computing device executing weight, nutrition, health, behavior and exercise application software serves as a simulated combination personal trainer and dietician/nutritionist for the user using comprehensive databases storing personalized health, nutrition and exercise information.
Abstract: An illustrative mobile computing device executing weight, nutrition, health, behavior and exercise application software serves as a simulated combination personal trainer and dietician/nutritionist for the user using comprehensive databases storing personalized health, nutrition and exercise information. A mobile computing device, such as a smartphone, executing such software monitors, tracks and/or adjusts caloric intake, energy expenditure taking into account nutritional information and behavioral factors. The mobile computing device receives food consumption, exercise-related, behavior and other input using speech input and the device's GPS subsystem to ease data entry burden on users and to promote continued long-term usage. The system rewards user goal achievement in an automatic, seamless manner, through, for example, downloading music, books, or other media. In illustrative implementations, the system assists users to make healthy food and exercise choices by using a comprehensive color code system to identify good choices, bad choices and those in between.

56 citations


Proceedings ArticleDOI
22 May 2016
TL;DR: The CPN algorithm is installed in the Cognitive Routing Engine (CRE), a new application software for SDN, and it is shown that with limited monitoring overhead it is able to determine the near-optimal paths for given QoS metrics that may be proposed by the end users.
Abstract: In Software Defined Networks (SDN), intensive traffic monitoring is used to optimize the Quality-of-Service (QoS) of the network paths which are selected. Thus, we introduce the use of the Cognitive Packet Network (CPN) algorithm to SDN in order to optimize the search for new high-QoS paths. We install the CPN algorithm in the Cognitive Routing Engine (CRE), a new application software for SDN, and show that with limited monitoring overhead we are able to determine the near-optimal paths for given QoS metrics that may be proposed by the end users. Measurements that we have conducted on an experimental replica of the GEANT network that our approach uses close to 10 times less monitoring data than conventional SDN, but that we are able to approach the optimal paths within 2%.

50 citations


Journal ArticleDOI
26 Feb 2016-PLOS ONE
TL;DR: An interactive mobile phone application is developed that enables transfer of both patient data and pictures of a wound from the point-of-care to a remote burns expert who, in turn, provides advice back.
Abstract: BACKGROUND: Each year more than 10 million people worldwide are burned severely enough to require medical attention, with clinical outcomes noticeably worse in resource poor settings. Expert clinical advice on acute injuries can play a determinant role and there is a need for novel approaches that allow for timely access to advice. We developed an interactive mobile phone application that enables transfer of both patient data and pictures of a wound from the point-of-care to a remote burns expert who, in turn, provides advice back. METHODS AND RESULTS: The application is an integrated clinical decision support system that includes a mobile phone application and server software running in a cloud environment. The client application is installed on a smartphone and structured patient data and photographs can be captured in a protocol driven manner. The user can indicate the specific injured body surface(s) through a touchscreen interface and an integrated calculator estimates the total body surface area that the burn injury affects. Predefined standardised care advice including total fluid requirement is provided immediately by the software and the case data are relayed to a cloud server. A text message is automatically sent to a burn expert on call who then can access the cloud server with the smartphone app or a web browser, review the case and pictures, and respond with both structured and personalized advice to the health care professional at the point-of-care. CONCLUSIONS: In this article, we present the design of the smartphone and the server application alongside the type of structured patient data collected together with the pictures taken at point-of-care. We report on how the application will be introduced at point-of-care and how its clinical impact will be evaluated prior to roll out. Challenges, strengths and limitations of the system are identified that may help materialising or hinder the expected outcome to provide a solution for remote consultation on burns that can be integrated into routine acute clinical care and thereby promote equity in injury emergency care, a growing public health burden. Language: en

49 citations


Journal ArticleDOI
TL;DR: This paper presents the first work in this domain that inscribes the optimal scheduling problem for mobile application software execution requests with three‐dimensional context parameters, and demonstrates that the QCASH outperforms the state‐of‐the‐art works well across the success rate, waiting time, and QoE.
Abstract: Application software execution requests, from mobile devices to cloud service providers, are often heterogeneous in terms of device, network, and application runtime contexts. These heterogeneous contexts include the remaining battery level of a mobile device, network signal strength it receives and quality-of-service QoS requirement of an application software submitted from that device. Scheduling such application software execution requests from many mobile devices on competent virtual machines to enhance user quality of experience QoE is a multi-constrained optimization problem. However, existing solutions in the literature either address utility maximization problem for service providers or optimize the application QoS levels, bypassing device-level and network-level contextual information. In this paper, a multi-objective nonlinear programming solution to the context-aware application software scheduling problem has been developed, namely, QoE and context-aware scheduling QCASH method, which minimizes the application execution times i.e., maximizes the QoE and maximizes the application execution success rate. To the best of our knowledge, QCASH is the first work in this domain that inscribes the optimal scheduling problem for mobile application software execution requests with three-dimensional context parameters. In QCASH, the context priority of each application is measured by applying min-max normalization and multiple linear regression models on three context parameters-battery level, network signal strength, and application QoS. Experimental results, found from simulation runs on CloudSim toolkit, demonstrate that the QCASH outperforms the state-of-the-art works well across the success rate, waiting time, and QoE. Copyright © 2016 John Wiley & Sons, Ltd.

44 citations


Journal ArticleDOI
07 Mar 2016
TL;DR: It is found that parallel architectures and parallelism in general provide the best means to combat and exploit variability to design resilient and efficient systems.
Abstract: Variation in performance and power across manufactured parts and their operating conditions is an accepted reality in modern microelectronic manufacturing processes with geometries in nanometer scales. This article surveys challenges and opportunities in identifying variations, their effects and methods to combat these variations for improved microelectronic devices. We focus on computing devices and their design at various levels to combat variability. First, we provide a review of key concepts with particular emphasis on timing errors caused by various variability sources. We consider methods to predict and prevent, detect and correct, and finally conditions under which such errors can be accepted; we also consider their implications on cost, performance and quality. We provide a comparative evaluation of methods for deployment across various layers of the system from circuits, architecture, to application software. These can be combined in various ways to achieve specific goals related to observability and controllability of the variability effects, providing means to achieve cross-layer or hybrid resilience. We then provide examples of real world resilient single-core and parallel architectures. We find that parallel architectures and parallelism in general provide the best means to combat and exploit variability to design resilient and efficient systems. Using programmable accelerator architectures such as clustered processing elements and GP-GPUs, we show how system designers can coordinate propagation of timing error information and its effects along with new techniques for memoization (i.e., spatial or temporal reuse of computation). This discussion naturally leads to use of these techniques into emerging area of “approximate computing,” and how these can be used in building resilient and efficient computing systems. We conclude with an outlook for the emerging field.

43 citations


Patent
05 Oct 2016
TL;DR: In this paper, a cloud tutoring system relates to the tutoring technology field, where a teacher, a parent, a student, and a platform maintenance terminal carry out information communication with a server of an education cloud data center through a wired or wireless network.
Abstract: A cloud tutoring system relates to the tutoring technology field. The system is operated as a B/S or C/S mode. A teacher terminal, a parent terminal, a student terminal and a platform maintenance terminal carry out information communication with a server of an education cloud data center through a wired or wireless network. The education cloud data center comprises one or more cloud servers and server operating systems, a database and application software. The teacher terminal, the parent terminal, the student terminal and the platform maintenance terminal are formed by a desk computer, a notebook computer, a tablet personal computer, an electronic whiteboard or intelligent mobile phone and the like, and the application software. Usage is convenient, operation is simple, safety is increased, data consistency and safety are guaranteed and work efficiency is high.

37 citations


Patent
26 Sep 2016
TL;DR: An improved storage controller that enables the acceleration of datacenter software, by making it easier to deploy application software portions (applets) onto storage devices, in a manner that best supports runtime performance acceleration of storage-network-latency-throttled applications as discussed by the authors.
Abstract: An improved storage controller that enables the acceleration of datacenter software, by making it easier to deploy application software portions (applets) onto storage devices, in a manner that best supports runtime performance acceleration of storage-network-latency-throttled applications. Means are defined for how server hosted applications cause to have provisioned, initiate execution of, and work with a multitude of applets on a multitude of storage devices, proximate to storage contents. This invention supports the multi-exabyte growth of data storage, by scaling performance acceleration linearly with the growth in the number of storage devices. This in turn supports the evolving cloud and Enterprise Cognitive Computing datacenter by providing the infrastructure necessary for accelerating applications that face enormous heterogeneous datasets. This includes Big Data Analytics of problems that have eluded successful analysis.

Journal ArticleDOI
TL;DR: Experimental results show that two-granularity software rejuvenation is much more effective than traditional single-levelSoftware rejuvenation, and the unavailability and the overall loss probability of the system were reduced by 17.9% and 2.65%, respectively, in comparison with the single-levels.
Abstract: Software rejuvenation is a proactive software control technique that is used to improve a computing system performance when it suffers from software aging. In this paper, a two-granularity inspection-based software rejuvenation policy, which works as a closed-loop control technique, is proposed. This policy mitigates the negative impact of two-level software aging. The two levels considered are the user-level applications and the operating system. A Markov regenerative process model is constructed based on the system condition. We obtain the degradation rate of the application software and operating system from fault injection experiments. The diagnostic accuracy of the adopted monitor and analysis system, which is applied to inspect the application software and operating system, is considered as we provide the optimal rejuvenation strategies. Finally, the availability and the overall loss probability with their corresponding optimal inspection time intervals are obtained numerically based on the parameter values estimated from the experiments. Experimental results show that two-granularity software rejuvenation is much more effective than traditional single-level software rejuvenation. In our experi-mental study, when two-granularity software rejuvenation is used, the unavailability and the overall loss probability of the system were reduced by 17.9% and 2.65%, respectively, in comparison with the single-level rejuvenation.

Patent
25 May 2016
TL;DR: In this article, a method for encrypting paper title assets to crypto currency and transferring title is disclosed, which involves the use of application software and a physical vault, including an encryption engine, decryption engine, user interface module, records, and a security key management system.
Abstract: A method for encrypting paper title assets to crypto currency and transferring title is disclosed. The method involves the use of application software and a physical vault. Application software including an encryption engine, a decryption engine, a user interface module, records, and a security key management system. Paper title assets are provided to a physical vault and transferred physically at the behest of users of the application software and verified by public ledger records.

Patent
22 Dec 2016
TL;DR: In this article, a graphical user interface-driven store and share system containing application templates that defines a database storing components and services of an application, exposes the application elements to different users in the system, and provides a uniform entry point for the different users to access and manipulate the application program components.
Abstract: Embodiments are directed to a graphical user interface-driven store and share system containing application templates that defines a database storing components and services of an application, exposes the application elements to different users in the system, and provides a uniform entry point for the different users to access and manipulate the application program components.

Journal ArticleDOI
TL;DR: Naive Bayes Classifier is used for recognition of runtime activities minimizing dimension of large feature vectors and Threshold based condition box is designed by us and these two results are compared with that of another classifier HF-SVM (Hardware Friendly-Support Vector Machine) of previous related work.
Abstract: Mobile phone is becoming a very popular tool due to having various user friendly applications with all flexible options. It is highly popular for its light weight, wearable and comfortable uses. Many extrinsic habitat of human being can be monitored by the help of inbuilt sensors and its application software. This has appealing use for healthcare applications using exploitation of Ambient Intelligence for daily activity monitoring system. Here, a standard dataset of UCI HAR (University of California, Irvine, Human Activity Recognition, http://archive.ics.uci.edu) is used for analysis purpose. Naive Bayes Classifier is used for recognition of runtime activities minimizing dimension of large feature vectors. Threshold based condition box is designed by us and finally these two results are compared with that of another classifier HF-SVM (Hardware Friendly-Support Vector Machine) of previous related work.

Journal ArticleDOI
TL;DR: Experimental results demonstrate that the function of an application and its power consumption have a close relationship, and the method can detect some typical malicious application software accurately.
Abstract: In order to solve the problem that Android platform’s sand-box mechanism prevents security protection software from accessing effective information to detect malware, this paper proposes a malicious software detection method based on power consumption. Firstly, the mobile battery consumption status information was obtained, and the Gaussian mixture model GMM was built by using Mel frequency cepstral coefficients MFCC. Then, the GMM was used to analyze power consumption; malicious software can be classified and detected through classification processing. Experiment results demonstrate that the function of an application and its power consumption have a close relationship, and our method can detect some typical malicious application software accurately.

Proceedings ArticleDOI
09 Apr 2016
TL;DR: A prototype of JAUMIN is given, which is a programming framework for large scale application software based on unstructured mesh, which can accelerate the development of application software greatly and support effective simulation on petascale supercomputer.
Abstract: The performance of parallel computers grows rapidly. However, application software is lagging behind due to two bottlenecks: "performance wall" and "programmability wall". These bottlenecks have prevented a lot of application software from achieving good performance and fast development. Programming framework is considered an effective approach to overcome the above bottlenecks. In this paper, we give a prototype of JAUMIN, which is a programming framework for large scale application software based on unstructured mesh. Some important technologies of JAUMIN will be presented, including distributed data structures, data communication patterns and application programming interfaces. Finally, some applications based on JAUMIN will be demonstrated to show that JAUMIN can accelerate the development of application software greatly and support effective simulation on petascale supercomputer.

Proceedings ArticleDOI
01 Dec 2016
TL;DR: A run-time security monitor for embedded system applications that detects both known and unknown computational cyber-attacks and isSound and complete, i.e. sound and complete), eliminating false alarms, as well as efficient, supporting real-time detection.
Abstract: We introduce a run-time security monitor for embedded system applications that detects both known and unknown computational cyber-attacks. Our security monitor is rigorous (i.e. sound and complete), eliminating false alarms, as well as efficient, supporting real-time detection. In contrast, conventional run-time security monitors for application software either produce (high rates of) false alarms (e.g. intrusion detection systems) or limit application performance (e.g. run-time verification systems). Such monitors are typically non-adaptive against constantly changing attacks of variable extent. Our run-time monitor detects attacks by checking the consistency between the application run-time behavior and its specified (expected) behavior model. Our specification language is based on monadic second order logic and event calculus interpreted over algebraic data structures; the application implementation can be in any programming language. Based on our defined denotational semantics of the specification language, we prove that the security monitor is sound and complete, i.e. it produces an alarm iff it detects an inconsistency between the application execution and the specified behavior. Importantly, the monitor detects not only cyber-attacks but all behavioral deviations from specification, e.g. bugs, and so, is readily applicable to the security of legacy systems. Through an application of our prototype monitor to a PID controller for a feedwater tank, we demonstrate that rigorous run-time monitors employing verification techniques are effective, efficient and readily applicable to demanding real-time critical systems, without scalability limitations.

Patent
17 Feb 2016
TL;DR: In this article, a software upgrade method and system is described, which consists of: obtaining a local application software version information list containing a software mark and a corresponding version number by an operation system calling module; sending an update request carrying the local application program information list to a server, obtaining an application update list fed back by the server, downloading an installation package of application software required to be updated, and recording a storage path of the downloaded installation package; and sending an software upgrade request to a silent upgrade module, wherein the silent upgrading module receives the software upgrade requests, calls an
Abstract: The invention discloses a software upgrade method and system. The method comprises: obtaining a local application software version information list containing a software mark and a corresponding version number by an operation system calling module; sending an update request carrying the local application software version information list to a server, obtaining an application update list fed back by the server, downloading an installation package of application software required to be updated, and recording a storage path of the downloaded installation package; and sending a software upgrade request to a silent upgrade module, wherein the silent upgrade module receives the software upgrade request, calls an upgrade process of an operation system, and indicates the upgrade process to obtain the installation package by utilizing the storage path and upgrade the application software required to be updated. Through the technical scheme provided by embodiments of the invention, the upgrade process of the operation system is directly called to upgrade the application software, and a prompt interface of installation control is skipped, so that the batch download and silent upgrade of the application software required to be upgraded are realized, and the software installation efficiency is improved.

Journal ArticleDOI
TL;DR: Experimental results performed by fault injection using different software applications demonstrate that the proposed debug interface module is able to archieve high fault coverage with a limited cost in terms of area and performance degradation.
Abstract: Detecting the effects of transient faults is a key point in many processor-based safety-critical applications. This paper proposes to adopt the debug interface module existing today in several processors/controllers available on the market. In this way, we can achieve a good detection capability and small latency with respect to control flow errors, while the cost for adopting the proposed technique is rather limited and does not involve any change either in the processor hardware or in the application software. The method works even if the processor uses caches and we experimentally evaluated its characteristics demonstrating the advantages and showing the limitations on two pipelined processors. Experimental results performed by fault injection using different software applications demonstrate that the method is able to archieve high fault coverage (more than 95 percent in nearly all the considered cases) with a limited cost in terms of area and performance degradation.

Journal ArticleDOI
TL;DR: It is demonstrated that the adopted methodology accounts for the differential impacts of the willingness to receive and/or to give information about road conditions on the overall willingness to receiving and/ or to give Information through an application software for mobile devices.
Abstract: In the last few years mobile devices have reached a large amount of consumers in both developed and high-growth world economies. In 2013, 97% of the Italian population owns a mobile phone, and 62% owns a smartphone. Application software for mobile devices is largely proposed to consumers, and several mobile applications were oriented toward the improvement of road safety and road accident risk reduction. In this paper, we describe the results of a survey oriented to preventively investigate on the willingness to receive and/or to give information about road condition by means of mobile devices. Road users were informed about the characteristics of a mobile application, and then they were invited to complete a questionnaire. Experimental data were used for capturing road user attitudes toward the use of the smartphone to improve road safety, and to establish the preferences for the different features of the proposed mobile application. To this end, we choose to use the ordered probit model methodology. We demonstrate that the adopted methodology accounts for the differential impacts of the willingness to receive and/or to give information about road conditions on the overall willingness to receive and/or to give information through an application software for mobile devices.

Proceedings ArticleDOI
06 Jun 2016
TL;DR: The total cost of ownership of several variants of virtualized EPC gateways for a country-scale mobile network covering Japan is analyzed and the cost model presented can serve as guideline to understand the economic aspects of future virtual network function deployments.
Abstract: Technologies like software defined networking and cloud computing allow for new approaches in mobile network design. A key driver for bringing mobile networks into the cloud is the expected cost reduction resulting from economies of scale: all software run on commercial off-the-shelf server which can be accumulated in one or more datacenters with all of those having a similar setup, minimizing the administrative costs. Deploying mobile core control functions as applications in datacenters already proved to be viable and economic. However, the evolved packet core (EPC), which mostly comprises gateways, holds a special challenge, since there is a strong interaction between forwarding plane and control functions. Having those functions as application software running on servers in datacenters induces the risk that cost reductions from virtualization are offset by costs of additional transport and processing. This paper analyzes the total cost of ownership of several variants of virtualized EPC gateways for a country-scale mobile network covering Japan. The cost model presented can serve as guideline to understand the economic aspects of future virtual network function deployments.

Proceedings ArticleDOI
01 Mar 2016
TL;DR: A SVM method is proposed in comparison with CART and Test Metrics to classify classes in application and it shows that S VM method has better result in terms of precision and accuracy.
Abstract: The increasing number of user of mobile application, it is needed to check mobile applications that contains defect or not. I proposed a SVM method in comparison with CART and Test Metrics to classify classes in application. It shows that SVM method has better result in terms of precision and accuracy. SVM accuracy reaches 83% compared with CART and Test Metrics method in mobile apps defect prediction.

Journal ArticleDOI
TL;DR: The cloud computing architecture has been assessed, focusing on the various features of the Public, Private and Hybrid cloud models relevant to most individuals and organizations and how they support or hinder the operation of various cloud computing models.
Abstract: computing is a revolutionary technology that has brought about new luxuries in the field of Information Technology. It provides a source of data and application software storage in the form of huge data hubs called "clouds", which can be accessed with the help of a network connection. These clouds help maximize the capabilities of enterprises without any extra set-up, personnel or licensing costs. Clouds are generally deployed using Public, Private or Hybrid models depending upon the requirements of the user. In this paper, the cloud computing architecture has been assessed, focusing on the various features of the Public, Private and Hybrid cloud models relevant to most individuals and organizations and how they support or hinder the operation of various cloud computing models. This paper intends to provide a bird"s eye view of various characteristics of aforesaid models of cloud; which are put together side by side in order to facilitate the research study in this environment.

Patent
23 Nov 2016
TL;DR: In this paper, the authors provided a fire control safety management information system based on a grid management mode, which relies on cloud computing, mobile Internet and geographic information technologies, and constructs a grid, hierarchical and modular fire control information platform and a grid inspection mode, where the overall architecture is divided into five layers which are a cloud platform layer, database layer, a provincial management platform, a prefectural and municipal operation platform and user application layer.
Abstract: The invention provides a fire control safety management information system based on a grid management mode The fire control safety management information system relies on cloud computing, mobile Internet and geographic information technologies, and constructs a grid, hierarchical and modular fire control safety information platform and a grid inspection mode The overall architecture is divided into five layers which are a cloud platform layer, a database layer, a provincial management platform, a prefectural and municipal operation platform and a user application layer A private network is constructed through technologies such as an Internet special line, a VPN and an APN so as to realize safe transmission of data Application software of various access systems is provided in allusion to different users, wherein the application software mainly comprise a mobile client and a background computer client, the user type is recognized according to different login accounts, and corresponding authorities are set According to the system provided by the invention, the grid is divided according to geographic areas, a method for realizing grid management by adopting a tree-form collaborative management mode is implemented, the job responsibility and the content of each grid are clearly defined, and the responsibility is implemented by people by virtue of taking mobile internet technologies as a tail end hand grab, thereby mobilizing the power of each level, effectively eliminating potential safety hazards, and improving the fire control management level

Patent
21 Sep 2016
TL;DR: In this article, a method and a system for invoking a camera function according to an individualized property of an application, wherein the method comprises the following steps: using third-party application software to make a request of calling the pick-up head of a camera, accessing the unique identification of the third party application software on the framework layer, finding the optimal camera-calling parameter corresponding to the unique IDS, and transmitting the optimal calling parameter to the HAL layer.
Abstract: The invention discloses a method and a system for invoking a camera function according to an individualized property of an application, wherein the method comprises the following steps: using third party application software to make a request of calling the pick-up head of a camera; accessing the unique identification of the third party application software on the framework layer; from the corresponding relationship between the pre-established third-party application software and the optimal camera-calling parameter, finding the optimal camera-calling parameter corresponding to the unique identification of the third-party application software; transmitting the optimal camera-calling parameter to the HAL layer; and arranging the pick-up head according to the optimal camera-calling parameter in the HAL layer. The invention can better call a camera to take pictures without changing the codes of third party application software.

Journal ArticleDOI
18 Jul 2016-Symmetry
TL;DR: A model-driven framework to develop the IoT-based prototype and its reference architecture for personalized health monitoring (PHM) applications with emphasis on the synergistic effect of security and energy issues is proposed.
Abstract: Both distributed healthcare systems and the Internet of Things (IoT) are currently hot topics. The latter is a new computing paradigm to enable advanced capabilities in engineering various applications, including those for healthcare. For such systems, the core social requirement is the privacy/security of the patient information along with the technical requirements (e.g., energy consumption) and capabilities for adaptability and personalization. Typically, the functionality of the systems is predefined by the patient’s data collected using sensor networks along with medical instrumentation; then, the data is transferred through the Internet for treatment and decision-making. Therefore, systems creation is indeed challenging. In this paper, we propose a model-driven framework to develop the IoT-based prototype and its reference architecture for personalized health monitoring (PHM) applications. The framework contains a multi-layered structure with feature-based modeling and feature model transformations at the top and the application software generation at the bottom. We have validated the framework using available tools and developed an experimental PHM to test some aspects of the functionality of the reference architecture in real time. The main contribution of the paper is the development of the model-driven computational framework with emphasis on the synergistic effect of security and energy issues.

Proceedings ArticleDOI
01 Sep 2016
TL;DR: An automated technique based on genetic algorithms is proposed to find the application-specific set of compiler optimizations that can boost performance without degrading the application's error resilience, finding that the resulting optimized code has significantly better error resilience.
Abstract: With the projected future increase in hardware error rates, application software needs to be resilient to hardware faults. An important factor affecting an application's error resilience and vulnerability is the set of optimizations used when compiling it. We propose an automated technique based on genetic algorithms to find the application-specific set of compiler optimizations that can boost performance without degrading the application's error resilience. We find that the resulting optimized code has significantly better error resilience than when being compiled with the standard optimization levels (i.e., O1, O2, O3), while attaining comparable performance improvements, thus leading to lower overall vulnerabilities.

01 Jan 2016
TL;DR: This paper will examine issues on the architecture, and some security issues of mobile internet banking apps, and then some security measuras to deal with the associated security challenges are explored.
Abstract: Mobile apps is a used to designate the act or process by which application software is developed for handheld devices, such as personal digital assistants or mobile phones. These applications can be pre-installed on phones during manufacturing platforms, or delivered as web applications using server-side or client-side processing (e.g. JavaScript) to provide an "application-like" experience within a Web browser. However there are some cases where the mobile internet banking apps occurred some problems that might cause loss of money. Therefore, in this paper we will examine issues on the architecture, and some security issues of mobile internet banking apps. And then we will explore some security measuras to deal with the associated security challenges.

Patent
26 Oct 2016
TL;DR: In this article, a cloud platform application automatic deployment framework consisting of an application service module, a storage pool, a host machine, and a virtual machine module is proposed to realize one-key-to-cloud.
Abstract: The invention relates to the technical field of cloud computing, and especially relates to a cloud platform application automatic deployment framework The framework comprises an application service module, a storage pool module, a host machine module and a virtual machine module The application service module is responsible for receiving and responding to an API request of a cloud platform front end user The storage pool module is responsible for managing an application software package and automatic script deployment The host machine module is responsible for mounting and unloading between a storage pool and a virtual machine The virtual machine module is responsible for receiving application service control and finishing automatic deployment of application software The framework provided by the invention is simple and general and is used for carrying out rapid expansion in an existing cloud platform, thereby realizing one-key-to-cloud of an application