1,078 research outputs found

    Static Analysis of Android Secure Application Development Process with FindSecurityBugs

    Get PDF
    Mobile devices have been growing more and more powerful in recent decades, evolving from a simple device for SMS messages and phone calls to a smart device that can install third party apps. People are becoming more heavily reliant on their mobile devices. Due to this increase in usage, security threats to mobile applications are also growing explosively. Mobile app flaws and security defects can provide opportunities for hackers to break into them and access sensitive information. Defensive coding needs to be an integral part of coding practices to improve the security of our code. We need to consider data protection earlier, to verify security early in the development lifecycle, rather than fixing the security holes after malicious attacks and data leaks take place. Early elimination of known security vulnerabilities will help us increase the security of our software, reduce the vulnerabilities in the programs, and mitigate the consequences and damage caused by potential malicious attacks. However, many software developer professionals lack the necessary security knowledge and skills at the development stage, and secure mobile software development is not yet well represented in most schools\u27 computing curriculum. In this paper, we present a static security analysis approach with the FindSecurityBugs plugin for Android secure mobile software development based on OWASP mobile security recommendations to promote secure mobile software development education and meet the emerging industrial and educational needs

    Application Analysis of Artificial Intelligence in Computer Network Technology

    Get PDF
    Artificial Intelligence (AI) is a kind of intelligent behavior similar to human being which helps human being to participate in dangerous and complicated work directly. The effective application of computer network technology has changed people's production and life style, and technological innovation has paid more attention to intelligence and humanity, leading to that artificial intelligence has become a development trend. This paper analyzes the general situation of artificial intelligence and its application and future development in computer network technology, hoping to provide help for related work

    Lumped Mass Finite Element Method of BBM Equation on Rectangular Mesh

    Get PDF
    In this paper, the full-discrete approximation scheme of the lumped mass nonconforming finite element method for the nonlinear BBM equation is discussed on rectangular meshes. Firstly, we study the Crank-Nicolson full-discrete approximation scheme of the lumped mass fi nite element method for the discussed problem. Secondly, error analysis between the solution of the BBM equation and the solution of the approximated scheme are discussed. Without using traditional elliptic projection operator, the optimal error estimations are obtained on anisotropic meshes

    A Study on the Sustainable Development Strategy for Cultural Brands from the Perspective of All Media

    Get PDF
    The era of all media, as a new cognitive background connecting together everything, provides a new perspective for the operation and communication of cultural brands. Taking the connection between all media and cultural brands as the entry point, this paper discusses how to operate cultural brands in a reasonable and efficient manner. On the one hand, the task is on the construction and communication of cultural brands themselves, focusing on the cultural connotations of their brands and the integration of their marketing with multimedia resources; on the other hand, the operation strategy needs to be further improved, such as the innovation of operation concept, balance of brand layout and creation of brand differentiation advantages. In the context of the era of all-media integration, cultural brands create a more comprehensive and three-dimensional communication mode in a more diversified form. Choosing cross-media and multimedia for brand planning and operation is an inevitable choice

    Inhibitors and Activators of SOD, GSH‐Px, and CAT

    Get PDF
    Reactive oxygen species (ROS) is harmful to our health, and SOD, CAT, and GPX are the major antioxidant enzymes that defend us from effects of ROS. In medicine, food, and dairy industries, antioxidant enzymes often surround complex environments. For better utilization of these enzymes, the inhibitors (including competitive inhibitors and noncompetitive inhibitors) and activators of SOD, CAT, and GPX are descripted in detail in this chapter. Also, the structure and catalytic mechanism of these antioxidants are summarized

    Report on assessment and management advice for 2004 of the anchovy fishery in the Yellow Sea

    Get PDF
    The Bei Dou Fisheries Management Project 2001-2005; Institute of Marine Research, Bergen, April 24-30, 200

    Report on assessment and management advice for 2004 of the anchovy fishery in the Yellow Sea

    Get PDF
    The Bei Dou Fisheries Management Project 2001-2005; Institute of Marine Research, Bergen, April 24-30, 200

    Simple rejection Monte Carlo algorithm and its application to multivariate statistical inference

    Full text link
    The Monte Carlo algorithm is increasingly utilized, with its central step involving computer-based random sampling from stochastic models. While both Markov Chain Monte Carlo (MCMC) and Reject Monte Carlo serve as sampling methods, the latter finds fewer applications compared to the former. Hence, this paper initially provides a concise introduction to the theory of the Reject Monte Carlo algorithm and its implementation techniques, aiming to enhance conceptual understanding and program implementation. Subsequently, a simplified rejection Monte Carlo algorithm is formulated. Furthermore, by considering multivariate distribution sampling and multivariate integration as examples, this study explores the specific application of the algorithm in statistical inference
    corecore