{"title":"Retracted: Joint Decision Making of Replenishment, Pricing, and Fresh Keeping Input in Fruit and Vegetable Cold Chain: Based on Markov Process","authors":"M. Systems","doi":"10.1155/2023/9853434","DOIUrl":"https://doi.org/10.1155/2023/9853434","url":null,"abstract":"<jats:p />","PeriodicalId":49802,"journal":{"name":"Mobile Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138595189","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: GIP Evaluation and Path Improvement of Technological SMEs Based on Digital Information Technology","authors":"M. Systems","doi":"10.1155/2023/9816593","DOIUrl":"https://doi.org/10.1155/2023/9816593","url":null,"abstract":"<jats:p />","PeriodicalId":49802,"journal":{"name":"Mobile Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138595269","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: Regulatory Mechanism of Financial Market Resource Management Driven by Big Data","authors":"M. Systems","doi":"10.1155/2023/9789304","DOIUrl":"https://doi.org/10.1155/2023/9789304","url":null,"abstract":"<jats:p />","PeriodicalId":49802,"journal":{"name":"Mobile Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138596261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: Research on the Social Security and Elderly Care System under the Background of Big Data","authors":"M. Systems","doi":"10.1155/2023/9793645","DOIUrl":"https://doi.org/10.1155/2023/9793645","url":null,"abstract":"<jats:p />","PeriodicalId":49802,"journal":{"name":"Mobile Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138598099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recently, fifth-generation (5G) mobile connectivity has been launched in Bangladesh on a trial-run basis. 5G is a super-speed mobile network that is much faster than the existing fourth-generation (4G) technology. It is excruciatingly hard to deploy a fully functioning 5G in any country regardless of its available resources and technological advancements because of some apparent technological complexity and limitations. In addition, when deploying this technology in developing countries such as Bangladesh, the costs come into play. To cope with the world’s advancement in science and technology, Bangladesh is planning to implement 5G covering the whole country. In this paper, we present the major challenges in implementing a wide area 5G network in Bangladesh and find some possible solutions. This research work has also tried to get a clear picture of the service quality of the existing 4G cellular communication by analyzing some of the mobile operators’ download speeds over 24 hours. In addition, this paper presents the current comparison of Internet facilities in Bangladesh with those of other countries across the globe. To the best of our knowledge, there is no publicly available study that has focused on the deployment of the 5G network in Bangladesh after assessing the current state of the cellular network. Therefore, this study could serve as a guiding resource, providing valuable information for decision-making.
{"title":"Challenges and Possible Solutions of Implementing 5G Mobile Networks in Bangladesh","authors":"Md. Najmul Hossain, Hasan Al-Mamun, Muhammad Shafiqul Islam, Liton Chandra Paul, Md. Abdur Rahim, Md. Matiqul Islam, Md. Ashraful Islam, Md. Arifour Rahman","doi":"10.1155/2023/9586126","DOIUrl":"https://doi.org/10.1155/2023/9586126","url":null,"abstract":"Recently, fifth-generation (5G) mobile connectivity has been launched in Bangladesh on a trial-run basis. 5G is a super-speed mobile network that is much faster than the existing fourth-generation (4G) technology. It is excruciatingly hard to deploy a fully functioning 5G in any country regardless of its available resources and technological advancements because of some apparent technological complexity and limitations. In addition, when deploying this technology in developing countries such as Bangladesh, the costs come into play. To cope with the world’s advancement in science and technology, Bangladesh is planning to implement 5G covering the whole country. In this paper, we present the major challenges in implementing a wide area 5G network in Bangladesh and find some possible solutions. This research work has also tried to get a clear picture of the service quality of the existing 4G cellular communication by analyzing some of the mobile operators’ download speeds over 24 hours. In addition, this paper presents the current comparison of Internet facilities in Bangladesh with those of other countries across the globe. To the best of our knowledge, there is no publicly available study that has focused on the deployment of the 5G network in Bangladesh after assessing the current state of the cellular network. Therefore, this study could serve as a guiding resource, providing valuable information for decision-making.","PeriodicalId":49802,"journal":{"name":"Mobile Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-12-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138493586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yanbin Xu, Xinya Jian, Tao Li, Shuang Zou, Beibei Li
Authentication is of paramount significance to cybersecurity. However, most of conventional authentication schemes are implemented in a centralized mode, in which potential problems that could arise include single-point failure, the exposure of personal information, and the risk of identity theft. Additionally, static single-factor authentication schemes are unsuitable for dynamic environments like mobile applications. In order to tackle these difficulties, we propose a blockchain-based authentication scheme with an adaptive multi-factor authentication strategy. Our scheme features a blockchain-based authentication framework that prevents unauthorized information alteration and system corruption. Additionally, we design an adaptive multi-factor authentication strategy model to ensure trustworthy multi-factor authentication in dynamic scenarios. Last, we construct a Raft-based consensus model to select an authoritative leading node for rapid authentication. The security analysis demonstrates the effectiveness of the proposed scheme in effectively countering various forms of cyberattacks targeted at authentication systems, and experiments demonstrate its superior effectiveness and efficiency compared to existing studies.
{"title":"Blockchain-Based Authentication Scheme with an Adaptive Multi-Factor Authentication Strategy","authors":"Yanbin Xu, Xinya Jian, Tao Li, Shuang Zou, Beibei Li","doi":"10.1155/2023/4764135","DOIUrl":"https://doi.org/10.1155/2023/4764135","url":null,"abstract":"Authentication is of paramount significance to cybersecurity. However, most of conventional authentication schemes are implemented in a centralized mode, in which potential problems that could arise include single-point failure, the exposure of personal information, and the risk of identity theft. Additionally, static single-factor authentication schemes are unsuitable for dynamic environments like mobile applications. In order to tackle these difficulties, we propose a blockchain-based authentication scheme with an adaptive multi-factor authentication strategy. Our scheme features a blockchain-based authentication framework that prevents unauthorized information alteration and system corruption. Additionally, we design an adaptive multi-factor authentication strategy model to ensure trustworthy multi-factor authentication in dynamic scenarios. Last, we construct a Raft-based consensus model to select an authoritative leading node for rapid authentication. The security analysis demonstrates the effectiveness of the proposed scheme in effectively countering various forms of cyberattacks targeted at authentication systems, and experiments demonstrate its superior effectiveness and efficiency compared to existing studies.","PeriodicalId":49802,"journal":{"name":"Mobile Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134957011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cloud computing provides on-demand access to a shared puddle of computing resources, containing applications, storage, services, and servers above the internet. This allows organizations to scale their IT infrastructure up or down as needed, reduce costs, and improve efficiency and flexibility. Improving professional guidelines for social media interactions is crucial to address the wide range of complex issues that arise in today’s digital age. It is imperative to enhance and update professional guidelines regarding social media interactions in order to effectively tackle the multitude of intricate issues that emerge. In this paper, we propose a reinforcement learning (RL) method for handling dynamic resource allocation (DRA) and load balancing (LB) activity in a cloud environment and achieve good scalability and a significant improvement in performance. To address this matter, we propose a dynamic load balancing technique based on Q-learning, a reinforcement learning algorithm. Our technique leverages Q-learning to acquire an optimal policy for resource allocation in real-time based on existing workload, resource accessibility, and user preferences. We introduce a reward function that takes into account performance metrics such as response time and resource consumption, as well as cost considerations. We evaluate our technique through simulations and show that it outperforms traditional load balancing techniques in expressions of response time and resource utilization while also reducing overall costs. The proposed model has been compared with previous work, and the consequences show the significance of the proposed work. Our model secures a 20% improvement in scalability services. The DCL algorithm offers significant advantages over genetic and min-max algorithms in terms of training time and effectiveness. Through simulations and analysis on various datasets from the machine learning dataset repository, it has been observed that the proposed DCL algorithm outperforms both genetic and min-max algorithms. The training time can be reduced by 10% to 45%, while effectiveness is enhanced by 30% to 55%. These improvements make the DCL algorithm a promising option for enhancing training time and effectiveness in machine learning applications. Further research can be conducted to investigate the potential of combining the DCL algorithm with a supervised training algorithm, which could potentially further improve its performance and apply in real-world application.
{"title":"Dynamic Q-Learning-Based Optimized Load Balancing Technique in Cloud","authors":"Arvindhan Muthusamy, Rajesh Kumar Dhanaraj","doi":"10.1155/2023/7250267","DOIUrl":"https://doi.org/10.1155/2023/7250267","url":null,"abstract":"Cloud computing provides on-demand access to a shared puddle of computing resources, containing applications, storage, services, and servers above the internet. This allows organizations to scale their IT infrastructure up or down as needed, reduce costs, and improve efficiency and flexibility. Improving professional guidelines for social media interactions is crucial to address the wide range of complex issues that arise in today’s digital age. It is imperative to enhance and update professional guidelines regarding social media interactions in order to effectively tackle the multitude of intricate issues that emerge. In this paper, we propose a reinforcement learning (RL) method for handling dynamic resource allocation (DRA) and load balancing (LB) activity in a cloud environment and achieve good scalability and a significant improvement in performance. To address this matter, we propose a dynamic load balancing technique based on Q-learning, a reinforcement learning algorithm. Our technique leverages Q-learning to acquire an optimal policy for resource allocation in real-time based on existing workload, resource accessibility, and user preferences. We introduce a reward function that takes into account performance metrics such as response time and resource consumption, as well as cost considerations. We evaluate our technique through simulations and show that it outperforms traditional load balancing techniques in expressions of response time and resource utilization while also reducing overall costs. The proposed model has been compared with previous work, and the consequences show the significance of the proposed work. Our model secures a 20% improvement in scalability services. The DCL algorithm offers significant advantages over genetic and min-max algorithms in terms of training time and effectiveness. Through simulations and analysis on various datasets from the machine learning dataset repository, it has been observed that the proposed DCL algorithm outperforms both genetic and min-max algorithms. The training time can be reduced by 10% to 45%, while effectiveness is enhanced by 30% to 55%. These improvements make the DCL algorithm a promising option for enhancing training time and effectiveness in machine learning applications. Further research can be conducted to investigate the potential of combining the DCL algorithm with a supervised training algorithm, which could potentially further improve its performance and apply in real-world application.","PeriodicalId":49802,"journal":{"name":"Mobile Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135589775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: Student Behavior Analysis and Research Model Based on Clustering Technology","authors":"Mobile Information Systems","doi":"10.1155/2023/9848534","DOIUrl":"https://doi.org/10.1155/2023/9848534","url":null,"abstract":"<jats:p />","PeriodicalId":49802,"journal":{"name":"Mobile Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135271146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: Intelligent Data Analytics for Diagnosing Melanoma Skin Lesions via Deep Learning in IoT System","authors":"Mobile Information Systems","doi":"10.1155/2023/9807057","DOIUrl":"https://doi.org/10.1155/2023/9807057","url":null,"abstract":"<jats:p />","PeriodicalId":49802,"journal":{"name":"Mobile Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135271160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Retracted: Research on Digital Industry Development Algorithm Based on Deep Learning","authors":"Mobile Information Systems","doi":"10.1155/2023/9804986","DOIUrl":"https://doi.org/10.1155/2023/9804986","url":null,"abstract":"<jats:p />","PeriodicalId":49802,"journal":{"name":"Mobile Information Systems","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135271290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}