首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 140 毫秒
1.
本文设计实现了基于物联网的远程物资监测系统,实时地保护重要物资,将安全隐患扼杀于萌芽之中.该系统安装于重要物资之上,管理软件将实时显示物品的位置、运动轨迹、环境状态等信息,满足了对重要物品的实时监控、状态监测及防盗预警的需求,实现了室内室外定位无缝连接,监控范围无死角.该系统能对物品全时域全方位进行定位报警,还能辅助工作人员查找丢失物资.  相似文献   

2.
基于递归与多线程的丢失文件查找设计   总被引:1,自引:0,他引:1  
在文件意外丢失的情况下,需在文件数量庞大的系统中查找丢失文件。根据操作系统对文件的管理以树型进行组织,即是一种递归的数据结构进行存储,递归的数据结构可使用递归的算法;同时,要在文件数量庞大的系统中进行查找,可用多线程技术以加快查找速度。在递归搜索过程中创建丢失文件链表及现存文件链表,开辟线程。当需要对丢失文件进行查找恢复时,可从丢失文件链表中快速找到丢失文件信息,参照现存文件链表对该文件进行查找恢复。实验结果表明,该方法具有一定的可行性和适用性。  相似文献   

3.
"声纳"智能物品查询系统(以下简称:该系统)从物品管理功能需求出发,基于语音识别技术,重点研究该领域发展现状、受众需求模型及实用功能设计,研究智能语音识别技术及应用,拟实现通过使用智能语音助手,以语音答辩的形式快速查找、获得物品存放位置及信息。项目创新点在于突破传统查询及管理模式,语音对话实现录入及查找操作,解放双手。  相似文献   

4.
随着电子信息技术的快速普及和发展,提升了人们生活的自动化、移动化和便携化,许多电子设备呈现出集成化和微型化特点,这些设备在日常使用中非常容易丢失,因此在设备使用中引入传感器技术,开发一种防丢失系统,实时的采集设备信息,发出报警信号,快速定位设备位置,放置设备丢失.  相似文献   

5.
高校生活学习过程中丢失物品的事情时有发生,但高校内的活动范围相对固定,人员的相对稳定,只要信息发布及时,找到物品失主或丢失物品的可能性较大。本文介绍了一款利用node.js技术的安卓手机软件,帮助学生寻找失主或失物,可为失主和拾获者提供了极大的方便。  相似文献   

6.
基于GPSOne的贵重物品跟踪系统终端设计   总被引:1,自引:0,他引:1  
GPS技术广泛应用于物流定位终端,但其因存在定位盲区而导致物流公司的运输物品容易丢失。本文介绍一种基于GPSOne技术的贵重物品跟踪系统终端,通过Internet实时传输定位数据和防盗报警信息,解决了对贵重物品的跟踪和实时监控问题。  相似文献   

7.
随着信息技术的飞速发展,移动存储设备的使用越来越广泛,然而移动存储设备的丢失甚至是盗用一直困扰着广大用户,并由此引发出一系列数据泄密问题。阳盘-基于Windows的移动存储设备保护系统,其核心是在总体控制移动存储设备使用权限的基础上,加强移动存储设备数据管理,防止设备丢失,找回丢失设备中的重要数据。该系统的主要功能:身份验证检测用户合法性、数据隐藏保护用户私密信息、数据加密防止用户数据泄露、数据回传找回用户丢失数据、日志系统记录设备使用情况、关机提示减少设备丢失几率。经验证,通过以上功能,阳盘系统有效地保护了丢失设备中的用户信息,能帮组用户成功找回丢失的数据,并大大降低了设备丢失的可能。  相似文献   

8.
针对mesh网络下基于Gossip协议的资源查找算法带来的资源查找效率低、消息负载高的问题,本文设计一个mesh网络下P2P-VoD(Peer-to-Peer Video-on-Demand)系统的资源查找算法。将P2P-VoD系统划分为两层结构:利用Chord算法将mesh路由器进行组织作为顶层逻辑结构,负责资源的分配与索引;移动设备为底层结构。根据本文提出的资源查询算法,P2P-VoD系统能够为移动节点快速定位最优服务资源。实验结果表明,该算法能够有效地提高资源查找效率以及降低数据传输时延。  相似文献   

9.
为了提升使用者与系统界面间的交互性与视觉体验感,设计了基于虚拟现实技术的交互式界面设计系统.首先对图像进行滤波、分割与配准等预处理,实现界面物品图像三维重建,达到物品三维空间可视化目的 ;然后以人机交互功能为基础,通过设定条件与模型获取的视景图像构建完整界面;最后通过触摸手势与笔画手势实现界面与使用者之间的交互功能.实验结果表明,该系统所设计的界面图像真实度达到90%以上,可有效提升界面使用者的视觉体验与移动交互体验.  相似文献   

10.
运用GSM和GPS技术,开发了基于STC 12C5A08S2单片机控制器的物品安全报警系统.通过上位机设置物品放置的原始位置,当物品被移动的距离超过10 m时,将向设定的手机号码发送短信(短信内容可由物主自由设置)并报警,同时定时向该手机发送该物品的位置信息.物主也可随时发送特定命令的短信给系统,系统就会返回物品的位置信息.物主通过发送带密码的短信到系统的SIM卡号,表明是自己移动的物品,从而减少错误报警,节约短信费用.  相似文献   

11.
移动应用的隐私权声明作为用户与应用的协议条款,是用户信息采集前必须向用户披露的关键文档。近年来,国家出台多部政策法规明确要求移动应用需要配备清晰和规范的隐私权声明。然而,如今隐私权声明存在诸多问题,如缺失核心条目的披露,省略信息采集的目的和使用模糊的表述等。另一方面,随着法律条款数量增多,条款间要求各不相同,隐私权声明合规检验工作愈加繁重。本文提出一种移动应用隐私权声明的多标签分类方法,这一方法通过比较四部核心法律法规对隐私权声明的要求,总结梳理得到31类核心条目标签及特征。在该标签体系下,本文设计实现了一个隐私权声明语句的分类模型,该模型可以实现94%的条目分类准确率。基于该模型,本文结合句法结构解析和实体识别方法,在安卓应用和小程序场景中进行合规性检验,发现79%,63%和94%的隐私权声明分别存在条目缺失、目的省略和表述模糊问题。  相似文献   

12.
In a mobile ad-hoc network (MANET), mobile hosts can move freely and communicate with each other directly through a wireless medium without the existence of a fixed wired infrastructure. MANET is typically used in battlefields and disaster recovery situations where it is not feasible to have a fixed network. Techniques that manage database transactions in MANET need to address additional issues such as host mobility, energy limitation and real-time constraints. This paper proposes a solution for transaction management that reduces the number of transactions missing deadlines while balancing the energy consumption by the mobile hosts in the system. This paper then reports the simulation experiments that were conducted to evaluate the performance of the proposed solution in terms of number of transactions missing deadlines, total energy consumption and the distribution of energy consumption among mobile hosts. Recommended by: Ahmed Elmagarmid This work is partially supported by the National Science Foundation grants No. EIA-9973465 and IIS-0312746.  相似文献   

13.
In this paper, we provide an overview of challenges in mobile search and ranking, and envision the fundamental features that should be satisfied. We argue that two principles will help improve the relevance and quality of mobile search and ranking: the first one is to examine both intrinsic content features and context of items (usage statistics and social features, etc.); and the second one lies in that no algorithms can replace the objectivity of a human being—let users define the sites that they feel are relevant, leverage their social networks, and over time see their results become highly personalized. Specifically, wireless-virtualcommunity- based mobile search and ranking architecture is proposed in this paper, in which communities act as a first class abstraction for information sharing. Then, we introduce briefly the potential procedures of achieving high relevance and quality in mobile search and ranking based on wireless virtual community.  相似文献   

14.
In this paper, we provide an overview of challenges in mobile search and ranking, and envision the fundamental features that should be satisfied. We argue that two principles will help improve the relevance and quality of mobile search and ranking: the first one is to examine both intrinsic content features and context of items (usage statistics and social features, etc.); and the second one lies in that no algorithms can replace the objectivity of a human being—let users define the sites that they feel are relevant, leverage their social networks, and over time see their results become highly personalized. Specifically, wireless-virtualcommunity-based mobile search and ranking architecture is proposed in this paper, in which communities act as a first class abstraction for information sharing. Then, we introduce briefly the potential procedures of achieving high relevance and quality in mobile search and ranking based on wireless virtual community.  相似文献   

15.
在目前的移动智能系统中,由于使用现有挖掘算法存在大量的冗余候选项和重复计算量,制约着移动系统效率的提高;故提出一种基于事务支持项分离的拓扑关联规则挖掘算法,其适合在移动计算的多空间关系模式下,提取复杂的拓扑关联规则;该算法通过事务支持项分离法和上行搜索法,计算出空间拓扑关联规则,为移动用户提供决策支持;算法无需产生候选项和计算支持数;在仿真实验中,根据用户提供的不同支持度,与同类算法比较运行时间,实验结果表明其比现有算法快速而有效。  相似文献   

16.
沈坚 《物联网技术》2012,(12):76-78
将社区帮扶人员的信息整合进入物联网技术和移动互联网技术,可以使管理中的各种事务得到更为及时的处理和更有效的反馈。文章介绍了研究基于物联网技术的社区帮扶人员管理系统的目的,给出了系统智能终端的设计框架,同时结合实现过程中的具体情况和开发平台,采用客户端服务器端(C/S)模式,对移动办公系统进行设计,最后详细介绍了手机端Android与服务器_NETC群通信的WebService技术。  相似文献   

17.
The unceasing growth and divergence of the mobile landscape have led to the use of smartphone and tablet devices in consuming Web services (WS) in enterprises. However, in heterogeneous WS, the shift from the mobile client consumer approach to the mobile service hosting approach is insufficiently studied. With the advancement of storage and processing capabilities of these devices, coupled with the high availability of the Web, this research focuses on the use of the mobile devices as hosts of WS in a mHealth domain. In this paper, a cloud-centric middleware technique is employed to enable access to the mobile hosts. The paper presents mobile hosting of medical data which are modeled as light-weight WS which is deployed in a real-world system. Further, a workflow authorization model is proposed to ensure privacy and the prevention of unauthorized modification of data on the mobile hosts. A data encryption technique is also put forward to enforce security and privacy of the mobile hosted data. Our current implemented project, called SOPHRA, supports mobile communication over HTTP in a Wi-Fi environment.  相似文献   

18.
Based on location information, users’ mobility profile building is the main task for making different useful systems such as early warning system, next destination and route prediction, tourist guide, mobile users’ behavior-aware applications, and potential friend recommendation. For mobility profile building, frequent trajectory patterns are required. The trajectory building is based on significant location extraction and the user’s actual movement prediction. Previous works have focused on significant places extraction without considering the change in GSM (global system for mobile communication) network and is based on complete data analysis. Since network operators change the GSM network periodically, there are possibilities of missing values and outliers. These missing values and outliers must be addressed to ensure actual mobility and for the efficient extraction of significant places, which are the basis for users’ trajectory building. In this paper, we propose a methodology to convert geo-coordinates into semantic tags and we also purposed a clustering methodology for recovering missing values and outlier detection. Experimental results prove the efficiency and effectiveness of the proposed scheme.  相似文献   

19.
Broadcast disk technique has been often used to disseminate frequently requested data efficiently to a large volume of mobile clients over wireless channels. In broadcast disk environments, a server often broadcasts different data items with differing frequencies to reflect the skewed data access patterns of mobile clients. Previously proposed concurrency control methods for mobile transactions in wireless broadcast environments are focused on the mobile transactions with uniform data access patterns. These protocols perform poorly in broadcast disk environments where the data access patterns of mobile transactions are skewed. In broadcast disk environments, the time length of a broadcast cycle usually becomes large to reflect the skewed data access patterns. This will often cause read-only transactions to access old data items rather than the latest data items. Furthermore, updating mobile transactions will be frequently aborted and restarted in the final validation stage due to the update conflict of the same data items with high access frequencies. This problem will increase the average response time of the update mobile transactions and waste the uplink communication bandwidth. In this paper, we extend the existing FBOCC concurrency control method to efficiently handle mobile transactions with skewed data access patterns in broadcast disk environments. Our method allows read-only transactions to access the more updated data, and reduces the average response time of updating transactions through early aborts and restarts. Our method also reduces the amount of uplink communication bandwidth for the final validation of the update transactions. We present an in-depth experimental analysis of our method by comparing with existing concurrency control protocols. Our performance analysis shows that it significantly decreases the average response time and the amount of uplink bandwidths over existing methods.  相似文献   

20.
Recently, augmenting paper maps with additional dynamic information on mobile devices has become popular. A central task in this context is to register high-resolution paper maps to digital maps on a mobile device, which was typically performed by means of RFID tags or visual markers on specially prepared paper maps. In this paper we present a novel graph-based approach for a markerless registration of city maps. The goal is to find the best registration between a given image, which shows a small part of a city map, and stored map data. The proposed method creates a graph representation of a given input image and robustly finds an optimal registration using a geometric hashing technique. It is translation, scale and rotation invariant, and robust against noise and missing data. Experiments on both synthetic and real data are presented to demonstrate the algorithmic performance.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号