共查询到20条相似文献,搜索用时 15 毫秒
1.
基于Android视频客户端的设计 总被引:2,自引:0,他引:2
普通的网络视频监控已普及于安防应用和人们的家庭生活,但不能满足人们用手机实时监视的需求。因此,设计An-droid系统下的视频客户端具有了一定的实际意义。介绍了Android操作系统的特点及应用,设计了视频客户端分层的结构,分析了视频客户端各层的关键技术及功能。最后,系统通过性能测试,实现了客户端远程实时视频监视的功能。 相似文献
2.
为了实现移动视频监控,提出了一种基于智能手机的远程视频监控系统.介绍了监控系统的体系结构和硬件平台,阐述了嵌入式操作系统Android应用程序的开发方法,并结合实际的应用系统,重点论述了Android平台上视频监控客户端的设计思路.移植了音视频解码库FFmpeg进行H.264视频解码,并采用OpenGL ES实现实时视... 相似文献
3.
基于3G的手机远程监控系统 总被引:1,自引:0,他引:1
由于传输速度等问题的影响,传统的无线通信技术在远程监控上的应用受到限制。现将第三代移动通信技术(3G)应用到了远程监控系统中,介绍了手机作为信息采集端设备与客户端设备的应用,满足了随时、随地远程监测实时控制的应用需求,并叙述了将采集的信息进行转码处理的过程。还列举了在3G系统中将手机作为终端的具体实例应用,这个系统在当前应用越来越广泛,最后对此系统的其它应用做了简单展望。 相似文献
4.
《Digital Communications & Networks》2022,8(6):1040-1047
In recent years, we have witnessed a surge in mobile devices such as smartphones, tablets, smart watches, etc., most of which are based on the Android operating system. However, because these Android-based mobile devices are becoming increasingly popular, they are now the primary target of mobile malware, which could lead to both privacy leakage and property loss. To address the rapidly deteriorating security issues caused by mobile malware, various research efforts have been made to develop novel and effective detection mechanisms to identify and combat them. Nevertheless, in order to avoid being caught by these malware detection mechanisms, malware authors are inclined to initiate adversarial example attacks by tampering with mobile applications. In this paper, several types of adversarial example attacks are investigated and a feasible approach is proposed to fight against them. First, we look at adversarial example attacks on the Android system and prior solutions that have been proposed to address these attacks. Then, we specifically focus on the data poisoning attack and evasion attack models, which may mutate various application features, such as API calls, permissions and the class label, to produce adversarial examples. Then, we propose and design a malware detection approach that is resistant to adversarial examples. To observe and investigate how the malware detection system is influenced by the adversarial example attacks, we conduct experiments on some real Android application datasets which are composed of both malware and benign applications. Experimental results clearly indicate that the performance of Android malware detection is severely degraded when facing adversarial example attacks. 相似文献
5.
6.
7.
8.
Constantinos Spyrou George Samaras Evaggelia Pitoura Paraskevas Evripidou 《Mobile Networks and Applications》2004,9(5):517-528
Wireless mobile computing breaks the stationary barrier and allows users to compute and access information from anywhere and at anytime. However, this new freedom of movement does not come without new challenges. The mobile computing environment is constrained in many ways. Mobile elements are resource-poor and unreliable. Their network connectivity is often achieved through low-bandwidth wireless links. Furthermore, connectivity is frequently lost for variant periods of time. The difficulties raised by these constraints are compounded by mobility that induces variability in the availability of both communication and computational resources. These severe restrictions have a great impact on the design and structure of mobile computing applications and motivate the development of new software models. To this end, a number of extensions to the traditional distributed system architectures have been proposed [26]. These new software models, however, are static and require a priori set up and configuration. This in effect limits their potential in dynamically serving the mobile client; the client cannot access a site at which an appropriate model is not configured in advance. The contribution of this paper is twofold. First, the paper shows how an implementation of the proposed models using mobile agents eliminates this limitation and enhances the utilization of the models. Second, new frameworks for Web-based distributed access to databases are proposed and implemented. 相似文献
9.
针对汽车的安全管理提出了一种基于stm32控制器的定位系统,实现了对于车辆位置的远程监控。该系统通过由车载终端和远程移动终端组成。在车载端系统设备通过GPS模块接受卫星信号,主控制器提取车辆的经纬度、时间、速度等信息,经过GPRS网络发送到手机客户端,手机客户端加载运用Google Maps API将这些信息加载到Google地图中并显示。设备中系统运用uCOS-II操作系统以提高系统的鲁棒性,实验结果表明,系统实时可靠性高,通信稳定有效,能满足用户对于车辆位置安全监视需求。 相似文献
10.
11.
基于移动互联网的实时路况采集与发布系统,由运行于智能手机等终端的数据采集客户端软件、基于因特网的实时路况服务器及运行于智能手机等终端的实时路况查询客户端软件3部分组成。其基于智能手机操作系统,利用GPS、A-GPS和GPS数据保障技术,采集交通参与者的位置、速度和方向等信息;利用数据挖掘技术和GIS地图匹配进行数据处理;然后使用位置服务和动态路径规划等技术发布。利用MI-RTTS系统的数据,可发现城市交通问题,据此提出交通工程专业解决方案;缓解城市交通拥堵、节约能源、降低机动车污染排放。 相似文献
12.
13.
嵌入式电网参数检测系统的研究 总被引:1,自引:0,他引:1
阐述基于短消息服务(SMS)通信的电网参数检测系统的整体方案、系统组成、硬件配置、软件设计、功能以及技术性能.该系统针对电力系统电网参数检测的需要,利用单片机系统采集各种电网参数,并根据所采集的数据对电网参数进行故障检测.若单片机检测到电网故障,则单片机通过TC35模块以短消息方式将电网参数发送到电网监控中心.监控中心采用PC机获取电网参数,并以数据库的方式保存电网参数,以便于维修人员分析故障.该系统利用SMS通信不但降低了设计电路的难度,而且还具备SMS的优势.对于通信数据量小的远程检测系统设计具有很好的推广和应用价值. 相似文献
14.
《IEEE instrumentation & measurement magazine》2007,10(1):44-51
The goal of the proposed system is to protect sensitive areas of the country from hydrocarbon pollution with the use of a global system for mobile communications/general packet radio service (GSM/GPRS) accessed from mobile observation points (MOPs). The primary applications of this system are detection of leaks from an underground or aboveground storage tank (UST/AST), monitoring waste water discharge/ monitoring bilge water, monitoring water quality, monitoring groundwater, monitoring oil-water separators, monitoring storm drain effluents, and static soil gas headspace analysis. The basic version of the system is equipped with: a GPS position locator, a contamination probe sensitive to hydrocarbons, and a GSM/GPRS connection with the central www server 相似文献
15.
16.
在对3G手机VoIP话音QoS的主要实现技术进行分析的基础上,提出了3G手机VoIP话音QoS新的实现技术。文中通过对实时传输控制协议(RTCP协议)的详细研究,同时根据3G系统无线信道的具体特点,说明了实时传输控制协议运用于3G手机VoIP话音的QoS控制中的缺陷,并阐述了相应的控制解决方法。在基于Android的3G智能手机的VoIP客户端软件中,综合运用VoIP话音QoS的主要成熟实现技术,同时结合文中提出的VoIP话音QoS的解决思路,实现了对VoIP话音的QoS的控制。基于Android的3G智能手机的VolP客户端软件通过在不同的网络环境条件下的测试,VoIP话音质量良好,说明文中提出的3G手机VoIP话音QoS新的实现技术具有一定的实用价值。 相似文献
17.
本文研究了一套一体化监控支撑管理系统——"监控之家"。该系统基于VISUAL STUDIO.NET2005和SQL Server数据库基础之上,充分利用公司内部现有的资源,整合了IOD短信业务功能,制定了出入基站的短信申请、闭站开站的闭环操作控制等监控功能模块的标准化操作,规范了操作人员的监控流程。同时加强了日常监控工作的集中化管理,强化了监控中心作为部门之间、员工之间连接纽带的作用,促进了信息的沟通和协调。本文并对方案的运行情况进行了效果分析。 相似文献
18.
On effective offloading services for resource-constrained mobile devices running heavier mobile internet applications 总被引:1,自引:0,他引:1
Kun Yang Shumao Ou Hsiao-Hwa Chen 《Communications Magazine, IEEE》2008,46(1):56-63
Rapid advances in wireless mobile network technologies and mobile handsets (MHs) facilitate ubiquitous infrastructure that can support a range of mobile services and applications in addition to conventional mobile Internet access. One recent trend is to effectively run desktop PC-oriented heavier applications on MHs. However, due to their miniature, portable size, MHs are resource-constrained and therefore, running these applications directly on an MH is not satisfactory given a user's expectations. To cope with this problem, this article proposes a novel offloading service that can seamlessly offload some of the tasks of a mobile application from an MH to nearby, resource-rich PCs (called surrogates). The system architecture and key components of the proposed offloading service are presented, prototyped, and evaluated. The results of experiments and simulations have demonstrated the effectiveness and efficiency of this offloading service for mobile applications. 相似文献
19.
The rapid growth in the mobile application market presents a significant challenge to find interesting and relevant applications for users. An experimental study was conducted through the use of a specifically designed mobile application, on users’ mobile phones. The goals were; first, to learn about the users’ personality and the applications they downloaded to their mobile phones, second to recommend applications to users via notifications through the use of experimental mobile application and learn about user behavior in mobile environment. The question of how the personality features of users affect their compliance to recommendations is explored in this study. It is found that conscientiousness is positively related with accepting recommended applications and being agreeable is related with the preference for the applications of editor’s choice. Furthermore, in this study, applications owned by the user and the composition of applications under categories and their relation with personality features are explored. It is shown that the number of user owned applications and their category differ according to gender and personality. Having similar applications and the number of applications owned under specific categories increase the probability of accepting recommended applications. 相似文献