首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 859 毫秒
1.
安全高效矿井通信系统技术要求   总被引:4,自引:4,他引:0  
提出了矿用有线调度通信系统、矿井广播通信系统、多基站矿井移动通信系统、矿井漏泄通信系统、矿井感应通信系统、矿用透地通信系统、矿井救灾通信系统的技术要求。矿井广播通信系统应具有音频和视频全播、组播、选播及录音和记录功能;具有调度台与井下终端双向通话功能;具有井下终端呼叫地面调度功能等。多基站矿井移动通信系统应具有移动台与移动台、移动台与固定电话之间通话功能;具有短信和数据传输功能;具有移动台位置登记和越区切换功能;具有优先权设置、用户限时、非法用户禁用、中继汇接、自诊断和故障指示功能。矿井救灾通信系统应具有移动台与移动台、移动台与基站、移动台与地面基地通信终端、基站与地面基地通信终端通话功能;具有发起急呼、全呼和组呼的功能;具有基站和移动台脱网工作功能;具有图像监视功能;具有CH4,CO,O2及温度等监测功能;具有救护队员心跳、体温、姿态监测功能等。  相似文献   

2.
实时通信技术在移动互联网的应用已得到广泛的认可,关系较为紧密的用户需要进行实时性更强的富媒体通信,这要求在网络连接并不稳定的移动互联网环境,提供相对可靠的实时通信机制.本文将使用ELGG社交网络平台,采用MQTT作为消息传输协议,利用手机广播用户已有的社交关系,设计实现了基于消息通知的实时通信机制体系结构,并且通过手机终端信息的交互验证了这种通信方式的可行性.  相似文献   

3.
In these days, the privacy of a user in information communication system is more important than ever before. Especially, the property is important for mobile communication systems due to the mobility of underlying mobile devices. Until now, many cryptographic tools have been proposed for achieving users’ privacy. In this paper, we review two privacy-oriented cryptographic protocols, and show their security holes. We also provide some countermeasure to fix the weaknesses. First, we discuss the security of the user identification scheme proposed by Hsu and Chuang which permits a user to anonymously log into a system and establish a secret key shared with the system. We show that the Hsu-Chuang scheme is not secure against known session key attacks, and then we provide a countermeasure which can be used for enhancing the security the Hsu-Chuang scheme. Secondly, we review a deniable authentication proposed by Harn and Ren which protects the privacy of a message sender. Then we show that the protocol has a potential incompleteness and two weaknesses.  相似文献   

4.
Given the popularity of checking in at a location via mobile phone, little research has examined the germane motivations tied to location check-in as a form of in-group electronic word-of-mouth and its relation to the concern of privacy. A survey with 255 college students found that the students' privacy concerns – both online and Facebook specific – did not show any relationship with the motivations of location check-in as a means of information sharing. However, the relationship varied among the non-users of location check-in on Facebook. Involvement with mobile phone showed mixed relationships with check-in motivations – commitment to Facebook, self-development and reputation, and promotional viral communication. Findings not only confirm that young Facebook users are relatively free from the concern of privacy during their location-based information sharing, but also suggest different motivational mechanisms to operate for Facebook users’ viral communication depending on the habitualness of their mobile phone use. Implications are discussed for interpersonal marketing strategies on social networking sites.  相似文献   

5.
In the emerging world of m-commerce potential users consistently cite location based information as one of the emergent services that they would most likely utilise. However, solutions for obtaining the specific location of a mobile user predominately rely on the provision of additional hardware and/or software within either the mobile phone or system infrastructure. Further, these techniques are often inappropriate for indoor and highly urban environments, where they are often most useful, as the line of sight to the location measurement unit is often obscured resulting in inaccurate and unreliable positional information. In this paper we present a system that can be used with any current mobile phone system to provide location based information/advertisements to any mobile phone, equipped with Bluetooth technology, without any necessity of installing client side software. The system is readily deployable and can be used to provide systems such as location based information for tourist in cities or museums or indeed location based advertisements.  相似文献   

6.
With the rapid evolution of the mobile environment, demand for information extraction from mobile devices is increasing. This paper proposes an information extraction system that is designed for mobile devices with limited hardware resources. The proposed system extracts temporal (dates and times) and named instances (locations and title) from Korean short messages in an appointment management domain. To efficiently extract temporal instances with limited numbers of surface forms, the proposed system uses well-refined finite state automata. To effectively extract various surface forms of named instances with limited hardware resources, the proposed system uses a modified hidden Markov model (HMM) based on character n-grams. In the experiment on instance boundary labeling, the proposed system showed comparable performances with representative conventional classifiers. The proposed system was implemented in a commercial mobile phone to test its ability to automatically extract appointment information from a short message and store the information into a schedule database. The system performed well with a reasonable response time.  相似文献   

7.
We have designed and built a mobile emotional messaging system named eMoto. With it, users can compose messages through using emotion-signalling gestures as input, rendering a message background of colours, shapes and animations expressing the emotional content. The design intent behind eMoto was that it should be engaging physically, intellectually and socially, and allow users to express themselves emotionally in all those dimensions, involving them in an affective loop experience. In here, we describe the user-centred design process that lead to the eMoto system, but focus mainly on the final study where we let five friends use eMoto for two weeks. The study method, which we name in situ informants, helped us enter and explore the subjective and distributed experiences of use, as well as how emotional communication unfolds in everyday practice when channelled through a system like eMoto. The in situ informants are on the one hand users of eMoto, but also spectators, that are close friends who observe and document user behaviour. Design conclusions include the need to support the sometimes fragile communication rhythm that friendships require—expressing memories of the past, sharing the present and planning for the future. We saw that emotions are not singular state that exist within one person alone, but permeates the total situation, changing and drifting as a process between the two friends communicating. We also gained insights into the under-estimated but still important physical, sensual aspects of emotional communication. Experiences of the in situ informants method pointed to the need to involve participants in the interpretation of the data obtained, as well as establishing a closer connection with the spectators.  相似文献   

8.
结合中国移动快捷的通讯网络和SuperMap地理信息系统软件的优点,建立基于LBS的手机监控系统.通过中国移动的基站获得位置信息,以短消息方式传递位置信息,达到对手机终端进行监控的目的.加上地理信息系统丰富的空间信息,实现了手机终端用户在任何时间、任何地点都可以监控到本机和其他授权手机终端的位置信息及其他与位置相关的商务信息,给用户的生活和工作带来了极大的便利.  相似文献   

9.
This paper tackles a privacy breach in current location-based services (LBS) where mobile users have to report their exact location information to an LBS provider in order to obtain their desired services. For example, a user who wants to issue a query asking about her nearest gas station has to report her exact location to an LBS provider. However, many recent research efforts have indicated that revealing private location information to potentially untrusted LBS providers may lead to major privacy breaches. To preserve user location privacy, spatial cloaking is the most commonly used privacy-enhancing technique in LBS. The basic idea of the spatial cloaking technique is to blur a user’s exact location into a cloaked area that satisfies the user specified privacy requirements. Unfortunately, existing spatial cloaking algorithms designed for LBS rely on fixed communication infrastructure, e.g., base stations, and centralized/distributed servers. Thus, these algorithms cannot be applied to a mobile peer-to-peer (P2P) environment where mobile users can only communicate with other peers through P2P multi-hop routing without any support of fixed communication infrastructure or servers. In this paper, we propose a spatial cloaking algorithm for mobile P2P environments. As mobile P2P environments have many unique limitations, e.g., user mobility, limited transmission range, multi-hop communication, scarce communication resources, and network partitions, we propose three key features to enhance our algorithm: (1) An information sharing scheme enables mobile users to share their gathered peer location information to reduce communication overhead; (2) A historical location scheme allows mobile users to utilize stale peer location information to overcome the network partition problem; and (3) A cloaked area adjustment scheme guarantees that our spatial cloaking algorithm is free from a “center-of-cloaked-area” privacy attack. Experimental results show that our P2P spatial cloaking algorithm is scalable while guaranteeing the user’s location privacy protection.  相似文献   

10.
艾菊梅  周书民  彭健 《计算机工程》2008,34(22):256-257
针对目前WAP带宽瓶颈和高额付费问题,提出一种将MMS和Web GIS相结合的移动搜索设计方案。以Web GIS作为空间信息引擎,采用MMS7.0和CMPP3.0为通信协议,依托Lucene技术框架实现中文索引和分词,搭建移动空间信息搜索平台。该平台接受移动用户查询,并生成空间信息,以彩信方式反馈到手机用户。实验结果证明,该方案可以有效降低移动搜索成本。  相似文献   

11.
基于嵌入式终端的信息交互平台的设计与实现   总被引:1,自引:0,他引:1  
徐宝成  王磊 《计算机应用》2007,27(5):1271-1273
针对嵌入式设备的特点,结合数字校园信息交互的具体研究,提出了一种基于嵌入式终端的信息交互平台的设计方案。通过构建该平台的模型和分析嵌入式终端的体系结构,阐述了在Linux和Intel XScale PXA270处理器为核心的终端软硬件系统上,扩展手机通信模块,实现短信方式的信息交互服务和数据上传管理,并最终完成了一个面向校园信息交互的实体系统。  相似文献   

12.
13.
The demand for group communication using smart devices in campus environment is increasing rapidly. In this paper, we design an architecture for a mobile group communication system (MGCS) on campus by using Wi-Fi networks and smart devices. The architecture is composed of a web-based system and a smart device based mobile system. Through the systems, users on campus create community/mobile group, maintain dynamic group membership, and reliably deliver the message to other users. We use the common features of many smart devices to develop a prototype that works on off-the-shelf hardware. In the experimental section, we demonstrate our system using various real scenarios which can occur in university campuses.  相似文献   

14.
《Computer Networks》2007,51(16):4634-4654
In recent years, both the number and capabilities of mobile devices have increased rapidly to the point where the mobile world is becoming a significant part of the Internet. Another recent trend is the increase in XML use for communication between applications. However, the mobile world has been reluctant to adopt XML due to its verbosity and processing needs.We consider here the problem of providing an XML-based messaging system for mobile devices. We analyze the requirements that the environment places on such a system and elaborate on these requirements by concentrating on three components that seem most amenable to improvements, namely XML processing interfaces, XML serialization, and message transfer protocols. In tandem with the analysis we also present the design and implementation of our messaging system that addresses these requirements.Our experimentation of this system is extensive and performed completely on real devices and real wireless networks. Based on our implementation and experimentation we conclude that there is potential for improvement in XML messaging. The largest gains are achieved by using an asynchronous programming style and by using a compact serialization format. The improvements are also individually integratable into existing systems.  相似文献   

15.
一种改进的移动Agent通信算法   总被引:18,自引:0,他引:18  
如何实现远程Agent通信的位置透明性,保证消息不会因为目标Agent迁移而丢失,一直是移动Agent通信所面临的难题,在现有的很多移动Agent系统中都没有得到解决,作者在Mogent系统中提出的通信算法初步实现了通信的位置透明和可靠的消息传输,该文在原有处的基础上提出了一种改进的适于多种迁移和通信模式的移动Agent通信算法,进一步减少了Agent的地址注册开销和迁移受到的限制,并给出了一种避免地址欺骗攻击的解决方案。  相似文献   

16.
许明艳  赵华  季新生  申涓 《软件学报》2018,29(7):1852-1862
针对移动点对点(P2P)结构下位置隐私保护匿名区形成存在着通信开销大、匿名效率低以及成功率低等问题,提出了一种移动P2P结构下用户分布感知方案,用户在邻域内共享邻域加权密度参数,获取邻域用户实时分布信息,根据用户分布特征为用户推荐隐私参数及候选用户查找半径,帮助用户快速形成匿名区。仿真结果表明,该算法通信开销小,在满足移动P2P网络移动设备节能需求的同时,匿名区生成时间平均在500ms以下,平均成功率达到92%以上。  相似文献   

17.
随着互联网和移动增值业务的迅猛发展,用户规模与市场规模不断扩大,以及国内3G时代的到来,移动增值业务必将成为拉动整个通信行业的新亮点。考虑到消息在空中传输的安全性,设计并实现了空中下载技术(OTA)系统的密钥管理,加入MAC(消息验证码)保证数据的安全性,从而保证了数据在服务器端和USIM卡端传输的安全性和完整性,为开展移动增值业务提供了安全保障。  相似文献   

18.
GSM网络已经扩展到全世界的各个角落,成为目前用户数量最大的移动通信系统。短消息作为GSM系统中最为简单和方便的数据通信方式,其业务和应用得到迅猛的发展。在工业控制系统中以短消息作为数据载体传送数据既有效又经济。本文提出一种基于GSM短消息业务的无线远程监控报警系统,该系统用于水厂的实时监控中,控制性能良好。  相似文献   

19.
通信是移动Agent系统的关键技术之一。目前为止已有很多相关研究人员提出了一些比较好的通信机制,基本上已经可以满足Agent通信的一些要求。但是如何能有效的实现已提出的机制,这方面的研究还不多。本文提出发送包方法来进行移动agent通信,采用一个HomeServer来记录每个代理的位置和状态信息,HomeServer配有一张事件列表配合每台主机通信平台的SendBox来处理未发送成功的消息。当通信双方驻留在主机上时,通信双方直接通信;当通信双方中有一方在迁移时,则将未发送成功的信息存入发送方通信平台上的SendBox,并在HomeServer的事件列表中增加一条记录,当迁移中的移动代理驻留在某一方的主机上时,由先前发送方平台的SendBox向接收方发送信息。采用发送包方法进行Agent通信能有效地实现位置透明性、异步性、可靠性和降低网络负载。  相似文献   

20.
随着移动产业发展和移动技术提高,基于用户位置的业务迅速发展,如:紧急援助、信息查询等,基于位置业务创新已经成为移动产业发展的巨大推动力。文中在ISG平台上设计和实现基于位置的手机博客系统。与传统的手机博客系统相比较,文中引入用户位置信息。用户写博客时,系统自动记录用户的位置信息,并把用户位置与其所写博客动态绑定存储;用户可以根据自己的位置动态搜索博客。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号