共查询到20条相似文献,搜索用时 859 毫秒
1.
安全高效矿井通信系统技术要求 总被引:4,自引:4,他引:0
提出了矿用有线调度通信系统、矿井广播通信系统、多基站矿井移动通信系统、矿井漏泄通信系统、矿井感应通信系统、矿用透地通信系统、矿井救灾通信系统的技术要求。矿井广播通信系统应具有音频和视频全播、组播、选播及录音和记录功能;具有调度台与井下终端双向通话功能;具有井下终端呼叫地面调度功能等。多基站矿井移动通信系统应具有移动台与移动台、移动台与固定电话之间通话功能;具有短信和数据传输功能;具有移动台位置登记和越区切换功能;具有优先权设置、用户限时、非法用户禁用、中继汇接、自诊断和故障指示功能。矿井救灾通信系统应具有移动台与移动台、移动台与基站、移动台与地面基地通信终端、基站与地面基地通信终端通话功能;具有发起急呼、全呼和组呼的功能;具有基站和移动台脱网工作功能;具有图像监视功能;具有CH4,CO,O2及温度等监测功能;具有救护队员心跳、体温、姿态监测功能等。 相似文献
2.
3.
In these days, the privacy of a user in information communication system is more important than ever before. Especially, the property is important for mobile communication systems due to the mobility of underlying mobile devices. Until now, many cryptographic tools have been proposed for achieving users’ privacy. In this paper, we review two privacy-oriented cryptographic protocols, and show their security holes. We also provide some countermeasure to fix the weaknesses. First, we discuss the security of the user identification scheme proposed by Hsu and Chuang which permits a user to anonymously log into a system and establish a secret key shared with the system. We show that the Hsu-Chuang scheme is not secure against known session key attacks, and then we provide a countermeasure which can be used for enhancing the security the Hsu-Chuang scheme. Secondly, we review a deniable authentication proposed by Harn and Ren which protects the privacy of a message sender. Then we show that the protocol has a potential incompleteness and two weaknesses. 相似文献
4.
Given the popularity of checking in at a location via mobile phone, little research has examined the germane motivations tied to location check-in as a form of in-group electronic word-of-mouth and its relation to the concern of privacy. A survey with 255 college students found that the students' privacy concerns – both online and Facebook specific – did not show any relationship with the motivations of location check-in as a means of information sharing. However, the relationship varied among the non-users of location check-in on Facebook. Involvement with mobile phone showed mixed relationships with check-in motivations – commitment to Facebook, self-development and reputation, and promotional viral communication. Findings not only confirm that young Facebook users are relatively free from the concern of privacy during their location-based information sharing, but also suggest different motivational mechanisms to operate for Facebook users’ viral communication depending on the habitualness of their mobile phone use. Implications are discussed for interpersonal marketing strategies on social networking sites. 相似文献
5.
In the emerging world of m-commerce potential users consistently cite location based information as one of the emergent services
that they would most likely utilise. However, solutions for obtaining the specific location of a mobile user predominately
rely on the provision of additional hardware and/or software within either the mobile phone or system infrastructure. Further,
these techniques are often inappropriate for indoor and highly urban environments, where they are often most useful, as the
line of sight to the location measurement unit is often obscured resulting in inaccurate and unreliable positional information.
In this paper we present a system that can be used with any current mobile phone system to provide location based information/advertisements
to any mobile phone, equipped with Bluetooth technology, without any necessity of installing client side software. The system
is readily deployable and can be used to provide systems such as location based information for tourist in cities or museums
or indeed location based advertisements. 相似文献
6.
With the rapid evolution of the mobile environment, demand for information extraction from mobile devices is increasing. This paper proposes an information extraction system that is designed for mobile devices with limited hardware resources. The proposed system extracts temporal (dates and times) and named instances (locations and title) from Korean short messages in an appointment management domain. To efficiently extract temporal instances with limited numbers of surface forms, the proposed system uses well-refined finite state automata. To effectively extract various surface forms of named instances with limited hardware resources, the proposed system uses a modified hidden Markov model (HMM) based on character n-grams. In the experiment on instance boundary labeling, the proposed system showed comparable performances with representative conventional classifiers. The proposed system was implemented in a commercial mobile phone to test its ability to automatically extract appointment information from a short message and store the information into a schedule database. The system performed well with a reasonable response time. 相似文献
7.
《International journal of human-computer studies》2007,65(4):388-403
We have designed and built a mobile emotional messaging system named eMoto. With it, users can compose messages through using emotion-signalling gestures as input, rendering a message background of colours, shapes and animations expressing the emotional content. The design intent behind eMoto was that it should be engaging physically, intellectually and socially, and allow users to express themselves emotionally in all those dimensions, involving them in an affective loop experience. In here, we describe the user-centred design process that lead to the eMoto system, but focus mainly on the final study where we let five friends use eMoto for two weeks. The study method, which we name in situ informants, helped us enter and explore the subjective and distributed experiences of use, as well as how emotional communication unfolds in everyday practice when channelled through a system like eMoto. The in situ informants are on the one hand users of eMoto, but also spectators, that are close friends who observe and document user behaviour. Design conclusions include the need to support the sometimes fragile communication rhythm that friendships require—expressing memories of the past, sharing the present and planning for the future. We saw that emotions are not singular state that exist within one person alone, but permeates the total situation, changing and drifting as a process between the two friends communicating. We also gained insights into the under-estimated but still important physical, sensual aspects of emotional communication. Experiences of the in situ informants method pointed to the need to involve participants in the interpretation of the data obtained, as well as establishing a closer connection with the spectators. 相似文献
8.
结合中国移动快捷的通讯网络和SuperMap地理信息系统软件的优点,建立基于LBS的手机监控系统.通过中国移动的基站获得位置信息,以短消息方式传递位置信息,达到对手机终端进行监控的目的.加上地理信息系统丰富的空间信息,实现了手机终端用户在任何时间、任何地点都可以监控到本机和其他授权手机终端的位置信息及其他与位置相关的商务信息,给用户的生活和工作带来了极大的便利. 相似文献
9.
Spatial cloaking for anonymous location-based services in mobile peer-to-peer environments 总被引:2,自引:0,他引:2
This paper tackles a privacy breach in current location-based services (LBS) where mobile users have to report their exact
location information to an LBS provider in order to obtain their desired services. For example, a user who wants to issue
a query asking about her nearest gas station has to report her exact location to an LBS provider. However, many recent research
efforts have indicated that revealing private location information to potentially untrusted LBS providers may lead to major
privacy breaches. To preserve user location privacy, spatial cloaking is the most commonly used privacy-enhancing technique
in LBS. The basic idea of the spatial cloaking technique is to blur a user’s exact location into a cloaked area that satisfies
the user specified privacy requirements. Unfortunately, existing spatial cloaking algorithms designed for LBS rely on fixed
communication infrastructure, e.g., base stations, and centralized/distributed servers. Thus, these algorithms cannot be applied
to a mobile peer-to-peer (P2P) environment where mobile users can only communicate with other peers through P2P multi-hop
routing without any support of fixed communication infrastructure or servers. In this paper, we propose a spatial cloaking
algorithm for mobile P2P environments. As mobile P2P environments have many unique limitations, e.g., user mobility, limited
transmission range, multi-hop communication, scarce communication resources, and network partitions, we propose three key
features to enhance our algorithm: (1) An information sharing scheme enables mobile users to share their gathered peer location information to reduce communication overhead; (2) A historical location scheme allows mobile users to utilize stale peer location information to overcome the network partition problem; and (3) A cloaked area adjustment scheme guarantees that our spatial cloaking algorithm is free from a “center-of-cloaked-area” privacy attack. Experimental results
show that our P2P spatial cloaking algorithm is scalable while guaranteeing the user’s location privacy protection. 相似文献
10.
11.
基于嵌入式终端的信息交互平台的设计与实现 总被引:1,自引:0,他引:1
针对嵌入式设备的特点,结合数字校园信息交互的具体研究,提出了一种基于嵌入式终端的信息交互平台的设计方案。通过构建该平台的模型和分析嵌入式终端的体系结构,阐述了在Linux和Intel XScale PXA270处理器为核心的终端软硬件系统上,扩展手机通信模块,实现短信方式的信息交互服务和数据上传管理,并最终完成了一个面向校园信息交互的实体系统。 相似文献
12.
13.
The demand for group communication using smart devices in campus environment is increasing rapidly. In this paper, we design an architecture for a mobile group communication system (MGCS) on campus by using Wi-Fi networks and smart devices. The architecture is composed of a web-based system and a smart device based mobile system. Through the systems, users on campus create community/mobile group, maintain dynamic group membership, and reliably deliver the message to other users. We use the common features of many smart devices to develop a prototype that works on off-the-shelf hardware. In the experimental section, we demonstrate our system using various real scenarios which can occur in university campuses. 相似文献
14.
《Computer Networks》2007,51(16):4634-4654
In recent years, both the number and capabilities of mobile devices have increased rapidly to the point where the mobile world is becoming a significant part of the Internet. Another recent trend is the increase in XML use for communication between applications. However, the mobile world has been reluctant to adopt XML due to its verbosity and processing needs.We consider here the problem of providing an XML-based messaging system for mobile devices. We analyze the requirements that the environment places on such a system and elaborate on these requirements by concentrating on three components that seem most amenable to improvements, namely XML processing interfaces, XML serialization, and message transfer protocols. In tandem with the analysis we also present the design and implementation of our messaging system that addresses these requirements.Our experimentation of this system is extensive and performed completely on real devices and real wireless networks. Based on our implementation and experimentation we conclude that there is potential for improvement in XML messaging. The largest gains are achieved by using an asynchronous programming style and by using a compact serialization format. The improvements are also individually integratable into existing systems. 相似文献
15.
一种改进的移动Agent通信算法 总被引:18,自引:0,他引:18
如何实现远程Agent通信的位置透明性,保证消息不会因为目标Agent迁移而丢失,一直是移动Agent通信所面临的难题,在现有的很多移动Agent系统中都没有得到解决,作者在Mogent系统中提出的通信算法初步实现了通信的位置透明和可靠的消息传输,该文在原有处的基础上提出了一种改进的适于多种迁移和通信模式的移动Agent通信算法,进一步减少了Agent的地址注册开销和迁移受到的限制,并给出了一种避免地址欺骗攻击的解决方案。 相似文献
16.
17.
随着互联网和移动增值业务的迅猛发展,用户规模与市场规模不断扩大,以及国内3G时代的到来,移动增值业务必将成为拉动整个通信行业的新亮点。考虑到消息在空中传输的安全性,设计并实现了空中下载技术(OTA)系统的密钥管理,加入MAC(消息验证码)保证数据的安全性,从而保证了数据在服务器端和USIM卡端传输的安全性和完整性,为开展移动增值业务提供了安全保障。 相似文献
18.
19.
周晨叶 《数字社区&智能家居》2007,2(5):667-670
通信是移动Agent系统的关键技术之一。目前为止已有很多相关研究人员提出了一些比较好的通信机制,基本上已经可以满足Agent通信的一些要求。但是如何能有效的实现已提出的机制,这方面的研究还不多。本文提出发送包方法来进行移动agent通信,采用一个HomeServer来记录每个代理的位置和状态信息,HomeServer配有一张事件列表配合每台主机通信平台的SendBox来处理未发送成功的消息。当通信双方驻留在主机上时,通信双方直接通信;当通信双方中有一方在迁移时,则将未发送成功的信息存入发送方通信平台上的SendBox,并在HomeServer的事件列表中增加一条记录,当迁移中的移动代理驻留在某一方的主机上时,由先前发送方平台的SendBox向接收方发送信息。采用发送包方法进行Agent通信能有效地实现位置透明性、异步性、可靠性和降低网络负载。 相似文献
20.
随着移动产业发展和移动技术提高,基于用户位置的业务迅速发展,如:紧急援助、信息查询等,基于位置业务创新已经成为移动产业发展的巨大推动力。文中在ISG平台上设计和实现基于位置的手机博客系统。与传统的手机博客系统相比较,文中引入用户位置信息。用户写博客时,系统自动记录用户的位置信息,并把用户位置与其所写博客动态绑定存储;用户可以根据自己的位置动态搜索博客。 相似文献