首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   61篇
  免费   2篇
  国内免费   6篇
电工技术   4篇
综合类   1篇
金属工艺   1篇
建筑科学   2篇
矿业工程   1篇
无线电   24篇
一般工业技术   1篇
自动化技术   35篇
  2023年   1篇
  2022年   1篇
  2021年   3篇
  2019年   2篇
  2018年   3篇
  2017年   9篇
  2016年   7篇
  2015年   8篇
  2014年   11篇
  2013年   10篇
  2012年   10篇
  2011年   4篇
排序方式: 共有69条查询结果,搜索用时 31 毫秒
1.
Smartphones are being used and relied on by people more than ever before. The open connectivity brings with it great convenience and leads to a variety of risks that cannot be overlooked. Smartphone vendors, security policy designers, and security application providers have put a variety of practical efforts to secure smartphones, and researchers have conducted extensive research on threat sources, security techniques, and user security behaviors. Regrettably, smartphone users do not pay enough attention to mobile security, making many efforts futile. This study identifies this gap between technology affordance and user requirements, and attempts to investigate the asymmetric perceptions toward security features between developers and users, between users and users, as well as between different security features. These asymmetric perceptions include perceptions of quality, perceptions of importance, and perceptions of satisfaction. After scoping the range of smartphone security features, this study conducts an improved Kano-based method and exhaustively analyzes the 245 collected samples using correspondence analysis and importance satisfaction analysis. The 14 security features of the smartphone are divided into four Kano quality types and the perceived quality differences between developers and users are compared. Correspondence analysis is utilized to capture the relationship between the perceived importance of security features across different groups of respondents, and results of importance-satisfaction analysis provide the basis for the developmental path and resource reallocation strategy of security features. This article offers new insights for researchers as well as practitioners of smartphone security.  相似文献   
2.
随着移动互联网发展越来越快,iOS成为发展最为迅速的手机操作系统之一。基于IOS平台的safari浏览器的开发由此产生,该文使用Objective-C语言和Sqlite数据库技术,在Xcode环境下,实现基于iOS平台的Safari浏览器系统,为用户提供了一个快速上网浏览的入口,不仅满足了用户的需求,而且使用户的体验更加良好。  相似文献   
3.
GPS一般不适用于室内环境定位,惯性导航是一种常用的室内定位技术。对此,提出了一种基于iOS平台的行走步长计算方法,通过iOS设备内置加速度计采集数据,计算腰部的竖直位移。行走时,人体的腰部轨迹相对于前进方向近似1个倒置单摆模型,依据此运动模型可以计算行走的步长。此外还给出了在iPhone上实现步长计算的软件实现方案,并设计了应用软件。实验表明,所提出的步长计算方案和软件可以实时显示行进的步长和总位移,测量结果较准确,误差约为5%,该方法可为开发室内定位系统提供一定理论依据。  相似文献   
4.
智能终端系统安全性研究   总被引:1,自引:0,他引:1  
对智能终端所面临的安全威胁及安全需求进行了研究,分析比较了当前主流智能终端操作系统的安全特性、架构和机制,并针对现有安全问题及机制提出了安全增强方法,最后对智能终端系统未来发展趋势进行了预测分析。  相似文献   
5.
设计了基于iOS(iPhone operating system)智能操作系统的监控平台,实现对未成年人的出行监控或作为用户遇险时的报警及追踪平台.iOS终端应用作为Client端实时获取用户GPS信息,采用Speex算法实现录制的音频压缩,与平台数据库Server通信并整合存储信息.平台的监控显示端通过加载网页的形式呈现用户位置及音频信息.平台搭建完成后经测试表明,监控平台将C/S与B/S模式结合,通过iOS端native编程实现更具针对性与稳定性的终端功能,同时平台显示部分采取网页形式可以更好的兼容多种系统,服务器端作为中间件实现了数据传输与处理的及时性.为开发基于iOS终端的监控或报警类平台提供了一定的应用与理论依据.  相似文献   
6.
高士翔  葛霄  潘磊  郑滔 《计算机科学》2012,39(106):375-379
在分析Dalvik虚拟机体系结构设计的基础上,针对iOS平台研究了Dalvik移植过程中的几个关键技术,并在iOS平台上成功构建了基于Dlavik的JAVA运行环境,这对iOS手机与Android手机的跨平台应用开发具有重大应用价值。对移植后的Dalvik进行了性能分析,给出了结论,并给出了下一步的项目计划。  相似文献   
7.
Internet of Things (IoT) products provide over-the-net capabilities such as remote activation, monitoring, and notifications. An associated mobile app is often provided for more convenient usage of these capabilities. The perceived quality of these companion apps can impact the success of the IoT product. We investigate the perceived quality and prominent issues of smart-home IoT mobile companion apps with the aim of deriving insights to: (i) provide guidance to end users interested in adopting IoT products; (ii) inform companion app developers and IoT producers about characteristics frequently criticized by users; (iii) highlight open research directions. We employ a mixed-methods approach, analyzing both quantitative and qualitative data. We assess the perceived quality of companion apps by quantitatively analyzing the star rating and the sentiment of 1,347,799 Android and 48,498 iOS user reviews. We identify the prominent issues that afflict companion apps by performing a qualitative manual analysis of 1,000 sampled reviews. Our analysis shows that users’ judgment has not improved over the years. A variety of functional and non-functional issues persist, such as difficulties in pairing with the device, software flakiness, poor user interfaces, and presence of issues of a socio-technical impact. Our study highlights several aspects of companion apps that require improvement in order to meet user expectations and identifies future directions.  相似文献   
8.
SSL/TLS validations such as certificate and public key pinning can reinforce the security of encrypted communications between Internet-of-Things devices and remote servers, and ensure the privacy of users. However, such implementations complicate forensic analysis and detection of information disclosure; say, when a mobile app breaches user’s privacy by sending sensitive information to third parties. Therefore, it is crucial to develop the capacity to vet mobile apps augmenting the security of SSL/TLS traffic. In this paper, we propose a technique to bypass the system’s default certificate validation as well as built-in SSL/TLS validations performed in iOS apps. We then demonstrate its utility by analysing 40 popular iOS social networking, electronic payment, banking, and cloud computing apps.  相似文献   
9.
针对数字化校园建设中存在的信息孤岛问题,设计开发了基于客户服务架构的能支持多种手机客户端的校园信息发布系统。分析了系统功能,描述了系统拓扑结构和软件架构,对数据交换接口、网页和手机客户端信息提醒等关键技术进行了探讨。试用结果表明系统运行良好,达到了设计目的。  相似文献   
10.
本文通过对智能终端技术架构的安全梳理和分析,找出智能终端存在的安全问题,从技术角度提出一个合理的安全体系,分别从安全管理、固件安全、网络安全、操作系统、应用安全等几个层面给出了防护建议。对中国移动智能终端的安全管理有很强的指导意义。  相似文献   
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号