共查询到20条相似文献,搜索用时 109 毫秒
1.
桓汗晶 《信息通信技术与政策》2015,(7):66-73
随着移动互联网的快速发展,各种移动支付业务在现网越来越多。而移动支付的支付成功率则是影响用户感知的关键因素,目前移动支付基本都基于TCP/IP协议进行传输,TCP建链成功率的高低则会显著影响支付成功率。本文依托专业信令分析工具,针对某市移动支付成功率进行专项提升工作,通过对移动支付服务器、移动支付服务器端口、现场测试和用户投诉信令等不同角度进行分析,最终定位并解决了问题,极大地提升了用户感知。 相似文献
2.
张琳 《电信工程技术与标准化》2018,(7)
本文提出了基于U-vMOS视频质量评价标准的IPTV业务感知提升优化研究,研究的目标是对IPTV业务进行全流程优化,从“端、管、云、源”等各个环节提升用户感知。
最后通过对优化前和优化后的质差率以及万户投诉量两个指标的对比分析,表明所提出的端到端提升优化体系,能够大幅度提升用户实际业务体验及感知,完成了研究的预定目标。 相似文献
3.
通过信令提取扫码支付的域名,从单个小区和全网分析发现,无线网络出现异常时是影响扫码支付业务感知差的关键因素;鉴于此,针对特定场景(例如高支付小区),可以通过QoS技术对访问扫码支付IP的用户调度优先级提高,从而用户扫码支付业务感知得到提升。通过从核心网KQI、现场实测和关键指标波动数据显示,应用效果是有效的。 相似文献
4.
5.
6.
7.
张霙 《电信工程技术与标准化》2022,(12):82-88
随着5G网络的逐步普及,视频业务的使用需求和用户对业务感知的要求都有了更进一步的提高,大量高清视频的在线播放业务也被更加广泛地推广。本文通过典型视频的业务分析,建立感知指标体系、感知问题分析定界方法和流程,实现对客户感知问题的发现、分析和处理方法,用于各区域有效开展视频业务端到端质量优化提升工作,确保用户视频上网业务良好感知。 相似文献
8.
9.
本文提出了基于接入性和流畅性构建的一种TD-LTE视频端到端业务评估体系,以此来定位现网中视频业务中影响用户感知的主要问题所在,以及一些感知较差的小区,进行有针对性的优化,提升系统性能。 相似文献
10.
11.
目前,移动互联网的发展非常迅速,许多第三方平台都相继推出了手机端移动智能应用,并且这些移动智能应用都可以使用支付功能。文章首先对微信缴费系统设计整体需求进行简单总结,其次对微信公众号缴费系统板块设计、微信公众号的缴费充值平台总体设计进行概述分析,最后以有线电视在微信公众号缴费为例说明其优势。 相似文献
12.
为响应中国移动总部“研究出一套提高VOLTE用户感知度的方法,做出一个样板点”的号召,湖北公司以VoLTE和最热门OTT业务微信对比研究为基础,理论和实际相结合进行VoLTE优化方案设计,提出了一整套解决方案,该方案以优化接续时延为中心、以位置获取和冗余语音算法为辅、减少连续丢包缩短VoLTE接续时延、提升语音感知及弱场高干扰场景VoLTE性能。 相似文献
13.
Miha Rugelj Mojca Volk Urban Sedlar Janez Sterle Andrej Kos 《Telecommunication Systems》2014,56(3):417-425
The notion of user perception has grown in terms of its importance and complexity. This paper presents results of an experimental study focused on predictive modeling of the relations between the user perception, user satisfaction and objective technical parameters in data communication services. A new model for prediction of user satisfaction was devised using probability theory based on Markov chain. Two experiments were completed for web browsing scenarios. The results of the first experiment have confirmed that previous user experience has significant effect on the user perception of quality and should represent a vital element of future predictive user models. The result of the second experiment is a user satisfaction prediction model, which presents a novel insight and deeper understanding of user perception of quality. This model can significantly improve level of user satisfaction with services in telecommunications systems if implemented within advanced system design, optimization and quality assurance procedures. 相似文献
14.
15.
16.
在运营商网络中,当宽带用户欠费后,由于无法继续使用网络,因此通常采用去营业网点缴费来实现继续服务。基于此出发点考虑,设计一种用户自助方式,实现在线快捷支付的便捷服务能力,提升用户对服务的满意度。 相似文献
17.
Facial recognition payment (FRP) technology has been used as an innovative digital approach to payment services. This study develops a model to investigate how user trust—including trust in FRP service providers and FRP—affects users’ continuance intentions toward FRP services. We also propose that trust in FRP itself is affected by perceived vulnerability, perceived security, and perceived response efficacy from a privacy and security perspective. Our research model was empirically tested via a partial-least-squares analysis with survey data collected from 217 FRP users in China. The results show that trust in both FRP service providers and FRP itself positively affects users’ continuance intentions, and trust in service providers affects trust in FRP. Perceived security and response efficacy positively affect trust in FRP. This research contributes to the literature on FRP and trust, offering practical implications for FRP service providers on how to manage individual users’ FRP-related privacy concerns while enhancing user trust in FRP, which facilitates continuous FRP use. 相似文献
18.
Chi-Lun Liu 《电子科技学刊:英文版》2013,11(2):176-180
Personal cloud computing is an emerging trend in the computer industry. For a sustainable service, cloud computing services must control user access. The essential business characteristics of cloud computing are payment status and service level agreement. This work proposes a novel access control method for personal cloud service business. The proposed method sets metadata, policy analysis rules, and access denying rules. Metadata define the structure of access control policies and user requirements for cloud services. The policy analysis rules are used to compare conflicts and redundancies between access control policies. The access denying rules apply policies for inhibiting inappropriate access. The ontology is a theoretical foundation of this method. In this work, ontologies for payment status, access permission, service level, and the cloud provide semantic information needed to execute rules. A scenario of personal data backup cloud service is also provided in this work. This work potentially provides cloud service providers with a convenient method of controlling user access according to changeable business and marketing strategies. 相似文献
19.
对移动支付的定义和分类进行了分析,研究了在线移动支付和离线移动支付技术,对移动支付业务的国内外应用情况进行了总结,分析了移动支付业务发展存在的问题。 相似文献
20.
李文进 《信息安全与通信保密》2011,(2):52-54
针对用户在使用“手机钱包”的过程中,存在不明了操作流程,担心资金安全等问题。从用户的角度出发,在提取出支付过程中的4个主要角色之后,通过一次购买行为,分别采取短信和网站点击两种支付方式,分步描述了支付流程,支付短信的内容构造,短信下发号码的规则,商品、订单数据的格式,以及支付数据在各个角色中的传递过程。并且,同网银、支付宝等支付方式进行了比较,让用户对手机钱包有了充分的认识。 相似文献