首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
随着移动互联网的广泛应用,智能手机、平板等新型智能终端设备在各种各样的违法犯罪活动中开始扮演越来越重要的角色,从涉案手机中提取的数据常常包含与违法犯罪行为相关的重要线索和证据。然而,移动智能终端设备不断提升的安全设计可能使得取证人员无法从设备中提取数据,给电子数据取证鉴定工作提出了新的挑战。本文详细分析当前主流的iOS、Android和Windows Phone等平台下的移动设备的安全机制,研究了主要的安全机制破解和取证技术及其在目前电子数据取证工作中的应用。最后,对未来面向新型移动智能终端电子数据取证技术研究发展方向进行了探讨。  相似文献   

2.
The smartphone market is nowadays highly competitive. When buying a new device, users focus on visual esthetics, ergonomics, performance, and user experience, among others. Assessing usability issues allows improving these aspects. One popular method for detecting usability problems is heuristic evaluation, in which evaluators employ a set of usability heuristics as guide. Using proper heuristics is highly relevant. In this paper we present SMASH, a set of 12 usability heuristics for smartphones and mobile applications, developed iteratively. SMASH (previously named TMD: Usability heuristics for Touchscreen-based Mobile Devices) was experimentally validated. The results support its utility and effectiveness.  相似文献   

3.
李伟  柳长安  芦东昕  徐立峰 《微机发展》2006,16(11):109-111
Windows Mobile 5.0是微软为智能移动终端推出的软件平台,特别在智能手机领域受到越来越广泛的应用;在基于Windows Mobile的产品设计中,内存泄露又是需要考虑的关键之一。文中解析了Windows Mobile平台上监测设备内存泄露的工具AppVerifier,并在模拟器上实现了监测应用程序内存泄露,进而发现使用AppVerifier存在的问题,并指出了使用中高效利用AppVerifier的方法。  相似文献   

4.
阐述了如何在windows mobile 5.0的环境下越过文件系统直接读取OneNand Flash。首先介绍了OneNand Flash的特点,然后简要地介绍了windows mobile5.0系统,最后介绍了如何按块读取OneNand Flash中的数据并将读取的数据传输给PC。结合Windows Mobile上开发GHOST软件的实例,详细介绍了数据读取以及数据传输的全过程,并给出了部分关键代码。  相似文献   

5.
Windows Mobile智能手机中Flash数据读取功能的设计与开发①   总被引:1,自引:0,他引:1  
阐述了如何在windows mobile5.0的环境下越过文件系统直接读取OneNand Flash。首先介绍了OneNand Flash的特点,然后简要地介绍了windows mobile5.0系统,最后介绍了如何按块读取OneNand Flash中的数据并将读取的数据传输给PC。结合Windows Mobile上开发GHOST软件的实例,详细介绍了数据读取以及数据传输的全过程,并给出了部分关键代码。  相似文献   

6.
The percentage of individuals frequently using their smartphones in work and life is increasing steadily. The interactions between individuals and their smartphones can produce large amounts of usage data, which contain rich information about smartphone owners’ usage habits and their daily life. In this paper, a personal visual analytic tool is proposed to develop insights and discover knowledge of personal life in smartphone usage data. Four cooperated visualization views and many interactions are provided in this tool to visually explore the temporal features of various interactive events between smartphones and their users, the hierarchical associations among event types, and the detailed distributions of massive event sequences. In the case study, plenty of interesting patterns are discovered by analyzing the data of two smartphone users with different usage styles. We also conduct a one-month user study on several invited volunteers from our laboratory and acquaintance circle to improve our prototype system based on their feedback.  相似文献   

7.
The increasing ubiquity of smartphones coupled with the mobility of their users will allow the use of smartphones to enhance the operation of wireless sensor networks. In addition to accessing data from a wireless sensor network for personal use, and the generation of data through participatory sensing, we propose the use of smartphones to collect data from sensor nodes opportunistically. For this to be feasible, the mobility patterns of smartphone users must support opportunistic use. We analyze the dataset from the Mobile Data Challenge by Nokia, and we identify the significant patterns, including strong spatial and temporal localities. These patterns should be exploited when designing protocols and algorithms, and their existence supports the proposal for opportunistic data collection through smartphones.  相似文献   

8.
基于Windows Mobile的智能手机蓝牙功能的实现   总被引:1,自引:0,他引:1  
论文描述了蓝牙的Headset&Hands-Free、A2DP描述集,重点阐述了在基于WindowsMobile2005的智能手机上蓝牙功能实现,包括ActiveSync的数据传输、耳机和免提、无线立体声,最后结合测试,得出这几种功能的若干性能指标。  相似文献   

9.
As Android Operating System (OS) for mobile computing devices become one of the major trends, the utilization of smartphones set the record for global users and they are taking advantages of the contemporary Instant Messaging (IM) as a convenient tool to communicate with global users in real time because of its competitive rate, high availability, robust reliability, and agile mobility. Undoubtedly, as IM has gradually become one of the channels to commit the cybercrime, the digital evidence collection, analysis, and preservation of the non-volatile data from the Random Access Memory (RAM) of the computing device in terms of cyber trails that were unknowingly left on the crime scene. Hence, this research conducts the design of the experiments to fulfill the essence of contribution of the paper. The Skype Chat and MSN are the popular IM tools, which are widely utilized in contemporary digital era. This paper provides a generic paradigm for the digital forensics specialists and law enforcement agencies to ponder if similar situations are faced.  相似文献   

10.
The seismic reflection method is one of the most important methods in geophysical exploration. There are three stages in a seismic exploration survey: acquisition, processing, and interpretation. This paper focuses on a pre-processing tool, the Non-Local Means (NLM) filter algorithm, which is a powerful technique that can significantly suppress noise in seismic data. However, the domain of the NLM algorithm is the whole dataset and 3D seismic data being very large, often exceeding one terabyte (TB), it is impossible to store all the data in Random Access Memory (RAM). Furthermore, the NLM filter would require a considerably long runtime. These factors make a straightforward implementation of the NLM algorithm on real geophysical exploration data infeasible. This paper redesigned and implemented the NLM filter algorithm to fit the challenges of seismic exploration. The optimized implementation of the NLM filter is capable of processing production-size seismic data on modern clusters and is 87 times faster than the straightforward implementation of NLM.  相似文献   

11.
本文介绍了由单片机控制的基于以太网的数据采集电路.该电路采用了美国Microchip公司的8位单片机PIC16F877和台湾Realtek公司的10M以太网控制芯片RTL8019AS.实现了数据采集以及以太网数据传输的功能。整个电路主要包括网络接1:7电路,单片机电路,A,D转换电路,D,A转换电路,RAM存储电路,EEPROM存储电路,D10电路等。文中简单阐述了以太网数据采集电路的设计原理,并给出了其实现的方法。  相似文献   

12.
In this paper, we investigate the relationship between automatically extracted behavioral characteristics derived from rich smartphone data and self-reported Big-Five personality traits (extraversion, agreeableness, conscientiousness, emotional stability and openness to experience). Our data stem from smartphones of 117 Nokia N95 smartphone users, collected over a continuous period of 17 months in Switzerland. From the analysis, we show that several aggregated features obtained from smartphone usage data can be indicators of the Big-Five traits. Next, we describe a machine learning method to detect the personality trait of a user based on smartphone usage. Finally, we study the benefits of using gender-specific models for this task. Apart from a psychological viewpoint, this study facilitates further research on the automated classification and usage of personality traits for personalizing services on smartphones.  相似文献   

13.
基于PCI总线的指纹采集卡   总被引:2,自引:0,他引:2  
介绍了PCI总线的性能特点和几种实现方法,根据应用电路的硬件实现周期选择了专用接口芯片PCI9054,研究了PCI9054的工作模式、数据传输的突发方式和EEPROM完成的功能,设计了一种基于PCI总线的指纹采集卡。通过分析指纹采集头的配置方式和I^2C总线时序,采用可编程逻辑器件模拟I^2C总线控制指纹采集头,得到适合相应识别算法的指纹数据。利用DdverStudio工具包生成框架,开发出驱动程序,并给出了最终的硬件设计方案。  相似文献   

14.
This study aims at understanding the fundamental factors influencing users’ intentions to continually use smartphones as a ubiquitous learning (u-learning) tool. This study examines consumers’ experiences with smartphone learning in order to investigate the areas of its development as a u-learning application. In this paper, the modified unified theory of acceptance and usage technology (UTAUT) model is used with constructs from expectation-confirmation theory (ECT). While the findings confirm the significant roles of users’ cognitive perceptions, the findings also shed light on the possibility of the smartphone serving as an enabler of u-learning. Users may want to use the smartphone as a telecommunication tool, as well as a u-learning application. The proposed model brings together extant research on smartphones and provides an important cluster of antecedents to eventual technology acceptance via constructs of continuance intention to use and actual usage of u-learning. The empirical findings demonstrate that employing perceived usability and perceived quality would be a worthwhile extension of the UTAUT/ECT in the smartphone learning context, as both were found to be influential in predicting smartphone users’ attitudes and behavioral intentions. Practical implications for industry can be drawn from these findings in terms of strategies and new models for u-learning and beyond.  相似文献   

15.
Smartphones store sensitive and confidential data, e.g., business related documents or emails. If a smartphone is stolen, such data are at risk of disclosure. To mitigate this risk, modern smartphones allow users to enable data encryption, which uses a locking password to protect the data encryption key. Unfortunately, users either do not lock their devices at all, due to usability issues, or use weak and easy to guess 4-digit PINs. This makes the current approach of protecting confidential data-at-rest ineffective against password guessing attackers. To address this problem we design, implement and evaluate the Sidekick system — a system that uses a wearable device to decouple data encryption and smartphone locking. Evaluation of the Sidekick system revealed that the proposal can run on an 8-bit System-on-Chip, uses only 4 Kb/20 Kb of RAM/ROM, allows data encryption key fetching in less than two seconds, while lasting for more than a year on a single coin-cell battery.  相似文献   

16.
分析Windows98虚拟内存   总被引:1,自引:0,他引:1  
在机器RAM内存有限的情况下,使用虚拟内存将能获得很大的性能提升。本文以虚拟内存管理程序为核心对Windows98的虚拟内存进行了较为详细的分析。  相似文献   

17.
The tele‐cocooning hypothesis posits that mobile communication increases interaction with communication rich ties, while simultaneously weakening interaction with communication weak ties. In this study, we demonstrate how smartphones can be used to mitigate tele‐cocooning behavior by stimulating interaction with communication weak ties. Using a smartphone application to collect non‐identifying mobile communication log data, we conducted a field experiment with 193 Japanese participants. The treatment consisted of onscreen reminders designed to stimulate interaction with communication weak ties. The results indicate that the treatment promoted the activation of communication weak ties and the acquisition of information through those ties, suggesting that smartphones can be utilized to promote access to social capital.  相似文献   

18.
Based on a sample of 944 respondents who were recruited from 20 elementary schools in South Korea, this research surveyed the factors that lead to smartphone addiction. This research examined the user characteristics and media content types that can lead to addiction. With regard to user characteristics, results showed that those who have lower self-control and those who have greater stress were more likely to be addicted to smartphones. For media content types, those who use smartphones for SNS, games, and entertainment were more likely to be addicted to smartphones, whereas those who use smartphones for study-related purposes were not. Although both SNS use and game use were positive predictors of smartphone addiction, SNS use was a stronger predictor of smartphone addiction than game use.  相似文献   

19.
The objective of this study is twofold. First, it aims to investigate the various values users achieve with smartphones, which is a form of user‐empowering information technology (IT). The other objective is to introduce a means‐end chain approach into IT‐user studies. An important attraction of smartphones is their personalized environment, which is mainly provided by varied applications. The user personalization ability implies that users achieve diverse benefits with smartphones; that is, users decide what a smartphone is to them rather than adopt a given product. Thus, investigating what values users pursue with a smartphone (i.e. a value‐oriented approach) will give insights into understanding the users. To investigate user values in using smartphones, we conducted a laddering interview with 54 smartphone users and analyzed the data by using a means‐end chain approach to understand consumers' hierarchical value structure. This study contributes to value‐oriented research on user‐empowering IT by revelling how users benefit from smartphones. Furthermore, the study advances value‐oriented research by showing what users actually do with smartphones, from concrete activities to abstract values. In addition, a means‐end chain approach introduced in the study can be another angle for the investigation of user adoption of technology, in that it can describe IT use contexts and practices, which become an important object of analysis in the information systems research.  相似文献   

20.
This paper proposes MousePath, a novel lightweight communication system between PC web pages and smartphones. MousePath works in two modalities, MousePath-OPT and MousePath-BL. MousePath-OPT works by putting the optical mouse on top of the smartphone’s screen, then its transmission starts and instantly finishes without association and pairing fraction. It encodes data into the movement of the smartphone’s display content and leverages the optical mouse of the computer to sense the movement for decoding the data. MousePath-BL works by emulating the smartphone as a Bluetooth wireless mouse. Then the smartphone can directly transmit information to the web page via generating mouse events. We prototype and evaluate the system with commercial computers and smartphones. A key benefit of MousePath is that it seamlessly bridges smartphones to co-located PC web applications. MousePath-OPT is more secure and convenient to use while MousePath-BL achieves higher throughput. Two representative web applications, i.e., sensor sharing and message sharing, are developed to demonstrate MousePath’s potential in enhancing PC web applications.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号