首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 125 毫秒
1.
设计了一种基于移动终端的定位服务中间件实现方案,先设计了其总体框架,然后对其各个框架中的每一个模块的工作原理进行分析.本系统可为第三方应用提供获取位置信息的相关服务,如立即定位和周期定位,可以使用终端定位也可以自主扩展第三方平台.本实现方案的特点是轻量级、可跨平台、能为第三方应用提供完善的查询服务支持.  相似文献   

2.
袁宏  王晓刚  钟红梅 《信息技术》2014,(5):31-33,38
Android是当前移动终端的主流操作系统之一。研究利用移动终端的优势,设计了地质灾害全天时监测预警框架,阐述了框架的实施方法,并设计开发了Android地质灾害监测预警客户端,为地质灾害的监测预警提供了一种无线终端应用方案,为防灾治灾服务。  相似文献   

3.
北斗定位的民用终端在各个领域都得到了广泛的应用,相应的系统方案也很多,而随着网络和大数据时代的到来,终端需要集成更多的功能,更好的体验。而系统性能和成本就成为了这类终端最大的瓶颈。文章将介绍一种基于集成BD-2/GPS双模导航和多媒体于一体的SoC,将终端设计与平台应用两极进行一体化设计的方案。文章通过车载导航终端设计来举例说明本方案针对性的多项优化创新设计,对关键功能做了技术实现分析,并且与其他相关方案做了比较,突出本方案在性能、成本、产品化方面的优势。  相似文献   

4.
黄楠  伍小芹 《通信技术》2011,44(7):63-64
探讨了第三代移动通信技术(3G,3rd-Generation)无线网络下的移动用户定位技术。一方面是该技术中的上游技术中的空间数据服务系统的设计,实现了系统数据架构模块、业务层模块、接口模块的功能;另一方面是便携式移动定位终端,将全球定位系统(GPS,Global Positioning System)以模块化的方式进行了嵌入,实现与上游中的数据库支持技术中的接口模块的设计与实现。在设计中考虑将GPS定位功能与3G网络支持下的定位功能进行结合,既可以单独使用也可以综合应用,这进一步提高了该设备的应用范围,这对于设备功能的强化是一种有益的尝试。  相似文献   

5.
运营商在M2M业务运营中发现一些业务具有一个共同的特性,就是服务提供商需要触发终端来上传一些数据。现阶段的移动分组网络是为人与人通信设计的,主要提供终端上网络的服务,不具备触发终端的能力。本文介绍了3GPP提出的网络触发终端的几种主要实现方案,在分析不同实现方案应用场景及其优缺点的情况下,指出了可以分阶段使用不同的方案...  相似文献   

6.
基于GPS/GPRS的车辆移动监控终端的设计与实现   总被引:2,自引:0,他引:2  
李富年 《现代电子技术》2007,30(13):191-194
结合GPS/GPRS技术在目标定位和数据传输的优点,介绍了基于GPS/GPRS的车辆监控系统的工作原理及系统框架构成,并着重分析了车载移动监控终端的硬件结构和系统软件设计,详细阐述了在实时嵌入式操作系统NucleusPLUS平台下其各系统软件功能模块的实现。该终端方案充分发挥Nucleus PLUS功能集成的优点,较为方便地实现了终端监控功能。  相似文献   

7.
张新  姜涌  苏放  纪阳  张平 《无线电工程》2004,34(10):4-6,31
3GPP定义的虚拟归属环境概念让用户在跨越网络或是切换终端时,仍可以个性化的保持其终端业务环境的 设置,获得一致的业务服务。移动多媒体业务的大规模应用对终端技术提出了新的要求。本文在此基础之上提出了统一业 务终端的分层体系结构以及终端重构的设计框架,研究了实现的关键技术,分析了对新一代信息网络发展的影响。  相似文献   

8.
本文介绍了广电运营商在运营中的终端资源、业务与终端设备的关系,以及用户和终端设备的关系及应用发展历程。在三网融合的下一代广播电视网的契机下,如何面对新业务新终端的出现,通过对业务和终端设备应用的提炼和设计,提出了基于NGB的终端设备的业务应用模式--终端设备框架。通过这个框架可以灵活、高效地应对和支撑创新业务及其新型终端,提升运营商的运营、服务能力和满足业务发展。  相似文献   

9.
13G的各种应用情况说明第三代移动通信的市场定位应基于移动多媒体业务,其成功的关键在于它提供个性化多媒体业务的能力。1.1多媒体信息服务的推广多媒体信息服务(MMS)是对短信息服务(SMS)和图片信息传递的进一步发展,可即时实现端到端、终端到互联网或互联网到终端的传送。MMS内容包括照片、录像剪辑图片、音频或语音剪辑、城市地图、信函、明信片、贺卡、演示文稿、图表、布局图、平面图、卡通及动画等等。这种服务方式为可能使用MMS来提供信息的各种应用类型和企业(如广告商)开辟了令它们感兴趣的空间。对于企业用户而言,多媒体信…  相似文献   

10.
网络环境下系统终端以不同的方式与用户主机相连,终端的数量、类型十分繁杂,使得终端硬件管理、网络安全管理均存在一定的难度和风险.为改善终端使用的孤立与共享之间的矛盾,要求进一步提高虚拟终端的应用深度与广度.为此提出了一种虚拟终端模型设计方案,本方案给出了模型结构与组成,其关键部分是VT用户之间的通信区CCA,由概念数据存储器CDS、控制指令和状态存储器CSS、数据结构定义器DSD、访问控制器ACS组成.此外,文中还给出了VT服务原语,提供了用户与服务提供方之间的交互工具.VT系统的进一步完善将对终端接入类目的减少,提高资源的利用率发挥重要作用,也为系统的安全保护产生积极推动作用.  相似文献   

11.
LBS已经成为当今移动和互联网领域的热点应用,本文在分析移动LBS关键问题的基础上,提出了移动与固定融合网络环境下的LBS业务运营基本架构及其功能要求,为LBS业务推广提供发展思路和技术解决方案.  相似文献   

12.
随着PHS无线市话业务的普及,继短消息服务等附加业务后,PHS无线市话定位业务将成为无线数据增值业务的一个新亮点。这种定位系统对于需要紧急服务的公安、金融、交通等行业用户有着广泛的应用前景。本文简述了无线市话小灵通定位系统业务的发展概况和特点,对其管理系统构成及业务实现流程进行了探讨。  相似文献   

13.
We investigate the notion of per-user integrated location and service management in personal communication service (PCS) networks by which a per-user service proxy is created to serve as a gateway between the mobile user and all client-server applications engaged by the mobile user. The service proxy is always colocated with the mobile user's location database such that whenever the MU's location database moves during a location handoff, a service handoff also ensues to colocate the service proxy with the location database. This allows the proxy to know the location of the mobile user all the time to reduce the network communication cost for service delivery. We investigate four integrated location and service management schemes. Our results show that the centralized scheme performs the best when the mobile user's SMR (service to mobility ratio) is low and CMR (call to mobility ratio) is high, while the fully distributed scheme performs the best when both SMR and CMR are high. In all other conditions, the dynamic anchor scheme is the best except when the service context transfer cost is high, under which the static anchor scheme performs the best. Through analytical and simulation results, we demonstrate that different users with vastly different mobility and service patterns should adopt different integrated location and service management methods to optimize system performance. Further, the best integrated scheme always performs better than the best decoupled scheme that considers location and service managements separately and management schemes that do not use any service proxy.  相似文献   

14.
孙科学  李献军 《信息技术》2007,31(8):55-57,124
无线定位业务是随着移动通信技术的进步而发展起来的增值业务。首先介绍移动通信系统中无线定位技术,然后讨论了具有LCS业务的WCDMA系统的网络结构,对无线接入网中LCS功能网元和协议进行了分析,最后提出WCDMA系统中定位业务的解决方案。  相似文献   

15.
The move towards service-oriented architectures and the increasing usage of mobile devices to access such services are two of the major changes in modern computing. Information about the user, their location and their trajectory can provide additional context information to a service, leading to useful applications such as directing a user to the nearest bus stop and displaying which buses are due to arrive in the next minutes. While this type of information can be useful, when the offered services are trusted, it also introduces privacy issues relating to gathering of location information for non-trusted applications like location-based marketing or user behaviour profiling. Users can limit their location information provided to a service but these controls are simple, making it important for the user to understand how their location information is being used by services. This paper reviews some of the methods currently being proposed to reduce the impact of location tracking on user privacy, and presents a novel encryption method for preserving the location and trajectory path of a user using Privacy-Enhancing Technologies.  相似文献   

16.

Vehicular Ad hoc Networks (VANETs) have drawn incredible interest in both academic and industrial sectors due to their potential applications and services. Vehicles’ position plays a significant role in many location-based applications and services such as public emergency, vehicles tracking, resource discovery, traffic monitoring and position-based routing. A location service is used to keep up-to-date records of current positions of vehicles. However, locating vehicles’ positions and maintaining an accurate view of the entire network are quite challenging tasks due to the high number of nodes, and high and fast nodes mobility which results in rapid topological changes and sudden network disconnections. In the past literature, various location-based services have been proposed to solve the above mentioned issues. Moreover, the cluster-based location service schemes have gained a growing interest due to their advantages over non-cluster-based schemes. The cluster-based schemes improve the network scalability, reduce the communications overhead and resolve the mobility issues within the clusters preventing them from propagating in the whole network. Therefore, this paper presents the taxonomy of the existing location service schemes, inspects the cluster-based location service by highlighting their strengths and limitations, and provides a comparison between location-based clustering and application specific clustering such as the one used in routing, information dissemination, channel access management and security. In addition, the existing clustering schemes, challenges and future directions for efficient cluster-based location service are also discussed.

  相似文献   

17.
越来越多的应用以云中网络服务的形式在服务提供商的控制下发布出来,但使用这些服务的用户却没有办法判断这些服务是否是可信的。文中通过一个可信管理框架来支持在云计算环境中可信服务的建立,让用户通过一个中立第三方得以获知服务程序的可信度,实现一个可信平台服务。最后在一个支持Python/Django框架的云平台上实现了一个原型系统,让服务提供商得以在封装服务程序实例的同时再向其外部用户证明Python代码的可信度。一旦运行,服务实例可以拥有独立标识并能防止用户篡改其代码。  相似文献   

18.
刘林  范平志  许亮 《电讯技术》2005,45(2):134-137
基于现有无线定位系统种类多、覆盖范围小、业务单一的缺点,本文提出了一种新型开放式通用无线定位增值服务平台。该通用定位平台构架于现有的多个无线定位网络并独立于具体的无线通信网络,从而使定位功能和服务范围得到增强,适用于独立于无线通信网络的通用无线定位服务专业运营商。本文给出了通用无线定位增值服务平台的系统结构,然后讨论了基于GSM和3GPPParlayAPI规范的无线定位增值服务平台中间件功能层的定义以及该服务平台的功能,最后介绍了该增值服务平台可为独立的服务提供商提供的基于位置信息的具体应用。  相似文献   

19.
The AROUND Architecture for Dynamic Location-Based Services   总被引:1,自引:0,他引:1  
This paper presents a generic concept of location-based service as an abstraction for supporting the association between computational resources and location. The objective is to extend the advantages of service-based architectures to the development of location-based systems, thus providing a more open and extensible alternative to the vertical approaches typically used in this type of system. The novel AROUND architecture is proposed as an approach for supporting location-based services in the Internet environment. AROUND provides a service location infrastructure that allows applications to select services that are specifically associated with their current location. The architecture includes a flexible scope model that defines the association between services and location, and a service location infrastructure organised by spatial criteria and optimised for location-based queries. Based on a prototype implementation of this architecture, we have developed two case studies that illustrate the use of this approach for developing location-based systems. The overall results provide a valuable insight into the applicability of the architecture, and suggest that this model of location-based services can provide a useful approach for the development of a wide range of location-based applications.  相似文献   

20.
In location-based services (LBS),as the untrusted LBS server can be seen as an adversary,and it can utilize the attribute as background knowledge to correlate the real location of the user in the set of uncertain locations.Then the adversary can gain the location privacy when the user enjoys the snapshot and continuous query through the correlation inference attack.In order to cope with this attack,the main scheme in privacy protection is to generalize the attribute and achieve attribute anonymity.However,algorithms of this type usually assumes a trusted third party (TTP) which provides the service of similarity attribute finding and comparing,and it is unpractical in the real environment,as the TTP may become the point of attack or the bottleneck of service and it cannot be considered as the trusted one all the time.Thus,to cope with the correlation inference attack as well as the semi-trusted third party,ciphertext policy attribute based encryption (CP-ABE) and users collaboration based attribute anonymous scheme was proposed.In this scheme,the user coupled achieve location and attribute anonymity.Furthermore,this scheme could also provide security for attacks from the semi-trusted third party as well as semi-trusted collaborative users.At last,security analysis and the experiment results further verify the effectiveness of privacy protection and the efficiency of algorithm execution.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号