共查询到20条相似文献,搜索用时 125 毫秒
1.
2.
通过研究终端上报用户信息的两种方式,确定公安电子围栏只能通过主动给用户下发指示,要求终端上报来获取用户信息。优化的具体实现有同频电子围栏和异频电子围栏两种方案,根据对终端用户使用者的影响大小,最终确定采用异频方案。在公安电子围栏基站开通前预先在运营商基站与公安电子围栏基站上优化好相关参数,最终实现既能满足公安机关信息采集需求,也不影响现网用户使用感知的目的。 相似文献
3.
随着我国国民经济的不断增长,科学技术得到了快速的发展,人们的生活越来越离不开电子科技技术.把电子科技技术与汽车行业有效的结合起来,提升汽车维修技术的科学性,有效促进汽车使用年限的增加.汽车已经成为人们出行的重要交通工具,人们开始加大对汽车安全系数、驾驶技术和道路状况的关注,确保能够安全出行.汽车的维修技术不仅需要使用者增加对汽车故障修理知识的储备,还需要注意平时对汽车的维护和保养,面对汽车出现的不同故障和问题能够及时有效的进行解决,才能确保安全出行.本文我们就详细的阐述一下电子诊断技术在现代汽车维修过程中使用的状况,促进电子诊断技术更加科学合理的应用到汽车维修领域中,促进现代汽车维修技术向着科学化、专业化发展. 相似文献
4.
对现有汽车防盗系统的不足进行研究与分析,本文给出了一种基于车联网和GSM网络的汽车防盗系统设计方案。该方案的实现思路是主控制器通过车联网实时获取汽车状态,并对其进行监测,当盗窃行为发生时,通过GSM网络将汽车状态信息和当前的位置信息实时传送至车主的手机中,同时车主可通过远程命令切断燃油供给,从而实现汽车防盗的功能。 相似文献
5.
云计算安全:挑战与策略 总被引:3,自引:0,他引:3
0引言
云计算是指通过网络以按需、易扩展的方式提供所需的资源(硬件、平台、软件)及信息服务。从使用者的角度,这些资源或服务如同水、电等资源的供给方式,可以按需获取和使用,并按使用付费。云计算改变了信息技术的供给和使用方式。与传统的方式相比,云服务最大的优势在于供给弹性和低成本(尽管现有计算方式还有传输、部分管理与安全等方面的成本没有被仔细地计算在内),从而引起世界范围内的广泛关注和投资热情。 相似文献
6.
7.
8.
9.
随着人们生活水平的提高和汽车价格大幅下降,汽车已开始进入家庭。如何使用、保养汽车成为人们关注的焦点。本刊从本期开始增设“汽车电子”栏目,主要介绍汽车电子、国内外汽车电器、音响解码、保养等方面知识。 相似文献
10.
第二讲 机械传动部分及常见故障的维修 盒式录音机是一种经常使用的设备,需要定期进行清洁,调整等保养工作。为使广大使用者了解各类盒式录音机传动部分的结构原理,学会正确使用。保养和检测修理的知识及方法,本文对盒式录音机的机械传动部分作一简单叙述,并介绍几种常见的机械故障的维修方法。 相似文献
11.
The collision prevention system is one of most important research issues on vehicle safety technology. Sending worming messages within the right time and reliable transmission will get prevention of a possible vehicle accident. The communication standards of vehicular networks (VANET) are unable to guarantee the delivery of critical messages within tight deadlines. Indeed, the transmission collisions are handled with probabilistic manner that can reduce the transmission latency; however, it is inept to predict an upper bound value of this delay to verify the deadline. In this paper, we propose a medium access protocol that ensures the delivery of critical messages within a deadline. It is a hard real-time system with delay constant guarantee. We are focusing on improving the EDCA medium access protocol to prioritize critical messages and to get access to the transmission channel within a predictable communication delay. We create a new enhanced access protocol that is compatible with the IEEE 802.11p VANET standards and adapted to real-time communication requirements related to the vehicle collision avoidance problem. 相似文献
12.
13.
The wireless access in vehicular environment system is developed for enhancing the driving safety and comfort of automotive users. However, such system suffers from quality of service degradation for safety applications caused by the channel congestion in scenarios with high vehicle density. In the present work channel congestion is controlled jointly by road side unit, and vehicle. The present work supports vehicle to vehicle communication of authentic safe messages among authentic vehicles only. The road side unit reduces channel congestion by allowing only the authentic vehicles to participate in vehicle to vehicle communication, and by discarding unauthentic messages from the network. It revokes vehicles which are not authentic, and vehicles which are communicating unauthentic messages. Each vehicle also participates in the reduction of channel congestion by varying the size of beacon message dynamically, by removing the duplicate messages from message queue, and also by controlling the transmission power, and transmission range of a message during transmission. It further reduces the channel congestion by controlling the message generation rate using message generation rate control algorithm. Two different message generation rate control algorithm are proposed in the present work. In the first approach it maintains the channel load to an estimated initial value whereas the second approach increases the channel load till the percentage of message loss lies below a predefined threshold. The performance of the proposed scheme is studied on the basis of percentage of successful message reception, and percentage of message loss. The performance of the two message generation rate control algorithms are also compared in the present work. 相似文献
14.
在车载网络系统中,车辆用户根据距离接入点(AP)的远近使用不同的策略传输数据,为了控制策略切换造成的能量损耗,这里提出了一种适用于车载网络的能量有效频谱接入算法。通过车辆用户与基站的协作感知,对各个时段车辆用户的发射功率联合进行优化,使用户获得尽可能多的可用频谱资源,以最小化车辆用户总的能量损耗,满足车辆用户的QoS需求。仿真结果最终验证了算法的有效性。 相似文献
15.
为使汽车发生车祸时可在最短的时间内得到援救,以达到减少车祸伤亡的目的,设计了一种基于加速度的车祸报警系统,主要包括车载终端和上位机。车载终端以AVR单片机作为核心,它具有两个串行通讯口,一个接GPS模块,另一个接GSM模块。一旦判断发生车祸,车载终端会立即生成短信,通过GSM将信息发送至已设置的号码,同时上位机会很快收到短信而获得车祸的时间、地点、速度、加速度,接收号码也可以设置多个。车载终端同时也支持手动报警和呼叫功能,即发生车祸后现场人员可通过车载终端与监控中心联系,让监控中心获得更为详细的车祸情报。 相似文献
16.
为了更加有效地防止车辆被盗,笔者设计了一种远程汽车防盗报警系统。系统以单片机作为控制器,利用其通信功能及WISMO移动通信模块Q2403A,将汽车被盗的警情信号用短信息的方式发送到某个确定的手机用户,使该报警信息能及时地跟随手机用户,达到移动报警的目的。同时该手机用户还可以给系统回复短信息,以控制汽车的状态,另外,系统还可以根据接收到的控制短信息的不同内容,向手机用户发送当前系统状态的提示信息,从而实现系统和手机用户之间的互动。 相似文献
17.
Qasim Ali Arain ZhongLiang Deng Imran Memon Asma Zubedi Farman Ali Mangi 《Wireless Personal Communications》2017,97(3):3645-3671
According to the recent studies, application related with safety associated with road networks must need verification of entities and messages. However, security of road network users like vehicles and drivers needs to be dealt with. Unique identity like pen names and certificates might get useful to ensure security. Pseudonym names and the special certificates are being considered as the basic building blocks to ensure security requirements for road networks. Nevertheless, apart from the seen advantages, road network communication might also generate certain privacy issues by giving opportunity to invader to track vehicles. One and for most basic technique is to solve this issue by means of using pen names by the vehicles and alter them time to time. Since executing the procedure of changing pen names has to increase overhead. By looking at such type of limitations, our given technique will produce top privacy level for the road network users by using dynamic pseudonyms based multiple mix zones scenario. This pseudonym based procedure will base upon vehicle’s acceleration, heading and displacement to execute dynamic pseudonym alteration. We have performed simulation by applying SUMO simulator. After having a detailed comparison with the current pseudonym change techniques, it has been verified that our given technique has shown enhanced performance in terms of acquiring top level privacy rate having few numbers of pseudonyms alteration; broad level of simulations and analysis has been elaborated the efficiency of the given technique. 相似文献
18.
Weingarten H. Tie Liu Shamai S. Steinberg Y. Viswanath P. 《IEEE transactions on information theory / Professional Technical Group on Information Theory》2009,55(11):5011-5023
The capacity region of a compound multiple-antenna broadcast channel is characterized when the users exhibit a certain degradedness order. The channel under consideration has two users, each user has a finite set of possible realizations. The transmitter transmits two messages, one for each user, in such a manner that regardless of the actual realizations, both users will be able to decode their messages correctly. An alternative view of this channel is that of a broadcast channel with two common messages, each common message is intended to a different set of users. The degradedness order between the two sets of realizations/users is defined through an additional, fictitious, user whose channel is degraded with respect to all realizations/users from one set while all realizations/users from the other set are degraded with respect to him. 相似文献
19.
20.
垃圾短信目前依然是困扰用户和运营商的一大问题。本文根据运营商治理垃圾短信的现状,采用了基于用户行为特征的垃圾短信治理策略管理的技术和开启行业应用短信网关前转消息主叫号段鉴权的方法,有效提高垃圾短信的拦截效率,降低误拦率,取得了良好的社会效益。 相似文献