首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
This research aims to find out the key attributes influencing the user trust towards applications on the mobile application store. In this research, both the experimental data set and the evaluation results of analysis are described. The analysis results include the test results of analysis of variance (ANOVA) and correlation analysis. In ANOVA, the attributes affecting user rating are derived and applied to the correlation analysis to evaluate the degree of correlation towards user rating, and in the last stage the positive or negative relationship with user satisfaction is figured out.  相似文献   

2.
物联网的问世,打破了之前的传统思维。在物联网时代,道路、楼宇、电缆、管道、车辆、上下往复的电梯、甚至牲畜,都将整合为一个统一体。本文重点介绍物联网已经实现的应用。  相似文献   

3.
电力企业中的移动分析应用及其安全机制研究   总被引:1,自引:0,他引:1  
随着无线通信技术和手持便携设备的飞速发展,移动设备在日常生活中的应用日益广泛,移动用户群呈几何级增长,以移动终端设备为载体的移动分析应用逐渐走进电力企业,并扮演着越来越重要的角色。但移动设备自身的安全机制和接入网络技术都存在着安全隐患,制约着移动应用的发展。文章探讨了移动分析应用在电力企业中的应用价值和面临的挑战,设计了电力企业中的移动分析应用业务框架,并着重研究了电力企业中的移动分析应用安全机制和安全策略。文章中的相关研究成果可为电力企业移动分析应用平台建设提供参考。  相似文献   

4.
提出了一种应用开发统一架构.架构包括移动互联网终端应用的统一开发框架和开发环境两部分,目的在于最大程度地降低技术门槛,提高复用程度和抹平操作系统差异.该架构不仅能支持移动应用的开发,还将支持未来陆续推向市场应用的开发,使得技术资产能够得到复用并持续增值.开发移动应用时,企业需要根据用户的需求特点、开发人员技术储备能力、产品上线时间窗口、开发成本等多个因素综合考虑,最终选择最优的开发模式和方案.  相似文献   

5.
IPSec技术应用前景分析   总被引:1,自引:0,他引:1  
陈湉  谢玮 《电信网技术》2010,(11):45-49
IPSec作为网络层的通用安全协议广泛应用于构建企业级VPN,但是在主流公共互联网业务中使用的情况比较少见。本文通过分析造成IPSec应用现状的原因,分析和探讨未来IPSec在主流互联网公众业务领域中的应用前景。  相似文献   

6.
本文首先分析了移动应用的安全现状,提出了移动应用安全评估方法,包括客户端安全评估、服务器安全评估和业务流程安全评估,最后给出了移动应用典型安全漏洞及其检查方法与加固建议,包括敏感数据暴露、鉴权机制缺陷、代码保护不足、公共组件漏洞和应用配置错误。  相似文献   

7.

Purpose

Smartphones facilitate the potential adoption of new mobile applications. The purpose of this research is to study users and non-users of three selected mobile applications, and find out what really drives the intention to use these applications across users and non-users.

Design/methodology/approach

The authors measured actual usage of mobile applications in a panel study of 579 Finnish smartphone users, using in-device measurements as an objective way to identify users and non-users. A web-based survey was used in collecting data to test an extended TAM model in explaining intention to use.

Findings

Perceived technological barriers negatively affect behavioural control, reflecting people’s assessment of themselves being capable of using the services without trouble. Behavioural control is directly linked to perceived usefulness (except for games) and perceived enjoyment, as hypothesized. Perceived enjoyment and usefulness were generically found to explain intention to use applications for both users and for non-users.

Research limitations/implications

With regards to the impact of social norms, the study finds that further research needs to be done in exploring its impact more thoroughly. The dataset of the research, consisting purely of male-dominated, young smartphone users, make the generalization of results difficult.

Practical implications

There are differences regarding what drives the usage of different kinds of mobile applications. In this study, map applications and mobile Internet, are driven by more utilitarian motivations, whereas games are more hedonic. It is also clear that not everybody are using applications facilitated by smartphones, and therefore the presented approach of studying users and non-users separately provides a new approach to analyze adoption on a practical level.

Originality/value

This research proves that models like TAM should not treat mobile services as a generic concept, but instead to specifically address individual mobile services. The research also demonstrates the unique value of combining objective usage measurements (reflecting actual behaviour) with traditional survey data in more comprehensively modelling service adoption.  相似文献   

8.
秦宇  赵世军  张倩颖 《中国通信》2012,9(10):91-102
The Trusted Platform Module (TPM) is a dedicated hardware chip designed to provide a higher level of security for computing platform. All TPM functionalities are implemented in TPM commands to achieve specific security goals. We attempt to analyze the security properties of these commands, especially the key management API. Our study utilizes applied pi calculus to formalize the commands and determine how their security properties affect TPM key management. The attacker is assumed to call TPM commands without bounds and without knowing the TPM root key, expecting to obtain or replace the user key. The analysis goal in our study is to guarantee the corresponding property of API execution and the integrity of API data. We analyze the security properties of TPM commands with a process reduction method, identify the key-handle hijack attack on a TPM newly created key, and propose reasonable solutions to solve the problem. Then, we conduct an experiment involving a key-handle attack, which successfully replaces a user key with an attacker's key using malicious TPM software. This paper discloses the weakness of the relationship between the key handle and the key object. After the TPM software stack is compromised, the attacker can launch a key-handle attack to obtain the user key and even break into the whole storage tree of user keys.  相似文献   

9.
陈森  陈超  张小勇  王磊  孙鹏 《电信科学》2015,31(4):154-161
随着移动通信网络的逐渐演进和智能终端的迅猛发展,移动互联网业务层出不穷,竞争非常激烈,而让用户获得良好的业务感知成为在竞争中胜出的关键.移动互联网用户感知评估系统针对移动互联网各项主流业务搭建了一套用户感知评估体系,为每项主要业务设计了一套KQI(key quality indicator)以及具体的识别、提取、计算方法.利用用户感知评估系统对海量数据分组的大数据分析还原复现了用户的业务行为,并从各个维度计算获得了各项KQI的得分,实现了全面、及时、准确地评估移动互联网业务用户感知,从而为网络运营商和移动互联网公司提供高附加值的数据支撑.  相似文献   

10.
手机对讲技术近年来随着移动互联网的发展而日益受到人们关注.从专利保护的角度出发,以近年来手机对讲技术领域中国专利申请数据为基础,对历年专利申请数量、主要专利申请人、排名前五的重点申请人及其历年申请数量进行统计,根据统计结果进行专利分析,并针对国内申请人分布情况和专利申请情况给出专利规避和布局建议.  相似文献   

11.
Wireless Networks - Energy related research in wireless ad hoc sensor networks (WASNs) is focusing on energy saving techniques in the application-, protocol-, service-, or hardware-level. Little...  相似文献   

12.
在卫星数字通信中,非平衡QPSK(UQPSK)直接序列扩频(DSSS)信号是一类应用广泛的调制方式,对其侦察处理的研究很少。本文将相关函数二阶矩方法应用于这类信号的检测与伪码周期估计中,推导了检测性能与输入信噪比、初相估计误差、UQPSK DSSS信号的同相和正交支路功率比、伪码长度等参数的关系,计算机仿真验证了理论分析的正确性。  相似文献   

13.
本文论述了通过多次统计分析,建立数学模型,利用特殊软件分析用户流量流向等手段,将用户进行分类。对不同类别的用户进行区别对待,差异化服务;兼之使用流量控制等手段引导用户访问网内资源,逐步改变用户的上网行为和习惯,以达到增加网内流量,降低网外结算流量的效果。  相似文献   

14.
研究了一种拖车电站RCS的空间特性,运用二元方差分析理论评定方位角和俯仰角因素对RCS的影响程度,证明了方位角的影响最显著.  相似文献   

15.
一种“微机原理与应用”课程教学实验平台   总被引:1,自引:0,他引:1  
为了配合"微机原理与应用"课程教学改革,本文设计了一种新的教学实验平台。学生可利用该实验平台自主设计简单的计算机系统,完成大量的计算机接口电路实验。实践表明,该平台对于增进学生对计算机原理的理解和掌握有很好的促进作用,并且能够提高其微控制器应用系统设计能力。  相似文献   

16.
分析了物联网与民生服务的紧密关系,研究了物联网在移动资产管理领域的应用发展态势,重点对电动自行车防盗业务的技术框架及发展状况进行了研究。  相似文献   

17.
首先简单介绍了两种直接链路自适应技术AMC,H-ARQ,讨认弛不同的用户移动速度对信道估计的影响,说明用户移动速度差别很大时应采用不同的链路自适应技术;然后提出了一种在用户高速移动时的间接链路自适应技术并对其进行了分析,分析结果表明这种间接链路自适应技术在用户高速移动时的性能优于现在的通用的直接链路自适应技术。  相似文献   

18.
视频业务逐渐成为继语音业务之后的基础业务,本文基于U-vMOS评价体系,研究手机视频感知质量及体验评估,基于路测和SEQ数据,通过建模研究手机视频体验建网方法。  相似文献   

19.
为了实现图像中隐藏信息的盲检测,建立高阶统计模型,提取高阶小波统计量捕获原始图像和隐藏图像之间的统计差异;方差分析用于检验所提取的小波统计量对隐藏信息的敏感程度。应用方差分析选取出对隐藏信息较敏感的小波统计量作为图像的特征向量元素,基于核技巧的支撑向量机(SVM)用作原始图像与隐藏图像之间的分类器,实现图像中隐藏信息的盲检测分析。实验结果及分析表明本文的方法能较有效地实现信息隐藏的盲检测分析。  相似文献   

20.
结合运营商应用商城业务运营安全需求,分析了移动应用安全检测存在的主要问题,提出了移动应用安全批量化检测的体系框架,阐述了架构实施过程中的各项关键问题,最后,给出了安全检测服务平台建设策略.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号