期刊文献+

骑行智能振动导航系统的设计与实现 被引量:1

Design and implementation of intelligent vibration navigation system for riding
原文传递
导出
摘要 基于骑行时手机导航软件的不适用性,设计与实现了骑行智能振动导航系统。系统用于辅助自行车骑行者导航寻路,主要由智能手环和手机端手环助手App组成。智能手环通过蓝牙连接到手环助手App,利用App的导航功能实现实时导航,并在需要转弯或掉头时通过智能手环内侧不同方位的振动与手机语音来提示用户,以达到骑行导航者无须低头看屏幕就可安全、正确行驶的目的。与普通手机导航相比,本系统具有轻便、小巧、易用的特点,提高了安全性与可靠性。 Based on the inapplicability of mobile phone navigation software,an intelligent vibration navigation system is designed and implemented.The System is used to assist cyclists to navigate and find their way.It is mainly composed of intelligent bracelet and mobile phone end Bracelet assistant App.The smart hand ring connects to the handring assistant App through Bluetooth,and uses the navigation function of App.to navigate in real time.When turning or turning around,the user is reminded by.the vibration of different directions inside the smart hand ring and the voice of the mobile phone to make the rider run safely.and correctly without looking down atthe screen. Compared with ordinary mobile phone navigation,it improves the security,and has the characteristics of light, compact and easy to use.
作者 袁传辉 陈文婧 王兆信 张铭浩 Yuan Chuanhui;Chen Wenjing;Wang Zhaoxin;ZhangMinghao(School of software,Qufu Normal University,Qufu,Shandong,273165)
出处 《电子技术(上海)》 2018年第11期91-94,共4页 Electronic Technology
关键词 骑行 智能 导航 振动 蓝牙 riding intelligence navigation vibration Bluetooth
  • 相关文献

参考文献12

二级参考文献33

  • 1Adamo J M. Data mining for association rules and sequential patterns:sequential and parallel algorithrns[M].Springer Science & Business Media,2012.
  • 2Shabtai A, Kanonov U, Elovici Y, et al. "Andromaly": a behavioral malware detection framework for android devices[J]. Journal of Intelligent Information Systems, 2012, 38(1): 161-190.
  • 3Kraus L, Wechsung I, Moller S. Using Statistical Information to Communicate Android PermissionRisks to Users[C]//Socio-Technical Aspects in Security and Trust (STAST), 2014 Workshop on. IEEE, 2014: 48-55.
  • 4Sanz B, Santos I, Laorden C, et al. On the automatic categorisation of android applications[C] //Consumer Communications and Networking Conference (CCNC), 2012 IEEE. IEEE, 2012: 149-153.
  • 5Gallo R, Hongo P, Dahab R, et al. Security and system architecture:comparison of Android customizations[C]//Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks.ACM, 2015: 12.
  • 6Chia P H, Yamarnoto Y, Asokan N. Is this app safe?: a large scale study on application permissions and risk signals[C]//Proceedings of the 21 st international conference on World Wide Web. ACM, 2012: 311-320.
  • 7Peng H, Gates C, Sarma B, et al. Using probabilistic generative models for ranking risks of android apps[C]//Proceedings of the 2012 ACM conference on Computer and communications security. ACM, 2012: 241-252.
  • 8Zhou Y, Wang Z, Zhou W, et al. Hey, You, Get Off of My Market:Detecting Malicious Apps in Official and Alternative Android Market-s[C]//NDSS. 2012.
  • 9Chakradeo S, Reaves B, Traynor P, et al. Mast: triage for market-scale mobile malware analysis[C] //proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks. ACM, 2013:13-24.
  • 10Barrera D, Kayacik H G, van Oorschot P C, et al. A methodology for empirical analysis of permission-based security models and its application to android [C] // Proceedings of the 17th ACM conference on Computer and communications security. ACM, 2010: 73-84.

共引文献35

同被引文献7

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部