期刊文献+
共找到1,378篇文章
< 1 2 69 >
每页显示 20 50 100
Implicit Continuous User Authentication for Mobile Devices based on Deep Reinforcement Learning 被引量:1
1
作者 Christy James Jose M.S.Rajasree 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1357-1372,共16页
The predominant method for smart phone accessing is confined to methods directing the authentication by means of Point-of-Entry that heavily depend on physiological biometrics like,fingerprint or face.Implicit continuou... The predominant method for smart phone accessing is confined to methods directing the authentication by means of Point-of-Entry that heavily depend on physiological biometrics like,fingerprint or face.Implicit continuous authentication initiating to be loftier to conventional authentication mechanisms by continuously confirming users’identities on continuing basis and mark the instant at which an illegitimate hacker grasps dominance of the session.However,divergent issues remain unaddressed.This research aims to investigate the power of Deep Reinforcement Learning technique to implicit continuous authentication for mobile devices using a method called,Gaussian Weighted Cauchy Kriging-based Continuous Czekanowski’s(GWCK-CC).First,a Gaussian Weighted Non-local Mean Filter Preprocessing model is applied for reducing the noise pre-sent in the raw input face images.Cauchy Kriging Regression function is employed to reduce the dimensionality.Finally,Continuous Czekanowski’s Clas-sification is utilized for proficient classification between the genuine user and attacker.By this way,the proposed GWCK-CC method achieves accurate authen-tication with minimum error rate and time.Experimental assessment of the pro-posed GWCK-CC method and existing methods are carried out with different factors by using UMDAA-02 Face Dataset.The results confirm that the proposed GWCK-CC method enhances authentication accuracy,by 9%,reduces the authen-tication time,and error rate by 44%,and 43%as compared to the existing methods. 展开更多
关键词 Deep reinforcement learning gaussian weighted non-local meanfilter cauchy kriging regression continuous czekanowski’s implicit continuous authentication mobile devices
下载PDF
The Digital Age of Campus Maps on Mobile Devices 被引量:1
2
作者 Fan Wu Dwayne Clarke +2 位作者 Jian Jiang Asif Baba Sherman Buford 《Journal of Computer and Communications》 2016年第7期22-30,共9页
Developing mobile applications have always been a rising topic in the technology world. With the recent development in technology, mobile applications play an important role in various applications throughout the worl... Developing mobile applications have always been a rising topic in the technology world. With the recent development in technology, mobile applications play an important role in various applications throughout the world. Mobile applications are constantly evolving. There are several ongoing research and developments in both industry and academia. In this paper, we present the design and implementation of a mobile application that creates an electronic map or e-map application for the campus of Tuskegee University. The goals for this mobile application are to make the campus map easier and user-friendly for parents, visitors, and students using mobile devices. With this mobile application, the users will be able to search and find campus buildings, as well as give feedback on the application to eliminate the need for paper documentation. 展开更多
关键词 mobile Application mobile device E-Map
下载PDF
Phishing Techniques in Mobile Devices
3
作者 Belal Amro 《Journal of Computer and Communications》 2018年第2期27-35,共9页
The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks rang... The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks ranging from establishing a phone call to performing critical and sensitive tasks like money payments. Since the mobile device is accompanying a person most of his time, it is highly probably that it includes personal and sensitive data for that person. The increased use of mobile devices in daily life made mobile systems an excellent target for attacks. One of the most important attacks is phishing attack in which an attacker tries to get the credential of the victim and impersonate him. In this paper, analysis of different types of phishing attacks on mobile devices is provided. Mitigation techniques—anti-phishing techniques—are also analyzed. Assessment of each technique and a summary of its advantages and disadvantages is provided. At the end, important steps to guard against phishing attacks are provided. The aim of the work is to put phishing attacks on mobile systems in light, and to make people aware of these attacks and how to avoid them. 展开更多
关键词 MALWARE PHISHING ANTI-PHISHING mobile device mobile Application SECURITY PRIVACY
下载PDF
Battery Voltage Discharge Rate Prediction and Video Content Adaptation in Mobile Devices on 3G Access Networks
4
作者 Is-Haka Mkwawa Lingfen Sun 《ZTE Communications》 2013年第1期44-50,共7页
According to Cisco, mobile multimedia services now account for more than half the total amount of Internet traffic. This trend is burdening mobile devices in terms of power consumption, and as a result, more effort is... According to Cisco, mobile multimedia services now account for more than half the total amount of Internet traffic. This trend is burdening mobile devices in terms of power consumption, and as a result, more effort is needed to devise a range of pow- er-saving techniques. While most power-saving techniques are based on sleep scheduling of network interfaces, little has been done to devise multimedia content adaptation techniques. In this paper, we propose a multiple linear regression model that predicts the battery voltage discharge rate for several video send bit rates in a VoIP application. The battery voltage dis- charge rate needs to be accurately estimated in order to esti- mate battery life in critical VoIP contexts, such as emergency communication. In our proposed model, the range of video send bitrates is carefully chosen in order to maintain an acceptable VoIP quality of experience. From extensive profiling, the empir- ical resuhs show that the model effectively saves power and pro- longs real-time VoIP sessions when deployed in power-driven adaptation schemes. 展开更多
关键词 QOE POWER mobile devices quality adaptation discharge rate
下载PDF
Inferring Locations of Mobile Devices from Wi-Fi Data
5
作者 Leon Wu Ying Zhu 《Intelligent Information Management》 2015年第2期59-69,共11页
Mobile phones are becoming a primary platform for information access. A major aspect of ubiquitous computing is context-aware applications which collect information about the environment that the user is in and use th... Mobile phones are becoming a primary platform for information access. A major aspect of ubiquitous computing is context-aware applications which collect information about the environment that the user is in and use this information to provide better service and improve user experience. Location awareness makes certain applications possible, e.g., recommending nearby businesses and tracking estimated routes. An Android application is able to collect useful Wi-Fi information without registering a location listener with a network-based provider. We passively collected the data of the IDs of Wi-Fi access points and the received signal strengths. We developed and implemented an algorithm to analyse the data;and designed heuristics to infer the location of the device over time—all without ever connecting to the network thus maximally preserving the privacy of the user. 展开更多
关键词 LOCATION AWARENESS mobile device DATA Analysis DATA INFERENCE
下载PDF
Securing Display Path for Security-Sensitive Applications on Mobile Devices
6
作者 Jinhua Cui Yuanyuan Zhang +2 位作者 Zhiping Cai Anfeng Liu Yangyang Li 《Computers, Materials & Continua》 SCIE EI 2018年第4期17-35,共19页
While smart devices based on ARM processor bring us a lot of convenience,they also become an attractive target of cyber-attacks.The threat is exaggerated as commodity OSes usually have a large code base and suffer fro... While smart devices based on ARM processor bring us a lot of convenience,they also become an attractive target of cyber-attacks.The threat is exaggerated as commodity OSes usually have a large code base and suffer from various software vulnerabilities.Nowadays,adversaries prefer to steal sensitive data by leaking the content of display output by a security-sensitive application.A promising solution is to exploit the hardware visualization extensions provided by modern ARM processors to construct a secure display path between the applications and the display device.In this work,we present a scheme named SecDisplay for trusted display service,it protects sensitive data displayed from being stolen or tampered surreptitiously by a compromised OS.The TCB of SecDisplay mainly consists of a tiny hypervisor and a super light-weight rendering painter,and has only^1400 lines of code.We implemented a prototype of SecDisplay and evaluated its performance overhead.The results show that SecDisplay only incurs an average drop of 3.4%. 展开更多
关键词 mobile device secure display VIRTUALIZATION trusted computing base display path trust anchor
下载PDF
Study on Architecture-Oriented Information Security Management Model for Using Mobile Devices Control
7
作者 Wei-ming Ma 《Chinese Business Review》 2018年第9期442-464,共23页
The popularization of mobile devices has caused considerable impact on the security of the military of the Republic of China.The military barrack-areas have long been faced the control of mobile devices four issues:th... The popularization of mobile devices has caused considerable impact on the security of the military of the Republic of China.The military barrack-areas have long been faced the control of mobile devices four issues:the lack of accurate use of resources,the lack of protection of the mobile device from the overall point of view,the unclear division of responsibility among specialized agencies,and unclear members’responsibilities for their own duties.This study applies the structure behavior coalescence(SBC)methodology to integrate the organizational structure of the participating management and control units with effective management behaviors in a visualized and useful manner.The units can effectively communicate with each other and solve the four issues faced by the military barrack-areas for the control of mobile devices.This research fulfills improving the lack of control of the military mobile devices by using of management resources effectively and the establishment of mobile devices management with the overall concept,and strengthening the rights and responsibilities and information security awareness,through the logical verification and enterprise interview results. 展开更多
关键词 information security management structure behavior COALESCENCE mobile devices MILITARY ARMY
下载PDF
Utility-Improved Key-Value Data Collection with Local Differential Privacy for Mobile Devices
8
作者 TONG Ze DENG Bowen +1 位作者 ZHENG Lele ZHANG Tao 《ZTE Communications》 2022年第4期15-21,共7页
The structure of key-value data is a typical data structure generated by mobile devices.The collection and analysis of the data from mobile devices are critical for service providers to improve service quality.Neverth... The structure of key-value data is a typical data structure generated by mobile devices.The collection and analysis of the data from mobile devices are critical for service providers to improve service quality.Nevertheless,collecting raw data,which may contain various per⁃sonal information,would lead to serious personal privacy leaks.Local differential privacy(LDP)has been proposed to protect privacy on the device side so that the server cannot obtain the raw data.However,existing mechanisms assume that all keys are equally sensitive,which can⁃not produce high-precision statistical results.A utility-improved data collection framework with LDP for key-value formed mobile data is pro⁃posed to solve this issue.More specifically,we divide the key-value data into sensitive and non-sensitive parts and only provide an LDPequivalent privacy guarantee for sensitive keys and all values.We instantiate our framework by using a utility-improved key value-unary en⁃coding(UKV-UE)mechanism based on unary encoding,with which our framework can work effectively for a large key domain.We then vali⁃date our mechanism which provides better utility and is suitable for mobile devices by evaluating it in two real datasets.Finally,some pos⁃sible future research directions are envisioned. 展开更多
关键词 key-value data local differential privacy mobile devices privacy-preserving data collection
下载PDF
Enhancement of students' learning with mobile devices: Taking librarian-faculty collaboration in SJTU as an example
9
作者 Qinling HUANG Xie GAO +1 位作者 Wei PAN Lin GU 《Chinese Journal of Library and Information Science》 2015年第1期37-52,共16页
Purpose: This paper presents an innovative program of Shanghai Jiao Tong University Library which aims to help engineering students to make use of mobile devices to improve their learning efficiency. Design/methodolo... Purpose: This paper presents an innovative program of Shanghai Jiao Tong University Library which aims to help engineering students to make use of mobile devices to improve their learning efficiency. Design/methodology/approach: Information literacy training and course learning resources were integrated into students' learning process. Surveys on students' learning with the touch pads were conducted to help evaluate the program's effectiveness. Findings: Our practice showed that collaboration of library staff with faculty members is an effective way to integrate information literacy education and course-specific library resources into students' learning with mobile devices, which has greatly improved the efficiency of students' learning. Research limitations: First, our literacy training still focused on the use of mobile devices in information access, but not on how to evaluate and manage their information resources with mobile devices. Second, subject librarians need to shift their role from information service providers into information resource instructors while developing the partnership with faculty members and teaching assistants. Practical implications: This paper provides learning efficiency of university students with touch pads conveniently. a new insight into the way of how to enhance such new technical devices as smartphones and Originality/value: Our practice can be used as a valuable guide for libraries that plan to leverage mobile technologies to enhance students' learning efficiency. 展开更多
关键词 Subject librarian Embedded librarianship mobile learning mobile device Service planning Academic library
下载PDF
Case of colonic intussusception secondary to mobile cecum syndrome repaired by laparoscopic cecopexy using a barbed wound suture device 被引量:1
10
作者 Tetsu Yamamoto Yoshitsugu Tajima +4 位作者 Ryoji Hyakudomi Takanori Hirayama Takahito Taniura Kazunari Ishitobi Noriyuki Hirahara 《World Journal of Gastroenterology》 SCIE CAS 2017年第35期6534-6539,共6页
A 27-year-old man with recurrent right lower quadrant pain was admitted to our hospital. Ultrasonography and computed tomography examination of the abdomen revealed a target sign in the ascending colon, which was comp... A 27-year-old man with recurrent right lower quadrant pain was admitted to our hospital. Ultrasonography and computed tomography examination of the abdomen revealed a target sign in the ascending colon, which was compatible with the diagnosis of cecal intussusception. The intussusception was spontaneously resolved at that time, but it relapsed 6 mo later. The patient underwent a successful colonoscopic disinvagination; there was no evidence of neoplastic or inflammatory lesions in the colon and terminal ileum. The patient underwent laparoscopic surgery for recurring cecal intussusception. During laparoscopy, we observed an unfixed cecum on the posterior peritoneum(i.e. a mobile cecum). Thus, we performed laparoscopic appendectomy and cecopexy with a lateral peritoneal flap using a barbed wound suture device. The patient's post-operative course was uneventful, and he continued to do well without recurrence at 10 mo after surgery. Laparoscopic cecopexy using a barbed wound suture device is a simple and reliable procedure that can be the treatment of choice for recurrent cecal intussusception associated with a mobile cecum. 展开更多
关键词 COLONIC INTUSSUSCEPTION Adult mobile CECUM Cecopexy Barbed WOUND SUTURE device
下载PDF
Mobile Data Mining-Based Services on the Base of Mobile Device Management (MDM) System
11
作者 Mazin Omar Khairo 《Journal of Signal and Information Processing》 2014年第3期89-96,共8页
Client software on mobile devices that can cause the remote control perform data mining tasks and show production results is significantly added the value for the nomadic users and organizations that need to perform d... Client software on mobile devices that can cause the remote control perform data mining tasks and show production results is significantly added the value for the nomadic users and organizations that need to perform data analysis stored in the repository, far away from the site, where users work, allowing them to generate knowledge regardless of their physical location. This paper presents new data analysis methods and new ways to detect people work location via mobile computing technology. The growing number of applications, content, and data can be accessed from a wide range of devices. It becomes necessary to introduce a centralized mobile device management. MDM is a KDE software package working with enterprise systems using mobile devices. The paper discussed the design system in detail. 展开更多
关键词 Data MINING mobile device MANAGEMENT USER RECOMMENDATION KDE Software PACKAGE
下载PDF
基于MobileNet的移动端列车图像故障检测算法
12
作者 周鹏 张龙信 《现代信息科技》 2023年第6期46-49,53,共5页
针对列车故障检测效率低的问题,提出一种基于MobielNet的移动端列车图像故障检测算法。首先,在MobileNet中引入注意力卷积块和Ghost模块,用以提升网络的学习能力。其次,使用残差聚合网络获取多层次的特征图。最后,将该模型移植到移动端... 针对列车故障检测效率低的问题,提出一种基于MobielNet的移动端列车图像故障检测算法。首先,在MobileNet中引入注意力卷积块和Ghost模块,用以提升网络的学习能力。其次,使用残差聚合网络获取多层次的特征图。最后,将该模型移植到移动端设备上完成列车故障检测任务。实验结果表明,该算法的平均精度均值达到了85.35%,与YOLOv3-Tiny、YOLOv4-Tiny、YOLOX、YOLOv5相比,mAP分别提高了8.83%、5.49%、7.89%、5.31%,并且FED拥有更低检测延迟。 展开更多
关键词 列车故障检测 目标识别 mobileNet 移动设备 注意力机制
下载PDF
Decoding Note-Taking Abbreviations and Symbols Using a Mobile Device
13
作者 Paula Ruby Ralph Ruby Jr. 《Psychology Research》 2013年第10期606-615,共10页
关键词 解码器 笔记 移动设备 缩写 苹果公司 行动研究 专利申请 有效率
下载PDF
香车美机 Audi Mobile Device
14
作者 Kane 《移动信息》 2007年第11期98-98,共1页
在东京车展上,奥迪不仅展示了新车型A1,同时还推出了一款配合A1使用的专用导航手机——Audi Mobile Device,该机将在汽车销售时赠送给消费者。这款奥迪自家品牌的手机采用触控操作方式,支持3G,Wi-Fi和GPS,奥迪A1上专门设计了放置手机的... 在东京车展上,奥迪不仅展示了新车型A1,同时还推出了一款配合A1使用的专用导航手机——Audi Mobile Device,该机将在汽车销售时赠送给消费者。这款奥迪自家品牌的手机采用触控操作方式,支持3G,Wi-Fi和GPS,奥迪A1上专门设计了放置手机的插槽.并可通过汽车内置的车载充电器为手机充电。当你忘记带车钥匙时,通过手机可以打开A1的车门.也能用来开启汽车空调。 展开更多
关键词 Audi mobile device
下载PDF
The Underlying Motivations for Mobile Device Use by Seniors
15
作者 Susan E. Reid Bessam Abdulrazak Monica Alas 《Journal of Health Science》 2017年第3期152-157,共6页
下载PDF
基于Windows Mobile的测量软件的开发 被引量:6
16
作者 王崇倡 孙尚宇 宋伟东 《辽宁工程技术大学学报(自然科学版)》 CAS 北大核心 2011年第A01期18-21,共4页
为了开发简单易用的移动测量设备数据采集、处理软件,对目前常用的数据采集、处理软件的优缺点作了分析,并针对存在缺点提出了GeoSolution软件的解决方案。以Windows Mobile 6.0操作系统应用程序的开发环境为平台,搭建GeoSolution软件... 为了开发简单易用的移动测量设备数据采集、处理软件,对目前常用的数据采集、处理软件的优缺点作了分析,并针对存在缺点提出了GeoSolution软件的解决方案。以Windows Mobile 6.0操作系统应用程序的开发环境为平台,搭建GeoSolution软件的开发架构,并对GeoSolution软件的开发过程作了阐明,针对软件开发过程中遇到的技术难题提出了解决方法。 展开更多
关键词 移动设备 测绘软件开发 数据处理 WINDOWS mobile
下载PDF
基于Windows Mobile的移动GIS研究 被引量:10
17
作者 龙明 王青山 《测绘科学技术学报》 北大核心 2007年第6期458-461,共4页
移动GIS能够弥补传统静态GIS的某些不足,因而正成为地理信息科学领域新的研究热点,而Windows Mobile作为微软进军移动设备领域的主要品牌,受到了人们越来越多的关注。介绍了Windows Mobile操作系统和移动GIS的有关概念,对在Windows Mob... 移动GIS能够弥补传统静态GIS的某些不足,因而正成为地理信息科学领域新的研究热点,而Windows Mobile作为微软进军移动设备领域的主要品牌,受到了人们越来越多的关注。介绍了Windows Mobile操作系统和移动GIS的有关概念,对在Windows Mobile系统上进行移动GIS开发需要解决的几个关键技术,特别是对空间数据建立分块分级索引的技术进行了研究和探讨,最后对系统实现做了有益的尝试。 展开更多
关键词 WINDOWS mobile 移动GIS 移动设备 空间索引
下载PDF
Quality of Service and Security on Cisco Network Devices, Coupled with the Development of a Mobile Application Prototype Software for Server Room Temperature Monitoring
18
作者 Desire Mudenda Charles Smart Lubobya 《Journal of Computer and Communications》 2024年第8期123-140,共18页
In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge... In an era where digital technology is paramount, higher education institutions like the University of Zambia (UNZA) are employing advanced computer networks to enhance their operational capacity and offer cutting-edge services to their academic fraternity. Spanning across the Great East Road campus, UNZA has established one of the most extensive computer networks in Zambia, serving a burgeoning community of over 20,000 active users through a Metropolitan Area Network (MAN). However, as the digital landscape continues to evolve, it is besieged with burgeoning challenges that threaten the very fabric of network integrity—cyber security threats and the imperatives of maintaining high Quality of Service (QoS). In an effort to mitigate these threats and ensure network efficiency, the development of a mobile application to monitor temperatures in the server room was imperative. According to L. Wei, X. Zeng, and T. Shen, the use of wireless sensory networks to monitor the temperature of train switchgear contact points represents a cost-effective solution. The system is based on wireless communication technology and is detailed in their paper, “A wireless solution for train switchgear contact temperature monitoring and alarming system based on wireless communication technology”, published in the International Journal of Communications, Network and System Sciences, vol. 8, no. 4, pp. 79-87, 2015 [1]. Therefore, in this study, a mobile application technology was explored for monitoring of temperatures in the server room in order to aid Cisco device performance. Additionally, this paper also explores the hardening of Cisco device security and QoS which are the cornerstones of this study. 展开更多
关键词 Quality of Service (QoS) Network Security Temperature Monitoring mobile Application Cisco devices
下载PDF
基于ArcGIS Mobile的移动规划平台的设计与实现 被引量:2
19
作者 蒋波涛 《浙江万里学院学报》 2010年第5期70-72,共3页
结合宁波市规划外业应用,通过分析运用ArcGIS Server和ArcGIS Mobile等移动技术,设计并实现了一个基于ArcGIS Mobile的移动规划平台。
关键词 ARCGIS mobile 移动设备 城乡规划
下载PDF
Scudware Mobile:支持可穿戴设备间数据及服务协同的移动中间件 被引量:2
20
作者 丁扬 李石坚 +1 位作者 叶志强 潘纲 《计算机科学》 CSCD 北大核心 2014年第10期57-61,共5页
随着计算泛在化日益深入,软硬件一体化成为个人电子消费领域的重要趋势,可穿戴设备正成为目前学术界与工业界的研究热点。这些设备虽然具有一定的传感、计算和服务能力,但其接口各异且设备间的协同能力很弱。这就一方面造成了计算和感... 随着计算泛在化日益深入,软硬件一体化成为个人电子消费领域的重要趋势,可穿戴设备正成为目前学术界与工业界的研究热点。这些设备虽然具有一定的传感、计算和服务能力,但其接口各异且设备间的协同能力很弱。这就一方面造成了计算和感知能力的浪费,另一方面也无法提供丰富的服务。针对此问题,提出一个支持可穿戴设备间数据及服务协同的移动中间件——Scudware Mobile。Scudware Mobile汇聚了可穿戴设备的数据和服务,并以统一的接口提供给应用层,且引入了设备协同机制。在Scudware Mobile上,实现了两个应用:个人数据门户和shaking ecard。 展开更多
关键词 Scudware mobile 数据及服务协同 可穿戴设备 智能手机
下载PDF
上一页 1 2 69 下一页 到第
使用帮助 返回顶部