期刊文献+
共找到1,398篇文章
< 1 2 70 >
每页显示 20 50 100
CORBA技术的新发展 被引量:18
1
作者 刘锦德 苏森 《计算机应用》 CSCD 1999年第5期1-3,7,共4页
为了保持生命力,CORBA技术正在继续不断地发展。本文首先介绍CORBA的发展历程,在此基础上探讨了CORBA3.0的三个主要组成部分:CORBA消息服务、通过值传递对象和CORBA构件。随后简述了CORBA3.0的... 为了保持生命力,CORBA技术正在继续不断地发展。本文首先介绍CORBA的发展历程,在此基础上探讨了CORBA3.0的三个主要组成部分:CORBA消息服务、通过值传递对象和CORBA构件。随后简述了CORBA3.0的另外几个规范:嵌埋式CORBA、实时CORBA、Java/IDL映射、防火墙和DCE/CORBA之间的协同工作。 展开更多
关键词 面向对象 中间件 互操作 CORBA 软件
下载PDF
基于SIM900A的GSM远程监控系统设计 被引量:17
2
作者 王明新 《电脑知识与技术》 2014年第5X期3500-3503,3508,共5页
为实现对设备的远程监控,方便管理人员对设备的远程控制并及时了解故障信息,设计了一款基于GSM技术的短信息无线监控系统。系统以SimCom公司的SIM900A模块和STC12C5A32S2单片机为核心,进行软硬件设计,介绍单片机控制SIM900A模块所使用... 为实现对设备的远程监控,方便管理人员对设备的远程控制并及时了解故障信息,设计了一款基于GSM技术的短信息无线监控系统。系统以SimCom公司的SIM900A模块和STC12C5A32S2单片机为核心,进行软硬件设计,介绍单片机控制SIM900A模块所使用的AT指令和短信TEXT(文本)模式接收和PDU(中文)方式发送数据格式。设计的系统运行稳定可靠,并成功的应用在仓库的温度控制项目中。 展开更多
关键词 远程监控 GSM 短信 AT指令 PDU
下载PDF
企业信息平台中消息机制的应用研究 被引量:5
3
作者 蒋琛 张素琴 +1 位作者 曹永宁 李红 《计算机工程与应用》 CSCD 北大核心 2002年第24期134-136,共3页
企业信息平台实现有业务往来的各应用系统之间的交互,同时从分散的各应用系统中提取公共信息,为企业信息发布提供及时、可靠的数据。文章介绍企业信息平台的设计方案,并探讨消息机制在企业信息平台中的应用。
关键词 企业信息平台 消息机制 应用软件 应用系统集成 企业信息化
下载PDF
IM在实时在线教学中的应用模式研究 被引量:9
4
作者 李群 彭琼芝 +1 位作者 王维平 朱一凡 《高等教育研究学报》 2007年第4期97-98,共2页
加强研究生课程建设,是进一步推进研究生教育创新,提高研究生教育质量的有效途径。国防科技大学高度重视研究生课程建设,取得积极的进展。本刊刊发几篇文章,供大家交流。
关键词 IM软件 在线教学 应用 messaging Internet 通讯工具 实时 演示文档
下载PDF
Comparison of an SMS text messaging and phone reminder to improve attendance at a health promotion center:A randomized controlled trial 被引量:9
5
作者 Zhou-wen CHEN Li-zheng FANG Li-ying CHEN Hong-lei DAI 《Journal of Zhejiang University-Science B(Biomedicine & Biotechnology)》 SCIE CAS CSCD 2008年第1期34-38,共5页
Objective: To compare the efficacy of a short messaging service (SMS) text messaging and phone reminder to im-prove attendance rates at a health promotion center. Methods: A total of 1 859 participants who had schedul... Objective: To compare the efficacy of a short messaging service (SMS) text messaging and phone reminder to im-prove attendance rates at a health promotion center. Methods: A total of 1 859 participants who had scheduled appointments in the health promotion center of our hospital from April 2007 to May 2007 were enrolled in the study and randomly assigned into 3 groups: control (no reminder) group,SMS text messaging reminder group and telephone reminder group. Attendance rates and costs of interventions were collected. Results: A total of 1848 participants were eligible for analysis. Attendance rates of control,SMS and telephone groups were 80.5%,87.5% and 88.3%,respectively. The attendance rates were significantly higher in SMS and telephone groups than that in the control group,with odds ratio 1.698,95% confidence interval 1.224 to 2.316,P=0.001 in the SMS group,and odds ratio 1.829,95% confidence interval 1.333 to 2.509,P<0.001 in the telephone group. However,there was no difference between the SMS group and the telephone group (P=0.670). The cost effectiveness analysis showed that the cost per attendance for the SMS group (0.31 Yuan) was significantly lower than that for the telephone group (0.48 Yuan). Conclusion: SMS and telephone are effective reminders for improving attendance rate at a health promotion center. SMS reminder may be more cost-effective compared with the telephone reminder. 展开更多
关键词 REMINDER Short messaging service (SMS) TELEPHONE Failure to attend (FTA) Randomized controlled trial (RCT)
下载PDF
An Adaptive Push-Styled Command and Control Mechanism in Mobile Botnets 被引量:6
6
作者 CHEN Wei GONG Peihua +1 位作者 YU Le YANG Geng 《Wuhan University Journal of Natural Sciences》 CAS 2013年第5期427-434,共8页
The mobile botnet, developed from the traditional PC-based botnets, has become a practical underlying trend. In this paper, we design a mobile botnet, which exploits a novel command and control (CC) strategy named P... The mobile botnet, developed from the traditional PC-based botnets, has become a practical underlying trend. In this paper, we design a mobile botnet, which exploits a novel command and control (CC) strategy named Push-Styled CC. It utilizes Google cloud messaging (GCM) service as the botnet channel. Compared with traditional botnet, Push-Styled CC avoids direct communications between botmasters and bots, which makes mobile botnets more stealthy and resilient. Since mobile devices users are sensitive to battery power and traffic consumption, Push- Styled botnet also applies adaptive network connection strategy to reduce traffic consumption and cost. To prove the efficacy of our design, we implemented the prototype of Push-Style CC in Android. The experiment results show that botnet traffic can be concealed in legal GCM traffic with low traffic cost. 展开更多
关键词 mobile botnet push style Google cloud messaging (GCM) adaptive connection
原文传递
多阶段三支决策垃圾短信过滤模型 被引量:7
7
作者 李建林 黄顺亮 《计算机科学与探索》 CSCD 2014年第2期226-233,共8页
提出了一种多阶段三支决策垃圾短信过滤模型。该模型使用不同的信息粒度对短信进行表示,运用序列决策(即多阶段、多步骤决策),在不同的决策阶段基于不同的信息粒度分别进行三支决策,有效地避免了当信息粒度太大或信息量不足时进行不合... 提出了一种多阶段三支决策垃圾短信过滤模型。该模型使用不同的信息粒度对短信进行表示,运用序列决策(即多阶段、多步骤决策),在不同的决策阶段基于不同的信息粒度分别进行三支决策,有效地避免了当信息粒度太大或信息量不足时进行不合理的决策,对于不能满足当前决策条件的信息,可以通过补充足够的粒度信息作进一步的决策。最后通过实验证明了该模型的合理性和有效性。 展开更多
关键词 三支决策 序列决策 短信(SMS) 多阶段垃圾短信过滤 粒计算 SHORT messaging service (SMS)
下载PDF
Promoting Sickle Cell Trait Awareness and Education: A Typology of Interventions in the United States to Inform Ongoing Efforts to Patients and Providers
8
作者 Stacey Cunnington Jacey Greece 《Health》 2024年第4期280-308,共29页
Research Background: Sickle cell trait has no treatment or cure and predominantly affects people who are Black, but can affect anyone of any race or ethnicity. While commonly incorrectly considered benign by providers... Research Background: Sickle cell trait has no treatment or cure and predominantly affects people who are Black, but can affect anyone of any race or ethnicity. While commonly incorrectly considered benign by providers and the public, people with a sickle cell trait experience life-threatening outcomes that are exacerbated by extreme conditions. There is a severe lack of awareness and understanding of sickle cell trait and the associated health complications among sickle cell trait carriers and healthcare providers. Purpose/Aim: Interventions that aim to improve awareness of sickle cell trait differ in approaches and are not well documented in the literature. This typology aims to highlight current efforts to inform targeted interventions that raise awareness through consistent messaging, educate people and providers on sickle cell trait and the related health complications, and support the design and implementation of comprehensive sickle cell trait awareness initiatives. Methods: We conducted a scoping review of United States-based sickle cell trait interventions and performed a content analysis to identify the categories and characteristics of these efforts. We then organized the results into a typology according to established protocols. Results: Among 164 interventions, twenty-five (15%) met the typology inclusion criteria described above and were grouped into categories: Seven of twenty-five interventions were Educational Interventions (28%), three of twenty-five interventions (12%) were Combined Screening and Educational-Based Interventions, eight of twenty-five interventions (32%) were Policy and Guideline-Based Intervention, and six of twenty-five interventions (24%) were Sickle Cell Trait Organization-Led Interventions. Conclusions: There is a lack of consistency in messaging across interventions whether delivered by credible healthcare institutions or national organizations, which can result in lack of education and awareness and confusion around sickle cell trait. Categorizing interventions through a t 展开更多
关键词 Sickle Cell Trait Awareness Sickle Cell Trait messaging Sickle Cell Trait Intervention TYPOLOGY Scoping Review
下载PDF
面向移动平台的消息通讯服务设计与实现 被引量:5
9
作者 邵小哲 吴国全 +1 位作者 魏峻 黄涛 《计算机工程与科学》 CSCD 北大核心 2013年第9期78-82,共5页
由于移动平台网络和能耗方面的限制,应用开发者实现并维护一个移动端与服务器端可靠的、低能耗的消息通讯服务代价较高。面向移动平台的消息通讯服务为移动应用提供了即时的、可靠的消息通讯。同时结合移动端上下文信息丰富的特点,消息... 由于移动平台网络和能耗方面的限制,应用开发者实现并维护一个移动端与服务器端可靠的、低能耗的消息通讯服务代价较高。面向移动平台的消息通讯服务为移动应用提供了即时的、可靠的消息通讯。同时结合移动端上下文信息丰富的特点,消息通讯服务提供了上下文情景感知的消息通讯方式。实验表明了此服务的可行性和低能耗特点。 展开更多
关键词 移动云计算 消息通讯 移动应用 中间件 上下文感知
下载PDF
基于二维码的加密文本信息传递系统设计 被引量:5
10
作者 张长胜 韩艳龙 +2 位作者 张慧翔 黄兴利 杨鸣坤 《计算机技术与发展》 2016年第12期127-131,共5页
设计并实现了一种基于二维码的加密信息传递系统,用于将普通文本信息高效、安全地从内网传输至外网。传统的内外网物理隔离的方法在保证数据安全的同时也严重限制了内外网之间的数据交流,因此不能满足需求。摆渡机等中继方式在从内向外... 设计并实现了一种基于二维码的加密信息传递系统,用于将普通文本信息高效、安全地从内网传输至外网。传统的内外网物理隔离的方法在保证数据安全的同时也严重限制了内外网之间的数据交流,因此不能满足需求。摆渡机等中继方式在从内向外传输纯文本信息时,方法的程序繁琐且效率低。为了解决这些问题,利用二维码信息密度高的优势,在信息传递系统的信息生成端将内网的普通文本加密后生成二维码发布,再在信息读取端扫描、解密并逆转换二维码后显示信息。实验结果表明,该基于二维码的加密信息传递系统在保证安全的前提下完成了大容量文字信息的单向传输工作,具有较高的实用性、易开发性、可移植性。 展开更多
关键词 二维码 加密信息 信息传递 安全
下载PDF
Exploring the Feasibility of Text Messaging Intervention in Intimate Partner Violence 被引量:2
11
作者 Rose Constantino Linden Wu +4 位作者 Dominique de la Cruz Joseph Burroughs JuHae Grace Hwang Amanda Henderson Betty Braxter 《Open Journal of Nursing》 2014年第7期528-537,共10页
Introduction: Intimate Partner Violence (IPV) is defined as controlling, abusive, and aggressive behavior in a romantic relationship. Women between the ages 16 and 24 experience the highest rate of IPV. IPV costs US s... Introduction: Intimate Partner Violence (IPV) is defined as controlling, abusive, and aggressive behavior in a romantic relationship. Women between the ages 16 and 24 experience the highest rate of IPV. IPV costs US society at least $13.6 billion annually and is expected to rise to $15.6 billion by 2021. The purpose of this study is to explore the feasibility of Text Messaging Intervention (TMI) in recognizing, responding and preventing IPV among college students. The research questions are: Will TMI 1) improve participant knowledge of warning signs of IPV? (Knowledge) and 2) improve participant confidence to intervene in IPV? (Confidence). Methods: A mixed methods design in data collection and data analysis was used. One-way ANOVA and Chi-square test were used to analyze quantitative data from the pre and post TMI survey. Results of the qualitative data analysis are included verbatim. Results: Results showed that knowledge level pre to post test increased from 2.00 ± 1.00 to 2.7 ± 0.48 (p < 0.001) and confidence level pre to post test increased from 2.89 ± 0.60 to 3.30 ± 0.68 (p < 0.001). Conclusions: Further research is needed in evaluating the feasibility and effectiveness of IPV prevention programs that uses mobile devices to create the best optimal health outcomes. 展开更多
关键词 Disruptive Innovations (DI) INTIMATE Partner VIOLENCE (IPV) Primary PREVENTION Strategy Text messaging INTERVENTION (TMI) VIOLENCE PREVENTION
下载PDF
SecSPS: A Secure and Privacy-Preserving Framework for Smart Parking Systems 被引量:2
12
作者 Ali Alqazzaz Ibrahim Alrashdi +2 位作者 Esam Aloufi Mohamed Zohdy Hua Ming 《Journal of Information Security》 2018年第4期299-314,共16页
Smart parking systems are a crucial component of the “smart city” concept, especially in the age of the Internet of Things (IoT). They aim to take the stress out of finding a vacant parking spot in city centers, due... Smart parking systems are a crucial component of the “smart city” concept, especially in the age of the Internet of Things (IoT). They aim to take the stress out of finding a vacant parking spot in city centers, due to the increasing number of cars, especially during peak hours. To realize the concept of smart parking, IoT-enabling technologies must be utilized, as the traditional way of developing smart parking solutions entails a lack of scalability, compatibility with IoT-constrained devices, security, and privacy awareness. In this paper, we propose a secure and privacy-preserving framework for smart parking systems. The framework relies on the publish/subscribe communication model for exchanging a huge volume of data with a large number of clients. On one hand, it provides functional services, including parking vacancy detection, real-time information for drivers about parking availability, driver guidance, and parking reservation. On the other hand, it provides security approaches on both the network and application layers. In addition, it supports mutual authentication mechanisms between entities to ensure device/ data authenticity, and provide security protection for users. That makes our proposed framework resilient to various types of security attacks, such as replay, phishing, and man-in-the-middle attacks. Finally, we analyze the performance of our framework, which is suitable for IoT devices, in terms of computation and network overhead. 展开更多
关键词 IoT PUBLISH/SUBSCRIBE messaging PROTOCOL Security PARKING System
下载PDF
Instant Messaging Worms Propagation Simulation and Countermeasures 被引量:2
13
作者 HU Huaping WEI Jianli 《Wuhan University Journal of Natural Sciences》 CAS 2007年第1期95-100,共6页
Instant messaging (IM) has become one of the most popular online communication tools among consumer and enterprise IM users. It provides instant message delivery, as well as convenient file transfer services. The in... Instant messaging (IM) has become one of the most popular online communication tools among consumer and enterprise IM users. It provides instant message delivery, as well as convenient file transfer services. The increasing popularity and functionalities of IM programs have made it increasingly attractive for attackers, especially for worm writers. IM contact list offers worm an easy way of finding potential victims so that the worm could achieve a surprising spreading speed. This paper first presents our experimental results of simulating IM worm propagation in the logical network defined by IM contact lists, which is reported to be a scale-free network. Then, the existing proposals for detecting and containing IM worm epidemics are discussed. At last, a new algorithm for this purpose is presented, which is based on the observation of the bi-directional nature of IM worm traffic, and its advantages and possible improvements in implementation are analyzed. The simulation results show the proposed algorithm is of significant effect on restricting IM worm propagation. 展开更多
关键词 instant messaging worms SIMULATION PROPAGATION worm detection and containment
下载PDF
关于CORBA消息机制的研究
14
作者 吕钊 顾君忠 《计算机应用研究》 CSCD 北大核心 2001年第8期64-67,共4页
介绍了CORBA的异步消息机制和新CORBA消息规范。在新CORBA规范中包括异步方法调用(AMI)、与时间无关调用 (TII)和通用的消息服务质量 (QoS)策略。这些新的特征大大地增强了CORBA所采用的标准的请求 /响应通讯模式的功能。
关键词 CORBA 对象管理组织 消息机制 单向模式 计算机网络 应用程序
下载PDF
Dynamic Networking Method of Vehicles in VANET
15
作者 Qingkun Chen Qinmu Wu 《Computers, Materials & Continua》 SCIE EI 2024年第10期1301-1318,共18页
Vehicular Ad-hoc Networks(VANETs)make it easy to transfer information between vehicles,and this feature is utilized to enable collaborative decision-making between vehicles to enhance the safety,economy,and entertainm... Vehicular Ad-hoc Networks(VANETs)make it easy to transfer information between vehicles,and this feature is utilized to enable collaborative decision-making between vehicles to enhance the safety,economy,and entertainment of vehicle operation.The high mobility of vehicles leads to a time-varying topology between vehicles,which makes inter-vehicle information transfer challenging in terms of delay control and ensuring the stability of collaborative decision-making among vehicles.The clustering algorithm is a method aimed at improving the efficiency of VANET communication.Currently,most of the research based on this method focuses on maintaining the stability of vehicle clustering,and few methods focus on the information interaction and collaborative decisionmaking of vehicles in the region.In this context,this paper proposes a networking method for intra-regional vehicle information interaction,through an efficient information transmission mechanism,vehicles can quickly obtain the required information and make more accurate decisions.Firstly,this networking method utilizes DBSCAN and the proposed vehicle scoring model to form clusters,ensuring the stability and adaptability of clusters;secondly,in the process of interacting with the information,the cosine similarity is utilized to check the similarity of the information to eliminate the highly similar information,effectively reducing redundant information;and lastly,in the case of a consensus reached by the cluster,the frequency of broadcasting of information between vehicles is reduced as a way to minimize the waste of communication resources.The proposed method is simulated based on Python and Sumo platforms,and several metrics such as cluster clustering situation,information volume,and state change rate are analyzed.The results show that the method maintains better cluster stability with a 60%and 92%reduction in information overhead compared to the FVC and HCAR algorithms,respectively. 展开更多
关键词 NETWORKING VANET messaging optimization
下载PDF
Falling-Incident Detection and Alarm by Smartphone with Multimedia Messaging Service (MMS) 被引量:1
16
作者 Yi He Ye Li Chuan Yin 《E-Health Telecommunication Systems and Networks》 2012年第1期1-5,共5页
This paper presents a system with real-time classification of human movements based on smartphone mounted on the waist. The built-in tri-accelerometer was utilized to collect the information of body motion. At the sam... This paper presents a system with real-time classification of human movements based on smartphone mounted on the waist. The built-in tri-accelerometer was utilized to collect the information of body motion. At the same time, the smartphone is able to classify the data for activity recognition. By our algorithm, body motion can be classified into five different patterns: vertical activity, lying, sitting or static standing, horizontal activity and fall. It alarms falling by Multimedia Messaging Service (MMS) with map of suspected fall location, GPS coordinate and time etc. If a fall was suspected, an automatic MMS would be sent to preset people. The major advantage of the proposed system is the novel application of smartphone which already have the necessary sensors and can monitor fall ubiquitously without any additional devices. 展开更多
关键词 Multimedia messaging Service (MMS) SMARTPHONE Tri-Accelerometer Falling-Incident Detection
下载PDF
MIND THE GAP: TOWARDS AND BEYOND IMPACT MESSAGING TO ENHANCE TROPICAL CYCLONE RISK COMMUNICATION 被引量:1
17
作者 PETER OTTO AMISHA MEHTA BROOKE LIU 《Tropical Cyclone Research and Review》 2018年第2期140-151,共12页
Traditionally, meteorological agencies collect, analyse, and share technical information about natural hazards with emergency services organisations and community members; often sending different warning products to e... Traditionally, meteorological agencies collect, analyse, and share technical information about natural hazards with emergency services organisations and community members; often sending different warning products to each of these groups. For the general public, effective risk communication requires that technical information be translated to first gain attention and build understanding of risk, and then continue to be exchanged by all parties. The World Meteorological Organization and its partner agencies have recognised this need for translated information by moving away from warnings describing risks solely in terms of meteorological parameters and towards clearer messaging emphasizing significance and potential impacts. While the move towards more relatable weather warning messaging is a positive one, risk communication is a complex, dynamic and interactive process that is highly dependent on audience psychology, knowledge, skills, and capabilities; presenting at once difficulties and opportunities for agencies. Over recent years, advertisers, politicians and public safety advocates have all improved their messaging through the use of big data, psychology, social networking and behavioural economics principles, yet the links between these elements and weather risk communication are still relatively immature. This report aims to build links between weather forecasters, social scientists and related industries by outlining three conceptual models social scientists have developed to meet different challenges in the field of risk communication; the mental models approach, risk information seeking and processing, and the protective action decision making model. Recent issues and successes in the communication of tropical cyclone risk will then be examined and compared to these models, and future opportunities will be discussed. 展开更多
关键词 RISK COMMUNICATION impact-based WARNINGS IMPACT WARNINGS tropical cyclone RISK messaging models of RISK COMMUNICATION public safety social media
原文传递
End-to-End Encryption in Messaging Services and National Security—Case of WhatsApp Messenger 被引量:1
18
作者 Robert E. Endeley 《Journal of Information Security》 2018年第1期95-99,共5页
The ubiquity of instant messaging services on mobile devices and their use of end-to-end encryption in safeguarding the privacy of their users have become a concern for some governments. WhatsApp messaging service has... The ubiquity of instant messaging services on mobile devices and their use of end-to-end encryption in safeguarding the privacy of their users have become a concern for some governments. WhatsApp messaging service has emerged as the most popular messaging app on mobile devices today. It uses end-to-end encryption which makes government and secret services efforts to combat organized crime, terrorists, and child pornographers technically impossible. Governments would like a “backdoor” into such apps, to use in accessing messages and have emphasized that they will only use the “backdoor” if there is a credible threat to national security. Users of WhatsApp have however, argued against a “backdoor”;they claim a “backdoor” would not only be an infringement of their privacy, but that hackers could also take advantage of it. In light of this security and privacy conflict between the end users of WhatsApp and government’s need to access messages in order to thwart potential terror attacks, this paper presents the advantages of maintaining E2EE in WhatsApp and why governments should not be allowed a “backdoor” to access users’ messages. This research presents the benefits encryption has on consumer security and privacy, and also on the challenges it poses to public safety and national security. 展开更多
关键词 INSTANT messaging WhatsApp END-TO-END ENCRYPTION National Security Privacy
下载PDF
A Secure Short Message Communication Protocol 被引量:1
19
作者 Chao-Wen Chang Heng Pan Hong-Yong Jia 《International Journal of Automation and computing》 EI 2008年第2期202-207,共6页
According to the security requirement of the short message service (SMS) industry application, a secure short message communication protocol is proposed. This is an application level protocol constructed on the stan... According to the security requirement of the short message service (SMS) industry application, a secure short message communication protocol is proposed. This is an application level protocol constructed on the standard SMS communication protocol using public key authentication and key agreement without the need of wireless public key infrastructure (WPKI). Secure short message transmission and dynamic key agreement between mobile terminals and the accessing gateway axe realized. The security of the proposed protocol is validated through the BAN logic. Compared with the standard SMS protocol, the effective payload rate of our protocol can reach 91.4%, and subscriber identity module (SIM) tool kit (STK) applications based on our protocol suit well for all kinds of mobile terminals in practical application. 展开更多
关键词 Short messaging service security protocol subscriber identity module (SIM) tool kit (STK) AUTHENTICATION mobile
下载PDF
Design and Implementation of Remotely Controlled Vehicle Anti-Theft System via GSM Network 被引量:1
20
作者 T. T. Oladimeji P. O. Oshevire +1 位作者 O. O. Omitola O. E. Adedokun 《Wireless Sensor Network》 2013年第8期151-157,共7页
The purpose of this paper is to build a secured and reliable vehicle anti-theft system which will have the ability to access the vehicle subsystems from a remote location where there is GSM network. And also, the desi... The purpose of this paper is to build a secured and reliable vehicle anti-theft system which will have the ability to access the vehicle subsystems from a remote location where there is GSM network. And also, the design method involves the interfacing of GSM/GPRS modem module with the vehicle ignition subsystem, and the test result shows that it performs some control actions on the vehicle subsystems from a mobile phone, having taken the advantage of the wide coverage area of some GSM networks. Hence the topic is “Remotely Controlled Vehicle Anti-theft System via GSM Network”. 展开更多
关键词 CODEC—Coder and DECODER GSM—Global System for Mobile Telecommunication GPRS—General Packet Radio SERVICE MODEM—Modulator and DEMODULATOR SMS—Short messaging SERVICE
下载PDF
上一页 1 2 70 下一页 到第
使用帮助 返回顶部