首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到18条相似文献,搜索用时 640 毫秒
1.
基于可用性的移动商务系统采纳研究框架*   总被引:2,自引:1,他引:1  
从系统可用性的角度来探究移动商务的采纳问题,探讨了对移动商务系统可用性的定义和测量,分析了可用性对采纳的影响机制问题,提出移动商务系统可用性受到移动设备特性、WAP网站特性、移动通信网络特性以及情境因素等四个方面因素的影响,并对这四个方面进行了深入的分析和探讨。提出了一种基于可用性的移动商务采纳研究框架,希望引起学术界对移动商务系统可用性的更多关注,并更好理解影响移动商务采纳的因素。  相似文献   

2.
移动学习资源作为移动学习的重要支持,其质量的优劣会直接影响学习者的学习体验及移动学习效果。因此,将可用性理论引入移动学习资源的评价过程中,确定了移动学习资源的可用性评价维度,并提出有效提高移动学习资源可用性的若干策略。  相似文献   

3.
为了提高移动交互的可用性,进行了用非语音声音来增强移动终端菜单交互的研究,首先设计了一个移动终端的声音增强菜单,然后通过与相应的视觉菜单的对比实验来研究其是否能提高可用性。结果显示,声音增强移动菜单具有更好的可用性,声音增强移动菜单可以显著减少任务完成时间、降低工作负荷和脑力负荷。这说明有效利用声音增强移动菜单交互技术可以提高移动终端菜单交互的可用性。  相似文献   

4.
本文在探究移动学习教学模式、应用模式的基础上,设计开发了一个基于Android平台的移动学习系统,解决了实现移动学习系统的几个关键技术,提出了合适的技术方案,实现了移动学习环境的基本功能,验证了系统的可用性及学习效果。此次移动学习系统设计的尝试,对推动移动学习的发展有着积极的意义。  相似文献   

5.
基于移动智能体的分布式入侵检测系统研究   总被引:1,自引:0,他引:1  
分析当前分布式入侵检测系统中存在的一般性缺陷,在此基础上,研究了移动智能体在入侵检测系统中的可用性。提出一种具有网络拓扑结构感应能力和行为自主性的、基于移动智能体的分布式入侵检测系统模型,能有效保证网络系统的安全。  相似文献   

6.
分析了移动Agent系统中可能受到的各种威胁,包括对Agent、对Agent主机和通信的攻击,然后总结了安全性的4个方面要求,即保密性、可验证性、可审计性和可用性,最后研究了设计移动Agent系统的主要语言Java和TCL的安全性,并讨论了各种保护Agent系统的安全的措施。  相似文献   

7.
基于Agent的移动数据库系统结构   总被引:6,自引:0,他引:6  
移动agent技术对于移动环境具有较好的支持,但是,大多数系统中,客户-agent-服务器之间的关系是线性的,不适合现实中移动数据库的网状结构。通过对agent的功能进行扩充和分工,提出了三层agent的移动数据库系统结构,较好地解决了移动数据库中的数据可用性和位置相关查询等问题。  相似文献   

8.
赵丽  王凤先 《计算机应用》2003,23(Z2):120-121
为提高系统的可用性,目前很多分布式应用系统都采用了冗余服务技术.文中分析了集中式管理存在的诸多问题,并引入移动代理来提高系统的性能,重点介绍了该冗余服务系统中,移动代理所存在的安全性问题及相应对策.  相似文献   

9.
张雪冰  吴伟明  谷勇浩 《软件》2012,33(10):13-15,19
移动互联网现在发展迅速,市场潜力大,各种企事业单位都希望能在移动互联网上开发应用,获取更高的价值.办公系统也需要从传统的web网络上转移到移动互联网,以适应人们随时随地的办公需求.本文在分析了移动互联网的特点和SOA框架主要技术的基础上,探讨了在移动互联网上开发基于SOA的移动办公系统的优势,从而提出移动办公系统设计方案.最终实现了松耦合、可重用的移动OA系统,采用Web Service提供数据与服务、XML实现SOA底层数据的描述和交换、基于B/S的模式和J2EE架构技术.并通过实际数据验证了在移动互联网上实现的基于SOA框架的移动OA系统具有很好的可用性.  相似文献   

10.
移动IPv6是实现下一代互联网移动特性的核心技术,依赖于部署在家乡链路的家乡代理(HA)实现节点移动过程中的可寻址性.家乡链路的单一HA部署,将成为系统的单点故障隐患及性能瓶颈,难以保证系统服务可用性.为提升移动IPv6网络的系统服务可用性和系统性能,需要在家乡链路部署多HA,解决其单点故障问题,并有效均衡多家乡代理间的负载.文中研究移动IPv6网络多家乡代理部署方法,引入检测备份环对多HA间进行有效组织,基于此实现HA容错和负载均衡.多家乡代理采用单一HA映像以实现容错及负载均衡处理对移动节点的透明性,减小处理延迟和开销.  相似文献   

11.
目前,老人手机被老年群体广泛使用,但对老人手机易用性评估还尚缺,不利于老人手机研发。针对老人手机易用性评估的问题,提出基于云模型的老人手机易用性评估方法。构建老人手机易用性评估指标体系,并把熵权法和层次分析法相结合来确定各指标间相对权重,利用云模型对指标信息进行评估。实例分析表明该方法可以有效地处理老人手机易用性评估中的不确定度和模糊性,提高易用性评估结果的客观准确性,为老人手机在易用性设计方面提供理论依据。  相似文献   

12.
Previous studies on mobile Web browsers have focused on phone features and technical performance, but not on the user interface. In this study, we compared three mobile Web browsers in the iPhone and ultimately proposed recommendations for the design of mobile Web browsers for smartphones. To develop such recommendations, we redefined the user interface (UI) components of mobile Web browsers from previous studies to conform to smartphones and compared the Chrome, Safari, and Opera Mini-browsers. To do this, we conducted experiments on usability tests with several dependent variables, including usefulness, perceived time reduction, minimal action, usability, ease to memorize, learnability, fun, and satisfaction. Finally, we developed several recommendations, based on the experimental results and participant interviews, which will fulfill user needs for the interface design of mobile Web browsers for smartphones. Multi-windows need to be implemented in a 3D environment. Developers should consider UI components and features that ease learning how to use the browser for novice users.  相似文献   

13.
User authentication such as password setting has become increasingly important for the secure management of the information stored in mobile devices. However, in the password authentication schemes used in mobile devices, enhancing security reduces their usability, and passwords become hard to memorize. In addition, enhancing their usability makes them vulnerable to shoulder-surfing or recording attacks involving stealing a glance at the authentication process through the system interface. In this paper, we propose a password authentication scheme that uses a virtual scroll wheel, called WheelLock, to ensure appropriate usability and prevent brute force, shoulder-surfing, and recording attacks.  相似文献   

14.
基于WEB的移动端云存储技术研究   总被引:2,自引:0,他引:2       下载免费PDF全文
随着海量存储系统的出现与并行文件系统、分布式文件系统的发展,云存储系统已经成为业界中的焦点;另一方面,在WAP与WEB融合的大背景下,智能移动终端的快速发展,使得移动终端上的云存储服务已经提上日程。但是考虑到移动终端用户的使用习惯和当前移动终端的技术特点,云存储移动端的服务内容与交互设计仍需优化。通过研究云存储系统的架构、WEB端和WAP端的区别,搭建了一个云存储系统WFS的移动端站点,并通过测试证明了该移动端站点有良好的可用性。  相似文献   

15.
The mobile Internet—accessing the Internet via a mobile device—has become quite popular recently. The mobile Internet is mainly different from the stationary Internet because it may be used in various contexts, whereas the stationary Internet is mostly used in pre-determined environments. However, it is unclear when the mobile Internet is used most frequently, and in what context it is most useful. A greater understanding of the contexts for using the mobile Internet will relieve usability problems that mobile Internet users often encounter.This paper proposes a conceptual framework of use contexts, which includes various facets of contexts related to the mobile Internet. It then presents the results of an exploratory study in which the use contexts for the mobile Internet and corresponding usability problems have been empirically monitored. The results indicate that use of the mobile Internet is heavily clustered around a few key contexts, rather than dispersed widely in diverse contexts. Moreover, different contexts are found to cause different kinds of usability problems. The paper ends with theoretical and practical implications of the study results.  相似文献   

16.
The purpose of this study is to better understand, from an explorative qualitative perspective, the motivations and practices of highly security-conscious users of mobile authentication, and their underlying mental models of those behaviours. Mobile authentication studies have largely overlooked the mindset of these users in the upper bound of security experience, who have considered their behaviour in terms of detailed knowledge of mobile authentication risk. Twenty IT professionals who self-identified as security-conscious mobile device users, many with decades of intensive security-specific experience, were interviewed for this study regarding their opinions and experiences with mobile device authentication and security. These users described usability and situational impairment issues, as well as a deep concern for their identity and data security arising from highly contextual combinations of distrust towards underlying technologies and situational risk. Derived implications for development of security methods adapted to these informed perspectives are discussed and will be the basis for follow-on research comparing these findings with everyday users.  相似文献   

17.
18.
针对移动式起重机吊装路径规划的过程、结果难以直观显示,算法性能测评困难等问题,设计并实现了一款面向移动式起重机吊装路径规划的仿真平台。给出平台的系统框架,具体介绍路径规划、可视化的设计,用一个实例验证其可用性和有效性。实例表明,平台可实时显示搜索树(图)的生长过程、规划所得的路径及其吊装过程,同时可进行算法性能的自动测试,有助于吊装路径规划算法的研究。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号