相似文献/References:
[1]桂佳平 周雍恺 沈俊 蔡继文 刘功申.基于智能手机恶意代码防范模型的研究[J].计算机技术与发展,2010,(01):159.
GUI Jia-ping,ZHOU Yong-kai,SHEN Jun,et al.Research on Prevention Model of Malicious Code in Smart Phone[J].,2010,(10):159.
[2]李伟.人脸识别算法在智能手机上的实现[J].计算机技术与发展,2008,(01):161.
LI Wei.Implementation of Face Identification in Intelligent Mobile Telephone[J].,2008,(10):161.
[3]李君鹏 陈榕 闻英波.基于CAR构件的“Elastos”手机邮件系统设计和实现[J].计算机技术与发展,2008,(11):5.
LI Jun-peng,CHEN Rong,WEN Ying-bo.Design and Implementation of "Elastos"Smart Phone Email System Based on CAR[J].,2008,(10):5.
[4]周健 马志媛 杨宸.研究智能手机轻量级访问控制的探讨[J].计算机技术与发展,2011,(11):227.
ZHOU Jian,MA Zhi-yuan,YANG Chen.Research on Access Control of Smart Phone[J].,2011,(10):227.
[5]顾亦然 李绪强.基于蓝牙的手机病毒传播模型的研究[J].计算机技术与发展,2012,(04):246.
GU Yi-ran,LI Xu-qiang.Epidemic Model Research of Mobile Virus Based on Bluetooth[J].,2012,(10):246.
[6]孙勇,陈小惠.WIFI与GPRS在远程医疗中的应用及研究[J].计算机技术与发展,2013,(08):200.
SUN Yong,CHEN Xiao-hui.Application and Research of WIFI and GPRS in Telemedicine System[J].,2013,(10):200.
[7]杨雄,朱宇光.伪造接入点技术的智能手机拒绝服务攻防策略[J].计算机技术与发展,2013,(10):134.
YANG Xiong[],ZHU Yu-guang[].Strategy of Denial of Service Attack and Defense to Smart Phones of Faked Access Point[J].,2013,(10):134.
[8]吴渊,史殿习,杨若松,等. 手机位置和朝向无关的活动识别技术研究[J].计算机技术与发展,2016,26(04):1.
WU Yuan,SHI Dian-xi,YANG Ruo-song,et al.Research on Activity Recognition Technique of Smart Phone Position and Orientation Independent[J].,2016,26(10):1.
[9]傅仁壮[][],吴坤悌[][],符传博[][],等. 基于Android的决策气象服务系统的设计与实现[J].计算机技术与发展,2016,26(08):125.
FU Ren-zhuang[][],WU Kun-ti[][],FU Chuan-bo[][],et al. Design and Implementation of Decision Making Meteorological Information Service Platform Based on Android[J].,2016,26(10):125.
[10]李文娟,沈 澍,孙绍山,等.智能设备上步态识别系统设计与实现[J].计算机技术与发展,2022,32(12):57.[doi:10. 3969 / j. issn. 1673-629X. 2022. 12. 009]
LI Wen-juan,SHEN Shu,SUN Shao-shan,et al.Design and Realization of Gait Recognition System in Intelligent Equipment[J].,2022,32(10):57.[doi:10. 3969 / j. issn. 1673-629X. 2022. 12. 009]