Joke Collection Website - Public benefit messages - Mobile phone science and technology paper

Mobile phone science and technology paper

Today, smartphones dominate the field of communication. The following is a paper on mobile phone technology that I carefully recommend for you, hoping to help you.

The first paper on mobile phone technology

Functional design of mobile phones for the elderly in the era of smart phones

Today, smartphones dominate the field of communication. With the arrival of this era and the continuous development of the aging population, coupled with the increasing number of elderly people, the needs of the elderly for society are growing. How to apply new science and technology to the design of mobile phones for the elderly, especially how to help improve the quality of life and convenience of the elderly, is even more important. Based on the gerontology theory and social status quo, this paper puts forward some superficial views on the functional design of mobile phones for the elderly in the era of smart phones.

Keywords: the era of smart phones; Mobile phone design for the elderly; Psychology of aging

China Library Classification Number: TP393 Document Identification Number: A Document Number:1009-3044 (2013) 35-7985-02.

1 the current situation of the elderly population in China and its relationship with mobile phones.

According to the statistics of the sixth population census in China in 20 10, at present, the proportion of people aged 60 and over in China has reached 13.26%, that is to say, if the population of China is1300 million, then the number of elderly people is 17238 million. With the acceleration of population aging in China, how to build a harmonious and comfortable old age life for the elderly, so that the material and spiritual life of the elderly has attracted people's attention and become the focus of the whole society. At the same time, the reality is that children work outside the home, and old people often stay at home after retirement. Most of the old people have become what we call? Empty nesters? . The way they communicate with their families has become more single. There are only a handful of elderly people who can independently use social chat software such as QQ online. For most elderly people, mobile phones have become the most important platform and communication channel for them to communicate with their family and friends. A convenient and well-designed mobile phone is a good partner to accompany them in life and a good helper for children to better support and honor the elderly. However, due to the limitations of the surrounding environment and the physical conditions of the elderly, it is not very convenient for most elderly people to receive and transmit information. Most of them don't brush Weibo, send WeChat and download mobile phone software as young people do now, which will also restrict the daily life of the elderly and even have many adverse effects on their quality of life.

2 Physical characteristics of the elderly

Most people's perception begins to decline before they enter old age, because most individual factors are not obvious; However, after the age of 50 or 60, not only did the hearing and vision begin to decline obviously, but in fact, together with the touch of the skin, it also increased with age. 3. Reasonable design of mobile phone functions for the elderly in the era of smart phones.

Smart phone refers to a mobile phone with an independent operating system like a personal computer, which can be provided by third-party service providers such as software and games installed by users themselves. Through this program, the functions of mobile phones can be continuously expanded, and wireless network access can be realized through mobile communication networks. No matter on the pages of shopping websites or in the mobile phone sales business hall, exquisite mobile phones come into view, but there are only a handful of mobile phones that are really suitable for the elderly. Some use the slogan of "old man-machine", but the function is a mode that young people can operate quickly. Some mobile phones are not designed according to the characteristics of the elderly at all, and the products designed do not meet the needs of the elderly.

As a product that can provide convenience for young people's lives, smart phones will also become an indispensable partner for the elderly in their daily lives. A well-designed mobile phone suitable for the elderly can not only make their lives more convenient, but also help improve their quality of life.

So what are the design and functions of mobile phones for the elderly today when smart phones become arcades? Based on the physiological functions and living habits of the elderly, according to the physical characteristics of the elderly, the functional design suggestions of the elderly mobile phone are as follows:

[Hardware function design of mobile phone for the elderly \&; Interface design of mobile phone software for the elderly \&; 1, hard interface keyboard operation (with or without keyboard), keyboard pressing function, old people's sensitivity to touch decreases, how to control the pressing degree to operate mobile phones and their programs. If the key operation is set, it needs to be 1.5 times larger than the normal phone key size.

2, mobile phone screen display function, simple operation.

3, battery charging settings, automatically remind the elderly to charge in time. The standby time needs to be longer, and a spare battery can be built in case of emergency when there is no electricity.

4, the communication function of the receiver, the ringtone function, the hearing of the elderly is declining, so the audio setting of the ringtone is very critical, and the ringtone is loud, which is in line with the preferences of the elderly.

5, the appearance of the texture materials should choose green materials and non-slip waterproof, fall-resistant, wear-resistant and high-temperature resistant materials, the shape and color of the mobile phone should also meet the aesthetic needs of the elderly.

6. Keyboard, FM radio, push-to-talk, speed dialing, voice control, long standby and health monitoring are all essential. \&1.The interface color design is best to choose black, white, orange and red. Under the same conditions, the elderly are more likely to identify warm colors than cold ones.

2. Literally, the size can be adjusted to suit the different eyesight of different old people.

3. The setting of the operation interface should be concise and clear, and the operation depth should be low.

4. In terms of functions, in addition to telephone and SMS, it also provides the following functions, such as emergency function, lighting, alarm clock, health reminder (for example, medication time reminder), ECG and blood pressure, entertainment (radio, music, camera and home vision function) and so on.

5, anytime and anywhere geographical location and real-time monitoring, that is, GPS positioning, even if the old man's memory is bad and lost, the family can find the old man's position.

6. Now the application of high-tech technologies, such as cloud services and other high-tech means, is to completely introduce the concept and technology of cloud services. Children can connect their parents' cloud service mobile phones through computers, mobile phones and other devices around them, and remotely assist their parents to manage their mobile phones and make remote management settings, covering menu functions such as remote positioning, health information, contacts, ringing, alarm clock, tablecloth time and date, keyboard, advanced settings and mobile phone mode. \ & amp]

Figure 2

It is not difficult to see that the functional design of mobile phones for the elderly should focus on the injection of high and new technologies such as humanization, intelligence and cloud services. Smart phones for the elderly can meet the daily needs of the elderly better and faster, just like having a personal housekeeper and secretary to help take care of the daily life of the elderly; Cloud service can upload the data measured and detected by mobile phones anytime and anywhere, such as ECG, blood pressure level and geographical location, to the cloud in real time, so that children thousands of miles away can know the old man's every move, so that they can ask their children and family for help at the first time in case of abnormality and emergency. The overall functional design of mobile phones for the elderly should be simple, easy to use, economical and durable. Although the physical and psychological functions of the elderly are declining, I believe that a mobile phone designed for the elderly with people-oriented and user-experience as the center will become an indispensable partner in their lives. Of course, the care of the elderly by children and family members is the basis of their sense of security and happiness, and they need more care and visits. Empty nesters? Our hearts and souls are no longer empty and lonely, and only in this way can we truly reflect the care of human nature.

References:

[1] Zhao Huimin geriatrics [M]. Tianjin: Tianjin University Press, 20 10, 1.

[2] Zhang. Research on mobile phone design for the elderly based on usage behavior analysis [D]. Shenyang: Shenyang University of Aeronautics and Astronautics, 20 10.

On mobile phone science and technology papers II

Analysis on the Characteristics of Mobile Malware in the Smart Phone Era

This paper studies the characteristics of mobile phone malware, first introduces the definition and types of mobile phone malware, and then summarizes the types and impacts of mobile phone malware threats, which provides effective reference for the prevention and control of mobile phone malware.

Keywords: smart phone; Malware; Characteristic analysis; potential threat

China Library Classification Number: TN929.53 Document Identification Number: A Document Number:1674-7712 (2014) 02-0000-01.

The popularity of 3G network promotes the deep application of mobile Internet, and more traditional application modes are transferred to mobile Internet. In recent years, mobile phones are favored because of their small size and convenience. With the rapid development of smart phones, the performance of smart phones is constantly improving. With the development of broadband networks, more and more users tend to use mobile phones to surf the Internet.

First, the definition of mobile phone malware

Mobile malware refers to the software installed or run on the user's mobile phone, which infringes on the legitimate rights and interests of the user without explicit prompt or permission. Generally speaking, mobile phone malware has seven behavioral characteristics, and some malware conforms to multiple characteristics.

(1) Unloading is difficult. Once the mobile phone malware is forcibly installed on the mobile phone, it is difficult for users to use the commonly used uninstallation tools to fundamentally delete the mobile phone malware.

(2) mandatory installation. Malware is forcibly installed on the user's mobile phone without permission or knowledge.

(3) Advertising push. After the mobile phone is infected with some mobile phone malware, malware developers can communicate with the user's mobile phone background remotely, and occasionally push a large number of spam messages and multimedia messages to the user's mobile phone [1].

(4) browser poisoning. After the mobile phone browser is infected, it may be maliciously called the API of the operating system to further achieve the purpose of stealing user privacy information.

(5) stealing information. If the mobile phone is infected with some mobile phone malware, personal privacy information in the system, such as user address book, user SMS and other content will be stolen by these softwares.

(6) Infringement of authority. Mobile malware may pop up a prompt box during the initial operation after the program is installed, so that users can give mobile malware file system access rights unsuspecting.

(7) Malicious bundling. In order to gain more benefits, some malicious softwares bind other softwares or advertisements without the authorization of users.

Second, the scope of mobile phone malware

Referring to the classification of computer malware and the existing types of mobile malware, this paper divides mobile malware into five categories: mobile worms, mobile viruses, botnets, mobile trojans and spyware [2]:

(1) The mobile phone worm is a malicious program that can copy and spread itself. This system is not destructive. Ordinary mobile phone worms will not infect system files. The main purpose is to occupy a lot of system and network resources.

(2) Mobile phone virus is a self-replicating program. The main means is to destroy or tamper with user data, which affects the normal operation of the information system and the system is extremely destructive.

(3) Botnet is to implant malicious programs into a large number of smart phones with the same system platform through various covert means, so that attackers can manipulate infected mobile phones to perform the same malicious behaviors through one-to-many command and control channels, such as sending a large number of spam messages or conducting distributed denial-of-service attacks on target websites.

(4) Mobile Trojan is a malicious program disguised as genuine software, and the software itself cannot spread itself on the network. It is usually installed on the user's mobile phone without the user's knowledge, and secretly performs some malicious functions in the background, such as destroying system files.

(5) Spyware is a program that can secretly collect the data of mobile phone users in the background of the mobile phone, and send these personal data to the third party through the network without the user's knowledge or permission. This program is very harmful and the most secretive. Its main purpose is to steal users' confidential information, such as IMSI, IMEI, passwords, various accounts and passwords.

Three, mobile phone malware threat classification

Mobile malware is a general term for worms, viruses and Trojans, which deliberately perform malicious tasks on smart phone systems. Smart phones can help and standardize software developers because they have corresponding software development platforms and languages. The huge smart phone market has driven the rapid development of the smart phone software industry economy, but driven by economic interests, smart phone software has become a new target for hackers and gold diggers. According to the current classification and characteristics of mobile phone malware [3], the potential threats brought by mobile phone malware can be divided into the following four categories:

(1) information stealing type. Information-stealing mobile phone malware mainly steals important personal information from users' mobile phones driven by economic interests. If users install this kind of mobile phone malicious software, once the malicious programs in these software are activated and run, personal information such as address book, photos, various accounts and passwords in the mobile phone may be stolen.

(2) Functional damage. The main purpose of this kind of mobile phone malware is to destroy the system and consume resources. Infection with this kind of mobile phone malware mainly shows that the running speed of the mobile phone suddenly slows down, some functions are limited, and memory is consumed instantly.

(3) Promote communication. The main purpose of this kind of mobile phone malware is to promote and spread some illegal applications and advertisements, which is not destructive. Under the temptation of related interests, give up the purity of software, act as the promotion carrier of advertising and other software, and sacrifice some user experience to gain some benefits.

(4) Communication charging type. The ultimate goal of this mobile phone malware is to obtain economic benefits. One way of this kind of malicious virus is to secretly customize SP service through SMS in the background program of mobile phone to deceive users and charge service fees. Another way is to directly implant malicious charges and codes that consume a lot of traffic into mobile phone software. When the user runs this software, communication and traffic charges may be generated invisibly without the user's knowledge. These malicious charges are generally hidden, and some of them are even realized through legal channels of operators. Ordinary mobile phone users are not aware of them at all, and they are generally discovered only after malicious charges are generated [4].

Four. Concluding remarks

With the opening of China's 4G network and the rapid development of smart phone industry, illegal and criminal activities on the Internet will inevitably migrate to mobile phones on a large scale, and will be expanded because of the portability, frequent use and rich personal information of mobile phones. In view of the security problems of smart phones and mobile Internet, the Ministry of Industry and Information Technology needs to formulate corresponding administrative technical specifications as soon as possible, speed up the technical research required for legislation, and provide technical guidance and strong legal guarantee for the healthy and orderly development of mobile Internet.

References:

[1] Chen Jian, Fan Mingniu. Feature code extraction method based on malware classification [J]. Computer application, 20 1 1, 3 1 (supplement 1): 83-84.

[2] Hao Lu, Hu Huaping, Liu Bo. Research on Malware Classification [J]. Computer Application Research, 2006 (9): 4-8.

[3] Stream, Sun. Malware Behavior Analysis and Detection Technology [J]. Journal of Anhui Institute of Architecture and Technology, 20 12 (3): 52-55.

[4] Zhou. Analysis on the Difficulties and Countermeasures of Mobile Phone Security [J]. Proceedings of the 28th National Computer Security Academic Exchange Conference, 20 13 (10): 78-80.

People who read mobile phone technical papers will still read them.

1. How do college students use their mobile phones well?

2. College students' mobile phone market papers

3. There are three model articles in the survey report of college students' mobile phones.

4. Mobile phone market papers

5. Model essay on graduation thesis of communication technology