Results 101 to 110 of about 582,811 (354)

Gradient Ion Beams Regulate Surface Group Modification to Enhance Interfacial Charge Transport in Triboelectric Polymers

open access: yesAdvanced Science, EarlyView.
This study addresses the core scientific question of atomic‐scale structural units and their assembly mechanisms by integrating ion implantation technology— originally developed in nuclear physics research—with flexible intelligent polymers. Through this interdisciplinary approach, we have enabled on‐demand customization of surface functionalities and ...
Yi Chen   +11 more
wiley   +1 more source

Realidad Aumentada, una herramienta para la gestión de los valores patrimoniales. Augmented Reality, a tool for the management of heritage values

open access: yesSantiago, 2019
La evolución de las Tecnologías de la Información y las Comunicaciones ponen al alcance de las personas tecnologías como la Realidad Aumentada. Esta es muy flexible y permite a los usuarios interactuar con el ambiente que los rodea.
Gilbert Adrián Mengana-de la Fé   +1 more
doaj  

An Android Malicious Code Detection Method Based on Improved DCA Algorithm

open access: yesEntropy, 2017
Recently, Android malicious code has increased dramatically and the technology of reinforcement is increasingly powerful. Due to the development of code obfuscation and polymorphic deformation technology, the current Android malicious code static ...
Chundong Wang   +5 more
doaj   +1 more source

Advancing the Tendinopathy Triad: Comment on “Tendinopathy: The Interplay Between Mechanical Stress, Inflammation, and Vascularity”

open access: yesAdvanced Science, EarlyView.
Abstract Building upon the integrative framework of tendinopathy proposed by Gehwolf et al.—which elegantly connects mechanical stress, inflammation, and vascularity—this commentary extends the discussion by introducing novel mechanistic insights and future research directions that move beyond the established triad. A paradigm shift is proposed ...
DuJiang Yang   +3 more
wiley   +1 more source

Eight years of rider measurement in the Android malware ecosystem: evolution and lessons learned [PDF]

open access: yes, 2018
Despite the growing threat posed by Android malware, the research community is still lacking a comprehensive view of common behaviors and trends exposed by malware families active on the platform.
Stringhini, Gianluca   +1 more
core  

A Novel Co3O4@Co3(HITP)2‐Based Sensor for Low‐Temperatures H2S Detection: Fabrication, Performance, and Preliminary Exploration in Monitoring Pork Spoilage

open access: yesAdvanced Science, EarlyView.
Hybrid Co3O4@Co3(HITP)2‐based chemiresitor was constructed for hydrogen sulfide detection at low‐temperature, which presented excellent sensing performance at room and refrigerant temperature. A proof of concept was conducted by monitoring hydrogen sulfide released from pork spoilage at both temperature using a portable device with a smartphone ...
Yongjiao Sun   +9 more
wiley   +1 more source

Customizing Tactile Sensors via Machine Learning‐Driven Inverse Design

open access: yesAdvanced Science, EarlyView.
ABSTRACT Replicating the sophisticated sense of touch in artificial systems requires tactile sensors with precisely tailored properties. However, manually navigating the complex microstructure‐property relationship results in inefficient and suboptimal designs.
Baocheng Wang   +15 more
wiley   +1 more source

Neuromorphic Motor Control with Electrolyte‐Gated Organic Synaptic Transistors

open access: yesAdvanced Electronic Materials, EarlyView.
Electrolyte‐gated organic synaptic transistor (EGOST)‐based neuromorphic motor control systems integrate sensing, processing, and actuation by mimicking biological synapses. With advantages such as low power consumption, tunable synaptic plasticity, and mechanical flexibility, they are emerging as next‐generation core technologies for real‐time ...
Sung‐Hwan Kim   +3 more
wiley   +1 more source

HTTP behavior characteristics generation and extraction approach for Android malware

open access: yesDianxin kexue, 2016
Growing of Android malware,not only seriously endangered the security of the Android market,but also brings challenges for detection.A generation and extraction approach of automatic Android malware behavioral signatures was proposed based on HTTP ...
Yaling LUO, Wenwei LI, Xin SU
doaj   +2 more sources

Analysis of the development Android’s runtime

open access: yesJournal of Computer Sciences Institute, 2019
The article presents the development of the Android runtime. Own application for Android is presented, which implements performance benchmarks used to test different versions of the Android runtime.
Kostiantyn Honcharenko, Jakub Smołka
doaj   +1 more source

Home - About - Disclaimer - Privacy