Results 111 to 120 of about 398,420 (276)
Since Android is the popular mobile operating system worldwide, malicious attackers seek out Android smartphones as targets. The Android malware can be identified through a number of established detection techniques.
Amarjyoti Pathak +2 more
doaj +1 more source
A multimodal laser‐induced graphene (LIG)‐based flexible sensor is developed to detect proximity and contact signals. Integrated into a soft robotic hand, it enables vision‐free object searching and grasping. Combined with a convolutional neural network, the system achieves accurate material and texture recognition, enhancing the capability of ...
Youning Duo +9 more
wiley +1 more source
REWW‐ARM—Remote Wire‐Driven Mobile Robot: Design, Control, and Experimental Validation
The Remote Wire‐Driven robot “REWW‐ARM” demonstrates a new concept of remote actuation that separates electronics from harsh environments while retaining closed‐loop control. Combining tendon‐sheath mechanisms with decoupled joints, it achieves efficient power transmission and autonomous locomotion, manipulation, and underwater operation, suggesting ...
Takahiro Hattori +4 more
wiley +1 more source
Proactive Robotic Grasp Stability via Tactile Safety Margin Feedback
We introduce the tactile safety margin (TSM), defined as the ratio between applied friction force (Ffric) and maximum friction (Fmax) derived from grip force. A bilayer E‐skin with decoupled temperature, strain, and pressure sensing enables real‐time grasp stability monitoring through measured TSM values, allowing robots to proactively adjust grip ...
Yebin Park +10 more
wiley +1 more source
Modeling and Characterization of a Self‐Sensing Soft Hydraulic Muscle
This article presents the self‐sensing soft hydraulic muscle (SSHM), a novel soft actuator capable of simultaneously sensing force and length without external sensors. A comprehensive model accurately predicts SSHM behavior, validated experimentally with minimal errors. Using propylene glycol enhances durability and reduces hysteresis.
Nhu An Phan +8 more
wiley +1 more source
Adaptive secure malware efficient machine learning algorithm for healthcare data
Abstract Malware software now encrypts the data of Internet of Things (IoT) enabled fog nodes, preventing the victim from accessing it unless they pay a ransom to the attacker. The ransom injunction is constantly accompanied by a deadline. These days, ransomware attacks are too common on IoT healthcare devices.
Mazin Abed Mohammed +8 more
wiley +1 more source
GeoTools-Android. Eines geogràfiques per Android
El presente Trabajo Final de Carrera (TFC), basado en el tema de los Sistemas de Información Geográfica y Geotelemática, se centra en las diversas aplicaciones geoespaciales para el sistema operativo Android.
+8 more sources
Virtualpatch: Distributing Android Security Patches Through Android Virtualization
The Android Operating System (OS) is a complex system that might contain vulnerabilities and allow malicious apps to damage the legitimate ones on the same device or steal sensitive user data. Vulnerabilities in the Android OS are fixed through security patches that can only be distributed through an update of the whole OS.
Simeone Pizzi +3 more
openaire +2 more sources
Electrical impedance tomography (EIT) tactile skins enable multiplexed measurements that trade sensing speed against information richness. This work introduces an economy‐of‐touch framework that treats tactile sensing as an information‐budgeting problem.
Xiaoxian Xu, David Hardman, Fumiya Iida
wiley +1 more source
Abstract Background Resettled refugee families face elevated mental health risks, compounded by structural and cultural barriers. The Family Strengthening Intervention for Resettlement (FSIR), co‐developed with resettled refugee communities, aims to improve family functioning and child mental health.
Euijin Jung +7 more
wiley +1 more source

