Results 141 to 150 of about 456,592 (325)
ABSTRACT AVATAR therapy (AT) works by facilitating a ‘face‐to‐face’ dialog between the person and a digital representation (avatar) of their persecutory voice. Although there is cumulative evidence of this way of working with voices, enhancing the therapeutic focus on improved confidence and a sense of control of the voices in social situations ...
Mar Rus‐Calafell +10 more
wiley +1 more source
Research on Android malware detection method based on multimodal feature fusion
Existing Android malware detection methods mainly use single-modal data to characterize program features, but fail to fully mine and fuse different feature information, resulting in unsatisfactory detection results.
Ge Jike +4 more
doaj +1 more source
ABSTRACT Introduction Augmented reality (AR) enables interactive learning in real‐world environments. In dental radiography education, AR offers a promising tool to enhance students' clinical skills by allowing them to simulate and practice procedures before engaging with actual patients. Repeated practice in an AR environment can reinforce theoretical
Maitê Michel Piazza Willig +7 more
wiley +1 more source
Augmented Reality Bangunan Bersejarah Berbasis Android (Studi Kasus : Istana Siak Sri Indrapura)
Ause Labellapansa +1 more
openalex +2 more sources
Animal Models and Experimental Medicine, EarlyView.
Asian Federation of Laboratory Animal Science Associations (AFLAS)
wiley +1 more source
You, Me, and the AI: The Role of Third‐Party Human Teammates for Trust Formation Toward AI Teammates
ABSTRACT As artificial intelligence (AI) becomes increasingly integrated in teams, understanding the factors that drive trust formation between human and AI teammates becomes crucial. Yet, the emergent literature has overlooked the impact of third parties on human‐AI teaming.
Türkü Erengin +2 more
wiley +1 more source
Android Security: Malicious use of Android permissions [PDF]
In this article Nikola Milosevic explains a threat model for analyzing android security and how to look deeper in how android permissions are used and how they can be used maliciously. The article will especially analyze combinations of android permission that could be maliciously used for stealing private information, disable phone or cost user money.
openaire +3 more sources
ABSTRACT As artificial intelligence (AI) technologies progress, AI agents arise as potential teammates in the workplace. This study explores how the visual representation of the AI agent as well as its conformity to traditional gender stereotypes affects the manifestation of uncanny valley effects in a workplace team context.
Agata Mirowska, Jbid Arsenyan
wiley +1 more source
This review examines how optical coherence tomography transforms industrial inspection by delivering real‐time, micrometer‐resolution, depth‐resolved imaging. It surveys applications across display manufacturing, thin films, microelectronics, laser processing, and coatings, evaluates performance against conventional techniques, and highlights emerging ...
Nipun Shantha Kahatapitiya +7 more
wiley +1 more source
Android Based Electronic Travel Aid System for Blind People
Paraskevas Diamantatos +1 more
openalex +2 more sources

