Results 21 to 30 of about 402,294 (278)

Do customized Android frameworks keep pace with Android?

open access: yesProceedings of the 19th International Conference on Mining Software Repositories, 2022
The project is used to explore how customized Android Frameworks sync up with official Android Frameworks. 1. Clone corresponding customized Android Frameworks into directory platforms. 2. Retrieve commit history of customized Android Frameworks and store into directory history. 3. Run Python scripts to acquire merge and conflict information.
Liu, Pei   +3 more
openaire   +2 more sources

PENERAPAN KONSEP GEOTAGGING PADA APLIKASI TANGGAP DARURAT BENCANA BERBASIS ANDROID

open access: yesJSiI (Jurnal Sistem Informasi), 2019
Abstrak— Saat ini aplikasi mobile berbasis android telah banyak digunakan seiring semakin banyaknya perangkat smartphone android. Namun penyampaian informasi khususnya informasi bencana di majalengka masih saja belum tersampaikan dengan baik.
Nunu Nurdiana   +2 more
doaj   +1 more source

Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android [PDF]

open access: yes, 2011
A common security architecture, called the permission-based security model (used e.g. in Android and Blackberry), entails intrinsic risks. For instance, applications can be granted more permissions than they actually need, what we call a "permission gap".
Bartel, Alexandre   +3 more
core   +8 more sources

The development of Android-based learning media using Kodular in making suit patterns subject

open access: yesJurnal Pendidikan Vokasi, 2023
This research aims to produce Android-based interactive learning media by utilizing the Kodular application for learning materials for making suit patterns for XII grade students of Fashion Management Vocational Schools.
Fitri Nurjanah, Sri Emy Yuli Suprihatin
doaj   +1 more source

Android Malware Clustering through Malicious Payload Mining

open access: yes, 2017
Clustering has been well studied for desktop malware analysis as an effective triage method. Conventional similarity-based clustering techniques, however, cannot be immediately applied to Android malware analysis due to the excessive use of third-party ...
I Santos   +7 more
core   +1 more source

Testosterone therapy-induced erythrocytosis: can phlebotomy be justified?

open access: yesEndocrine Connections
Erythrocytosis, or elevated hematocrit, is a common side effect of testosterone therapy (TTh) in male hypogonadism. Testosterone stimulates erythropoiesis through an initial rise in erythropoietin (EPO), the establishment of a new EPO/hemoglobin ‘set ...
Peter Bond   +2 more
doaj   +1 more source

Rancang Bangun Aplikasi Pengarsipan Berkas Berbasis Android pada Kantor Notaris NJ

open access: yesBIOS, 2023
Archives is a collection of records or documents containing information on the activities and transactions of an organization, institution, and company. The Notary office NJ notary has been using conventional methods for archiving files, which requires a
Dian Novita Sari   +1 more
doaj   +1 more source

Selective androgen receptor modulators: a critical appraisal

open access: yesFrontiers in Endocrinology
The concept of selective androgen receptor modulators (SARMs) was introduced in 1999 in analogy to selective estrogen receptor modulators (SERMs).
Peter Bond   +5 more
doaj   +1 more source

Generating Predicate Callback Summaries for the Android Framework

open access: yes, 2017
One of the challenges of analyzing, testing and debugging Android apps is that the potential execution orders of callbacks are missing from the apps' source code.
Le, Wei, Perez, Danilo Dominguez
core   +1 more source

Predicting the Impact of Android Malicious Samples via Machine Learning

open access: yesIEEE Access, 2019
Recently, Android malicious samples threaten billions of mobile end users' security or privacy. The community researchers have designed many methods to automatically and accurately identify Android malware samples.
Junyang Qiu   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy