Microbiological contamination in androgens from the black market
Background Androgens from the black market are often produced in clandestine laboratories without adherence to hygienic manufacturing processes.
T. J. Verdegaal +7 more
doaj +1 more source
This research aimed to describe the development process and results of the Construct 2 Android-based education math game on number pattern subjects to increase student's ICT literacy.
Arif Fatahillah +2 more
doaj +1 more source
Feature selection to enhance android malware detection using modified term frequency-inverse document frequency (MTF-IDF) [PDF]
This research synthesizes an evaluation of feature selection algorithm by utilizing Term Frequency-Inverse Document Frequency (TF-IDF) as the main algorithm in Android malware detection.
Mazlan, Nurul Hidayah
core +1 more source
Analysis and evaluation of SafeDroid v2.0, a framework for detecting malicious Android applications [PDF]
Android smartphones have become a vital component of the daily routine of millions of people, running a plethora of applications available in the official and alternative marketplaces.
Argyriou, Marios +2 more
core +2 more sources
Recent Advances of Slip Sensors for Smart Robotics
This review summarizes recent progress in robotic slip sensors across mechanical, electrical, thermal, optical, magnetic, and acoustic mechanisms, offering a comprehensive reference for the selection of slip sensors in robotic applications. In addition, current challenges and emerging trends are identified to advance the development of robust, adaptive,
Xingyu Zhang +8 more
wiley +1 more source
Aplikasi Mobile Perpustakaan Berbasis Android (Studi Kasus Perpustakaan STMIK Palangka Raya)
Android is an operating system for mobile devices based on Linux, versions of android is ever released Android version 1.1, Android version 1.5 (Cupcake) Android version 1.6 (Donut), the Android version 2.0 / 2.1 (Eclair), Android Version 2.2 ( Froyo or ...
M. Haris Qamaruzzaman, Ferdiyani Haris
doaj +1 more source
Who you gonna call? Analyzing Web Requests in Android Applications
Relying on ubiquitous Internet connectivity, applications on mobile devices frequently perform web requests during their execution. They fetch data for users to interact with, invoke remote functionalities, or send user-generated content or meta-data ...
Dolby, Julian +4 more
core +1 more source
Smart Closed‐Loop Systems in Personalized Healthcare: Advances and Outlook
A smart closed‐loop e‐textile integrates multimodal sensing, onboard processing, wireless communication, and wearable power to enable real‐time physiological/biochemical monitoring and feedback‐controlled therapy. ABSTRACT Smart textiles represent a revolutionary frontier in healthcare, seamlessly blending fabric and advanced technologies to create ...
Safoora Khosravi +12 more
wiley +1 more source
MobileAppScrutinator: A Simple yet Efficient Dynamic Analysis Approach for Detecting Privacy Leaks across Mobile OSs [PDF]
Smartphones, the devices we carry everywhere with us, are being heavily tracked and have undoubtedly become a major threat to our privacy. As "tracking the trackers" has become a necessity, various static and dynamic analysis tools have been developed in
Achara, Jagdish Prasad +3 more
core +2 more sources
Ghera: A Repository of Android App Vulnerability Benchmarks
Security of mobile apps affects the security of their users. This has fueled the development of techniques to automatically detect vulnerabilities in mobile apps and help developers secure their apps; specifically, in the context of Android platform due ...
Arzt Steven +4 more
core +1 more source

