Results 71 to 80 of about 398,420 (276)
An Android Malicious Code Detection Method Based on Improved DCA Algorithm
Recently, Android malicious code has increased dramatically and the technology of reinforcement is increasingly powerful. Due to the development of code obfuscation and polymorphic deformation technology, the current Android malicious code static ...
Chundong Wang +5 more
doaj +1 more source
An Economic Study of the Effect of Android Platform Fragmentation on Security Updates
Vendors in the Android ecosystem typically customize their devices by modifying Android Open Source Project (AOSP) code, adding in-house developed proprietary software, and pre-installing third-party applications.
A Mylonas +10 more
core +1 more source
Liquid Metal Sensors for Soft Robots
This review thoroughly reviews liquid metal sensors in soft robots. Their unique material properties like high conductivity and good biocompatibility are analyzed. Working principles are classified, and applications in environmental perception, motion detection, and human—robot interaction are introduced.
Qi Zhang +7 more
wiley +1 more source
Automated Test Input Generation for Android: Are We There Yet?
Mobile applications, often simply called "apps", are increasingly widespread, and we use them daily to perform a number of activities. Like all software, apps must be adequately tested to gain confidence that they behave correctly.
Choudhary, Shauvik Roy +2 more
core +1 more source
The Future of Research in Cognitive Robotics: Foundation Models or Developmental Cognitive Models?
Research in cognitive robotics founded on principles of developmental psychology and enactive cognitive science would yield what we seek in autonomous robots: the ability to perceive its environment, learn from experience, anticipate the outcome of events, act to pursue goals, and adapt to changing circumstances without resorting to training with ...
David Vernon
wiley +1 more source
HTTP behavior characteristics generation and extraction approach for Android malware
Growing of Android malware,not only seriously endangered the security of the Android market,but also brings challenges for detection.A generation and extraction approach of automatic Android malware behavioral signatures was proposed based on HTTP ...
Yaling LUO, Wenwei LI, Xin SU
doaj +2 more sources
Grounding Large Language Models for Robot Task Planning Using Closed‐Loop State Feedback
BrainBody‐Large Language Model (LLM) introduces a hierarchical, feedback‐driven planning framework where two LLMs coordinate high‐level reasoning and low‐level control for robotic tasks. By grounding decisions in real‐time state feedback, it reduces hallucinations and improves task reliability.
Vineet Bhat +4 more
wiley +1 more source
Analysis of the development Android’s runtime
The article presents the development of the Android runtime. Own application for Android is presented, which implements performance benchmarks used to test different versions of the Android runtime.
Kostiantyn Honcharenko, Jakub Smołka
doaj +1 more source
ANDROID STUDIO YORDAMIDA ANDROID ILOVASINI YARATISH
Mazkur maqolada Android Studio dasturini ishlab chiqish muhitidan foydalangan holda Android ilovasini yaratish haqida ma’lumotlar keltirilgan. Android qurilmalari tobora keng tarqalgan bo'lib, yangi ilovalarga talab faqat oshadi. Android Studio - bu o'rganish uchun ishlatish uchun qulay (va bepul) ishlab chiqish muhitidir.
openaire +1 more source
INFORMATION SYSTEM FOR EDUCATIONAL EVALUATION OF UNIVERSITY'S ACADEMIC ACTIVITIES [PDF]
The system of academic activities in higher education institutions is a program created to enable students and academic activities to communicate with each other.
ASHOUR, Salim Fathi Salim +2 more
core

