Results 1 to 10 of about 72,269 (161)

Blockchain Enabled Online-Voting System [PDF]

open access: yesITM Web of Conferences, 2020
A blockchain-enabled online-voting system is being proposed in this following paper. Blockchain technologies deliver an endless variety of applications that benefit from distributed economies.
Shah Akhil   +4 more
doaj   +1 more source

RBEF: Ransomware Efficient Public Blockchain Framework for Digital Healthcare Application

open access: yesSensors, 2023
These days, the use of digital healthcare has been growing in practice. Getting remote healthcare services without going to the hospital for essential checkups and reports is easy. It is a cost-saving and time-saving process.
Abdullah Lakhan   +3 more
doaj   +1 more source

Students' Learning Interest Using Computer and Android in Acid Base Teaching

open access: yesJ-PEK (Jurnal Pembelajaran Kimia), 2021
This research is motivated by the influence of high technology on education; hence educators need to choose the right technology device to use and compare student learning interests with and without the support of computer and android multimedia.  It was
Milanda Putri, Yenni Kurniawati
doaj   +1 more source

Early Detection of Dengue Fever Outbreaks Using a Surveillance App (Mozzify): Cross-sectional Mixed Methods Usability Study

open access: yesJMIR Public Health and Surveillance, 2021
BackgroundWhile early detection and effective control of epidemics depend on appropriate surveillance methods, the Philippines bases its dengue fever surveillance system on a passive surveillance method (notifications from barangay/village health centers,
Herbuela, Von Ralph Dane Marquez   +7 more
doaj   +1 more source

Current state of mobile health apps in endourology: a review of mobile platforms in marketplaces and literature

open access: yesTherapeutic Advances in Urology, 2023
Several mobile healthcare (mHealth) apps are available in various marketplaces, but there is still concern about their accuracy, data safety, and regulation.
Ali Talyshinskii   +5 more
doaj   +1 more source

Aplikasi IoT untuk Kendali Beban Listrik

open access: yesJurnal Teknik Elektro Indonesia, 2020
Internet of thing (IoT) is a system that will change the order of human life and industrial operations. In the future, objects that are operated daily with human interaction will be equipped with internet connectivity which is equipped with various ...
Asnil Asnil   +4 more
doaj   +1 more source

ACMiner: Extraction and Analysis of Authorization Checks in Android's Middleware [PDF]

open access: yes, 2019
Billions of users rely on the security of the Android platform to protect phones, tablets, and many different types of consumer electronics. While Android's permission model is well studied, the enforcement of the protection policy has received ...
Arzt Steven   +16 more
core   +2 more sources

Static Analysis for Extracting Permission Checks of a Large Scale Framework: The Challenges And Solutions for Analyzing Android [PDF]

open access: yes, 2014
A common security architecture is based on the protection of certain resources by permission checks (used e.g., in Android and Blackberry). It has some limitations, for instance, when applications are granted more permissions than they actually need ...
Bartel, Alexandre   +3 more
core   +5 more sources

Automatically Securing Permission-Based Software by Reducing the Attack Surface: An Application to Android [PDF]

open access: yes, 2011
A common security architecture, called the permission-based security model (used e.g. in Android and Blackberry), entails intrinsic risks. For instance, applications can be granted more permissions than they actually need, what we call a "permission gap".
Bartel, Alexandre   +3 more
core   +8 more sources

Android Steganography Application Using Insertion of 4 Bit LSB with Substitution and Vigenere Algorithms

open access: yesJurnal Teknologi dan Sistem Komputer, 2018
This study aims to implement steganography with 4 bit LSB method combined with Vigenere and substitution encryption algorithms. This combination strengthens the security of text messages that are inserted into the image because the message is already a ...
Priyagung Hernawandra   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy