Results 121 to 130 of about 89,722 (318)

Quire: Lightweight Provenance for Smart Phone Operating Systems [PDF]

open access: yes, 2011
Smartphone apps often run with full privileges to access the network and sensitive local resources, making it difficult for remote systems to have any trust in the provenance of network connections they receive. Even within the phone, different apps with
Dietz, Michael   +4 more
core   +3 more sources

Multimodal Quad‐Finger Soft Robotic Hand With Dual‐Chamber Origami Actuator for Large‐Workspace Manipulation

open access: yesAdvanced Intelligent Systems, EarlyView.
A multimodal quad‐finger soft robotic hand (QDO hand) uses dual‐chamber straight–curved origami prismatic (SCOP) origami actuators. By coordinating positive and negative pressurization in the two chambers, each finger produces axial extension, contraction and bidirectional bending.
Qinlin Tan   +6 more
wiley   +1 more source

DEVELOPMENT OF PRACTICAL RECOMMENDATIONS FOR CREATING ELECTRONIC FIELD MAPS USING PROGRAMS BASED ON THE ANDROID OPERATING SYSTEM

open access: diamond, 2021
А.Н. Кувшинов   +3 more
openalex   +1 more source

Humanlike AI for Corporate Social Responsibility Communication: How Perceived Anthropomorphism Shapes Stakeholder Acceptance of Chatbots

open access: yesCorporate Social Responsibility and Environmental Management, EarlyView.
ABSTRACT Despite increasing interest in leveraging AI to improve CSR communication, there is limited understanding of consumers' reactions to chatbots in CSR communication. Building upon the HAII‐TIME model, this study proposes a theoretical model from the users' psychological perspective to explain facilitative pathways through which anthropomorphic ...
Yangzhi (Nicole) Jiang   +2 more
wiley   +1 more source

An Experience‐Sampling Study on the Frequency and Diversity of Positive and Negative Affective States

open access: yesEuropean Journal of Social Psychology, EarlyView.
ABSTRACT Ecological models explain social phenomena by assuming specific properties of the world an individual lives in. The evaluative information ecology model (Unkelbach et al. 2019) assumes two such properties: Positive information is more frequent (i.e., positivity prevalence), but negative information is more diverse (i.e., negativity diversity).
Anne I. Weitzel, Christian Unkelbach
wiley   +1 more source

A novel feature selection technique: Detection and classification of Android malware

open access: yesEgyptian Informatics Journal
Android operating system is not just the most commonly employed mobile operating system, but also the most lucrative target for cybercriminals due to its extensive user base.
Sandeep Sharma   +3 more
doaj   +1 more source

An Indoor Navigation System Using a Sensor Fusion Scheme on Android Platform [PDF]

open access: yes, 2017
With the development of wireless communication networks, smart phones have become a necessity for people’s daily lives, and they meet not only the needs of basic functions for users such as sending a message or making a phone call, but also the users ...
Xin, Jiayi
core   +1 more source

Design of a Hydroelectronic Solar‐Tracking System for Solar Panels

open access: yesEnergy Science &Engineering, EarlyView.
A prototype of a passive solar‐tracking system utilizing buoyant force based on water level was developed, and its MATLAB/Simulink model was implemented. This study is expected to encourage researchers to design solar‐tracking mechanisms using metals with different thermal expansion coefficients, air, oil, and other fluids. ABSTRACT This study presents
Ufuk Süğürtin, Türker Fedai Çavuş
wiley   +1 more source

Harnessing personal and social resources in managing internalising and externalising symptoms in children living in low‐resource settings

open access: yesJCPP Advances, EarlyView.
Abstract Background Children growing up in low‐resource settings are at greater risk for lifelong psychiatric problems. They are both more likely to have risk factors for early psychopathology and to be less likely to seek help and engage support for these problems.
Julia E. Michalek   +4 more
wiley   +1 more source

Malware Detection for Android Operating Systems Applications

open access: yes, 2018
Many researches were done to find creative techniques, for Android platform, that can detect malware in easy and reliable manner. The aim is not only the effectiveness but to have less processing time, and less resources consumption. This research provide a solution for a part of this problem by finding an easy and fast way to analyze static ...
Abu Samra, Aiman A.   +2 more
openaire  

Home - About - Disclaimer - Privacy