Results 31 to 40 of about 89,722 (318)

Information Integrity checking methods for smartphones with Android operating system

open access: yesБезопасность информационных технологий, 2023
The tendency of organizations to use unprotected mobile devices with the Android operating system leads to an increase in incidents with the loss of important information.
Mikhail M. Smotryaev   +3 more
doaj   +1 more source

Pembuatan Aplikasi Mobile Learning sebagai Sarana Pembelajaran di Lingkungan Universitas Diponegoro

open access: yesJurnal Teknologi dan Sistem Komputer, 2013
Mobile learning is the intersection of Mobile Computing and E-Learning that provides the resources that can be accessed from anywhere, a powerful search system capabilities, rich interaction, full support for effective learning and assessment based on ...
Afandi Nur Aziz Thohari   +2 more
doaj   +1 more source

The Development of Tanks War Mobile Game based on Android System

open access: yesMATEC Web of Conferences, 2016
Along with the rapid development of mobile games and the popularity of Google Android operating system, the Android mobile game designed for recreation, exercise thinking will become mainstream.
Shi Yi Ping
doaj   +1 more source

Real-time Ada applications on Android

open access: yesRevista Iberoamericana de Automática e Informática Industrial RIAI, 2019
Android is the most extended operating system in the field of smartphones. Its wide diffusion has caused a great interest in using it in real time environments.
Alejandro Pérez Ruiz   +2 more
doaj   +1 more source

Enhancing Security of Android Operating System Based Phones using Quantum Key Distribution [PDF]

open access: yesEAI Endorsed Transactions on Scalable Information Systems, 2020
The Android-based devices are gaining popularity now a day. With the widespread use of smartphones both in private andwork-related areas, securing these devices has become of paramount importance.
Nageen Saleem   +4 more
doaj   +1 more source

Research status and outlook of Android security

open access: yesDianxin kexue, 2016
Currently, Android is the most popular operating system for smartphones. At the same time, its security situation is becoming increasingly serious. The following topics: the development course of Android version updates, the features of Android system ...
Sihan QING
doaj   +2 more sources

Fuzzy Integral-Based Multi-Classifiers Ensemble for Android Malware Classification

open access: yesMathematics, 2021
One of the most commonly used operating systems for smartphones is Android. The open-source nature of the Android operating system and the ability to include third-party Android apps from various markets has led to potential threats to user privacy ...
Altyeb Taha   +2 more
doaj   +1 more source

Remote Monitoring in Myasthenia Gravis: Exploring Symptom Variability

open access: yesAnnals of Clinical and Translational Neurology, EarlyView.
ABSTRACT Background Myasthenia gravis (MG) is a rare, autoimmune disorder characterized by fluctuating muscle weakness and potential life‐threatening crises. While continuous specialized care is essential, access barriers often delay timely interventions. To address this, we developed MyaLink, a telemedical platform for MG patients.
Maike Stein   +13 more
wiley   +1 more source

Game Bola Tangkis Berbasis Android Menggunakan App Inventor

open access: yesDigital Zone: Jurnal Teknologi Informasi dan Komunikasi, 2017
Abstrak- Berkembangnya teknologi yang berbasis mobile sekarang ini sudah sangat maju dan sering dipakai untuk dunia Information Technology (IT), bisnis, pendidikan dan media pembelajaran.
Mhd Arief Hasan   +2 more
doaj   +1 more source

Instant Messaging Forensic Analysis on Android Operating System [PDF]

open access: yesKinetik: Game Technology, Information System, Computer Network, Computing, Electronics, and Control, 2019
WhatsApp (WA) is one of the Instant Messaging (IM) applications used by many people. WA and mobile devices cannot be separated from the possibility of misuse such as for criminal purposes. To handle a crime case involving a mobile device, the investigator needs to use suitable forensic tools and mobile forensic methodology so that the results can be ...
Guntur Maulana Zamroni, Imam Riadi
openaire   +1 more source

Home - About - Disclaimer - Privacy