Results 61 to 70 of about 8,962 (209)
Design of a Hydroelectronic Solar‐Tracking System for Solar Panels
A prototype of a passive solar‐tracking system utilizing buoyant force based on water level was developed, and its MATLAB/Simulink model was implemented. This study is expected to encourage researchers to design solar‐tracking mechanisms using metals with different thermal expansion coefficients, air, oil, and other fluids. ABSTRACT This study presents
Ufuk Süğürtin, Türker Fedai Çavuş
wiley +1 more source
Android application privacy protection mechanism based on virtual machine bytecode injection
To solve the abuse of the Android application permission mechanism, a method of Android application access control based on virtual machine bytecode injection technology was proposed.The security policy in the form of virtual machine bytecode was ...
Yubo SONG, Qi CHEN, Rui SONG, Aiqun HU
doaj +2 more sources
This paper investigates Generation Z's opinion of the Android OS through an analysis of system performance, security, and user experience and their influence on general satisfaction.
Cahyasari Kartika Murni +2 more
doaj +1 more source
Abstract To determine the prevalence of postpartum depression (PPD) and postpartum stress (PPS) and identify associated risk factors among mothers of preterm and low birth weight (LBW) infants. We conducted a secondary analysis of data collected from 255 mothers with preterm and LBW infants admitted to the neonatal intensive care unit (NICU) at Korle ...
John Pellegrino +6 more
wiley +1 more source
Understanding security risks in mobile-to-PC screen mirroring: an empirical study
To facilitate collaboration across multiple devices and benefit from larger screens and better user experiences, many users choose to mirror their screen content of smartphones to personal computers.
Zhaoyu Qiu +4 more
doaj +1 more source
Smartphones are used by billions of people that means the applications of the smartphone is increasing, it is out of control for applications marketplaces to completely validate if an application is malicious or legitimate. Therefore, it is up to users to choose for themselves whether an application is safe to use or not.
Omar Ahmed, Amira Sallow
openaire +2 more sources
Virtualpatch: Distributing Android Security Patches Through Android Virtualization
The Android Operating System (OS) is a complex system that might contain vulnerabilities and allow malicious apps to damage the legitimate ones on the same device or steal sensitive user data. Vulnerabilities in the Android OS are fixed through security patches that can only be distributed through an update of the whole OS.
Simeone Pizzi +3 more
openaire +2 more sources
You, Me, and the AI: The Role of Third‐Party Human Teammates for Trust Formation Toward AI Teammates
ABSTRACT As artificial intelligence (AI) becomes increasingly integrated in teams, understanding the factors that drive trust formation between human and AI teammates becomes crucial. Yet, the emergent literature has overlooked the impact of third parties on human‐AI teaming.
Türkü Erengin +2 more
wiley +1 more source
This review examines how optical coherence tomography transforms industrial inspection by delivering real‐time, micrometer‐resolution, depth‐resolved imaging. It surveys applications across display manufacturing, thin films, microelectronics, laser processing, and coatings, evaluates performance against conventional techniques, and highlights emerging ...
Nipun Shantha Kahatapitiya +7 more
wiley +1 more source
Static-analysis-based event input generation approach for Android application
A static-analysis-based event input generation approach for Android applications was proposed.Based on the inter-component call graph and the system dependence graph of single component,the event inputs that security-related callbacks depend on were ...
Yi-lin YE,Zhen-ji ZHOU,Zheng HONG,Hui-ying YAN,Li-fa WU
doaj +3 more sources

