Results 61 to 70 of about 8,962 (209)

Design of a Hydroelectronic Solar‐Tracking System for Solar Panels

open access: yesEnergy Science &Engineering, EarlyView.
A prototype of a passive solar‐tracking system utilizing buoyant force based on water level was developed, and its MATLAB/Simulink model was implemented. This study is expected to encourage researchers to design solar‐tracking mechanisms using metals with different thermal expansion coefficients, air, oil, and other fluids. ABSTRACT This study presents
Ufuk Süğürtin, Türker Fedai Çavuş
wiley   +1 more source

Android application privacy protection mechanism based on virtual machine bytecode injection

open access: yesTongxin xuebao, 2021
To solve the abuse of the Android application permission mechanism, a method of Android application access control based on virtual machine bytecode injection technology was proposed.The security policy in the form of virtual machine bytecode was ...
Yubo SONG, Qi CHEN, Rui SONG, Aiqun HU
doaj   +2 more sources

GENERATION Z'S AND ANDROID OS: HOW USER EXPERIENCE, SECURITY, AND SYSTEM PERFORMANCE SHAPE SATISFACTION

open access: yesPilar Nusa Mandiri
This paper investigates Generation Z's opinion of the Android OS through an analysis of system performance, security, and user experience and their influence on general satisfaction.
Cahyasari Kartika Murni   +2 more
doaj   +1 more source

Prevalence and risk factors for postpartum depression and stress among mothers of preterm and low birthweight infants admitted to a neonatal intensive care unit in Accra, Ghana

open access: yesInternational Journal of Gynecology &Obstetrics, Volume 169, Issue 1, Page 131-137, April 2025.
Abstract To determine the prevalence of postpartum depression (PPD) and postpartum stress (PPS) and identify associated risk factors among mothers of preterm and low birth weight (LBW) infants. We conducted a secondary analysis of data collected from 255 mothers with preterm and LBW infants admitted to the neonatal intensive care unit (NICU) at Korle ...
John Pellegrino   +6 more
wiley   +1 more source

Understanding security risks in mobile-to-PC screen mirroring: an empirical study

open access: yesCybersecurity
To facilitate collaboration across multiple devices and benefit from larger screens and better user experiences, many users choose to mirror their screen content of smartphones to personal computers.
Zhaoyu Qiu   +4 more
doaj   +1 more source

Android Security: A Review

open access: yesAcademic Journal of Nawroz University, 2017
Smartphones are used by billions of people that means the applications of the smartphone is increasing, it is out of control for applications marketplaces to completely validate if an application is malicious or legitimate. Therefore, it is up to users to choose for themselves whether an application is safe to use or not.
Omar Ahmed, Amira Sallow
openaire   +2 more sources

Virtualpatch: Distributing Android Security Patches Through Android Virtualization

open access: yesComputers & Security
The Android Operating System (OS) is a complex system that might contain vulnerabilities and allow malicious apps to damage the legitimate ones on the same device or steal sensitive user data. Vulnerabilities in the Android OS are fixed through security patches that can only be distributed through an update of the whole OS.
Simeone Pizzi   +3 more
openaire   +2 more sources

You, Me, and the AI: The Role of Third‐Party Human Teammates for Trust Formation Toward AI Teammates

open access: yesJournal of Organizational Behavior, EarlyView.
ABSTRACT As artificial intelligence (AI) becomes increasingly integrated in teams, understanding the factors that drive trust formation between human and AI teammates becomes crucial. Yet, the emergent literature has overlooked the impact of third parties on human‐AI teaming.
Türkü Erengin   +2 more
wiley   +1 more source

Optical Coherence Tomography for High‐Precision Industrial Inspection in Industry 4.0: Advances, Challenges, and Future Trends

open access: yesLaser &Photonics Reviews, EarlyView.
This review examines how optical coherence tomography transforms industrial inspection by delivering real‐time, micrometer‐resolution, depth‐resolved imaging. It surveys applications across display manufacturing, thin films, microelectronics, laser processing, and coatings, evaluates performance against conventional techniques, and highlights emerging ...
Nipun Shantha Kahatapitiya   +7 more
wiley   +1 more source

Static-analysis-based event input generation approach for Android application

open access: yes网络与信息安全学报, 2017
A static-analysis-based event input generation approach for Android applications was proposed.Based on the inter-component call graph and the system dependence graph of single component,the event inputs that security-related callbacks depend on were ...
Yi-lin YE,Zhen-ji ZHOU,Zheng HONG,Hui-ying YAN,Li-fa WU
doaj   +3 more sources

Home - About - Disclaimer - Privacy