Results 1 to 10 of about 85,437 (175)
IoT based smart home automation using blockchain and deep learning models [PDF]
For the past few years, the concept of the smart house has gained popularity. The major challenges concerning a smart home include data security, privacy issues, authentication, secure identification, and automated decision-making of Internet of Things ...
Muhammad Umer +8 more
doaj +2 more sources
Access Control and Security System Via Bluetooth Application on Android Smartphone
Smartphone technology can be applied not only to establish communication needs but also to support other purposes. One of them is related to personal safety and security functions. It is undeniable that criminal acts can occur anytime and anywhere.
Husna Amiliansyah +2 more
doaj +1 more source
A Crypto-Steganography Approach for Hiding Ransomware within HEVC Streams in Android IoT Devices
Steganography is a vital security approach that hides any secret content within ordinary data, such as multimedia. This hiding aims to achieve the confidentiality of the IoT secret data; whether it is benign or malicious (e.g., ransomware) and for ...
Iman Almomani +2 more
doaj +1 more source
Students' Learning Interest Using Computer and Android in Acid Base Teaching
This research is motivated by the influence of high technology on education; hence educators need to choose the right technology device to use and compare student learning interests with and without the support of computer and android multimedia. It was
Milanda Putri, Yenni Kurniawati
doaj +1 more source
Mobile Health Apps That Act as Surgical Preparatory Guides: App Store Search and Quality Evaluation
BackgroundMobile health (mHealth) apps are becoming increasingly common in surgical practices for training, education, and communication.
Naga Sindhura Gadde, Kevin Yi-Lwern Yap
doaj +1 more source
Rancang Bangun Sistem Kamera Pengawas dengan Pengenalan Wajah untuk Keamanan Berbasis Blynk Legacy
Covid-19 pandemic that has occurred since the beginning of 2020 has brought down all aspects of the country, starting from community activities to the economy.
Chandra I. Zamorano +3 more
doaj +1 more source
BackgroundThe ever-increasing pressure on health care systems has resulted in the underrecognition of perinatal mental disorders.
Benedetta Spadaro +3 more
doaj +1 more source
Seamless and Secure VR: Adapting and Evaluating Established Authentication Systems for Virtual Reality [PDF]
Virtual reality (VR) headsets are enabling a wide range of new opportunities for the user. For example, in the near future users may be able to visit virtual shopping malls and virtually join international conferences.
Alt, Florian +6 more
core +1 more source
BackgroundTraditional Chinese medicine (TCM) is an integral part of mainstream medicine in China, with theories and practices that are completely different from modern medicine.
Liu, Xiao Hang +4 more
doaj +1 more source
BackgroundWhile early detection and effective control of epidemics depend on appropriate surveillance methods, the Philippines bases its dengue fever surveillance system on a passive surveillance method (notifications from barangay/village health centers,
Herbuela, Von Ralph Dane Marquez +7 more
doaj +1 more source

