Results 41 to 50 of about 86,113 (173)

Enhancing Electrical Impedance Based Deformation Sensing with Dielectric Current Guide

open access: yesAdvanced Electronic Materials, EarlyView.
This work introduces a dielectric‐based field manipulation strategy for electrical impedance tomography in soft robotics. By using silicone as a passive electric field guide, improved deformation sensing accuracy and reduced interference are achieved without embedding conductive components.
Arsen Abdulali   +3 more
wiley   +1 more source

Procedures and tools for acquisition and analysis of volatile memory on android smartphones [PDF]

open access: yes, 2014
Mobile phone forensics have become more prominent since mobile phones have become ubiquitous both for personal and business practice. Android smartphones show tremendous growth in the global market share.
Heriyanto, Andri P
core   +1 more source

Who you gonna call? Analyzing Web Requests in Android Applications

open access: yes, 2017
Relying on ubiquitous Internet connectivity, applications on mobile devices frequently perform web requests during their execution. They fetch data for users to interact with, invoke remote functionalities, or send user-generated content or meta-data ...
Dolby, Julian   +4 more
core   +1 more source

Enhancing Sensitivity across Scales with Highly Sensitive Hall Effect‐Based Auxetic Tactile Sensors

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
Herein, a tactile sensor based on hall‐effect sensors with an auxetic structure, called Hall effect‐based auxetic tactile sensor (HEATS), is proposed. The change in magnetism resulting from the deformation of the auxetic structure is utilized for sensing.
Youngheon Yun   +6 more
wiley   +1 more source

After Over-Privileged Permissions: Using Technology and Design to Create Legal Compliance [PDF]

open access: yes, 2019
Consumers in the mobile ecosystem can putatively protect their privacy with the use of application permissions. However, this requires the mobile device owners to understand permissions and their privacy implications.
Madappa, Dhruv   +2 more
core   +1 more source

A Forensically Sound Adversary Model for Mobile Devices

open access: yes, 2015
In this paper, we propose an adversary model to facilitate forensic investigations of mobile devices (e.g. Android, iOS and Windows smartphones) that can be readily adapted to the latest mobile device technologies. This is essential given the ongoing and
Choo, Kim-Kwang Raymond   +2 more
core   +2 more sources

Printed Wearable Sweat Rate Sensor for Continuous In Situ Perspiration Measurement

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
A wireless wearable sweat rate sensor system is presented, featuring digital 3D direct‐write printing on a flexible substrate with microfluidic layers for continuous, real‐time monitoring. Printed encapsulated metal electrodes are used for capacitance measurements, achieving high sensitivity (0.01 μL min−1) while maintaining a compact and lightweight ...
Mohammad Shafiqul Islam   +6 more
wiley   +1 more source

Evaluation of "shared nurses" APPs

open access: yesHuli yanjiu, 2019
Objective:To evaluate the content of domestic "shared nurses" mobile applications (APPs),and to provide the reference for developing APPs by later researchers,selecting APPs for patients and nurses,and formulating policies by relevant departments.Methods:
陈可涵, 宁丽
doaj  

Factors Influencing Adoption of the PlantVillage Nuru Application for Cassava Mosaic Disease Diagnosis Among Farmers in Benin

open access: yesAgriculture
Cassava production in Africa is constrained by number of biotic factors, including cassava mosaic disease (CMD). In response to this challenge, the PlantVillage Nuru application, which employs artificial intelligence for CMD diagnosis, provides farmers ...
Dèwanou Kant David Ahoya   +7 more
doaj   +1 more source

AdSplit: Separating smartphone advertising from applications [PDF]

open access: yes, 2012
A wide variety of smartphone applications today rely on third-party advertising services, which provide libraries that are linked into the hosting application. This situation is undesirable for both the application author and the advertiser.
Dietz, Michael   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy