Results 51 to 60 of about 86,113 (173)

Proactive Robotic Grasp Stability via Tactile Safety Margin Feedback

open access: yesAdvanced Intelligent Systems, EarlyView.
We introduce the tactile safety margin (TSM), defined as the ratio between applied friction force (Ffric) and maximum friction (Fmax) derived from grip force. A bilayer E‐skin with decoupled temperature, strain, and pressure sensing enables real‐time grasp stability monitoring through measured TSM values, allowing robots to proactively adjust grip ...
Yebin Park   +10 more
wiley   +1 more source

Multimodal Quad‐Finger Soft Robotic Hand With Dual‐Chamber Origami Actuator for Large‐Workspace Manipulation

open access: yesAdvanced Intelligent Systems, EarlyView.
A multimodal quad‐finger soft robotic hand (QDO hand) uses dual‐chamber straight–curved origami prismatic (SCOP) origami actuators. By coordinating positive and negative pressurization in the two chambers, each finger produces axial extension, contraction and bidirectional bending.
Qinlin Tan   +6 more
wiley   +1 more source

How Smart is your Android Smartphone? [PDF]

open access: yes, 2010
Smart phones are ubiquitous today. These phones generally have access to sensitive personal information and, consequently, they are a prime target for attackers.
Mulani, Deepika
core   +3 more sources

AI voice journaling for future language teachers: A path to well‐being through reflective practices

open access: yesBritish Educational Research Journal, EarlyView.
Abstract This study aimed to explore the perceived impact of using an AI‐powered voice journaling app in overcoming the challenges and stressors encountered by senior students enrolled in teaching practicum at an English Language Teaching Bachelor's programme.
Bora Demir, Duygu Özdemir
wiley   +1 more source

Design of a Hydroelectronic Solar‐Tracking System for Solar Panels

open access: yesEnergy Science &Engineering, EarlyView.
A prototype of a passive solar‐tracking system utilizing buoyant force based on water level was developed, and its MATLAB/Simulink model was implemented. This study is expected to encourage researchers to design solar‐tracking mechanisms using metals with different thermal expansion coefficients, air, oil, and other fluids. ABSTRACT This study presents
Ufuk Süğürtin, Türker Fedai Çavuş
wiley   +1 more source

Detection and Localization of Hidden IoT Devices in Unknown Environments Based on Channel Fingerprints

open access: yesBig Data and Cognitive Computing
In recent years, hidden IoT monitoring devices installed indoors have raised significant concerns about privacy breaches and other security threats. To address the challenges of detecting such devices, low positioning accuracy, and lengthy detection ...
Xiangyu Ju   +3 more
doaj   +1 more source

Security Toolbox for Detecting Novel and Sophisticated Android Malware

open access: yes, 2015
This paper presents a demo of our Security Toolbox to detect novel malware in Android apps. This Toolbox is developed through our recent research project funded by the DARPA Automated Program Analysis for Cybersecurity (APAC) project.
Deering, Tom   +4 more
core   +1 more source

Prevalence and risk factors for postpartum depression and stress among mothers of preterm and low birthweight infants admitted to a neonatal intensive care unit in Accra, Ghana

open access: yesInternational Journal of Gynecology &Obstetrics, Volume 169, Issue 1, Page 131-137, April 2025.
Abstract To determine the prevalence of postpartum depression (PPD) and postpartum stress (PPS) and identify associated risk factors among mothers of preterm and low birth weight (LBW) infants. We conducted a secondary analysis of data collected from 255 mothers with preterm and LBW infants admitted to the neonatal intensive care unit (NICU) at Korle ...
John Pellegrino   +6 more
wiley   +1 more source

An Economic Study of the Effect of Android Platform Fragmentation on Security Updates

open access: yes, 2017
Vendors in the Android ecosystem typically customize their devices by modifying Android Open Source Project (AOSP) code, adding in-house developed proprietary software, and pre-installing third-party applications.
A Mylonas   +10 more
core   +1 more source

Analyzing Android Browser Apps for file:// Vulnerabilities

open access: yes, 2014
Securing browsers in mobile devices is very challenging, because these browser apps usually provide browsing services to other apps in the same device. A malicious app installed in a device can potentially obtain sensitive information through a browser ...
Chang, Rocky K. C., Wu, Daoyuan
core   +1 more source

Home - About - Disclaimer - Privacy