Results 51 to 60 of about 9,486 (244)

AndroShield:automated Android applications vulnerability detection, a hybrid static and dynamic analysis approach [PDF]

open access: yes, 2019
The security of mobile applications has become a major research field which is associated with a lot of challenges. The high rate of developing mobile applications has resulted in less secure applications.
Abdeen, Nouran   +5 more
core   +2 more sources

AgriSage: Android‐Based Application for Empowering Farmers With E‐Commerce and AI‐Driven Disease Detection

open access: yesEngineering Reports, Volume 7, Issue 8, August 2025.
Android‐based application for empowering farmers with E‐commerce. ABSTRACT Agriculture faces critical challenges such as timely disease detection, fragmented market access, and limited use of real‐time technology in the field. To address these issues, we developed AgriSage, an Android‐based intelligent mobile application that integrates artificial ...
Shabeena Naveed   +7 more
wiley   +1 more source

Development of Mobile GIS Based Digital Map Location Marking Application for Navigation Purposes

open access: yesJISA (Jurnal Informatika dan Sains)
In today's digital era, map and navigation applications have become essential tools for users to find locations, obtain the fastest routes, and explore new places.
Alif Ghifari, Sutarman Sutarman
doaj   +1 more source

Analiza zastosowania narzędzia Cucumber w testowaniu aplikacji

open access: yesJournal of Computer Sciences Institute, 2019
Niniejsza artykuł przedstawia analizę narzędzia do tworzenia testów automatycznych o nazwie Cucumber oraz opisuje jak dane narzędzie jest wykorzystywane w praktyce.
Illia Herman   +1 more
doaj   +1 more source

PeptideMind — Applying machine learning algorithms to assess replicate quality in shotgun proteomic data

open access: yesSoftwareX, 2021
Assessment of replicate quality is an important process for any shotgun proteomics experiment. One fundamental question in proteomics data analysis is whether any specific replicates in a set of analyses are biasing the downstream comparative ...
David C.L. Handler, Paul A. Haynes
doaj   +1 more source

Identifying Bugs in Make and JVM-Oriented Builds

open access: yes, 2020
Incremental and parallel builds are crucial features of modern build systems. Parallelism enables fast builds by running independent tasks simultaneously, while incrementality saves time and computing resources by processing the build operations that ...
Chaliasos, Stefanos   +3 more
core  

The CMS Si-strip Tracker

open access: yes, 2004
The Compact Muon Solenoid (CMS) experiment at LHC features the largest Silicon Strip Tracker (SST) ever build. This device is immersed in a 4T magnetic field and, in conjunction with a Pixel system, it allows the momentum of the charged particles to be ...
Sguazzoni, Giacomo
core   +2 more sources

New records of lichens and allied fungi from the Leningrad Region, Russia. VIII [PDF]

open access: yes, 2017
Thirteen species and one variety of lichens, nine lichenicolous and two saprobic fungi are reported for the first time for St. Petersburg, the whole Leningrad Region or its western or eastern parts. The lichens Bacidina brandii, B.
Dyomina, Aleksandra V.   +6 more
core   +2 more sources

Enhancing Smart Tourism With Chatbots: Focus on the Metamodel of Domain‐Specific Language and Emerging Technologies

open access: yesExpert Systems, Volume 42, Issue 7, July 2025.
ABSTRACT The tourism sector is adopting smart solutions to offer visitors more personalised and sustainable experiences. By leveraging urban infrastructure and new technologies, tourist destinations aim to enhance the interaction between travellers and their environment. Artificial intelligence (AI) and natural language processing (NLP) play a key role
Lamya Benaddi   +5 more
wiley   +1 more source

SINGLE HOP AUTHENTIC BROADCASTING IN SOCIAL MOBILE NETWORKS USING BLUETOOTH

open access: yesIraqi Journal of Information & Communication Technology, 2021
This paper aims to create infrastructure-free networking capabilities for people in need such as when inadequate infrastructure including mobile cell towers and power supplies are damaged or when all communication means are restricted.
Basma A. Qasim, Emad H. Al-Hemiary
doaj   +1 more source

Home - About - Disclaimer - Privacy