Results 41 to 50 of about 849,579 (245)
Over the past decade, online social networks (OSNs) such as Twitter and Facebook have thrived and experienced rapid growth to over 1 billion users. A major evolution would be to leverage the characteristics of OSNs to evaluate the effectiveness of the ...
Baker, Corey E. +3 more
core +1 more source
Objective Knee osteoarthritis (OA) commonly affects individuals with Type 2 diabetes (T2DM) and is associated with increased risk of diabetes‐related complications. To better understand potential mechanisms, we examined the association between symptomatic knee OA and glycemic control in individuals with T2DM.
Lauren K. King +10 more
wiley +1 more source
e-Counterfeit: a mobile-server platform for document counterfeit detection
This paper presents a novel application to detect counterfeit identity documents forged by a scan-printing operation. Texture analysis approaches are proposed to extract validation features from security background that is usually printed in documents as
Berenguel, Albert +3 more
core +1 more source
The documentation of component manufacture has become an essential part of today's production processes, especially for the analysis and optimization of production or component design with regard to structural performance, economic efficiency, and sustainability.
Björn Denker +4 more
wiley +1 more source
Android Malware Detection Systems Review
With the smartphones entering our lives, the number of smartphones continues to increase day by day. The reason why smartphones are in so demand is that people can easily do what they want.
Ömer Kiraz, İbrahim Alper Doğru
doaj
In order to detect special nuclear materials and other radioactive materials in Security and Defense scenarios, normally, a combination of neutron and gamma-ray detection systems is used.
Luís Marques +8 more
doaj +1 more source
THE PROTOTYPE OF SECURITY SYSTEMS CONNECTED TO THE SECURITY POST USING PIR CENSOR AND SIEMENS C45 MOBILE BASED MICROCONTROLLER ATMEGA 16 [PDF]
Purpose of making the prototype of secutity sistems connected to the security post using pir censor and siemens c45 mobile based microcontroller ATmega 16 is to create a tool that can directly send information to a security post during a robbery, so that
Kurniawan, Agus Prasetya
core
Towards Baselines for Shoulder Surfing on Mobile Authentication
Given the nature of mobile devices and unlock procedures, unlock authentication is a prime target for credential leaking via shoulder surfing, a form of an observation attack. While the research community has investigated solutions to minimize or prevent
Aviv Adam J +6 more
core +1 more source
A lack of standard approaches for testing and reporting the performance of metal halide perovskites and organic semiconductor radiation detectors has resulted in inconsistent interpretation of performance parameters, impeding progress in the field. This Perspective recommends key metrics and experimental details, which are suggested for reporting in ...
Jessie A. Posar +8 more
wiley +1 more source
User Needs of Online Tutoring Applications Using House of Quality
Background: Technology has significantly influenced the education sector, particularly with the rise of mobile learning through online tutoring applications.
Qurrata Aini +2 more
doaj +1 more source

