Results 41 to 50 of about 849,579 (245)

In Vivo Evaluation of the Secure Opportunistic Schemes Middleware using a Delay Tolerant Social Network

open access: yes, 2017
Over the past decade, online social networks (OSNs) such as Twitter and Facebook have thrived and experienced rapid growth to over 1 billion users. A major evolution would be to leverage the characteristics of OSNs to evaluate the effectiveness of the ...
Baker, Corey E.   +3 more
core   +1 more source

Association Between Symptomatic Knee Osteoarthritis and Target Glycemic Control in Individuals with Type 2 Diabetes

open access: yesArthritis Care &Research, Accepted Article.
Objective Knee osteoarthritis (OA) commonly affects individuals with Type 2 diabetes (T2DM) and is associated with increased risk of diabetes‐related complications. To better understand potential mechanisms, we examined the association between symptomatic knee OA and glycemic control in individuals with T2DM.
Lauren K. King   +10 more
wiley   +1 more source

e-Counterfeit: a mobile-server platform for document counterfeit detection

open access: yes, 2017
This paper presents a novel application to detect counterfeit identity documents forged by a scan-printing operation. Texture analysis approaches are proposed to extract validation features from security background that is usually printed in documents as
Berenguel, Albert   +3 more
core   +1 more source

A Concept of a Digital and Traceable Manufacturing Documentation Based on Formalized Process Description Applied on Composite Aircraft Moveable

open access: yesAdvanced Engineering Materials, EarlyView.
The documentation of component manufacture has become an essential part of today's production processes, especially for the analysis and optimization of production or component design with regard to structural performance, economic efficiency, and sustainability.
Björn Denker   +4 more
wiley   +1 more source

Android Malware Detection Systems Review

open access: yesDüzce Üniversitesi Bilim ve Teknoloji Dergisi, 2017
With the smartphones entering our lives, the number of smartphones continues to increase day by day. The reason why smartphones are in so demand is that people can easily do what they want.
Ömer Kiraz, İbrahim Alper Doğru
doaj  

Neutron and Gamma-Ray Detection System Coupled to a Multirotor for Screening of Shipping Container Cargo

open access: yesSensors, 2022
In order to detect special nuclear materials and other radioactive materials in Security and Defense scenarios, normally, a combination of neutron and gamma-ray detection systems is used.
Luís Marques   +8 more
doaj   +1 more source

THE PROTOTYPE OF SECURITY SYSTEMS CONNECTED TO THE SECURITY POST USING PIR CENSOR AND SIEMENS C45 MOBILE BASED MICROCONTROLLER ATMEGA 16 [PDF]

open access: yes, 2012
Purpose of making the prototype of secutity sistems connected to the security post using pir censor and siemens c45 mobile based microcontroller ATmega 16 is to create a tool that can directly send information to a security post during a robbery, so that
Kurniawan, Agus Prasetya
core  

Towards Baselines for Shoulder Surfing on Mobile Authentication

open access: yes, 2017
Given the nature of mobile devices and unlock procedures, unlock authentication is a prime target for credential leaking via shoulder surfing, a form of an observation attack. While the research community has investigated solutions to minimize or prevent
Aviv Adam J   +6 more
core   +1 more source

Unique Performance Considerations for Printable Organic Semiconductor and Perovskite Radiation Detectors: Toward Consensus on Best Practice Evaluation

open access: yesAdvanced Functional Materials, EarlyView.
A lack of standard approaches for testing and reporting the performance of metal halide perovskites and organic semiconductor radiation detectors has resulted in inconsistent interpretation of performance parameters, impeding progress in the field. This Perspective recommends key metrics and experimental details, which are suggested for reporting in ...
Jessie A. Posar   +8 more
wiley   +1 more source

User Needs of Online Tutoring Applications Using House of Quality

open access: yesJurnal Aplikasi Bisnis dan Manajemen
Background: Technology has significantly influenced the education sector, particularly with the rise of mobile learning through online tutoring applications.
Qurrata Aini   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy