|
|
|
Artem Obukhov,Denis Dedov,Alexander Siukhin,Alexey Arkhipov
Pág. pp. 32 - 42
The current problem in the process of training miners is to ensure the mobility and the ability to perform exercises not only on simulators, but also in real conditions of the mine. Therefore, the software and hardware platform of the training complex sh...
ver más
|
|
|
|
|
|
|
Rasha Abdel sattar El Stohy,Nashaat el Khamessy el Ghetany,Haitham Abdul Menem el Gharib
Pág. pp. 29 - 34
Abstract? There is a remarkable growing interest in utilizing mobile communications to enhance the interactions between different partners in educational institutions, particularly in schools. However, how communicating with parents via applications whil...
ver más
|
|
|
|
|
|
|
Norah Abanmi, Heba Kurdi and Mai Alzamel
The prevalence of malware attacks that target IoT systems has raised an alarm and highlighted the need for efficient mechanisms to detect and defeat them. However, detecting malware is challenging, especially malware with new or unknown behaviors. The ma...
ver más
|
|
|
|
|
|
|
Muawya Naser and Qasem Abu Al-Haija
|
|
|
|
|
|
|
Fabrizio Cara, Michele Scalas, Giorgio Giacinto and Davide Maiorca
Due to its popularity, the Android operating system is a critical target for malware attacks. Multiple security efforts have been made on the design of malware detection systems to identify potentially harmful applications. In this sense, machine learnin...
ver más
|
|
|
|
|
|
|
Malcolm L. Spaulding, Annette Grilli, Chris Damon, Brian McKenna, Michael Christensen, Nathan Vinhateiro, James Boyd and Grover Fugate
STORMTOOLS Coastal Environmental Risk Index (CERI) predicts the coastal flooding damage to individual structures using coastal flooding levels, including the effects of sea level rise (SLR), provided in terms of the base flood elevation (BFE), specificat...
ver más
|
|
|
|
|
|
|
Kejia Huang, Chenliang Wang, Shaohua Wang, Runying Liu, Guoxiong Chen and Xianglong Li
With the extensive application of big spatial data and the emergence of spatial computing, augmented reality (AR) map rendering has attracted significant attention. A common issue in existing solutions is that AR-GIS systems rely on different platform-sp...
ver más
|
|
|
|
|
|
|
Pavel Smirnov,Stanislav Smyshlyaev
Pág. 77 - 84
The task of providing security to remote digital signature systems (?cloud? signature) for cases of end user running client-side components on devices without potential of ensuring trusted environment (most common examples of such devices are smartphones...
ver más
|
|
|
|
|
|
|
Parvez Faruki, Rati Bhan, Vinesh Jain, Sajal Bhatia, Nour El Madhoun and Rajendra Pamula
Android platform security is an active area of research where malware detection techniques continuously evolve to identify novel malware and improve the timely and accurate detection of existing malware. Adversaries are constantly in charge of employing ...
ver más
|
|
|
|
|
|
|
Sergey Agafyin,Stanislav Smyshlyaev
Pág. 84 - 89
The task of enabling usage of cryptographic software (especially, for working with digital signature) with general-purpose mobile devices (e.g., smartphones with iOS or Android operation systems) is inevitably discussed during all conference discussions ...
ver más
|
|
|
|
|
|
|
Sergey Agafyin,Stanislav Smyshlyaev
Pág. 84 - 89
The task of enabling usage of cryptographic software (especially, for working with digital signature) with general-purpose mobile devices (e.g., smartphones with iOS or Android operation systems) is inevitably discussed during all conference discussions ...
ver más
|
|
|
|
|
|
|
Xu Jiang, Dejun Mu and Huixiang Zhang
Increasingly, malicious Android apps use various methods to steal private user data without their knowledge. Detecting the leakage of private data is the focus of mobile information security. An initial investigation found that none of the existing secur...
ver más
|
|
|
|
|
|
|
Prayoga Umbulsari,Hartati Dyah W.
Smartphone is chosen as a tool to implement information system of solo culture event due to observation in Solo city that shows that smartphone is owned by all people good from among children up to parents. Information Systems Solo Based Android Culture ...
ver más
|
|
|
|
|
|
|
Salma Charkaoui,El Habib Ben Lahmar,Abdelaziz Marzak,Issam Abdelbaki
Pág. pp. 18 - 25
Nowadays, the mobile operating systems market (Android, IOS, Windows Phone ?) continues to grow. It has become a real challenge for application vendors to provide versatile applications in this competitive market in a short time. The challenge is even gr...
ver más
|
|
|
|
|
|
|
Witold Chmielarz
Pág. 21 - 36
The growing popularity of the mobile solutions leads to the research different aspects of the sphere. The aim of this article is to analyze select mobile applications stores from the point of view of a user. The analysis was carried out for three the mos...
ver más
|
|
|
|
|
|
|
Manish Bhurtel and Danda B. Rawat
Operating systems play a crucial role in computer systems, serving as the fundamental infrastructure that supports a wide range of applications and services. However, they are also prime targets for malicious actors seeking to exploit vulnerabilities and...
ver más
|
|
|
|
|
|
|
Yann Stephen Mandza and Atanda Raji
In developing countries today, population growth and the penetration of higher standard of living appliances in homes has resulted in a rapidly increasing residential load. In South Africa, the recent rolling blackouts and electricity price increase only...
ver más
|
|
|
|
|
|
|
Radius Tanone,Hendra Budi Prasetya
Pág. pp. 134 - 149
The development of food and beverage products increases over the years. The high level of food consumption led to the presence of new food and beverage brands produced in Salatiga. In accordance with this fact, Organoleptic Tests or in other words evalua...
ver más
|
|
|
|
|
|
|
Kalis Wahyu Herdianto,Ernes Cahyo Nugroho
The need for information is very high, resulting in the presentation of informationrequired very quick and precise. Internet is a place for people to obtain the desired information. Rapid development of the Internet, it is used the smartphone manufacture...
ver más
|
|
|
|
|
|
|
Ana Serrano Tellería,Marco Oliveira
Pág. pp. 4 - 14
Data collected from the profiles and the digital identities has become a valuable currency for the mobile ecosystem, especially between users and providers. Services that required them are also described as the ground floor in direct linked with the infr...
ver más
|
|
|
|