-
141
Smartphone-Based Automated Non-Destructive Testing Devices
Published 2020-12-01“…To ensure the operation of the smartphone in the ultrasonic flaw detector mode, the smartphone has software installed that runs in the Android operating system and implements the proposed algorithm of the device, and can serve as a repeater for processing data over a considerable distance (up to hundreds and thousands of kilometers) if it necessary.The experimental data comparative analysis of the developed device with the Einstein-II flaw detector from Modsonic (India) and the TS-2028H+ flaw detector from Tru-Test (New Zealand) showed that the proposed device is not inferior to them in terms of such characteristics as the range of measured thicknesses, the relative error in determining the depth defect and the object thickness. …”
Get full text
Article -
142
Semi-Supervised Machine Learning for Fault Detection and Diagnosis of a Rooftop Unit
Published 2023-06-01“…In this paper, supervised and semi-supervised machine learning (ML) approaches are applied to datasets collected from an operating system in the field to develop new FDD methods and to help building owners see the value proposition of performing proactive maintenance. …”
Get full text
Article -
143
Leveraging Cognitive Machine Reasoning and NLP for Automated Intent-Based Networking and e2e Service Orchestration
Published 2025-01-01“…A simulated testbed was created to assess the system’s performance using Containernet, a lightweight Container-Based Network Emulator, and Open Networking Operating System (ONOS) Software Defined Networking (SDN) controllers. …”
Get full text
Article -
144
Network Intrusion Detection and Prevention System Using Hybrid Machine Learning with Supervised Ensemble Stacking Model
Published 2024-01-01“…Implementing the detection framework as a Java solution makes it possible to deploy it across various operating system platforms without any impact on the detection performance.…”
Get full text
Article -
145
Transformer-based malware detection using process resource utilization metrics
Published 2025-03-01“…Additionally, we showcase that other tenant processes within the operating system act as indirect indicators of malware presence, providing valuable signals for detection even when the malware process itself is not directly observed. …”
Get full text
Article -
146
Developing a Mobile Application-based System for Enhancing Medical Skill Training
Published 2025-01-01“…In the system architecture design phase, we chose Windows Server as the operating system, combined PHP and Apache to handle web service requests, used MariaDB for data storage and management, and applied FastAPI to facilitate dataexchange with other services. …”
Get full text
Article -
147
PermGuard: A Scalable Framework for Android Malware Detection Using Permission-to-Exploitation Mapping
Published 2025-01-01“…Android, the world’s most widely used mobile operating system, is increasingly targeted by malware due to its open-source nature, high customizability, and integration with Google services. …”
Get full text
Article -
148
The use of nano-structured cellulose to improve plywood: A review
Published 2025-03-01“…A subsequent search included the acronym “plywood” combined with terms such as “nanocellulose,” “cellulose nanocrystals,” and “cellulose nanofibrils.” The Virtual Operating System (VOS) Viewer was used to develop a graphical mapping. …”
Get full text
Article -
149
OpenNavSense platform: A low-cost, open-source inertial navigation system for the evaluation of estimation algorithms
Published 2025-03-01“…This platform is built using FreeRTOS, an open-source real-time operating system (RTOS) that enables the microcontroller to run parallel individual threads (tasks), providing a practical and effective tool for implementing estimation algorithms that compensate for the use of low-cost microelectromechanical systems (MEMS) sensors instead of high-end sensors in professional INS. …”
Get full text
Article -
150
Obfuscated Malware Detection and Classification in Network Traffic Leveraging Hybrid Large Language Models and Synthetic Data
Published 2025-01-01“…Cybercriminals target Android since it is the most popular smartphone operating system (OS). Malware detection, analysis, and classification have become diverse research areas. …”
Get full text
Article -
151
An Adaptive Message Passing MPSoC Framework
Published 2009-01-01“…Each processor of this system is compact and runs a tiny preemptive operating system that monitors various metrics and is entitled to take remapping decisions through code migration techniques. …”
Get full text
Article -
152
Reduced graphene oxide anchored MnCo2S4 for solid state asymmetric capacitor device
Published 2025-03-01“…The electrochemical evaluation was verified through a three-electrode operating system, it shows the MnCo2S4 and rGO@MnCo2S4 electrodes have 42.72 mAh g-1 and 82.57 mAh g-1 capacity values. …”
Get full text
Article -
153
Desain Penilaian Risiko Privasi pada Aplikasi Seluler Melalui Model Machine Learning Berbasis Ensemble Learning dan Multiple Application Attributes
Published 2023-08-01“…Abstract Since the Android operating system is open-source, many Android-based applications are developed and freely available in app stores. …”
Get full text
Article -
154
FABLDroid: Malware detection based on hybrid analysis with factor analysis and broad learning methods for android applications
Published 2025-02-01“…The Android operating system, which is popular on mobile devices, creates concerns for users due to the malware it is exposed to. …”
Get full text
Article -
155
Evaluation of Performance Metrics Required in Proper Selection of SDN Controller for Integrated Satellite-Terrestrial Networks
Published 2024-09-01“…Five SDN controllers were subjected to evaluation and they are Open Network Operating System (ONOS), Opendaylight (ODL), Floodlight (FL), Ryu, and Pox. …”
Get full text
Article -
156
Implementasi Algoritma Catboost Dan Shapley Additive Explanations (SHAP) Dalam Memprediksi Popularitas Game Indie Pada Platform Steam
Published 2024-08-01“…The existence of steam trading cards category, RPG genre and compatibility on mac operating system will increase the popularity. This also happens with the higher prices and achievements provided. …”
Get full text
Article -
157
Mobile Toolbox sequences task: development and validation of a remote, smartphone-based working memory test
Published 2025-01-01“…When controlling for age, phone operating system (iOS vs. Android) and sex assigned at birth did not significantly impact performance; however, there was a significant difference between individuals who completed college and those with a high school education or lower.ConclusionThe results support the validity of Sequences as a measure of working memory for remote self-administered use. …”
Get full text
Article -
158
Cyborg Adolescents and Digital Data: Examining Education and Revenue Generation in the Digital Lives of Youth through More-than-Human Ethnography
Published 2024-12-01“…For instance, Arman discovered how to change his laptop's operating system by following online tutorials, demonstrating that knowledge could exist outside the individual mind (Menary, 2010). …”
Get full text
Article -
159
Training Center for Industrial Control Systems
Published 2013-02-01“…We consider the application of embedded microcontrollers and industrial controllers with built-in operating systems.With the development of embedded operating systems and technology of open standard IEC 61131-3 product developer can write their own program management and support staff – to modernize management program.…”
Get full text
Article -
160