Showing 41 - 60 results of 1,078 for search 'Manowar~', query time: 5.02s Refine Results
  1. 41

    Solution-Processed Nanowire Coating for Light Management in Organic Solar Cells by K. Tsuboi, T. Fukawa, Y. Konosu, H. Matsumoto, A. Tanioka

    Published 2012-01-01
    “…We report a novel light management approach based on solution-processed nanowire (NW) coating for enhancing organic solar cell efficiency. …”
    Get full text
    Article
  2. 42

    Observation of ultraviolet photothermoelectric bipolar impulse in gallium-based heterostructure nanowires by Jinjie Zhu, Qing Cai, Pengfei Shao, Shengjie Zhang, Haifan You, Hui Guo, Jin Wang, Junjun Xue, Bin Liu, Hai Lu, Youdou Zheng, Rong Zhang, Dunjun Chen

    Published 2025-01-01
    “…Here, we introduce a GaON/GaN heterostructure-nanowire ultraviolet electrochemical cell of observing a photothermoelectric bipolar impulse characteristic. …”
    Get full text
    Article
  3. 43

    Phase Transition and Optical Properties for Ultrathin KNbO3 Nanowires by Shulin Yang, Yongming Hu, Shengfu Wang, Haoshuang Gu, Yu Wang

    Published 2013-01-01
    “…Fascicular KNbO3 nanowires with tetragonal perovskite structures and ultrasmall diameters are synthesized by hydrothermal route at about 150°C for 24 hours. …”
    Get full text
    Article
  4. 44

    Mesoporous SnO2 Nanowires: Synthesis and Ethanol Sensing Properties by Shan-Hong Li, Fang-Fang Meng, Zhong Chu, Tao Luo, Fu-Min Peng, Zhen Jin

    Published 2017-01-01
    “…XRD, SEM, and HRTEM were used to characterize the synthesized mesoporous SnO2 nanowires. The sensing property of the mesoporous SnO2 nanowires in ethanol detection also has been studied. …”
    Get full text
    Article
  5. 45
  6. 46

    Preparation and photoelectric properties of Si:B nanowires with thermal evaporation method. by Yang Feng, Ping Liang, Ziwen Xia, Weiye Yang, Hongyan Peng, Shihua Zhao

    Published 2025-01-01
    “…We have successfully prepared a significant number of nanowires from non-toxic silicon sources. Compared to the SiO silicon source used in most other articles, our preparation method is much safer. …”
    Get full text
    Article
  7. 47
  8. 48

    Behavior Intention Derivation of Android Malware Using Ontology Inference by Jian Jiao, Qiyuan Liu, Xin Chen, Hongsheng Cao

    Published 2018-01-01
    “…Previous researches on Android malware mainly focus on malware detection, and malware’s evolution makes the process face certain hysteresis. …”
    Get full text
    Article
  9. 49

    HTTP behavior characteristics generation and extraction approach for Android malware by Yaling LUO, Wenwei LI, Xin SU

    Published 2016-08-01
    “…Growing of Android malware,not only seriously endangered the security of the Android market,but also brings challenges for detection.A generation and extraction approach of automatic Android malware behavioral signatures was proposed based on HTTP traffic.Firstly,the behavioral signatures were extracted from the traffic traces generated by Android malware.Then,network behavioral characteristics were extracted from the generated network traffic.Finally,these behavioral signatures were used to detect Android malware.The experimental results show that the approach is able to extract Android malware network traffic behavioral signature with accuracy and efficiency.…”
    Get full text
    Article
  10. 50
  11. 51

    Android malware detection based on APK signature information feedback by Xin-yu LIU, Jian WENG, Yue ZHANG, Bing-wen FENG, Jia-si WENG

    Published 2017-05-01
    “…A new malware detection method based on APK signature of information feedback (SigFeedback) was proposed.Based on SVM classification algorithm,the method of eigenvalue extraction adoped heuristic rule learning to sig APK information verify screening,and it also implemented the heuristic feedback,from which achieved the purpose of more accurate detection of malicious software.SigFeedback detection algorithm enjoyed the advantage of the high detection rate and low false positive rate.Finally the experiment show that the SigFeedback algorithm has high efficiency,making the rate of false positive from 13% down to 3%.…”
    Get full text
    Article
  12. 52
  13. 53
  14. 54

    A Data Mining Classification Approach for Behavioral Malware Detection by Monire Norouzi, Alireza Souri, Majid Samad Zamini

    Published 2016-01-01
    “…In this paper we present a data mining classification approach to detect malware behavior. We proposed different classification methods in order to detect malware based on the feature and behavior of each malware. …”
    Get full text
    Article
  15. 55
  16. 56
  17. 57
  18. 58

    HD-SEIRS Malware Propagation Model in Heterogeneous Complex Networks by Elham Asadi, Soodeh Hosseini

    Published 2024-12-01
    Subjects: “…malware propagation modeling…”
    Get full text
    Article
  19. 59

    Multi-granularity Android malware fast detection based on opcode by Xuetao ZHANG, Meng SUN, Jinshuang WANG

    Published 2019-12-01
    “…The detection method based on opcode is widely used in Android malware detection,but it still contains some problems such as complex feature extraction method and low efficiency.In order to solve these problems,a multi-granularity fast detection method based on opcode for Android malware was proposed.Multi-granularity refers to the feature based on the bag of words model,and with the function as basic unit to extract features.By step-by-level aggregation feature,the APK multi-level information is obtained.The log length characterizes the scale of the function.And feature can be compressed and mapped to improve the efficiency and construct the corresponding classification model based on the semantic similarity of the Dalvik instruction set.Tests show that the proposed method has obvious advantages in performance and efficiency.…”
    Get full text
    Article
  20. 60

    A Malware Detection Scheme Based on Mining Format Information by Jinrong Bai, Junfeng Wang, Guozhong Zou

    Published 2014-01-01
    “…Malware has become one of the most serious threats to computer information system and the current malware detection technology still has very significant limitations. …”
    Get full text
    Article