Showing 201 - 220 results of 1,738 for search 'Phonak~', query time: 4.06s Refine Results
  1. 201
  2. 202
  3. 203
  4. 204
  5. 205

    Detection Method of Effective Tillering of Rice in Field Based on Lightweight Ghost-YOLOv8 and Smart Phone by CUI Jiale, ZENG Xiangfeng, REN Zhengwei, SUN Jian, TANG Chen, YANG Wanneng, SONG Peng

    Published 2024-09-01
    “…In order to meet the needs of field work, a mobile phone App for effective tiller detection of rice was developed for real-time detection. …”
    Get full text
    Article
  6. 206
  7. 207

    Acceptability of Mobile Phone Technology for Medication Adherence Interventions among HIV-Positive Patients at an Urban Clinic by Christopher W. T. Miller, Seth Himelhoch

    Published 2013-01-01
    “…Mobile phone technology is increasingly used to overcome traditional barriers limiting access to care. …”
    Get full text
    Article
  8. 208

    Research on Clue Mining in Criminal Cases of Smart Phone Trojan Horse under the Background of Information Security by Li Gang, Yong Wen

    Published 2022-01-01
    “…Research and analysis Android smart phone Trojan horses can provide corresponding technical support for malware detection on Android smart phones, which has good scientific research significance and broad market value. …”
    Get full text
    Article
  9. 209
  10. 210
  11. 211
  12. 212
  13. 213

    Influence of phonon anharmonicity on Raman spectra of Cu2ZnSn(S,Se)4 polycrystalline thin films through computational study by Yurii A. Romaniuk, Ivan S. Babichuk, Vadym V. Korotyeyev, Volodymyr O. Yukhymchuk, Volodymyr M. Dzhagan, Sergiy V. Virko, Mykola O. Semenenko, Maksym O. Stetsenko, Anton Tiutiunnyk, Laura M. Pérez, David Laroze

    Published 2025-01-01
    “…Therefore, our findings show that incorporating anharmonism as an additional contribution to the phonon spectra, particularly in non-resonant cases, allows for a more accurate description of the vibrational properties of CZT(S,Se). …”
    Get full text
    Article
  14. 214

    Evaluation method for information security capability of mobile phone user based on behavior ontology under unconscious condition by Cheng-cheng MAI, Bo CHEN, Jia-kun ZHOU, Ling YU

    Published 2016-10-01
    “…A security capacity assessment method based on security behavior ontology,was proposed to collect users' be-havior data from their smartphones under unconscious condition to solve the problem of detecting mobile phone users' real existing insecure behaviors.A security behavior ontology was set up for formalizing the phone,message,network and App behavior data of mobile phone users and relevant rules were also set down for determining and associating inse-cure actions.Referring to the notion of attack graph,an insecure behavior detection algorithm was proposed based on behavior association graph for analyzing the paths of insecure behaviors dynamically.Furthermore,a competency model of information security capability assessment was presented for realizing the quantitative evaluation of information secu-rity capability of users.The experiment results prove the effectiveness of present competency model for insecure behavior path detection and security ability assessment.…”
    Get full text
    Article
  15. 215
  16. 216

    Smoking Cessation by Phone Counselling in a Lung Cancer Screening Program: A Retrospective Comparative Cohort Study by Ankita Ghatak, Sean Gilman, Siobhan Carney, Anne V Gonzalez, Andrea Benedetti, Nicole Ezer

    Published 2022-01-01
    “…Smoking cessation integration within lung cancer screening programs is challenging. Currently, phone counselling is available across Canada for individuals referred by healthcare workers and by self-referral. …”
    Get full text
    Article
  17. 217
  18. 218
  19. 219

    Using a Mobile Phone as a “Wii-like” Controller for Playing Games on a Large Public Display by Tamas Vajk, Paul Coulton, Will Bamford, Reuben Edwards

    Published 2008-01-01
    “…Whilst 3D motion can be utilized for ondevice games, in this paper we present a novel system that connects these phones to large public game screens via Bluetooth where it becomes a game controller for a multiplayer game. …”
    Get full text
    Article
  20. 220