We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.

Search Results

Showing 1-20 of 2,232 results
  1. Conclusion

    This chapter provides a comprehensive overview of the book’s security issues, vulnerabilities, and solutions for ten major operating systems:...
    Andi Fitriah Abdul Kadir, Arash Habibi Lashkari, Mahdi Daghmehchi Firoozjaei in Understanding Cybersecurity on Smartphones
    Chapter 2024
  2. Windows Operating System

    This chapter describes the Windows Operating System (OS), providing an overview of its history, vulnerabilities, adversarial techniques, malware...
    Andi Fitriah Abdul Kadir, Arash Habibi Lashkari, Mahdi Daghmehchi Firoozjaei in Understanding Cybersecurity on Smartphones
    Chapter 2024
  3. Other Operating Systems

    This chapter explores other alternative operating systems (OSs) beyond the commonly known Windows, Android, and iOS platforms. The chapter begins by...
    Andi Fitriah Abdul Kadir, Arash Habibi Lashkari, Mahdi Daghmehchi Firoozjaei in Understanding Cybersecurity on Smartphones
    Chapter 2024
  4. A KPI System to Measure Bicycle Attractiveness of a City

    Many municipalities want to become more bicycle friendly. More people should be convinced to use the bike more often to strengthen the location as an...
    Johannes Schering, Jorge Marx Gómez, Frank Köster in Smart and Secure Embedded and Mobile Systems
    Conference paper 2024
  5. Analysis of the Measurements of Cycle Path Surface Quality as Collected by Three Different Technologies

    Surface quality of bike paths plays an important role in the decision whether people are using the bicycle or not. Within a test with three different...
    Jana Klemp, Jorge Marx Gómez, ... Steven Soetens in Smart and Secure Embedded and Mobile Systems
    Conference paper 2024
  6. Explaining Changes in Short-Term Water Demand Patterns During the COVID-19 Pandemic: An Absorptive Capacity Perspective

    Embedded and mobile systems provide us with an ever-growing variety of potentially valuable information. While collecting and storing such data may...
    Conference paper 2024
  7. Multilevel Trustworthiness for Improved Process and Network Security in Critical Infrastructures and Domains

    The secure digitalization of distributed workflows with different stakeholders (and trust relationships) as well as of industrial network domains...
    Hermann Strack, Marlies Gollnick, ... Sandro Wefel in Smart and Secure Embedded and Mobile Systems
    Conference paper 2024
  8. Mask R-CNN Model for Banana Diseases Segmentation

    Early detection of banana diseases is necessary for develo** an effective control plan and minimizing quality and financial losses. Fusarium Wilt...
    Conference paper 2024
  9. Evidence-Based Practices on Co-operative Societies Information Record Management

    Co-operatives have proved to be one of the driving forces in the socio-economic empowerment of its members. The Government of Tanzania has been...
    Conference paper 2024
  10. Machine Learning-Based Forward Collision Avoidance System: A Case Study for the Kayoola EVS

    A forward collision avoidance system is an advanced driver assistance system that alerts the driver or maneuvers for safe motion in case of the...
    Conference paper 2024
  11. Theoretischer Hintergrund

    Dieses Kapitel präsentiert die Literaturübersicht, auf deren Grundlage Forschungslücken identifiziert und weitere Forschungen durchgeführt wurden, um...
    Chapter 2024
  12. Forschungsdesign

    Dieses Kapitel des Buches zielt darauf ab, Einblicke in mehrere Forschungsmethoden zu geben, die eingesetzt werden, um formulierte Forschungsziele zu...
    Chapter 2024
  13. Zusammenfassung der beigefügten Artikel

    Dieses Kapitel fasst die zehn Artikel zusammen, die das Buch ausmachen. Diese Artikel liefern die Ergebnisse der Forschung, die die Antworten auf die...
    Chapter 2024
  14. Machine Learning Model for Predicting Construction Project Success in Tanzania

    The construction projects in Tanzania mainly use the post-implementation evaluation method to determine the project completion success. This...
    Astin Ntulo, Elizabeth Mkoba, ... Sanket Mohan Pandhare in Artificial Intelligence Tools and Applications in Embedded and Mobile Systems
    Conference paper 2024
  15. Improved Medical Imaging Transfer Learning through the Conflation of Domain Features

    Transfer learning has made deep learning more accessible in many fields, such as medical imaging. However, data adaptation in medical imaging...
    Raphael Wanjiku, Lawrence Nderu, Michael Kimwele in Artificial Intelligence Tools and Applications in Embedded and Mobile Systems
    Conference paper 2024
  16. Influence of Microservice Design Patterns for Data Science Workflows

    Due to several advantages like scalability or fast development cycles, microservice architectures could also support the development and deployment...
    Christoph Schröer, Raphael Holtmann, ... Hergen Pargmann in Artificial Intelligence Tools and Applications in Embedded and Mobile Systems
    Conference paper 2024
  17. From Process Mining to Enterprise Mining

    In digitization projects, a detailed determination of the current situation and validation of the achievement of objectives is usually associated...
    Hans-Jürgen Scheruhn, Christian Reiter, Elnur Bayramli in Artificial Intelligence Tools and Applications in Embedded and Mobile Systems
    Conference paper 2024
  18. Analysis of Bicycle Use in German Cities Based on Smartphone App-Generated Data

    A worldwide uptake of cycling can be perceived. Even more, cycling is possible and can be assisted by digital solutions. Many cities and regions have...
    Firdaous Hebbal, Johannes Schering, ... Jana Klemp in Smart and Secure Embedded and Mobile Systems
    Conference paper 2024
  19. IoT-Based Monitoring and Reporting System for Dosimeter Wearers in Radiation Areas

    The utilization of radiation sources in a variety of activities has rapidly increased in today’s modern civilization. As a result, occupational...
    Avith Habonimana, Devotha Nyambo, ... John Ben Ngatunga in Smart and Secure Embedded and Mobile Systems
    Conference paper 2024
  20. The IoT Based Newborn Room Temperature Control System with Fire Detector (A Case of Mount Meru Hospital)

    Hypothermia is a severe problem that infants face worldwide. Several strategies have been put forth to address this issue. However, the existing...
    Juma O. Salim, Ramadhani Sinde, Shubi Kaijage in Smart and Secure Embedded and Mobile Systems
    Conference paper 2024
Did you find what you were looking for? Share feedback.