Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleAugust 2024
Attention-based multilayer GRU decoder for on-site glucose prediction on smartphone
The Journal of Supercomputing (JSCO), Volume 80, Issue 17Pages 25616–25639https://doi.org/10.1007/s11227-024-06424-yAbstractContinuous glucose monitoring (CGM) devices provide a considerable amount of data that can be used to predict future values, enabling sustainable control of blood glucose levels to prevent hypo-/hyperglycemic events and associated complications. ...
- research-articleJuly 2024
Smart solutions for capsicum Harvesting: Unleashing the power of YOLO for Detection, Segmentation, growth stage Classification, Counting, and real-time mobile identification
Computers and Electronics in Agriculture (COEA), Volume 219, Issue Chttps://doi.org/10.1016/j.compag.2024.108832Highlights- Demonstrated the versatility of YOLOv8s, in detection and determining the growth stages of capsicum plants.
- Utilizing YOLOv8s and YOLOv8s-seg models for highly accurate capsicum and peduncle detection, showcasing remarkable mean ...
This research paper explores a comprehensive approach to advancing capsicum harvesting by integrating cutting-edge technologies. The study addresses key objectives, including capsicum detection using various YOLO algorithms, peduncle detection ...
- research-articleMarch 2024
MOLHEM: An innovative android application with an interactive avatar-based chatbot for Arab children with ASD
Education and Information Technologies (KLU-EAIT), Volume 29, Issue 13Pages 17565–17599https://doi.org/10.1007/s10639-024-12547-9AbstractThe teaching of children with Autism spectrum disorder (ASD) in Arabic-speaking countries depends mainly on the traditional techniques which are limited and outdated. On the other hand, smartphone applications (apps) have become an essential part ...
- research-articleMay 2024
A comparative study of covert channel attacks in Android with different parameters and detection tools
International Journal of Electronic Security and Digital Forensics (IJESDF), Volume 16, Issue 3Pages 304–316https://doi.org/10.1504/ijesdf.2024.138331With the evolving technology worldwide, there has been an increase in technology usage. The internet has brought a considerable revolution in information technology, and cyber security is one of the fields growing at a tremendous speed daily. With the ...
- research-articleApril 2024
An intelligent social protection service beneficiary selection scheme using machine learning and a mobile application for social safety net program
International Journal of Data Analysis Techniques and Strategies (IJDATS), Volume 16, Issue 2Pages 181–206https://doi.org/10.1504/ijdats.2024.137864Social safety net (SSN) initiatives serve an important role in assisting disadvantaged communities and resolving socio-economic inequities across the world. However, Appropriate candidate selection for the SSN program is very difficult due to the lack of ...
-
- research-articleOctober 2023
Variable-strength combinatorial testing of exported activities based on misexposure prediction
Journal of Systems and Software (JSSO), Volume 204, Issue Chttps://doi.org/10.1016/j.jss.2023.111773AbstractExported Activity (EA), a kind of activities in Android apps that can be launched by external components, is one of the most important inter-component communication (ICC) mechanisms. In combinatorial testing of EAs, although exhaustive testing of ...
Highlights- Unearth misexposed and low-complexity exported activities.
- Propose a fully automated testing framework ExaDroid.
- Propose misexposure prediction and summary-based analysis techniques.
- ExaDroid can effectively find unique ...
- research-articleSeptember 2023
DroidEncoder: Malware detection using auto-encoder based feature extractor and machine learning algorithms
Computers and Electrical Engineering (CENG), Volume 110, Issue Chttps://doi.org/10.1016/j.compeleceng.2023.108804AbstractAndroid Malware detection became a hot topic over the last several years. Although considerable studies have been conducted utilizing machine learning-based methods, little attention has been dedicated to the feature extraction importance which ...
- research-articleJune 2023
Android static taint analysis based on multi branch search association
AbstractTaint analysis is a method used to detect system security problems by tracking the flow of user input or information leakage through the system. In the taint analysis for Android applications, the complete taint propagation path is generally ...
- research-articleMarch 2023
Demystifying Hidden Sensitive Operations in Android Apps
ACM Transactions on Software Engineering and Methodology (TOSEM), Volume 32, Issue 2Article No.: 50, Pages 1–30https://doi.org/10.1145/3574158Security of Android devices is now paramount, given their wide adoption among consumers. As researchers develop tools for statically or dynamically detecting suspicious apps, malware writers regularly update their attack mechanisms to hide malicious ...
- research-articleSeptember 2022
A CNN-based android application for plant leaf classification at remote locations
Neural Computing and Applications (NCAA), Volume 35, Issue 3Pages 2601–2607https://doi.org/10.1007/s00521-022-07740-1AbstractThe Earth has witnessed the evolution of thousands of plant species in the kingdom named Plantae. Due to the diversity and subtle differences in each plant, it becomes difficult for a novice to identify a particular plant and to know the ...
- research-articleSeptember 2022
Android Application Design with MIT App Inventor for Bluetooth Based Mobile Robot Control
Wireless Personal Communications: An International Journal (WPCO), Volume 126, Issue 2Pages 1403–1429https://doi.org/10.1007/s11277-022-09797-6AbstractIn this study, a Bluetooth-based Android application interface is developed to perform a manual and automatic control of a four-wheel-driven mobile robot designed for education, research, health, military, and many other fields. The proposed ...
- research-articleAugust 2022
Conceptual Hybrid Model for Wearable Cardiac Monitoring System
- Hafiz Imtiaz Ahmed,
- Darakhshan Mehboob Saleem,
- Syed Muhammad Omair,
- Sarmad Shams,
- Naeem Sheikh,
- Areeba Tariq
Wireless Personal Communications: An International Journal (WPCO), Volume 125, Issue 4Pages 3715–3726https://doi.org/10.1007/s11277-022-09732-9AbstractThe electrocardiogram is the most convenient and widely used method of cardiac monitoring. The information provided by an ECG, has the potential to be used as a means by which cardiac arrhythmia can be detected at an early stage to prevent life-...
- research-articleOctober 2022
Adoption of third-party libraries in mobile apps: a case study on open-source Android applications
MOBILESoft '22: Proceedings of the 9th IEEE/ACM International Conference on Mobile Software Engineering and SystemsPages 125–135https://doi.org/10.1145/3524613.3527810Third-party libraries are frequently adopted in open-source Android applications (apps). These libraries are essential to the Android app development ecosystem as they often provide vital functionality that would take significant development time to ...
- research-articleApril 2022
Detecting COVID-19 from chest computed tomography scans using AI-driven android application
Computers in Biology and Medicine (CBIM), Volume 143, Issue Chttps://doi.org/10.1016/j.compbiomed.2022.105298AbstractThe COVID-19 (coronavirus disease 2019) pandemic affected more than 186 million people with over 4 million deaths worldwide by June 2021. The magnitude of which has strained global healthcare systems. Chest Computed Tomography (CT) ...
Graphical abstractDisplay Omitted
Highlights- An AI-driven Android application for detecting COVID-19 from chest CT scans.
- ...
- research-articleJanuary 2022
Blockchain-based seamless end-to-end shipping with android application
International Journal of Internet Technology and Secured Transactions (IJITST), Volume 12, Issue 3Pages 265–285https://doi.org/10.1504/ijitst.2022.122113World trade has been influenced by the emergence of new technologies around the globe. Businesses are forced to adopt new technologies regardless of their expertise and capabilities, to outperform their counterparts. This leads to challenges, risks, and ...
- research-articleJanuary 2022
A machine learning-based approach to predict university students' depression pattern and mental healthcare assistance scheme using Android application
International Journal of Data Analysis Techniques and Strategies (IJDATS), Volume 14, Issue 2Pages 122–139https://doi.org/10.1504/ijdats.2022.124766Depression is particularly common among university students in developing countries like Bangladesh. University students may face challenges with their studies, relationships, drugs, and family issues, all of which are major or minor contributors to ...
- research-articleOctober 2021
VitaSi: A real-time contactless vital signs estimation system
Computers and Electrical Engineering (CENG), Volume 95, Issue Chttps://doi.org/10.1016/j.compeleceng.2021.107392AbstractThe non-contact monitoring of vital signs, especially the Heart Rate (HR) and Breathing Rate (BR), using facial video is becoming increasingly important. Although, researchers have made considerable progress in the past few years, ...
Graphical abstractDisplay Omitted
Highlights- A non-contact system is proposed to monitor heart rate and breathing rate.
- ...
- posterMay 2021
RDTCheck: A Smartphone App for Monitoring Rapid Diagnostic Test Administration
CHI EA '21: Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing SystemsArticle No.: 303, Pages 1–6https://doi.org/10.1145/3411763.3451821Rapid diagnostic tests are point-of-care medical tests that are used by clinicians and community healthcare workers to get quicker results at a better cost compared to traditional diagnostic tests. Distributing rapid diagnostic tests to people outside of ...
- research-articleApril 2021
Preventing serialization vulnerabilities through transient field detection
SAC '21: Proceedings of the 36th Annual ACM Symposium on Applied ComputingPages 1598–1606https://doi.org/10.1145/3412841.3442033Verifying Android applications' source code is essential to ensure users' security. Due to its complex architecture, Android has specific attack surfaces which the community has to investigate in order to discover new vulnerabilities and prevent as much ...
- research-articleMarch 2021
mTrust: Call Behavioral Trust Predictive Analytics Using Unsupervised Learning in Mobile Cloud Computing
Wireless Personal Communications: An International Journal (WPCO), Volume 117, Issue 2Pages 483–501https://doi.org/10.1007/s11277-020-07879-xAbstractFiltering spam voice calls are a still major challenge in today’s technology contrary to SMS or email-based spamming. A numerical measure of the trust between users can help us filter calls based on relevance. Given the abundance of user-generated ...