Skip to results page

Results: 52

0 bulk actions available

    You have selected 0 records

    Page #1

    • Peer reviewed
    • Academic Journal
    The International Safety Equipment Association (ISEA) updated its standard for hand protection products, introducing a new pentagon badge system to display gloves' levels of protection uniformly. This standard, ANSI/ISEA 105-2024, specifies the positioning of symbols for abrasion, cut, and punc...
    Subjects:
    • Peer reviewed
    • Academic Journal
    The proliferation of fake news and fake profiles on social media platforms poses significant threats to information integrity and societal trust. Traditional detection methods, including rule-based approaches, metadata analysis, and human fact-checking, have been employed to combat disinformati...
    Subjects:
    • Peer reviewed
    • Academic Journal
    Lighting Systems (LSs) play a fundamental role in almost every aspect of human activities. Since the advent of lights, both academia and industry have been engaged in raising the quality of the service offered by these systems. The advent of Light Emitting Diode (LED) lighting represented a giant ste...
    Subjects:
    • Peer reviewed
    • Academic Journal
    The monitoring of contaminants in fish species is pivotal for fishes' health and reproduction, as well as for human health. In the specific work, three major categories of contaminants, pesticides, pharmaceuticals, and macro and trace elements, were investigated in two major fish species, Dicentrar...
    Subjects:
    • Peer reviewed
    • Academic Journal
    Cloud computing is a valuable technology whose resources, data storage, software, infrastructure, and platform services are a few of its perks. The majority of cloud services are executed through an Internet connection. Thus, they are susceptible to a large extent of attacks that can lead to the disclo...
    Subjects:
    • Peer reviewed
    • Academic Journal
    The popularity of using the Android operating system has increased the number of developers and intruders in this field. Many applications are developed in this area and perform malicious activities like ransomware attacks, installing backdoors, phishing, sending premium short message service, and ...
    Subjects:
    • Peer reviewed
    • Academic Journal
    The smartphone has become an indispensable tool in our daily lives, and the Android operating system is widely installed on our smartphones. This makes Android smartphones a prime target for malware. In order to address threats posed by malware, many researchers have proposed different m...
    Subjects:
    • Peer reviewed
    • Academic Journal
    Data storage, software services, infrastructure services, and platform services are only some of the benefits of today's widespread use of cloud computing. Since most cloud services run via the internet, they are vulnerable to a comprehensive range of attacks that might end it the disclosure of sensi...
    Subjects:
    • Peer reviewed
    • Academic Journal
    Monitoring key physiological metrics, including heart rate and heart rate variability, has been shown to be of value in exercise science, disease management, and overall health. The purpose of this study was to investigate the diurnal variation of physiological responses and physical performances using...
    Subjects:
    • Peer reviewed
    • Academic Journal
    Android applications are indispensable resources that facilitate communication, health monitoring, planning, data sharing and synchronization, social interaction, business and financial transactions. However, the rapid increase in the smartphone penetration rate has consequently led to an incr...
    Subjects: