Showing 21 - 40 results of 402 for search '"Mobile phone', query time: 0.05s Refine Results
  1. 21
  2. 22
  3. 23

    Design of a GSM Based Switching and Monitoring System Using a Mobile Phone. by Bbaale Francis

    Published 2023
    “…Similar products commercially available are Internet dependent and so lack the true sense of real mobility and security. However, the present GSM based remote control system allows the electrical appliance owner to switch or monitor electrical appliances from anywhere using the mobile phone and also prevents unauthorized access to these appliances. …”
    Get full text
    Thesis
  4. 24
  5. 25
  6. 26

    A Novel Trip Coverage Index for Transit Accessibility Assessment Using Mobile Phone Data by Zhengyi Cai, Dianhai Wang, Xiqun (Michael) Chen

    Published 2017-01-01
    “…Massive trips between cellular base stations are estimated by using over four-million mobile phone users. An easy-to-implement method is also developed to extract the transit information and driving routes for millions of requests. …”
    Get full text
    Article
  7. 27
  8. 28

    Quantitative assessment of thermal effects on the auricle region caused by mobile phones operating in different modes by Tomasz Rok, Artur Kacprzyk, Eugeniusz Rokita, Dorota Kantor, Grzegorz Tatoń

    Published 2024-10-01
    “…To analyze thermal effects caused by mobile phones on the human auricle region, we performed an experiment with controlled exposure to mobile phones operating in different modes for a group of 40 men. …”
    Get full text
    Article
  9. 29
  10. 30
  11. 31
  12. 32
  13. 33

    The Relationship between Mobile Phone Anxiety and Sleep Quality Occupational Therapy in Adolescents and Its Internal Mechanism by Jingwen Bi

    Published 2022-01-01
    “…With the development of the Internet era, the application of smartphones in life is quite useful, and the penetration rate of smartphones will be further increased in the future, making teenagers increasingly dependent on mobile phones. Teenagers are under great academic pressure, and excessive reliance on mobile phones will inevitably affect the formation of normal values. …”
    Get full text
    Article
  14. 34

    Identifying the Service Areas and Travel Demand of the Commuter Customized Bus Based on Mobile Phone Signaling Data by Jingyuan Wang, Meng Zhang

    Published 2021-01-01
    “…Firstly, mobile phone signaling data is preprocessed to identify the commuter’s location of employment and residence. …”
    Get full text
    Article
  15. 35

    Mobile Phone Radiation Effects on Brain with Reference to the Protective Role of Moringa oleifera: Sonographic and Histological Study by Hadeel M. Hussein, Ghada A. Taqa

    Published 2024-10-01
    “…Objectives: The study aims to examine the effect of mobile phone radiation in male rats on the histological structure, and sonographic imaging of the brain of rats after mobile phone radiation exposure and investigate the ameliorating role of moringa. …”
    Get full text
    Article
  16. 36
  17. 37

    Acceptability of Mobile Phone Technology for Medication Adherence Interventions among HIV-Positive Patients at an Urban Clinic by Christopher W. T. Miller, Seth Himelhoch

    Published 2013-01-01
    “…Mobile phone technology is increasingly used to overcome traditional barriers limiting access to care. …”
    Get full text
    Article
  18. 38

    Cellular phones as an m-commerce application in the emerging youth market in South Africa by Clarissa Muir, Andrea Crystal

    Published 2022-10-01
    “…The most pertinent finding of the research is that the role of cellular phones as an m-commerce application in the emerging youth market is one of connectivity, lifestyle and usage convention. …”
    Get full text
    Article
  19. 39

    Evaluation method for information security capability of mobile phone user based on behavior ontology under unconscious condition by Cheng-cheng MAI, Bo CHEN, Jia-kun ZHOU, Ling YU

    Published 2016-10-01
    “…A security capacity assessment method based on security behavior ontology,was proposed to collect users' be-havior data from their smartphones under unconscious condition to solve the problem of detecting mobile phone users' real existing insecure behaviors.A security behavior ontology was set up for formalizing the phone,message,network and App behavior data of mobile phone users and relevant rules were also set down for determining and associating inse-cure actions.Referring to the notion of attack graph,an insecure behavior detection algorithm was proposed based on behavior association graph for analyzing the paths of insecure behaviors dynamically.Furthermore,a competency model of information security capability assessment was presented for realizing the quantitative evaluation of information secu-rity capability of users.The experiment results prove the effectiveness of present competency model for insecure behavior path detection and security ability assessment.…”
    Get full text
    Article
  20. 40