Academic literature on the topic 'Appr. automatico'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Appr. automatico.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Appr. automatico"

1

Ayyal Awwad, Aiman M., and Wolfgang Slany. "Automated Bidirectional Languages Localization Testing for Android Apps with Rich GUI." Mobile Information Systems 2016 (2016): 1–13. http://dx.doi.org/10.1155/2016/2872067.

Full text
Abstract:
Mobile apps are everywhere. The release of apps on a worldwide scale requires them to be made available in many languages, including bidirectional languages. Developers and translators are usually different persons. While automatic testing by itself is important in general in order to be able to develop high quality software, such automatic tests become absolutely essential when developers that do not possess enough knowledge about right-to-left languages need to maintain code that is written for bidirectional languages. A few bidirectional localization tests of mobile applications exist. However, their functionality is limited since they only cover translations and adoption of locales. In this paper we present our approach for automating the bidirectional localization testing for Android applications with a complete consideration for BiDi-languages issues. The objective is to check for any localization defects in the product. The proposed methods are used to test issues of bidirectional apps in general and specifically for the Arabic language. The results show that the methods are able to effectively reveal deficiencies in the app’s design, ensure that the localized app matches all expectations of local users, and guarantee that the product is culturally congruent to local conventions.
APA, Harvard, Vancouver, ISO, and other styles
2

Liao, Hsiu-Li, Chen-Huei Chou, and Wan-Chun Chao. "Functional Validation and Test Automation for Android Apps." International Journal of Machine Learning and Computing 4, no. 6 (2014): 553–58. http://dx.doi.org/10.7763/ijmlc.2014.v6.472.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mao, Jian, Hanjun Ma, Yue Chen, Yaoqi Jia, and Zhenkai Liang. "Automatic permission inference for hybrid mobile apps." Journal of High Speed Networks 22, no. 1 (February 10, 2016): 55–64. http://dx.doi.org/10.3233/jhs-160538.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Adams, Bruce W. "Automation and apps for clinical dental biomechanics." CRANIO® 34, no. 5 (April 7, 2016): 343–47. http://dx.doi.org/10.1080/08869634.2015.1113689.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Luo, Qian, Jiajia Liu, Jiadai Wang, Yawen Tan, Yurui Cao, and Nei Kato. "Automatic Content Inspection and Forensics for Children Android Apps." IEEE Internet of Things Journal 7, no. 8 (August 2020): 7123–34. http://dx.doi.org/10.1109/jiot.2020.2982248.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jordan, T. R., T. Welle, and M. D. Byrne. "Comparison of Manual versus Automated Data Collection Method for an Evidence-Based Nursing Practice Study." Applied Clinical Informatics 04, no. 01 (2013): 61–74. http://dx.doi.org/10.4338/aci-2012-09-ra-0037.

Full text
Abstract:
SummaryObjective: The objective of this study was to investigate and improve the use of automated data collection procedures for nursing research and quality assurance.Methods: A descriptive, correlational study analyzed 44 orthopedic surgical patients who were part of an evidence-based practice (EBP) project examining post-operative oxygen therapy at a Midwestern hospital. The automation work attempted to replicate a manually-collected data set from the EBP project.Results: Automation was successful in replicating data collection for study data elements that were available in the clinical data repository. The automation procedures identified 32 “false negative” patients who met the inclusion criteria described in the EBP project but were not selected during the manual data collection. Automating data collection for certain data elements, such as oxygen saturation, proved challenging because of workflow and practice variations and the reliance on disparate sources for data abstraction. Automation also revealed instances of human error including computational and transcription errors as well as incomplete selection of eligible patients.Conclusion: Automated data collection for analysis of nursing-specific phenomenon is potentially superior to manual data collection methods. Creation of automated reports and analysis may require initial up-front investment with collaboration between clinicians, researchers and information technology specialists who can manage the ambiguities and challenges of research and quality assurance work in healthcare.Citation: Byrne MD, Jordan TR, Welle T. Comparison of Manual versus Automated Data Collection Method for an Evidence-Based Nursing Practice Study. Appl Clin Inf 2013; 4: 61–74http://dx.doi.org/10.4338/ACI-2012-09-RA-0037
APA, Harvard, Vancouver, ISO, and other styles
7

Aakre, Christopher, Mikhail Dziadzko, Mark Keegan, and Vitaly Herasevich. "Automating Clinical Score Calculation within the Electronic Health Record." Applied Clinical Informatics 08, no. 02 (April 2017): 369–80. http://dx.doi.org/10.4338/aci-2016-09-ra-0149.

Full text
Abstract:
Summary Objectives: Evidence-based clinical scores are used frequently in clinical practice, but data collection and data entry can be time consuming and hinder their use. We investigated the programmability of 168 common clinical calculators for automation within electronic health records. Methods: We manually reviewed and categorized variables from 168 clinical calculators as being extractable from structured data, unstructured data, or both. Advanced data retrieval methods from unstructured data sources were tabulated for diagnoses, non-laboratory test results, clinical history, and examination findings. Results: We identified 534 unique variables, of which 203/534 (37.8%) were extractable from structured data and 269/534 (50.4.7%) were potentially extractable using advanced techniques. Nearly half (265/534, 49.6%) of all variables were not retrievable. Only 26/168 (15.5%) of scores were completely programmable using only structured data and 43/168 (25.6%) could potentially be programmable using widely available advanced information retrieval techniques. Scores relying on clinical examination findings or clinical judgments were most often not completely programmable. Conclusion: Complete automation is not possible for most clinical scores because of the high prevalence of clinical examination findings or clinical judgments – partial automation is the most that can be achieved. The effect of fully or partially automated score calculation on clinical efficiency and clinical guideline adherence requires further study. Citation: Aakre C, Dziadzko M, Keegan MT, Herasevich V. Automating clinical score calculation within the electronic health record: A feasibility assessment. Appl Clin Inform 2017; 8: 369–380 https://doi.org/10.4338/ACI-2016-09-RA-0149
APA, Harvard, Vancouver, ISO, and other styles
8

Altomare, Angela, Rocco Caliandro, Mercedes Camalli, Corrado Cuocci, Carmelo Giacovazzo, Anna Grazia Giuseppina Moliterni, and Rosanna Rizzi. "Automatic structure determination from powder data withEXPO2004." Journal of Applied Crystallography 37, no. 6 (November 11, 2004): 1025–28. http://dx.doi.org/10.1107/s0021889804021417.

Full text
Abstract:
EXPO2004is the updated version of theEXPOprogram [Altomareet al.(1999).J. Appl. Cryst.32, 339–340]. The traditional steps of theab initiopowder solution process are performed automatically: indexing, space-group determination, decomposition of the pattern for extracting the observed structure-factor moduli, structure solution by direct methods, model refinement by Rietveld technique. Special strategies may be applied to improve both the estimates of the extracted structure-factor moduli and the quality of the structure model. In addition, the use of special procedures exploiting available supplementary information on molecular geometry can be successfully adopted. The graphical interface has also been improved.
APA, Harvard, Vancouver, ISO, and other styles
9

Rauch, Edgar F., and Laurent Dupuy. "Comments on`On the reliability of fully automatic indexing of electron diffraction patterns obtained in a transmission electron microscope'by Morawiec & Bouzy (2006)." Journal of Applied Crystallography 39, no. 1 (January 12, 2006): 104–5. http://dx.doi.org/10.1107/s0021889805033157.

Full text
Abstract:
The limitation of automatic indexing of electron diffraction patterns raised by Morawiec & Bouzy [(2006).J. Appl. Cryst.39, 101–103] is discussed. The theoretical problem related to the famous 180° ambiguity may be surmounted by adequate technical improvements. Three solutions to avoid misindexing are briefly described.
APA, Harvard, Vancouver, ISO, and other styles
10

Chen, Junhan. "MiniWarner: An Novel and Automatic Malicious Phishing Mini-apps Detection Approach." Computer and Information Science 15, no. 1 (January 21, 2022): 57. http://dx.doi.org/10.5539/cis.v15n1p57.

Full text
Abstract:
WeChat mini-apps are “sub-applications” built within the WeChat platform. Unlike full-function native applications, they are streamlined, “light” versions of the apps, and enable users to open and use them inside WeChat without downloading and installation. Since being introduced by WeChat in 2017, 4.3 million WeChat mini-programs have been developed, and they attract around 410 million daily active users Up to 2021. However, motivated by financial gains, many malicious mini-app developers use some intended description and icon to mislead users to click and open their mini-apps. These mini-apps are full of annoying advertisements and collect users’ privacy information stealthily, which can expose users to privacy risks and financial losses. Although security personnel of WeChat has enforced various countermeasures to prevent malicious phishing mini-apps sneaking into WeChat, rampant malicious leading mini-apps still have been observed recently. In this paper, we present MiniWarner, a novel approach that leverages Natural Language Processing and a number of reverse engineering techniques to detect whether a mini-app is malicious and phishing when users open it. MiniWarner will only ask users whether to continue to open the malicious phishing mini-app, thus it can protect users against the intended misleading by attackers, and still preserve the original user experience. Besides, this approach is implemented as an Xposed module, making it practical to be quickly deployed on a large number of user devices. Our paper will introduce how we developed MiniWarner and the measurement results of MiniWarner in detail.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Appr. automatico"

1

ZINI, SIMONE. "Image Enhancement and Restoration using Machine Learning Techniques." Doctoral thesis, Università degli Studi di Milano-Bicocca, 2022. http://hdl.handle.net/10281/378899.

Full text
Abstract:
Le fotocamere digitali acquisiscono, manipolano e salvano in memoria informazioni elettronicamente tramite un sensore e unitá di calcolo integrate, rendendo la fotografia accessibile agli utenti finali i quali non necessitano di basi di conoscenza di chimica o delle specifiche operazioni meccaniche che erano necessarie per lo sviluppo con la fotografia analogica. Diversi tipi di degradazioni e artefatti possono affliggere le immagini acquisite tramite camere digitali, riducendo la fedeltà percepita delle immagini e rendendo piú difficili operazioni di visione artificiale che possono essere operate sulle immagini acquisite. Tre elementi possono essere identificati come possibili sorgenti di artefatti in un'immagine: il contenuto della scena, le limitazioni hardware della camera e la pipeline di elaborazione dell’immagine, dall’acquisizione al salvataggio in memoria. Alcuni artefatti non sono direttamente trattati all’interno della tipica pipeline di camera, come ad esempio la presenza di nebbia o pioggia che possono ridurre la visibilitá della scena acquisita. Questi artefatti , per essere trattati, necessitano di metodologie ad hoc che sono generalmente applicate come operazioni post-processing. Altri tipi di artefatti sono legati ai processi di elaborazione dell’immagine e all'intera pipeline di camera integrata nelle camere. Questi artefatti includono il rumore proveniente dal sensore, dominanti cromatiche indesiderate, basso contrasto e artefatti di compressione. L’obiettivo di questa tesi è l'identificazione e la progettazione di nuovi e piú robusti moduli di elaborazione e restauro dell’immagine capaci di migliorare la qualitá delle immagini acquisite dalle camere digitali, in particolare in scenari critici quali condizioni climatiche avverse, condizione di bassa illuminazione etc… Gli artefatti identificati sono divisi in due macro gruppi: “artefatti in-camera” e “artefatti esterni” Nel primo gruppo sono stati identificati e trattati quattro argomenti: la rimozione del rumore proveniente dal sensore della camera, il processo di bilanciamento automatico del bianco, il miglioramento automatico del contrasto e la rimozione di artefatti di compressione JPEG. Il processo di progettazione di questi moduli ha tenuto conto di aspetti di efficienza, in termini di calcolo e memoria occupata, in relazione alla possibilità di integrare tali moduli in future configurazioni di pipeline di camera. Il secondo gruppo di artefatti è legato alla presenza di elementi nella scena che possono causare una degradazione in termini di fedeltà dell’immagine e/o usabilità. In particolare il lavoro presentato nella tesi è focalizzato su artefatti provenienti dalla presenza di pioggia nella scena scattata. La tesi, dopo una descrizione della tipica pipeline di elaborazione delle camere digitali, analizza i diversi tipi di artefatti che possono affliggere la qualità di una immagine, e descrive la progettazione delle soluzioni proposte. Tutti gli approcci proposti sono basati su tecniche di apprendimento automatico, come ad esempio Reti Neurali Convoluzionali o procedure di ottimizzazione Bayesiana, e sono stati validati sperimentalmente su dataset standard. I contributi principali di questa tesi possono essere riassunti in tre punti: integrazione di approcci classici di imaging con tecniche di ottimizzazione basate su machine learning, progettazione e sviluppo di nuovi approcci e architetture di deep learning per il restauro e l'elaborazione di immagini e analisi di metodi di image processing basati su deep learning in task di computer vision.
Digital cameras record, manipulate, and store information electronically through sensors and built-in computers, which makes photography more available to final users which do not anymore need to rely on the use of chemicals and knowledge of mechanical procedures to develop their pictures. Different types of degradation and artifacts can affect images acquired using digital cameras, decreasing the perceptual fidelity of images and making harder many image processing and analysis tasks that can be performed on the collected images. Three elements can be identified as possible sources of artifacts in an image: the scene content, the hardware limitations and flaws, and finally the operations performed by the digital camera processing pipeline itself, from acquisition to compression and storing. Some artifacts are not directly treated in the typical camera processing pipeline, such as the presence of haze or rain that can reduce visibility of the scene in the depicted images. These artifacts require the design of ad hoc methods that are usually applied as post-processing on the acquired images. Other types of artifacts are related to the imaging process and to the image processing pipeline implemented on board of digital cameras. These include sensor noise, undesirable color cast, poor contrast and compression artifacts. The objective of this thesis is the identification and design of new and more robust modules for image processing and restoration that can improve the quality of the acquired images, in particular in critical scenarios such as adverse weather conditions, poor light in the scene etc… . The artifacts identified are divided into two main groups: “in camera-generated artifacts" and “external artifacts and problems". In the first group it has been identified and addressed four main issues: sensor camera noise removal, automatic white balancing, automatic contrast enhancement and compression artifacts removal. The design process of the proposed solutions has considered efficiency aspects, due to the possibility of directly integrating them in future camera pipelines. The second group of artifacts are related to the presence of elements in the scene which may cause a degradation in terms of visual fidelity and/or usability of the images. In particular the focus is on artifacts induced by the presence of rain in the scene. The thesis, after a brief review of the digital camera processing pipeline, analyzes the different types of artifacts that can affect image quality, and describes the design of the proposed solutions. All the proposed approaches are based on machine learning techniques, such as Convolutional Neural Networks and Bayesian optimization procedure, and are experimentally validated on standard images datasets. The overall contributions of this thesis can be summarized in three points: integration of classical imaging approaches with machine learning optimization techniques, design of novel deep learning architectures and approaches and analysis and application of deep learning image processing algorithms in other computer vision tasks.
APA, Harvard, Vancouver, ISO, and other styles
2

Kerov, Ghiglianovich Claudio. "Rilevazione automatica di attacchi in architetture antifragili." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2017.

Find full text
Abstract:
La tesi tratta l'utilizzo del machine learning per la classificazione e la predizione di attacchi ad un software. In particolare sono stati sviluppati: l'applicazione presa di mira, ovvero un sito di cloud storage; un programma Python per rilevare gli attacchi e uno per automatizzarli; uno script per il training e l'utilizzo di un classificatore SVC.
APA, Harvard, Vancouver, ISO, and other styles
3

Glanz, Leonid Verfasser], Mira [Akademischer Betreuer] [Mezini, and Awais [Akademischer Betreuer] Rashid. "Automatic Identification and Recovery of Obfuscated Android Apps / Leonid Glanz ; Mira Mezini, Awais Rashid." Darmstadt : Universitäts- und Landesbibliothek, 2020. http://d-nb.info/1224048601/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Glanz, Leonid [Verfasser], Mira [Akademischer Betreuer] Mezini, and Awais [Akademischer Betreuer] Rashid. "Automatic Identification and Recovery of Obfuscated Android Apps / Leonid Glanz ; Mira Mezini, Awais Rashid." Darmstadt : Universitäts- und Landesbibliothek, 2020. http://d-nb.info/1224048601/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Becaccia, Morris. "Machine Learning per il riconoscimento automatico delle attività umane da smartphone: una valutazione sperimentale." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amslaurea.unibo.it/19576/.

Full text
Abstract:
La tesi si occupa di creare un modello di classificazione analizzando dataset riguardanti le Human Activity Recognition. Il lavoro di tesi è stato diviso in due parti. La prima parte tratta lo stato dell'arte, in cui sono stati analizzati e approfonditi i temi di Machine Learning e sistemi HAR. Nella seconda parte è stato descritto il progetto. Il progetto si basa sul processo di Data Mining. Durante tutto il processo di Data Mining sono state fatte valutazioni e sperimentazioni sia durante la fase di pulizia dei dati e di preprocessing, sia durante la fase di classificazione valutando vari algoritmi. Alla fine del processo di Data Mining è stato ottenuto un modello di classificazione soddisfacente. Infine, è stata sviluppata un' applicazione moblie in Android, che accedendo ai valori di due sensori (accelerometro e giroscopio) e servendosi del modello di classificazione già creato, è in grado di riconoscere l'attività svolta dall'utente.
APA, Harvard, Vancouver, ISO, and other styles
6

Bhatt, Mrunal Dipakkumar Bhatt. "INTELLIGENT VOICE ACTIVATED HOME AUTOMATION (IVA)." Cleveland State University / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=csu1463517275.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mácha, Tomáš. "Využití nástroje MATLAB Coder pro automatické generování C kódu pro mikrokontroléry dsPIC." Master's thesis, Vysoké učení technické v Brně. Fakulta strojního inženýrství, 2019. http://www.nusl.cz/ntk/nusl-402535.

Full text
Abstract:
Generating C code from MATLAB can be a powerful tool for a wide range of engineering problems. Especially in cases where MATLAB excels, including matrix operations and some of the built-in functions, code conversion may represent a significant assistance in their development. The aim of this master's thesis is to explore the possibilities of generating C code using MATLAB Coder App. As the documentation for MATLAB Coder was not found sufficient a theoretical basis for the use of this tool was introduced along with simple examples of possible applications. Next, code generation for controlling a laboratory DC motor using a microcontroller dsPIC was made automatic and controlled directly from a single MATLAB script. Individual steps were described to supplement existing documentation and to allow for an easy use. Finally, selected functions were tested for code generation. As a result, certain limitations can be outlined, as well as suitability of both the created tool and the MATLAB Coder App.
APA, Harvard, Vancouver, ISO, and other styles
8

Asher, Natali. "A Warmer Welcome : Application of a Chatbot as a Facilitator for New Hires Onboarding." Thesis, Linnéuniversitetet, Institutionen för medieteknik (ME), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-65887.

Full text
Abstract:
Despite being explored and constantly improved through the years, onboarding of new hires in corporate organizations has remained a challenge. Many of the issues can be linked to a lack of communication between the organization and the new employee, as well as the common nature of these environments where information is spread across job titles and sources. This thesis discusses the feasibility of implementing a basic chatbot that will allow new hires to ask questions and request varied information at all times, using an interface such as a messaging app. This research explores the way chatbots should be designed in order to be effective, reliable and enjoyable from a user experience perspective. The chatbot was developed using the Chatfuel platform and tested by new employees at a corporate environment. The users were requested to explore the chatbot freely and then asked to answer a survey. The interactions were also recorded and analyzed from in both qualitative and quantitative ways (chat logs and analytics). The study proves that an onboarding chatbot is a useful tool for new hires and can be used as a communication facilitator between the organization and the new hires during the first weeks of employment, and also after that, serving as an information source and a broadcasting method. The chatbot gives the new hires an accessible source of information that helps on the process of getting to speed, and enables a positive experience that increases familiarity in the new workplace.
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, You-Syuan, and 陳佑宣. "Automatic Testing of Android Apps Using JUnit Framework." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/77277880696331330896.

Full text
Abstract:
碩士
開南大學
資訊管理學系
103
App development for smart phones and tablets is one of the hottest technologies in recent years. As the app can be downloaded and updated via the Internet, the revision of the software is much faster than the traditional PC software. How to use tools to improve development efficiency and program quality becomes more and more important. Testing is a necessary phase in software development. This paper discusses how to use JUnit Framework to test Android apps automatically, including the creation of testing classes and test cases. We use three different types of Apps in our experiments. One is the Contact App that uses the SQLite database access functions to save the profile data; the second is a Service, whichcan execute in the background; the third app is a Content Provider app. We implemented automatic test classes and test cases for them, and compared the efficiency of automatic testing and human testing. Experimental results show that automatic testing can significantly reduce the time spent on testing and reduce the physical and mental burden of testers. Besides, automatic testing can also avoid erroneous operations. The test cases can also be used in the future when the program is modified, and they can be used as auxiliary program documentation. Our study shows that the automatic testing technology can effectively improve the development efficiency and the app quality.
APA, Harvard, Vancouver, ISO, and other styles
10

Glanz, Leonid. "Automatic Identification and Recovery of Obfuscated Android Apps." Phd thesis, 2020. https://tuprints.ulb.tu-darmstadt.de/14647/7/Thesis_Leonid_Glanz.pdf.

Full text
Abstract:
Every day, developers add new applications (apps) to the Google Play Store, which ease users' lives and entertain them. The rapid development of these apps is only possible through the provision of software libraries whose functionality can be directly integrated into an app without creating it from scratch. For instance, some libraries provide extended possibilities for displaying content or additional support for specific networking capabilities. All these libraries are bundled with the main application code into one binary to avoid delays due to the loading of external functionality. The wide distribution of Android apps and the high turnover in this market attracts criminal actors (attackers). These attackers decompile the apps, integrate additional ad libraries or malware, and republish them. Through this approach, they use the apps’ popularity to trick users into downloading their repackaged apps. To prevent such malicious practices, developers and producers of libraries have begun to obfuscate their apps to make the decompilation process more challenging. However, the obfuscation of apps is not only done by developers but also by attackers to make the detection of copyright infringement harder or hide their malicious intent. While analysts try to protect the developers’ copyright and the privacy and security of app users, code obfuscation hinders them from identifying libraries and repackaged apps, detecting obfuscated names and strings, and recovering them. The obfuscated code might contain not only malware but also vulnerabilities or unauthorized access to private data. This dissertation introduces different approaches that support the analyses mentioned above using static analysis, dynamic analysis, and machine learning. Since the obfuscation of repackaged apps makes it difficult to distinguish between library and app code, we present approaches for library detection, separation of app code, and mapping of library code. We evaluated the effectiveness of these approaches under the influence of different obfuscation techniques. Furthermore, we present our approach for identifying repackaged apps that uses our library identification to measure the similarity between repackaged and original apps without the influence of library code, which would distort the measurement. Further contributions support the recovery of names from obfuscated entities in library code. Finally, we presented an approach for identifying and recovering obfuscated strings that supports data-flow analyses. Using our approaches, we outperformed all state-of-the-art competitors. Furthermore, we analyzed in total over 100,000 apps for obfuscated names, obfuscated libraries, obfuscated strings, and repackaged apps.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Appr. automatico"

1

Introduction to Google apps--productivity apps. Boston: Pearson, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Institute, Pennsylvania Bar. Smartphones and mobile apps for lawyers. Mechanicsburg, Pennsylvania: Pennsylvania Bar Institute, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Association, American Bar, ed. Ipad apps in one hour for lawyers. Chicago, Ill: American Bar Association, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Legal practice in the digital age: The quest for the killer legal app. London: Bowerdean Pub. Co. Ltd., 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

service), SpringerLink (Online, ed. Auditing and GRC Automation in SAP. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Nitin, Indurkhya, and Zhang Tong 1971-, eds. Fundamentals of predictive text mining. London: Springer-Verlag, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Mařík, Vladimír. Holonic and multi-agent systems for manufacturing: Proceedings. Berlin: Springer, 2003.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Test IOS Apps with UI Automation. The Pragmatic Programmers, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Introducing Microsoft Flow: Automating Workflows Between Apps and Services. Apress, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Clark, Mike. Pragmatic Project Automation: How to Build, Deploy, and Monitor Java Apps. The Pragmatic Programmers, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Appr. automatico"

1

Lopatin, Ben. "Automating." In Django Standalone Apps, 145–50. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5632-9_21.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Garg, Shankar. "Automating Different Apps." In Appium Recipes, 49–76. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2418-2_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Relan, Kunal. "Automating App Testing." In iOS Penetration Testing, 97–118. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-2355-0_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gupta, Rakesh. "Automating Business Processes." In Salesforce Platform App Builder Certification, 145–88. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5479-0_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chandrasekara, Chaminda, and Pushpa Herath. "Functional Testing for Windows Apps." In Hands-On Functional Test Automation, 119–54. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4411-1_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Maskrey, Molly K. "Home Automation Project." In App Development Recipes for iOS and watchOS, 461–504. Berkeley, CA: Apress, 2016. http://dx.doi.org/10.1007/978-1-4842-1820-4_16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rosenthal, Hanaan. "Scripting Apple Apps." In AppleScript: A Comprehensive Guide to Scripting and Automation on Mac OS X, 697–714. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-5352-5_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Stefanovic, Vladimir, and Milos Katinski. "App Service and Containers in Azure Compute." In Pro Azure Administration and Automation, 97–125. Berkeley, CA: Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-7325-8_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Zhang, Mu, and Heng Yin. "Automatic Generation of Security-Centric Descriptions for Android Apps." In SpringerBriefs in Computer Science, 77–98. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47812-8_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kapoor, Sheetika, Kalpna Sagar, and B. V. R. Reddy. "Speedroid: A Novel Automation Testing Tool for Mobile Apps." In International Conference on Innovative Computing and Communications, 271–85. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2354-6_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Appr. automatico"

1

Zhou, Chenyu, Xian Zhan, Linlin Li, and Yepang Liu. "Automatic Maturity Rating for Android Apps." In Internetware 2022: 13th Asia-Pacific Symposium on Internetware. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3545258.3545282.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dai, Shuaifu, Alok Tongaonkar, Xiaoyin Wang, Antonio Nucci, and Dawn Song. "NetworkProfiler: Towards automatic fingerprinting of Android apps." In IEEE INFOCOM 2013 - IEEE Conference on Computer Communications. IEEE, 2013. http://dx.doi.org/10.1109/infcom.2013.6566868.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Gao, Cuiyun, Jichuan Zeng, Xin Xia, David Lo, Michael R. Lyu, and Irwin King. "Automating App Review Response Generation." In 2019 34th IEEE/ACM International Conference on Automated Software Engineering (ASE). IEEE, 2019. http://dx.doi.org/10.1109/ase.2019.00025.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Yaqoob, Shamrose, and Salman Ali Khan. "COVID-19 Case Manager App for Oil & Gas Companies." In Abu Dhabi International Petroleum Exhibition & Conference. SPE, 2021. http://dx.doi.org/10.2118/207329-ms.

Full text
Abstract:
Abstract As COVID-19 quickly spread across the globe to reach pandemic levels, companies across every industry had to quickly adapt their business practices to allow employees to connect virtually and work remotely. This addressed new complications in several areas, including contact tracing. This paper reviews an approach that Siemens Energy took to remove the errors and inefficiencies in manually conducting contact tracing by automating the process using an end-to-end case manager app. The app, which provides full transparency, analytics, and support, fully digitizes contact tracing from each employee's mobile device or computer. We discuss the features of the app, how it has been used in the UAE region, and the benefits that the company has realized in automating contact tracing—including faster tracing time, improved accuracy, and greater compliance with UAE COVID requirements. In just a few months’ time, the app went from an idea to a fully-developed and widely used application—which is now approved for use in company facilities and business units around the world.
APA, Harvard, Vancouver, ISO, and other styles
5

Lin, Jun-Wei, Navid Salehnamadi, and Sam Malek. "Test automation in open-source Android apps." In ASE '20: 35th IEEE/ACM International Conference on Automated Software Engineering. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3324884.3416623.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Xiujiang, Yanyan Jiang, Yepang Liu, Chang Xu, Xiaoxing Ma, and Jian Lu. "User Guided Automation for Testing Mobile Apps." In 2014 21st Asia-Pacific Software Engineering Conference (APSEC). IEEE, 2014. http://dx.doi.org/10.1109/apsec.2014.13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Kim, Soohyun, Hyunsu Mun, and Youngseok Lee. "Automatic Mobile App Speed Measurement with Robot." In 2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS). IEEE, 2020. http://dx.doi.org/10.23919/apnoms50412.2020.9236980.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Vargas Orjuela, Mario Andres, Alvaro Uribe-Quevedo, Norman Jaimes, and Byron Perez-Gutierrez. "External automatic defibrillator game-based learning app." In 2015 IEEE Games Entertainment Media Conference (GEM). IEEE, 2015. http://dx.doi.org/10.1109/gem.2015.7377206.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Greenheld, Georgia, Bastin Tony Roy Savarimuthu, and Sherlock A. Licorish. "Automating Developers' Responses to App Reviews." In 2018 25th Australasian Software Engineering Conference (ASWEC). IEEE, 2018. http://dx.doi.org/10.1109/aswec.2018.00017.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fairhurst, Stuart R., Sara R. Koehler-McNicholas, Billie C. S. Slater, Eric A. Nickel, Karl A. Koester, Gregory O. Voss, Andrew H. Hansen, and John E. Ferguson. "Improving Automatic Control of an Ankle-Foot Prosthesis Using Machine Learning Algorithms." In 2017 Design of Medical Devices Conference. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/dmd2017-3464.

Full text
Abstract:
Most commercially available lower-limb prostheses are designed for walking, not for standing. The Minneapolis VA Health Care System has developed a bimodal prosthetic ankle-foot system with distinct modes for walking and standing [1]. With this device, a prosthesis user can select standing or walking mode in order to maximize standing stability or walking functionality, depending on the activity and context. Additionally, the prosthesis was designed to allow for an “automatic mode” to switch between standing and walking modes based on readings from an onboard Inertial Measurement Unit (IMU) without requiring user interaction to manually switch modes. A smartphone app was also developed to facilitate changing between walking, standing and automatic modes. The prosthesis described in [1] was used in a pilot study with 18 Veterans with lower-limb amputations to test static, dynamic, and functional postural stability. As part of the study, 17 Veterans were asked for qualitative feedback on the bimodal ankle-foot system (Table 1). The majority of participants (82%) expressed an interest in having an automatic mode. The participants also indicated that the automatic mode would need to reach walking mode on their first step and to lock the ankle quickly once the standing position was achieved. When asked about how they wanted to control the modes of the prosthesis, 82% wanted to use a physical switch and only 12% wanted to use a smartphone app. The results indicated that the following major design changes would be needed: 1) A fast and accurate automatic mode 2) A physical switch for mode changes This paper describes the use of machine learning algorithms to create an improved automatic mode and the use of stakeholder feedback to design a physical switch for the bimodal ankle-foot system.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Appr. automatico"

1

Boruchowicz, Cynthia, Florencia López Bóo, Benjamin Roseth, and Luis Tejerina. Default Options: A Powerful Behavioral Tool to Increase COVID-19 Contact Tracing App Acceptance in Latin America? Inter-American Development Bank, December 2020. http://dx.doi.org/10.18235/0002983.

Full text
Abstract:
Being able to follow the chain of contagion of COVID-19 is important to help save lives and control the epidemic without sustained costly lockdowns. This is especially relevant in Latin America, where economic contractions have already been the largest in the regions history. Given the high rates of transmission of COVID-19, relying only in manual contact tracing might be infeasible. Acceptability and uptake of contact tracing apps with exposure notifications is key for the implementation the “test, trace and treat” triad. In the first study of its kind in Latin America, we find that for a nationally representative sample of 10 countries, an opt-out regime with automatic installation significantly increases the probability of acceptance of such apps in almost 22 p.p. compared to an opt-in regime with voluntary installation. This triples the size and is of opposite sign of the effect found in Europe and the United States. We see that an opt-out regime is more effective in increasing acceptability in South America compared to Central America and Mexico; for those who claim not to trust the national government; and for those who do not use their smartphones for financial transactions. The severity of the pandemic at the place of residence does not seem to affect the effectiveness of the opt-out regime versus an opt-in one, but feeling personally at risk does increase the willingness to accept contact tracing apps with exposure notifications in general. These results can shed light on the use of default options in public health in the context of a pandemic in Latin America.
APA, Harvard, Vancouver, ISO, and other styles
2

Leitfaden für Aussagekräftige Metadaten. WIK Wissenschaftliches Institut für Infrastruktur und Kommunikationsdienste GmbH, 2019. http://dx.doi.org/10.26128/2021.247.

Full text
Abstract:
Open Data bezeichnet den freien Zugang und die entgeltfreie Bereitstellung von maschinenlesbaren Daten. Werden die Daten ausschließlich von der öffentlichen Verwaltung bereitgestellt, spricht man auch von Open Government Data. Auch privatwirtschaftlich agierende Unternehmen stellen Daten offen zur Verfügung und verfolgen damit durchaus auch kommerzielle Interessen. Die Deutsche Bahn bspw. ist sehr aktiv in der Bereitstellung von Open Data. Ihr Ziel liegt dabei in der Suche nach neuen Anwendungsmöglichkeiten der Daten. Sie unterstützt diesen Prozess aktiv mit ihren DB Hackathons. Hierbei entstehen u. a. Anwendungen, von denen sich die Deutsche Bahn eine Verbesserung ihres Service erwartet. Die Bereitstellung von Open Data kann einen hohen gesellschaftlichen Mehrwert erzeugen: Der freie Zugang zu Daten kann Transparenz und Vertrauen in Politik und Verwaltung stärken sowie Innovationen und Wirtschaftswachstum ermöglichen. In Dänemark konnte durch die Veröffentlichung von Geodaten ein volkswirtschaftlicher Mehrwert von geschätzt 470 Mio. € im Jahre 2016 erwirtschaftet werden.1 Studien bemessen das volkswirtschaftliche Potenzial von Open Data für Deutschland mit 12,1 Mrd. € bis 131,1 Mrd. € jährlich. Auf Grundlage von offenen Daten können innovative Anwendungen entwickelt werden, die zunächst einen Mehrwert für die Datenbereitsteller selbst, aber umso mehr auch für Bürgerinnen und Bürger schaffen können. Ein gutes Beispiel ist die App Mein Moers, die frei verfügbare Informationen über die Stadt Moers bündelt und bereitstellt. Neue, prototypische Anwendungen werden regelmäßig auf kommunalen Hackathons, wie bspw. dem Münsterhack, entwickelt. Für Wien wurden auf Basis der von der Stadt zur Verfügung gestellten Datensätze bereits über 240 Apps entwickelt. Das Spektrum reicht hier von Routenplanern für den ÖPNV und Informationen zu öffentlichen Leihrädern über Cityguides und Veranstaltungskalender bis hin zur Visualisierung von Pegelständen und Informationen zur Wasserqualität. Open Data können unterschiedlichen Ursprungs und Natur sein. Sie können bspw. über Sensoren automatisch erhoben und mit geringem Zeitverzug über Open Data Plattformen bereitgestellt werden, denkbar bspw. bei Pegelständen von Gewässern. Oder sie werden manuell erhoben und eher selten aktualisiert. Ein Beispiel hierfür wäre die Liste aller Straßennamen einer Stadt. Damit Open Data tatsächlich gefunden und genutzt werden können, ist eine Beschreibung der Daten mit aussagekräftigen Metadaten notwendig. Mit diesem Leitfaden wollen wir die Bedeutung von Metadaten für die Bereitstellung von Open Data aufzeigen und Tipps geben, diese sinnvoll zu gestalten. Metadaten sind strukturierte Informationen, die Merkmale von Daten beschreiben. Sie erleichtern es, relevante Daten in einer Vielzahl verfügbarer Datensätze in Datenportalen wie der mCLOUD (www.mcloud.de) zu suchen, zu finden und zu selektieren. Das Prinzip der Beschreibung mit Metadaten kennt man allgemein aus der Welt der Bibliotheken, in denen Bücher mit Metadaten beschrieben werden: Titel, Autor, Erscheinungsjahr und Klappentext sind Informationen, ohne die ein Buch in einem Bibliothekskatalog nicht gefunden werden kann. Aussagekräftige Metadaten stellen sicher, dass Datensätze von interessierten Nutzern gefunden werden und so ihr volles Potenzial entfalten können. Struktur und Bedeutung der Metadaten unterschiedlicher Datensätze sollten möglichst einheitlich sein, damit sie auch über einen längeren Zeitraum und von verschiedenen Personen einfach genutzt werden können. Für die Beschreibung von Open Data bietet sich die Verwendung eines Standards wie DCAT-AP.de an, der deutschen Version eines europäischen Standards für Metadaten.3 Für den Anwendungsfall der mCLOUD wurden bestimmte Metadatenfelder ausgewählt, für den dieser Leitfaden im Folgenden Empfehlungen geben will.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography