-
41
-
42
Spatial correlation guided cross scale feature fusion for age and gender estimation
Published 2025-07-01Get full text
Article -
43
-
44
A systematic review of features and content quality of Arabic mental mHealth apps
Published 2024-12-01Get full text
Article -
45
Key Technology of Communication Equipment Fingerprint Recognition Based on Intelligent Feature Extraction Algorithm
Published 2022-01-01“…The autoencoder feature and four kinds of integral bispectrum feature are analyzed and visualized. …”
Get full text
Article -
46
A Hybrid Deep Learning Framework for Deepfake Detection Using Temporal and Spatial Features
Published 2025-01-01“…The backbone of EfficientNet B0 utilizes Mobile Inverted Bottleneck Convolutions (MBConv) and Squeeze and Excitation (SE) blocks to enhance feature extraction by adjusting channels to highlight details effectively. …”
Get full text
Article -
47
Dual-Attention-Enhanced MobileViT Network: A Lightweight Model for Rice Disease Identification in Field-Captured Images
Published 2025-03-01“…Compared to traditional lightweight models, MobileViT-DAP showed significant improvements in model complexity, computational efficiency, and classification performance, effectively balancing lightweight design with high accuracy. …”
Get full text
Article -
48
-
49
Empowering Patients and Caregivers to Use Artificial Intelligence and Computer Vision for Wound Monitoring: Nonrandomized, Single-Arm Feasibility Study
Published 2025-06-01“…Feedback from patients and clinicians highlighted during the feasibility testing support insight into the app’s usability, data security features, and ability to enhance remote monitoring that need to be explored in further qualitative research. …”
Get full text
Article -
50
BAHGRF3: Human gait recognition in the indoor environment using deep learning features fusion assisted framework and posterior probability moth flame optimisation
Published 2025-04-01“…Abstract Biometric characteristics are playing a vital role in security for the last few years. Human gait classification in video sequences is an important biometrics attribute and is used for security purposes. …”
Get full text
Article -
51
-
52
-
53
LiSA-MobileNetV2: an extremely lightweight deep learning model with Swish activation and attention mechanism for accurate rice disease classification
Published 2025-08-01“…In the context of intelligent agriculture in China, rapid and accurate identification of crop diseases is essential for ensuring food security and improving crop yield. Although lightweight convolutional neural networks (CNNs) are widely adopted for plant disease recognition due to their computational efficiency, they often suffer from limited feature representation and classification accuracy. …”
Get full text
Article -
54
A compact deep learning approach integrating depthwise convolutions and spatial attention for plant disease classification
Published 2025-04-01“…We propose a novel Lightweight Deep Learning model, Depthwise Separable Convolution with Spatial Attention (LWDSC-SA), designed to address limitations and enhance feature extraction while maintaining computational efficiency. …”
Get full text
Article -
55
An efficient privacy-preserving multilevel fusion-based feature engineering framework for UAV-enabled land cover classification using remote sensing images
Published 2025-07-01“…Initially, the image pre-processing stage applies a joint bilateral filter (JBF) model to enhance image quality by removing noise. Furthermore, the feature extraction process uses the fusion models comprising NASNetMobile, ResNet50, and VGG19. …”
Get full text
Article -
56
-
57
THE IMPACT OF ECONOMIC COMPANY DATA THEFT
Published 2018-05-01“…In terms of preventing internal threats, solutions have powerful encryption algorithms that protect important business information, application control tools, device control, web control and mobile device management features to implement IT security policies. …”
Get full text
Article -
58
Vyoma commerce: a blockchain-based decentralized architecture to combat fraud and enhance security and trust in Bangladesh’s e-commerce ecosystem leveraging smart contracts, supply...
Published 2025-08-01“…The existing Web 2.0 framework, which employs inadequate security measures, exhibits vulnerabilities when compared to the robust security features of blockchain technology. …”
Get full text
Article -
59
-
60