Showing 41 - 60 results of 115 for search 'Mobile computing Security features.', query time: 0.12s Refine Results
  1. 41
  2. 42
  3. 43
  4. 44
  5. 45

    Key Technology of Communication Equipment Fingerprint Recognition Based on Intelligent Feature Extraction Algorithm by Meizhen Gao, Yunquan Li, Yetong Gao

    Published 2022-01-01
    “…The autoencoder feature and four kinds of integral bispectrum feature are analyzed and visualized. …”
    Get full text
    Article
  6. 46

    A Hybrid Deep Learning Framework for Deepfake Detection Using Temporal and Spatial Features by Fazeel Zafar, Talha Ahmed Khan, Salas Akbar, Muhammad Talha Ubaid, Sameena Javaid, Kushsairy Abdul Kadir

    Published 2025-01-01
    “…The backbone of EfficientNet B0 utilizes Mobile Inverted Bottleneck Convolutions (MBConv) and Squeeze and Excitation (SE) blocks to enhance feature extraction by adjusting channels to highlight details effectively. …”
    Get full text
    Article
  7. 47

    Dual-Attention-Enhanced MobileViT Network: A Lightweight Model for Rice Disease Identification in Field-Captured Images by Meng Zhang, Zichao Lin, Shuqi Tang, Chenjie Lin, Liping Zhang, Wei Dong, Nan Zhong

    Published 2025-03-01
    “…Compared to traditional lightweight models, MobileViT-DAP showed significant improvements in model complexity, computational efficiency, and classification performance, effectively balancing lightweight design with high accuracy. …”
    Get full text
    Article
  8. 48
  9. 49

    Empowering Patients and Caregivers to Use Artificial Intelligence and Computer Vision for Wound Monitoring: Nonrandomized, Single-Arm Feasibility Study by Rose Raizman, José Luis Ramírez-GarciaLuna, Tanmoy Newaz, Sheila C Wang, Gregory K Berry, Ling Yuan Kong, Heba Tallah Mohammed, Robert D J Fraser

    Published 2025-06-01
    “…Feedback from patients and clinicians highlighted during the feasibility testing support insight into the app’s usability, data security features, and ability to enhance remote monitoring that need to be explored in further qualitative research. …”
    Get full text
    Article
  10. 50

    BAHGRF3: Human gait recognition in the indoor environment using deep learning features fusion assisted framework and posterior probability moth flame optimisation by Muhammad Abrar Ahmad Khan, Muhammad Attique Khan, Ateeq Ur Rehman, Ahmed Ibrahim Alzahrani, Nasser Alalwan, Deepak Gupta, Saima Ahmed Rahin, Yudong Zhang

    Published 2025-04-01
    “…Abstract Biometric characteristics are playing a vital role in security for the last few years. Human gait classification in video sequences is an important biometrics attribute and is used for security purposes. …”
    Get full text
    Article
  11. 51
  12. 52
  13. 53

    LiSA-MobileNetV2: an extremely lightweight deep learning model with Swish activation and attention mechanism for accurate rice disease classification by Yongqi Xu, Dongcheng Li, Changcheng Li, Zheming Yuan, Zhijun Dai

    Published 2025-08-01
    “…In the context of intelligent agriculture in China, rapid and accurate identification of crop diseases is essential for ensuring food security and improving crop yield. Although lightweight convolutional neural networks (CNNs) are widely adopted for plant disease recognition due to their computational efficiency, they often suffer from limited feature representation and classification accuracy. …”
    Get full text
    Article
  14. 54

    A compact deep learning approach integrating depthwise convolutions and spatial attention for plant disease classification by Amreen Batool, Jisoo Kim, Yung-Cheol Byun

    Published 2025-04-01
    “…We propose a novel Lightweight Deep Learning model, Depthwise Separable Convolution with Spatial Attention (LWDSC-SA), designed to address limitations and enhance feature extraction while maintaining computational efficiency. …”
    Get full text
    Article
  15. 55

    An efficient privacy-preserving multilevel fusion-based feature engineering framework for UAV-enabled land cover classification using remote sensing images by S. Nagadevi, G. Abirami, R. Brindha, T. Prabhakara Rao, Gyanendra Prasad Joshi, Woong Cho

    Published 2025-07-01
    “…Initially, the image pre-processing stage applies a joint bilateral filter (JBF) model to enhance image quality by removing noise. Furthermore, the feature extraction process uses the fusion models comprising NASNetMobile, ResNet50, and VGG19. …”
    Get full text
    Article
  16. 56
  17. 57

    THE IMPACT OF ECONOMIC COMPANY DATA THEFT by Ramona MARGE, Ştefan IOVAN

    Published 2018-05-01
    “…In terms of preventing internal threats, solutions have powerful encryption algorithms that protect important business information, application control tools, device control, web control and mobile device management features to implement IT security policies. …”
    Get full text
    Article
  18. 58

    Vyoma commerce: a blockchain-based decentralized architecture to combat fraud and enhance security and trust in Bangladesh’s e-commerce ecosystem leveraging smart contracts, supply... by Avijit Chowdhury

    Published 2025-08-01
    “…The existing Web 2.0 framework, which employs inadequate security measures, exhibits vulnerabilities when compared to the robust security features of blockchain technology. …”
    Get full text
    Article
  19. 59
  20. 60