Showing 61 - 80 results of 115 for search 'Mobile computing Security features.', query time: 0.06s Refine Results
  1. 61

    Edge-optimized multimodal cross-fusion architecture for efficient crop disease detection by Thomas Kinyanjui Njoroge, Kelvin Mugoye Shindu, Rachael Kibuku

    Published 2025-06-01
    “…Deployment on low-end mobile devices posed challenges such as computational constraints and offline usability. …”
    Get full text
    Article
  2. 62

    CNN-Based Object Recognition and Tracking System to Assist Visually Impaired People by Fahad Ashiq, Muhammad Asif, Maaz Bin Ahmad, Sadia Zafar, Khalid Masood, Toqeer Mahmood, Muhammad Tariq Mahmood, Ik Hyun Lee

    Published 2022-01-01
    “…The application uses MobileNet architecture due to its low computational complexity to run on low-power end devices. …”
    Get full text
    Article
  3. 63

    An intelligent optimized object detection system for disabled people using advanced deep learning models with optimization algorithm by Marwa Obayya, Fahd N. Al-Wesabi, Menwa Alshammeri, Huda G. Iskandar

    Published 2025-05-01
    “…In addition, the YOLOv7 method is used for the process of OD to identify, locate, and classify objects within an image. Furthermore, the MobileNetV3 model is utilized for the feature extraction process. …”
    Get full text
    Article
  4. 64

    LGR-Net: A Lightweight Defect Detection Network Aimed at Elevator Guide Rail Pressure Plates by Ruizhen Gao, Meng Chen, Yue Pan, Jiaxin Zhang, Haipeng Zhang, Ziyue Zhao

    Published 2025-03-01
    “…In elevator systems, pressure plates secure guide rails and limit displacement, but defects compromise their performance under stress. …”
    Get full text
    Article
  5. 65
  6. 66

    AnomLite: Efficient binary and multiclass video anomaly detection by Anna K. Zvereva, Mariam Kaprielova, Andrey Grabovoy

    Published 2025-03-01
    “…The initial layers of MobileNetV2 are employed for efficient spatial feature extraction, capturing low-to-mid-level features such as edges and textures, while the last hidden state of an LSTM processes temporal dependencies to identify patterns indicative of anomalies. …”
    Get full text
    Article
  7. 67
  8. 68

    From detection to intervention: An end-to-end system for recognizing the “signal for help” gesture in real-time by Federico Buccellato, Eleonora Vacca, Sarah Azimi, Corrado De Sio, Luca Sterpone

    Published 2025-06-01
    “…Despite its potential, its effectiveness has been impeded by limited public awareness, the risk of misinterpretation, and the lack of reliable automated detection systems.To address these challenges, this paper introduces a framework consisting of two interconnected components: a real-time detection system of the “Signal for Help” gesture using a machine learning-based recognition system and a custom mobile application that receives notifications from the detection system and alerts security personnel in real-time.During the development process, we faced several challenges, including detecting the gesture in crowded environments and keeping the computational load low to ensure the system could run efficiently on edge devices.We overcame these challenges by designing a system that combines hand tracking and feature extraction, using tools such as MediaPipe and DeepSORT, followed by a final classification step. …”
    Get full text
    Article
  9. 69

    Social Work in Cybersecurity by Samah Monammed Albargi

    Published 2024-12-01
    “…Collaborations between social work and information/computing sciences based on these foundations/fields of social work represent an important pathway toward more productive, sustainable, impactful, and socially just cyber-security programs in the modern society.…”
    Get full text
    Article
  10. 70
  11. 71
  12. 72
  13. 73
  14. 74
  15. 75
  16. 76
  17. 77
  18. 78
  19. 79

    Discovering Accessible Financial Systems Resources for Emergent Users by Luciano Arruda Teran, Caio Pinheiro de Carvalho, Juliana Álvares Caruso, Marcelle Pereira Mota

    Published 2025-01-01
    “…This study examined the accessibility and communicability barriers this population faces in mobile banking applications, especially in instant payment features. …”
    Get full text
    Article
  20. 80