Results (10)
Search Parameters:
Keyword: Mobile phoneDense Deep Neural Network Architecture for Keystroke Dynamics Authentication in Mobile Phone
The ever-growing technology in mobile smartphones has enabled users to store sensitive and private information; as a result, it required the need for an improved security system. Previous approaches heavily relied on shallow machine learning algorithms that require feature extraction which is time consuming, laborious and can cause, resulting in poor authentication. In this paper,…
Read MoreAcquiring Wi-Fi Energy to Charge a Mobile Phone
As a result, outdoor travelers, tourists and businessman who utilize portable electronic devices often experience battery depletion of their devices without the means of charging their device. The number of Wi- Fi access point continues to increase. There are many occasions where it is desirable to acquire energy from many radio frequency stations, while charging…
Read MoreFlexible Aperture Tuning Solution for Cellular Main Antenna in Metallic Back Cover Mobile Phone
Metal housing has been used extensively on portable communication devices such as on mobile phones and tablets. The choice of metal housing ranges from metallic rim to metallic back cover. This metal housing tends to improve the outlook appearance of the mobile devices, and add mechanical strength towards the mobile devices. However, from the aspect…
Read MoreThe Role of Promotion in Mobile Wallet Adoption – A Research in Vietnam
Mobile wallet is an application that allows users to make online payments using their mobile phones. In the context of an outbreak of COVID-19 epidemic in Vietnam and the world, mobile wallets are considered having many opportunities to change people’s cash spending habits. The current study assesses the factors impact on the intention to use…
Read MoreRemote Control of Garden Plantation Water Pumps using Arduino and GSM Mobile
A remotely mobile phone controlled electronic system for supplying water to garden plantations in a greenhouse or similar environment was designed and experimentally implemented. The system monitors the garden environmental conditions such as soil moisture, temperature, humidity and sunlight and a remote user can send commands from his mobile phone such as to switch ON/OFF…
Read MoreAn Evaluation of some Machine Learning Algorithms for the detection of Android Applications Malware
Android Operating system (OS) has been used much more than all other mobile phone’s OS turning android OS to a major point of attack. Android Application installation serves as a major avenue through which attacks can be perpetrated. Permissions must be first granted by the users seeking to install these third-party applications. Some permissions can…
Read MoreEvaluation of the Quality Parameters of a 4G-LTE Communications Base Station, Installed in a Rural Area of Peru
This article has to specify the quality parameters of a Communications Base Station with 4G-LTE technology, installed in a rural area of Peru. The problem of this investigation is due to the fact that many areas of the country do not have a communications network capable of covering the high demand of the inhabitants; this…
Read MoreConceptual Architecture for the Continuity if Workflow in Activities on Multi-Devices: Case Study Co-Kitchen
Nowadays, the realization and follow-up of a team activity takes place in different execution environments (e.g. mobile phone, PC) through the use of computer applications. This implies context changes that generate interruptions in the activity. To improve the continuity of an activity with the reduction of interruptions during the development of this activity, would help…
Read MoreWeb Authentication: no Password; Listen and Touch
Just as electricity has an essential role in our lives, the internet network and especially web services have become of vital importance nowadays. Without security service layers, apparently small things like checking a child’s school schedule on web may turn the daily routine into a nightmare. Web services users are still required to use many…
Read MoreExperimental Investigation of Human Gait Recognition Database using Wearable Sensors
In this research human gait database is collected using different possible methods such as Wearable sensors, Smartphone and Cameras. For a gait recognition accelerometer data from wearable shimmer modules and smartphone are used. Data from different sensors location is compared to know which sensor location have better recognition rate. Different walking scenarios like slow, normal…
Read More
