Journal articles on the topic 'Mobile activity detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Mobile activity detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Vural, Ickin, and Hein Venter. "Combating Mobile Spam through Botnet Detection using Artificial Immune Systems." JUCS - Journal of Universal Computer Science 18, no. (6) (2012): 750–74. https://doi.org/10.3217/jucs-018-06-0750.
Full textSosnovyy, Vladyslav, and Nataliia Lashchevska. "DETECTION OF MALICIOUS ACTIVITY USING A NEURAL NETWORK FOR CONTINUOUS OPERATION." Cybersecurity: Education, Science, Technique 3, no. 23 (2024): 213–24. http://dx.doi.org/10.28925/2663-4023.2024.23.213224.
Full textAhn, Junho, and Richard Han. "Personalized Behavior Pattern Recognition and Unusual Event Detection for Mobile Users." Mobile Information Systems 9, no. 2 (2013): 99–122. http://dx.doi.org/10.1155/2013/360243.
Full textBoukhechba, Mehdi, Abdenour Bouzouane, Bruno Bouchard, Charles Gouin-Vallerand, and Sylvain Giroux. "Energy Optimization for Outdoor Activity Recognition." Journal of Sensors 2016 (2016): 1–15. http://dx.doi.org/10.1155/2016/6156914.
Full textPathmaperuma, Madushi H., Yogachandran Rahulamathavan, Safak Dogan, and Ahmet Kondoz. "CNN for User Activity Detection Using Encrypted In-App Mobile Data." Future Internet 14, no. 2 (2022): 67. http://dx.doi.org/10.3390/fi14020067.
Full textYang, Qiang, and Feng Zhao. "Artificial Intelligence on Mobile Devices: An Introduction to the Special Issue." AI Magazine 34, no. 2 (2013): 9. http://dx.doi.org/10.1609/aimag.v34i2.2470.
Full textEmish, Mohamed, Zeyad Kelani, Maryam Hassani, and Sean D. Young. "A Mobile Health Application Using Geolocation for Behavioral Activity Tracking." Sensors 23, no. 18 (2023): 7917. http://dx.doi.org/10.3390/s23187917.
Full textMamčenko, Jelena, and Regina Kulvietienė. "Data mining process for fraud detection in mobile communication." Lietuvos matematikos rinkinys 44 (December 17, 2004): 332–38. http://dx.doi.org/10.15388/lmr.2004.31698.
Full textSrujan, Kaluva. "Mobile Camera Application to Monitor Residential Society Vehicle Activity." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–9. https://doi.org/10.55041/ijsrem40860.
Full textMatzliach, Barouch, Irad Ben-Gal, and Evgeny Kagan. "Cooperative Detection of Multiple Targets by the Group of Mobile Agents." Entropy 22, no. 5 (2020): 512. http://dx.doi.org/10.3390/e22050512.
Full textKarthikayen, A., and Selvakumar S. Raja. "Bates Distribution Inspired Trust Factor-Based Selfish Node Detection Technique in Mobile Adhoc NETworks." Journal of Computational and Theoretical Nanoscience 16, no. 2 (2019): 609–15. http://dx.doi.org/10.1166/jctn.2019.7778.
Full textAloni, Sukhada, and Divya Shekhawata. "Detection of suspicious activity using mobile sensor data and Modified Sub-space K-NN for criminal investigations." YMER Digital 21, no. 08 (2022): 578–91. http://dx.doi.org/10.37896/ymer21.08/49.
Full textFitriah, Fitriah, and Mustofa Haris. "IMPLEMENTASI KADER YOUNG MOBILE POSBINDU UPAYA PROMOTIF DAN PREVENTIF PENYAKIT TIDAK MENULAR." JURNAL PARADIGMA (PEMBERDAYAAN & PENGABDIAN KEPADA MASYARAKAT) 3, no. 2 (2021): 45–53. http://dx.doi.org/10.36089/pgm.v3i2.584.
Full textViet, Vo Quang, Ali Fahmi Perwira Negera, Hoang Minh Thang, and Deokjai Choi. "Energy Saving in Forward Fall Detection using Mobile Accelerometer." International Journal of Distributed Systems and Technologies 4, no. 1 (2013): 78–94. http://dx.doi.org/10.4018/jdst.2013010106.
Full textHussain, Ibrar, and Muhammad Asif. "Detection of Anomalous Transactions in Mobile Payment Systems." International Journal of Data Analytics 1, no. 2 (2020): 58–66. http://dx.doi.org/10.4018/ijda.2020070105.
Full textNovikova, Evgenia Sergeevna, and Igor Vitalievich Kotenko. "Detection of Anomalous Activity in Mobile Money Transfer Services Using RadViz-Visualization." SPIIRAS Proceedings 5, no. 48 (2016): 32. http://dx.doi.org/10.15622/sp.48.2.
Full textWu, Bian, Xiaolin Ren, Chongqing Liu, and Yaxin Zhang. "A Robust, Real-Time Voice Activity Detection Algorithm for Embedded Mobile Devices." International Journal of Speech Technology 8, no. 2 (2005): 133–46. http://dx.doi.org/10.1007/s10772-005-2165-7.
Full textWu, Bian, Xiaolin Ren, Chongqing Liu, and Yaxin Zhang. "A Robust, Real-Time Voice Activity Detection Algorithm for Embedded Mobile Devices." Journal of Sol-Gel Science and Technology 8, no. 2 (1997): 133–46. http://dx.doi.org/10.1007/s10971-005-2165-8.
Full textNovikova, Evgenia, Igor Kotenko, and Evgenii Fedotov. "Interactive Multi-View Visualization for Fraud Detection in Mobile Money Transfer Services." International Journal of Mobile Computing and Multimedia Communications 6, no. 4 (2014): 73–97. http://dx.doi.org/10.4018/ijmcmc.2014100105.
Full textAdepu, Ashwin. "Security Risks and Mitigation Strategies in Mobile Banking Applications." International Journal of Innovative Research in Information Security 10, no. 05 (2024): 654–59. http://dx.doi.org/10.26562/ijiris.2024.v1005.01.
Full textWang, Yadi, Wangyang Yu, Peng Teng, Guanjun Liu, and Dongming Xiang. "A Detection Method for Abnormal Transactions in E-Commerce Based on Extended Data Flow Conformance Checking." Wireless Communications and Mobile Computing 2022 (January 4, 2022): 1–14. http://dx.doi.org/10.1155/2022/4434714.
Full textKannan, Aieswarya, and Abbas Z. Kouzani. "Violence Detection Using Wi-Fi and 5G/6G Sensing Technologies: A Review." Electronics 13, no. 14 (2024): 2765. http://dx.doi.org/10.3390/electronics13142765.
Full textBouchard-Roy, Jacob, Aidin Delnavaz, and Jérémie Voix. "Mobile In-Ear Power Sensor for Jaw Joint Activity." Micromachines 11, no. 12 (2020): 1047. http://dx.doi.org/10.3390/mi11121047.
Full textZakaria, Benhaili, Balouki Youssef, and Moumoun Lahcen. "Detecting human fall using internet of things devices for healthcare applications." IAES International Journal of Artificial Intelligence (IJ-AI) 14, no. 1 (2025): 561–69. https://doi.org/10.11591/ijai.v14.i1.pp561-569.
Full textByrne, Simon, Beth Kotze, Fabio Ramos, Achim Casties, and Anthony Harris. "Using a mobile health device to manage severe mental illness in the community: What is the potential and what are the challenges?" Australian & New Zealand Journal of Psychiatry 54, no. 10 (2020): 964–69. http://dx.doi.org/10.1177/0004867420945782.
Full textNeumann, Thea, Maren Krüger, Jasmin Weisemann, et al. "Innovative and Highly Sensitive Detection of Clostridium perfringens Enterotoxin Based on Receptor Interaction and Monoclonal Antibodies." Toxins 13, no. 4 (2021): 266. http://dx.doi.org/10.3390/toxins13040266.
Full textPathmaperuma, Madushi H., Yogachandran Rahulamathavan, Safak Dogan, and Ahmet M. Kondoz. "Deep Learning for Encrypted Traffic Classification and Unknown Data Detection." Sensors 22, no. 19 (2022): 7643. http://dx.doi.org/10.3390/s22197643.
Full textSara, Meghshanth. "Stress Detection Smartwatch." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 3796–802. http://dx.doi.org/10.22214/ijraset.2022.45865.
Full textL, Latha, Cynthia J, G. Seetha Lakshmi, Raajshre B, Senthil J, and Vikashini S. "Human Activity Recognition Using Smartphone Sensors." Webology 18, no. 04 (2021): 1499–511. http://dx.doi.org/10.14704/web/v18si04/web18294.
Full textSadoun, Maria Sara Nour, Juan Manuel Vargas, Mohamed Mouad Boularas, Arnaud Boutin, François Cottin, and Taous-Meriem Laleg-Kirati. "Cognitive Stress Detection during Physical Activity using Simultaneous, Mobile EEG and ECG signals." IFAC-PapersOnLine 58, no. 24 (2024): 291–96. http://dx.doi.org/10.1016/j.ifacol.2024.11.052.
Full textÁlvarez de la Concepción, Miguel Ángel, Luis Miguel Soria Morillo, Juan Antonio Álvarez García, and Luis González-Abril. "Mobile activity recognition and fall detection system for elderly people using Ameva algorithm." Pervasive and Mobile Computing 34 (January 2017): 3–13. http://dx.doi.org/10.1016/j.pmcj.2016.05.002.
Full textMoreno, Francisco, Silvia Uribe, Federico Alvarez, and Jose Manuel Menendez. "Extending Aspect-Oriented Programming for Dynamic User's Activity Detection in Mobile App Analytics." IEEE Consumer Electronics Magazine 9, no. 2 (2020): 57–63. http://dx.doi.org/10.1109/mce.2019.2953738.
Full textK., N. Apinaya Prethi, Sangeetha M., Nithya S., Priyadharshini G., and Anithadevi N. "An Electric Eye for Human Activity Recognition: A Hybrid Neural Network." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 3 (2020): 2806–9. https://doi.org/10.35940/ijeat.C5957.029320.
Full textDhivya, Karunya S., and Kumar Krishna. "Human Activity Recognition Methods." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 5 (2020): 1024–28. https://doi.org/10.35940/ijeat.E9771.069520.
Full textRajalakshmi, D., and K. Meena. "A Hybrid Intrusion Detection System for Mobile Adhoc Networks using FBID Protocol." Scalable Computing: Practice and Experience 21, no. 1 (2020): 137–45. http://dx.doi.org/10.12694/scpe.v21i1.1642.
Full textAloni, Sukhada, and Divya Shekhawat. "Detection of Suspicious Activity using Mobile Sensor Data and Modified Sub-space K-NN for Criminal Investigations." Journal of Advanced Zoology 44, S7 (2023): 130–37. http://dx.doi.org/10.17762/jaz.v44is7.2743.
Full textBasan, Elena, Alexandr Basan, and Alexey Nekrasov. "Method for Detecting Abnormal Activity in a Group of Mobile Robots." Sensors 19, no. 18 (2019): 4007. http://dx.doi.org/10.3390/s19184007.
Full textEsmaeili Kelishomi, Aghil, A. H. S. Garmabaki, Mahdi Bahaghighat, and Jianmin Dong. "Mobile User Indoor-Outdoor Detection Through Physical Daily Activities." Sensors 19, no. 3 (2019): 511. http://dx.doi.org/10.3390/s19030511.
Full textPark, Soojin, Sungyong Park, and Kyeongwook Ma. "An Automatic User Activity Analysis Method for Discovering Latent Requirements: Usability Issue Detection on Mobile Applications." Sensors 18, no. 9 (2018): 2963. http://dx.doi.org/10.3390/s18092963.
Full textNarziev, Nematjon, Hwarang Goh, Kobiljon Toshnazarov, Seung Ah Lee, Kyong-Mee Chung, and Youngtae Noh. "STDD: Short-Term Depression Detection with Passive Sensing." Sensors 20, no. 5 (2020): 1396. http://dx.doi.org/10.3390/s20051396.
Full textValiveti, Sharada Ramakrishna, Anush Manglani, and Tadrush Desai. "Anomaly-Based Intrusion Detection Systems for Mobile Ad Hoc Networks." International Journal of Systems and Software Security and Protection 12, no. 2 (2021): 11–32. http://dx.doi.org/10.4018/ijsssp.2021070102.
Full textYang, Taehun, Sang-Hoon Lee, and Soochang Park. "AI-Aided Individual Emergency Detection System in Edge-Internet of Things Environments." Electronics 10, no. 19 (2021): 2374. http://dx.doi.org/10.3390/electronics10192374.
Full textSachin Y. Meshram and K. Nagaraju. "Accident detection and alert system using global system for mobile communication." World Journal of Advanced Engineering Technology and Sciences 13, no. 2 (2024): 648–54. https://doi.org/10.30574/wjaets.2024.13.2.0646.
Full textBilton, Kyle J., Tenzing H. Y. Joshi, Mark S. Bandstra, Joseph C. Curtis, Daniel Hellfeld, and Kai Vetter. "Neural Network Approaches for Mobile Spectroscopic Gamma-Ray Source Detection." Journal of Nuclear Engineering 2, no. 2 (2021): 190–206. http://dx.doi.org/10.3390/jne2020018.
Full textAmouri, Amar, Vishwa T. Alaparthy, and Salvatore D. Morgera. "A Machine Learning Based Intrusion Detection System for Mobile Internet of Things." Sensors 20, no. 2 (2020): 461. http://dx.doi.org/10.3390/s20020461.
Full textKoctúrová, Marianna, and Jozef Juhár. "A Novel Approach to EEG Speech Activity Detection with Visual Stimuli and Mobile BCI." Applied Sciences 11, no. 2 (2021): 674. http://dx.doi.org/10.3390/app11020674.
Full textSi, Xia-Meng. "Research on System Structure of Mobile Internet Security Audit." International Journal of Interdisciplinary Telecommunications and Networking 8, no. 2 (2016): 12–20. http://dx.doi.org/10.4018/ijitn.2016040102.
Full textCan, Yekta Said, Heather Iles-Smith, Niaz Chalabianloo, et al. "How to Relax in Stressful Situations: A Smart Stress Reduction System." Healthcare 8, no. 2 (2020): 100. http://dx.doi.org/10.3390/healthcare8020100.
Full textCan, Yekta Said, Heather Iles-Smith, Niaz Chalabianloo, et al. "How to Relax in Stressful Situations: A Smart Stress Reduction System." Healthcare 8, no. 2 (2020): 147–63. https://doi.org/10.5281/zenodo.4293918.
Full textAl-Naji, Ali, Ali J. Al-Askery, Sadik Kamel Gharghan, and Javaan Chahl. "A System for Monitoring Breathing Activity Using an Ultrasonic Radar Detection with Low Power Consumption." Journal of Sensor and Actuator Networks 8, no. 2 (2019): 32. http://dx.doi.org/10.3390/jsan8020032.
Full text