A review of emotion recognition methods based on data acquired via smartphone sensors
A Kołakowska, W Szwoch, M Szwoch - Sensors, 2020 - mdpi.com
In recent years, emotion recognition algorithms have achieved high efficiency, allowing the
development of various affective and affect-aware applications. This advancement has taken …
development of various affective and affect-aware applications. This advancement has taken …
Cortisol: Biosensing and detection strategies
S Balasamy, R Atchudan, S Arya, BM Gunasekaran… - Clinica Chimica …, 2024 - Elsevier
Cortisol, a crucial steroid hormone synthesized by the adrenal glands, has diverse impacts
on multiple physiological processes, such as metabolism, immune function, and stress …
on multiple physiological processes, such as metabolism, immune function, and stress …
Advancing Mobile Sensor Data Authentication: Application of Deep Machine Learning Models
The authentication of sensor data is a must-need when we talk about the domain of mobile
security. This paper explores the efficacy of deep learning models known as Convolutional …
security. This paper explores the efficacy of deep learning models known as Convolutional …
Security, privacy and trust issues in internet of things and machine learning based e-healthcare
SS Kute, AK Tyagi, SU Aswathy - Intelligent Interactive Multimedia Systems …, 2022 - Springer
Abstract The Internet of Things (IoT) or Internet Connected Things is the networking of
physical devices that are both connected and smart. These devices are embedded with …
physical devices that are both connected and smart. These devices are embedded with …
A comprehensive survey about thermal comfort under the IoT paradigm: Is crowdsensing the new horizon?
V Tomat, AP Ramallo-González, AF Skarmeta Gómez - Sensors, 2020 - mdpi.com
This paper presents a review of technologies under the paradigm 4.0 applied to the study of
the thermal comfort and, implicitly, energy efficiency. The research is based on the analysis …
the thermal comfort and, implicitly, energy efficiency. The research is based on the analysis …
[HTML][HTML] Artificial intelligence, data sensors and interconnectivity: future opportunities for heart failure
P Bachtiger, CM Plymen, PA Pabari… - Cardiac failure …, 2020 - ncbi.nlm.nih.gov
A higher proportion of patients with heart failure have benefitted from a wide and expanding
variety of sensor-enabled implantable devices than any other patient group. These patients …
variety of sensor-enabled implantable devices than any other patient group. These patients …
Artificial intelligence based body sensor network framework—narrative review: proposing an end-to-end framework using wearable sensors, real-time location …
AA Phatak, FG Wieland, K Vempala, F Volkmar… - Sports Medicine …, 2021 - Springer
With the rising amount of data in the sports and health sectors, a plethora of applications
using big data mining have become possible. Multiple frameworks have been proposed to …
using big data mining have become possible. Multiple frameworks have been proposed to …
Mobile sensing for emotion recognition in smartphones: a literature review on non-intrusive methodologies
K Tzafilkou, AA Economides… - International Journal of …, 2022 - Taylor & Francis
This paper aims to provide the reader with a comprehensive background for understanding
current knowledge on the use of non-intrusive Mobile Sensing methodologies for emotion …
current knowledge on the use of non-intrusive Mobile Sensing methodologies for emotion …
Smartontosensor: ontology for semantic interpretation of smartphone sensors data for context‐aware applications
The integration of cheap and powerful sensors in smartphones has enabled the emergence
of several context‐aware applications and frameworks. However, the available smartphone …
of several context‐aware applications and frameworks. However, the available smartphone …
Malware Detection in Android OS Using Machine Learning Techniques
MM Mijwil - International Journal of Data Science and Applications, 2020 - dergipark.org.tr
Malware is a software that is created to distort or obstruct computer or mobile applications,
gather sensitive information or execute malicious actions. These malicious activities include …
gather sensitive information or execute malicious actions. These malicious activities include …