scholarly journals A Research on Fast Face Feature Points Detection on Smart Mobile Devices

2018 ◽  
Vol 2018 ◽  
pp. 1-8
Author(s):  
Xiaohe Li ◽  
Xingming Zhang ◽  
Haoxiang Wang

We explore how to leverage the performance of face feature points detection on mobile terminals from 3 aspects. First, we optimize the models used in SDM algorithms via PCA and Spectrum Clustering. Second, we propose an evaluation criterion using Linear Discriminative Analysis to choose the best local feature descriptions which plays a critical role in feature points detection. Third, we take advantage of multicore architecture of mobile terminal and parallelize the optimized SDM algorithm to improve the efficiency further. The experiment observations show that our final accomplished GPC-SDM (improved Supervised Descent Method using spectrum clustering, PCA, and GPU acceleration) suppresses the memory usage, which is beneficial and efficient to meet the real-time requirements.

2014 ◽  
Vol 511-512 ◽  
pp. 1244-1250
Author(s):  
Hao Hao Song ◽  
Qing Hong Shen ◽  
Xiao Xiao Zhang ◽  
Jian Gu

As information technology continues to develop, smart mobile terminal has become the electronic equipment most closely with people life and work. Meanwhile, the security threats are also increasing to smart mobile terminal when it conducts the business application. Based on the analysis of security assessment architecture for smart mobile terminals, the security risk assessment model for smart mobile terminals is proposed in this paper. The security of smart mobile terminals can be assessed based on the proposed security risk assessment model well.


2013 ◽  
Vol 336-338 ◽  
pp. 1631-1634
Author(s):  
Zhuo Lv ◽  
Shuang Xia Niu ◽  
Zhi Gang Zhang

The rapid development of wireless technology has been a qualitative leap in the mobile network performance, allowing mobile network terminals to enjoy a variety of service types. But as the important personal information storage carrier to users, the own security of the smart mobile terminal is related to the safety of the entire mobile Internet. This paper introduces the security situation of the smart mobile terminals, analyzes the potential security threats and the security needs, and at last gives improvement recommendations of the smart mobile terminals protection.


2021 ◽  
Vol 65 ◽  
pp. 107-117
Author(s):  
Cheng Ding ◽  
Weidong Tian ◽  
Chao Geng ◽  
Xijing Zhu ◽  
Qinmu Peng ◽  
...  

Author(s):  
Jari Veijalainen ◽  
Mathias Weske

During the last five years, the term mobile commerce (m-commerce) has appeared in the vocabulary of business people and researchers. Historically and conceptually, m-commerce can be regarded a new phase in electronic commerce (e-commerce). Although the term was introduced without a clear meaning and it is still lacking a single widely accepted definition, most people would say that the term m-commerce refers to e-commerce activities performed by people while on the move. Thus, m-commerce involves e-commerce transactions where a mobile terminal and a wireless network are used to conduct them. Therefore, m-commerce takes advantage of the e-commerce infrastructure developed for Internet e-commerce. Although in some cases an m-commerce transaction might be an alternative to a regular e-commerce transaction (such as buying a book) performed using a workstation and wired network, in many cases this is not the situation. The limitations of the mobile device - for instance, user interface limitations - are such that it is not attractive to perform typical Internet e-commerce transactions on them. Wireless technologies, combined with so-called ‘Internet-enabled’ terminals, constitute an ideal platform to realize new types of e-commerce transactions that are not possible or reasonable for wired terminals. The small and light, yet powerful, mobile terminals are almost always carried by their owners, just like wallets or watches. They can indeed also store electronic cash, credit card information, tickets, certificates of the Public Key Infrastructure (PKI), and so forth. Thus, they can assume the role of an e-wallet, as well as function as authentication and authorization devices in various contexts.


2019 ◽  
Vol 9 (20) ◽  
pp. 4426
Author(s):  
Hua Wang ◽  
Xiaoyu He ◽  
Mingge Pan

This paper introduces a system to realize interactive and personalized erasure animations by using mobile terminals, a shared display terminal, and a database server for a large group of participants. In the system, participants shake their mobile terminals with their hands. Their shaking data are captured by the database server. Then there are immersive and somatosensory erasure animations on the shared display terminal according to the participants’ shaking data in the database server. The system is implemented by a data preprocessing module and an interactive erasure animation module. The former is mainly responsible for the cleaning and semantic standardization of the personalized erasure shape data. The latter realizes the interactive erasure animation, which involves shaking the mobile terminal, visualizations of the erasure animation on the shared display terminal, and dynamic and personalized data editing. The experimental results show that the system can realize various styles of personalized erasure animation and can respond to more than 2000 shaking actions simultaneously and present the corresponding erasure animations on the shared display terminal in real time.


2013 ◽  
Vol 284-287 ◽  
pp. 2794-2798
Author(s):  
Dong Xu Jin ◽  
Fei Shi ◽  
Joon Sup Chin ◽  
Joo Seok Song

With the development of the wireless internet, there are more and more mobile terminals. Without a mobility management protocol a mobile terminal could not communicate with other terminals when it is away from its home network. Mobile IPv6 is proposed which is host-based mobility management protocol. But it has several drawbacks, such as wireless link resource waste, load or consumption of power in mobile terminal is large. To overcome the weakness of host-based mobility management protocol, network-based mobility management protocol called Proxy Mobile IPv6 (PMIPv6) is standardized by the IETF NETLMM working group, and it is starting to attract considerable attentions. Although several proposals have been made for Route Optimization (RO), they still need too many communications and it may cause communication delay. In this paper we proposed a time-efficient RO in PMIPv6 by optimize the procedure of it. We use the characteristic of anycast to achieve the time efficiency. By the mathematical analysis we prove that the proposed protocol has shorter latency and supports faster mobility of the mobile terminals.


2020 ◽  
Vol 41 (7) ◽  
pp. 074003
Author(s):  
Zhichao Lin ◽  
Rui Guo ◽  
Ke Zhang ◽  
Maokun Li ◽  
Fan Yang ◽  
...  

Author(s):  
Rui Guo ◽  
Maokun Li ◽  
Fan Yang ◽  
Shengheng Xu ◽  
Guangyou Fang ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document