Compliance source authentication technique for person adaptation networks utilizing deep learning-based patterns segmentation

Due to delivering flexible access to apps and assisted support, individual systems with adaptive capabilities adjust their behaviour in response to input. The adaptation process relies on personal inputs, including contact interactions, notes of speech, and postures. Errors occur within these system...

Full description

Saved in:
Bibliographic Details
Main Authors: Jamil Alsayaydeh, Jamil Abedalrahim, Oliinyk, Andrii O., Yusof, Mohd Faizal, Shkarupylo, Vadym Viktorovych, Artemchuk, Volodymyr O., Herawan, Safarudin Gazali
Format: Article
Language:English
Published: Institute of Electrical and Electronics Engineers Inc. 2024
Online Access:http://eprints.utem.edu.my/id/eprint/27738/3/Compliance_Source_Authentication_Technique_for_Person_Adaptation_Networks_Utilizing_Deep_Learning-Based_Patterns_Segmentation.pdf
http://eprints.utem.edu.my/id/eprint/27738/
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10599473
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utem.eprints.27738
record_format eprints
spelling my.utem.eprints.277382024-10-07T11:33:23Z http://eprints.utem.edu.my/id/eprint/27738/ Compliance source authentication technique for person adaptation networks utilizing deep learning-based patterns segmentation Jamil Alsayaydeh, Jamil Abedalrahim Oliinyk, Andrii O. Yusof, Mohd Faizal Shkarupylo, Vadym Viktorovych Artemchuk, Volodymyr O. Herawan, Safarudin Gazali Due to delivering flexible access to apps and assisted support, individual systems with adaptive capabilities adjust their behaviour in response to input. The adaptation process relies on personal inputs, including contact interactions, notes of speech, and postures. Errors occur within these systems primarily as an outcome of insufficient mining information along with unfamiliar types of input during adjustment. This manuscript reduces recognition errors by introducing a Compliant Input Recognition with Pattern Classification (CIR-PC) system. The recommended strategy uses deep learning and statistical mining to avoid unstructured source handling and information deficiencies. Input sequence analysis and information deficit correction are the two stages of deep learning. Specific requirements for data, including extraction associated with each classified input type, are established in the first stage. The subsequent stage identifies the input pattern containing mining data to provide flexible user interaction. The machine learning model undergoes training with the input pattern and data parameters for categorization. The result improves categorizing, resource usage, and reactions from the system. On the contrary, it reduces misdetection and reactive latencies. Institute of Electrical and Electronics Engineers Inc. 2024-07 Article PeerReviewed text en http://eprints.utem.edu.my/id/eprint/27738/3/Compliance_Source_Authentication_Technique_for_Person_Adaptation_Networks_Utilizing_Deep_Learning-Based_Patterns_Segmentation.pdf Jamil Alsayaydeh, Jamil Abedalrahim and Oliinyk, Andrii O. and Yusof, Mohd Faizal and Shkarupylo, Vadym Viktorovych and Artemchuk, Volodymyr O. and Herawan, Safarudin Gazali (2024) Compliance source authentication technique for person adaptation networks utilizing deep learning-based patterns segmentation. IEEE Access, 12. pp. 99045-99057. ISSN 2169-3536 https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10599473 10.1109/ACCESS.2024.3429332
institution Universiti Teknikal Malaysia Melaka
building UTEM Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknikal Malaysia Melaka
content_source UTEM Institutional Repository
url_provider http://eprints.utem.edu.my/
language English
description Due to delivering flexible access to apps and assisted support, individual systems with adaptive capabilities adjust their behaviour in response to input. The adaptation process relies on personal inputs, including contact interactions, notes of speech, and postures. Errors occur within these systems primarily as an outcome of insufficient mining information along with unfamiliar types of input during adjustment. This manuscript reduces recognition errors by introducing a Compliant Input Recognition with Pattern Classification (CIR-PC) system. The recommended strategy uses deep learning and statistical mining to avoid unstructured source handling and information deficiencies. Input sequence analysis and information deficit correction are the two stages of deep learning. Specific requirements for data, including extraction associated with each classified input type, are established in the first stage. The subsequent stage identifies the input pattern containing mining data to provide flexible user interaction. The machine learning model undergoes training with the input pattern and data parameters for categorization. The result improves categorizing, resource usage, and reactions from the system. On the contrary, it reduces misdetection and reactive latencies.
format Article
author Jamil Alsayaydeh, Jamil Abedalrahim
Oliinyk, Andrii O.
Yusof, Mohd Faizal
Shkarupylo, Vadym Viktorovych
Artemchuk, Volodymyr O.
Herawan, Safarudin Gazali
spellingShingle Jamil Alsayaydeh, Jamil Abedalrahim
Oliinyk, Andrii O.
Yusof, Mohd Faizal
Shkarupylo, Vadym Viktorovych
Artemchuk, Volodymyr O.
Herawan, Safarudin Gazali
Compliance source authentication technique for person adaptation networks utilizing deep learning-based patterns segmentation
author_facet Jamil Alsayaydeh, Jamil Abedalrahim
Oliinyk, Andrii O.
Yusof, Mohd Faizal
Shkarupylo, Vadym Viktorovych
Artemchuk, Volodymyr O.
Herawan, Safarudin Gazali
author_sort Jamil Alsayaydeh, Jamil Abedalrahim
title Compliance source authentication technique for person adaptation networks utilizing deep learning-based patterns segmentation
title_short Compliance source authentication technique for person adaptation networks utilizing deep learning-based patterns segmentation
title_full Compliance source authentication technique for person adaptation networks utilizing deep learning-based patterns segmentation
title_fullStr Compliance source authentication technique for person adaptation networks utilizing deep learning-based patterns segmentation
title_full_unstemmed Compliance source authentication technique for person adaptation networks utilizing deep learning-based patterns segmentation
title_sort compliance source authentication technique for person adaptation networks utilizing deep learning-based patterns segmentation
publisher Institute of Electrical and Electronics Engineers Inc.
publishDate 2024
url http://eprints.utem.edu.my/id/eprint/27738/3/Compliance_Source_Authentication_Technique_for_Person_Adaptation_Networks_Utilizing_Deep_Learning-Based_Patterns_Segmentation.pdf
http://eprints.utem.edu.my/id/eprint/27738/
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10599473
_version_ 1814061421589168128
score 13.211869