Compliance source authentication technique for person adaptation networks utilizing deep learning-based patterns segmentation
Due to delivering flexible access to apps and assisted support, individual systems with adaptive capabilities adjust their behaviour in response to input. The adaptation process relies on personal inputs, including contact interactions, notes of speech, and postures. Errors occur within these system...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers Inc.
2024
|
Online Access: | http://eprints.utem.edu.my/id/eprint/27738/3/Compliance_Source_Authentication_Technique_for_Person_Adaptation_Networks_Utilizing_Deep_Learning-Based_Patterns_Segmentation.pdf http://eprints.utem.edu.my/id/eprint/27738/ https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10599473 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
my.utem.eprints.27738 |
---|---|
record_format |
eprints |
spelling |
my.utem.eprints.277382024-10-07T11:33:23Z http://eprints.utem.edu.my/id/eprint/27738/ Compliance source authentication technique for person adaptation networks utilizing deep learning-based patterns segmentation Jamil Alsayaydeh, Jamil Abedalrahim Oliinyk, Andrii O. Yusof, Mohd Faizal Shkarupylo, Vadym Viktorovych Artemchuk, Volodymyr O. Herawan, Safarudin Gazali Due to delivering flexible access to apps and assisted support, individual systems with adaptive capabilities adjust their behaviour in response to input. The adaptation process relies on personal inputs, including contact interactions, notes of speech, and postures. Errors occur within these systems primarily as an outcome of insufficient mining information along with unfamiliar types of input during adjustment. This manuscript reduces recognition errors by introducing a Compliant Input Recognition with Pattern Classification (CIR-PC) system. The recommended strategy uses deep learning and statistical mining to avoid unstructured source handling and information deficiencies. Input sequence analysis and information deficit correction are the two stages of deep learning. Specific requirements for data, including extraction associated with each classified input type, are established in the first stage. The subsequent stage identifies the input pattern containing mining data to provide flexible user interaction. The machine learning model undergoes training with the input pattern and data parameters for categorization. The result improves categorizing, resource usage, and reactions from the system. On the contrary, it reduces misdetection and reactive latencies. Institute of Electrical and Electronics Engineers Inc. 2024-07 Article PeerReviewed text en http://eprints.utem.edu.my/id/eprint/27738/3/Compliance_Source_Authentication_Technique_for_Person_Adaptation_Networks_Utilizing_Deep_Learning-Based_Patterns_Segmentation.pdf Jamil Alsayaydeh, Jamil Abedalrahim and Oliinyk, Andrii O. and Yusof, Mohd Faizal and Shkarupylo, Vadym Viktorovych and Artemchuk, Volodymyr O. and Herawan, Safarudin Gazali (2024) Compliance source authentication technique for person adaptation networks utilizing deep learning-based patterns segmentation. IEEE Access, 12. pp. 99045-99057. ISSN 2169-3536 https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10599473 10.1109/ACCESS.2024.3429332 |
institution |
Universiti Teknikal Malaysia Melaka |
building |
UTEM Library |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknikal Malaysia Melaka |
content_source |
UTEM Institutional Repository |
url_provider |
http://eprints.utem.edu.my/ |
language |
English |
description |
Due to delivering flexible access to apps and assisted support, individual systems with adaptive capabilities adjust their behaviour in response to input. The adaptation process relies on personal inputs, including contact interactions, notes of speech, and postures. Errors occur within these systems primarily as an outcome of insufficient mining information along with unfamiliar types of input during adjustment. This manuscript reduces recognition errors by introducing a Compliant Input Recognition with Pattern Classification (CIR-PC) system. The recommended strategy uses deep learning and statistical mining to avoid unstructured source handling and information deficiencies. Input sequence analysis and information deficit correction are the two stages of deep learning. Specific requirements for data, including extraction associated with each classified input type, are established in the first stage. The subsequent stage identifies the input pattern containing mining data to provide flexible user interaction. The machine learning model undergoes training with the input pattern and data parameters for categorization. The result improves categorizing, resource usage, and reactions from the system. On the contrary, it reduces misdetection and reactive latencies. |
format |
Article |
author |
Jamil Alsayaydeh, Jamil Abedalrahim Oliinyk, Andrii O. Yusof, Mohd Faizal Shkarupylo, Vadym Viktorovych Artemchuk, Volodymyr O. Herawan, Safarudin Gazali |
spellingShingle |
Jamil Alsayaydeh, Jamil Abedalrahim Oliinyk, Andrii O. Yusof, Mohd Faizal Shkarupylo, Vadym Viktorovych Artemchuk, Volodymyr O. Herawan, Safarudin Gazali Compliance source authentication technique for person adaptation networks utilizing deep learning-based patterns segmentation |
author_facet |
Jamil Alsayaydeh, Jamil Abedalrahim Oliinyk, Andrii O. Yusof, Mohd Faizal Shkarupylo, Vadym Viktorovych Artemchuk, Volodymyr O. Herawan, Safarudin Gazali |
author_sort |
Jamil Alsayaydeh, Jamil Abedalrahim |
title |
Compliance source authentication technique for person adaptation networks utilizing deep learning-based patterns segmentation |
title_short |
Compliance source authentication technique for person adaptation networks utilizing deep learning-based patterns segmentation |
title_full |
Compliance source authentication technique for person adaptation networks utilizing deep learning-based patterns segmentation |
title_fullStr |
Compliance source authentication technique for person adaptation networks utilizing deep learning-based patterns segmentation |
title_full_unstemmed |
Compliance source authentication technique for person adaptation networks utilizing deep learning-based patterns segmentation |
title_sort |
compliance source authentication technique for person adaptation networks utilizing deep learning-based patterns segmentation |
publisher |
Institute of Electrical and Electronics Engineers Inc. |
publishDate |
2024 |
url |
http://eprints.utem.edu.my/id/eprint/27738/3/Compliance_Source_Authentication_Technique_for_Person_Adaptation_Networks_Utilizing_Deep_Learning-Based_Patterns_Segmentation.pdf http://eprints.utem.edu.my/id/eprint/27738/ https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10599473 |
_version_ |
1814061421589168128 |
score |
13.211869 |