Compliance source authentication technique for person adaptation networks utilizing deep learning-based patterns segmentation
Due to delivering flexible access to apps and assisted support, individual systems with adaptive capabilities adjust their behaviour in response to input. The adaptation process relies on personal inputs, including contact interactions, notes of speech, and postures. Errors occur within these system...
Saved in:
Main Authors: | Jamil Alsayaydeh, Jamil Abedalrahim, Oliinyk, Andrii O., Yusof, Mohd Faizal, Shkarupylo, Vadym Viktorovych, Artemchuk, Volodymyr O., Herawan, Safarudin Gazali |
---|---|
Format: | Article |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers Inc.
2024
|
Online Access: | http://eprints.utem.edu.my/id/eprint/27738/3/Compliance_Source_Authentication_Technique_for_Person_Adaptation_Networks_Utilizing_Deep_Learning-Based_Patterns_Segmentation.pdf http://eprints.utem.edu.my/id/eprint/27738/ https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10599473 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Stratified Model Of The Internet Of Things Infrastructure
by: Jamil Alsayaydeh, Jamil Abedalrahim, et al.
Published: (2018) -
Modified Genetic Algorithm To Determine The Location Of The Distribution Power Supply Networks In The City
by: Fedorchenko, Ievgen, et al.
Published: (2020) -
QoS-Aware Web-Services Ranking: Normalization Techniques Comparative Analysis For LSP Method
by: Polska, Olga, et al.
Published: (2021) -
Improving the robustness of IoT-powered smart city applications through service-reliant application authentication technique
by: Jamil Alsayaydeh, Jamil Abedalrahim, et al.
Published: (2024) -
Case driven TLC model checker analysis in energy scenario
by: Shkarupylo, Vadym, et al.
Published: (2023)