Compliance source authentication technique for person adaptation networks utilizing deep learning-based patterns segmentation

Due to delivering flexible access to apps and assisted support, individual systems with adaptive capabilities adjust their behaviour in response to input. The adaptation process relies on personal inputs, including contact interactions, notes of speech, and postures. Errors occur within these system...

Full description

Saved in:
Bibliographic Details
Main Authors: Jamil Alsayaydeh, Jamil Abedalrahim, Oliinyk, Andrii O., Yusof, Mohd Faizal, Shkarupylo, Vadym Viktorovych, Artemchuk, Volodymyr O., Herawan, Safarudin Gazali
Format: Article
Language:English
Published: Institute of Electrical and Electronics Engineers Inc. 2024
Online Access:http://eprints.utem.edu.my/id/eprint/27738/3/Compliance_Source_Authentication_Technique_for_Person_Adaptation_Networks_Utilizing_Deep_Learning-Based_Patterns_Segmentation.pdf
http://eprints.utem.edu.my/id/eprint/27738/
https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10599473
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknikal Malaysia Melaka
Language: English