Compliance source authentication technique for person adaptation networks utilizing deep learning-based patterns segmentation
Due to delivering flexible access to apps and assisted support, individual systems with adaptive capabilities adjust their behaviour in response to input. The adaptation process relies on personal inputs, including contact interactions, notes of speech, and postures. Errors occur within these system...
Saved in:
Main Authors: | , , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Institute of Electrical and Electronics Engineers Inc.
2024
|
Online Access: | http://eprints.utem.edu.my/id/eprint/27738/3/Compliance_Source_Authentication_Technique_for_Person_Adaptation_Networks_Utilizing_Deep_Learning-Based_Patterns_Segmentation.pdf http://eprints.utem.edu.my/id/eprint/27738/ https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10599473 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknikal Malaysia Melaka |
Language: | English |