- Context-Aware Activity Recognition Systems
- Non-Invasive Vital Sign Monitoring
- Human Pose and Action Recognition
- Face and Expression Recognition
- Mobile Learning in Education
- Handwritten Text Recognition Techniques
- Consumer Retail Behavior Studies
- Customer Service Quality and Loyalty
- Customer churn and segmentation
- IoT and Edge/Fog Computing
- Educational Games and Gamification
- Biometric Identification and Security
- Anomaly Detection Techniques and Applications
- Video Surveillance and Tracking Methods
- Advanced Malware Detection Techniques
- Internet Traffic Analysis and Secure E-voting
- Natural Language Processing Techniques
- User Authentication and Security Systems
- Cutaneous Melanoma Detection and Management
- Hand Gesture Recognition Systems
- Augmented Reality Applications
- Spam and Phishing Detection
- Face recognition and analysis
- Blind Source Separation Techniques
- Fire effects on ecosystems
Multimedia University
2015-2024
National Institute of Statistics and Geography
2024
Yonsei University
2019
Customers are prominent resources in every business for its sustainability. Therefore, predicting customer churn is significant reducing churn, particularly the high-churn-rate telecommunications business. To identify customers at risk of churning, tactical marketing actions can be strategized to raise likelihood churn-probable remaining as customers. This might provide a corporation with savings. Hence, this work, prediction system developed assist telecommunication operators detecting...
Small and medium-sized enterprises (SMEs) are constantly under pressure to grow. This forces everyone involved think about how best run their business. Although there is much research on SME growth, previous fragmented only addresses internal or external enablers. study aims construct an interaction model for all enablers that promote sustainable growth. An interpretive structural modeling (ISM) analysis conducted formulate of The results show both crucial shows the following interrelated...
Smartphone-based human activity recognition (HAR) is an important research area due to its wide-ranging applications in health, security, gaming, etc. Existing HAR models face challenges such as tedious manual feature extraction/selection techniques, limited model generalisation, high computational cost, and inability retain longer-term dependencies. This work aims overcome the issues by proposing a lightweight, homogenous stacked deep ensemble model, termed Homogenous Stacking Temporal...
Nowadays, people are more concerned about their skin conditions and willing to spend money time on facial care routines. The beauty sector market is increasing, type readers being created help determine type. While various in the market, each invented tested abroad. Those not applied well Malaysian skin. Therefore, this paper proposes a analysis system tailored primarily for This integrated object detection deep learning algorithms developing skin-type readers. A unique dataset consisting...
Touch-stroke dynamics is a relatively recent behavioral biometrics. It authenticates an individual by observing his behavior when swiping "stroke" on smartphone or tablet. Several studies have attempted to determine the optimum authentication accuracy of classifiers, but none them has used time series temporal machine learning techniques. We postulate that user performs touch strokes in continuous manner, it can be perceived as characteristic person. In this letter, we propose use regression...
The urgent need to protect user privacy and security has emerged as the World Wide Web become an increasingly necessary part of daily life. Browser fingerprinting is a very interesting topic in industry technology security. New will always raise new issues browser undoubtedly follow same process. It one most popular topics online because, date, there still no exact solution how stop it entirely. majority solutions just aim reduce likelihood obtaining fingerprint. Research on unquestionably...
This paper presents a review of some online/dynamic and offline/static signature verification system that have been proposed from year 2000 to 2010. There are numerous systems algorithms methods in the last decade. will mainly focus on discussing techniques onwards make novice summary conclusion for them.
Wearable-based approach and vision-based are two of the most common approaches in human activity recognition. However, concern privacy issues may limit application approach. Besides, some individuals reluctant to wear sensor devices. Hence, smartphone-based physical recognition is a popular alternative. In this paper, we propose deep analysis interpret predict accelerometer data captured using smartphone for The proposed model able extract features from both spatial temporal domains inertial...
In-air hand gesture signature (HGS) has become a new and emerging technique for dynamic recognition due to its advantageous touchless acquisition procedure. Unlike the conventional signature, HGS creates general images that carrying spatial temporal information of signing action. Deep learning algorithms are prominent learn these image features. However, they require tremendous amount data reach an optimal model which make collection process computationally expensive. Transfer becomes...
The Deep learning analysis has been extensively carried out in the context of object/ pattern recognition due to its excellence feature extraction and classification. However, superior performance just can be guaranteed with availability huge amounts training data also high-specification processing unit process deeper at high speeds. Hence, another alternative is by applying transfer learning. In learning, a neural network model first trained on similar targeted data. With that, knowledge...
This study developed a comprehensive framework using Google Earth Engine to efficiently generate forest fire inventory dataset, which enhanced data accessibility without specialized knowledge or access private datasets. The is applicable globally, and the datasets generated are freely accessible shareable. By implementing in Peninsular Malaysia, significant factors were successfully extracted, including Keetch–Byram Drought Index (KBDI), soil moisture, temperature, windspeed, land surface...
This study explores the challenges and solutions faced by manufacturing companies in one industry when integrating green suppliers into their supply chains. The FGD transcripts were analyzed using NVivo 12 Pro for coding thematic analysis, which helped identify key solutions. identified included higher procurement costs, limited availability of materials, quality assurance issues, difficulties verifying practices. Strategic involve establishing partnership strategies, conducting chain...
A decision tree is a transparent model where the rules are visible and can represent logic of classification. However, this structure might allow attackers to infer confidential information if carry some sensitive information. Thus, pruning methodology based on an IP truncation anonymisation scheme proposed in paper prune real addresses. possible drawback carelessly designed degrade performance original as intentionally opted out for tree’s consideration. In work, 6-percent-GureKDDCup’99,...
n the telecom industry, predicting customer churn is crucial for improving retention. In literature, use of single classifiers predominantly focused. Customer data complex due to class imbalance and contain multiple factors that exhibit nonlinear dependencies. these scenarios, may be unable fully utilize available information capture underlying interactions effectively. contrast, ensemble learning combines various base empowers a more thorough analysis, leading improved prediction...
A mobile application of in-air signature is proposed by implementing the algorithm Fast Dynamic Time Warping (FastDTW). With linear time- and memory-complexity FastDTW, authentication process can be done on a real-time mode. The programmed was tested 50 volunteers, 5 fraudsters who contributing total 500 genuine samples, 1250 forged samples. Average error rate (AER) 0.098 reported based private database. This promising result shown compatibility FastDTW in application. experienced users'...
There are growing concerns about the privacy invasion of biometric technology. This is due to fact that characteristics immutable and hence their compromise permanent. Thus, reissuable biometrics was devised denote templates can be reissued replaced. Biometric Strengthening a form which strengthens by altering original values thru Gaussian distribution, thus generating new set values. However, main drawback its great degradation in performance when legitimate token stolen used imposter claim...
Semi-supervised learning approach is a fusion of supervised and unsupervised learning. performs data from limited number available labelled training images along with large pool unlabelled data. discriminant analysis (SDA) one the popular semi-supervised techniques. However, there room for improvement. SDA resides in illumination local change face features. Hence, it hardly to guarantee its performance if are changes on images. This paper presents an improved version SDA, termed as...