Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Feature Fusion Based Deep Transfer Learning Based Human Gait Classification Model

    C. S. S. Anupama1, Rafina Zakieva2, Afanasiy Sergin3, E. Laxmi Lydia4, Seifedine Kadry5,6,7, Chomyong Kim8, Yunyoung Nam8,*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1453-1468, 2023, DOI:10.32604/iasc.2023.038321 - 21 June 2023

    Abstract Gait is a biological typical that defines the method by that people walk. Walking is the most significant performance which keeps our day-to-day life and physical condition. Surface electromyography (sEMG) is a weak bioelectric signal that portrays the functional state between the human muscles and nervous system to any extent. Gait classifiers dependent upon sEMG signals are extremely utilized in analysing muscle diseases and as a guide path for recovery treatment. Several approaches are established in the works for gait recognition utilizing conventional and deep learning (DL) approaches. This study designs an Enhanced Artificial Algae… More >

  • Open Access

    ARTICLE

    Learning-Based Artificial Algae Algorithm with Optimal Machine Learning Enabled Malware Detection

    Khaled M. Alalayah1, Fatma S. Alrayes2, Mohamed K. Nour3, Khadija M. Alaidarous1, Ibrahim M. Alwayle1, Heba Mohsen4, Ibrahim Abdulrab Ahmed5, Mesfer Al Duhayyim6,*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3103-3119, 2023, DOI:10.32604/csse.2023.034034 - 03 April 2023

    Abstract Malware is a ‘malicious software program that performs multiple cyberattacks on the Internet, involving fraud, scams, nation-state cyberwar, and cybercrime. Such malicious software programs come under different classifications, namely Trojans, viruses, spyware, worms, ransomware, Rootkit, botnet malware, etc. Ransomware is a kind of malware that holds the victim’s data hostage by encrypting the information on the user’s computer to make it inaccessible to users and only decrypting it; then, the user pays a ransom procedure of a sum of money. To prevent detection, various forms of ransomware utilize more than one mechanism in their attack… More >

Displaying 1-10 on page 1 of 2. Per Page