Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Feature Fusion Based Deep Transfer Learning Based Human Gait Classification Model

    C. S. S. Anupama1, Rafina Zakieva2, Afanasiy Sergin3, E. Laxmi Lydia4, Seifedine Kadry5,6,7, Chomyong Kim8, Yunyoung Nam8,*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1453-1468, 2023, DOI:10.32604/iasc.2023.038321

    Abstract Gait is a biological typical that defines the method by that people walk. Walking is the most significant performance which keeps our day-to-day life and physical condition. Surface electromyography (sEMG) is a weak bioelectric signal that portrays the functional state between the human muscles and nervous system to any extent. Gait classifiers dependent upon sEMG signals are extremely utilized in analysing muscle diseases and as a guide path for recovery treatment. Several approaches are established in the works for gait recognition utilizing conventional and deep learning (DL) approaches. This study designs an Enhanced Artificial Algae Algorithm with Hybrid Deep Learning… More >

  • Open Access

    ARTICLE

    Learning-Based Artificial Algae Algorithm with Optimal Machine Learning Enabled Malware Detection

    Khaled M. Alalayah1, Fatma S. Alrayes2, Mohamed K. Nour3, Khadija M. Alaidarous1, Ibrahim M. Alwayle1, Heba Mohsen4, Ibrahim Abdulrab Ahmed5, Mesfer Al Duhayyim6,*

    Computer Systems Science and Engineering, Vol.46, No.3, pp. 3103-3119, 2023, DOI:10.32604/csse.2023.034034

    Abstract Malware is a ‘malicious software program that performs multiple cyberattacks on the Internet, involving fraud, scams, nation-state cyberwar, and cybercrime. Such malicious software programs come under different classifications, namely Trojans, viruses, spyware, worms, ransomware, Rootkit, botnet malware, etc. Ransomware is a kind of malware that holds the victim’s data hostage by encrypting the information on the user’s computer to make it inaccessible to users and only decrypting it; then, the user pays a ransom procedure of a sum of money. To prevent detection, various forms of ransomware utilize more than one mechanism in their attack flow in conjunction with Machine… More >

Displaying 1-10 on page 1 of 2. Per Page