AI Classification Algorithms for Human Activities Recognition System With a Cyber Security Perspective

Naveed, F. and Imran, S.A. and Janisar, A.A. and Yusuf, A. and Khan, S. and Khan, I.U. (2024) AI Classification Algorithms for Human Activities Recognition System With a Cyber Security Perspective. CRC Press, pp. 294-313. ISBN 9781003826408; 9781032518992

Full text not available from this repository.
Official URL: https://www.scopus.com/inward/record.uri?eid=2-s2....

Abstract

Today�s world is heavily reliant on electronic technology, which attracts Cyber attacks and threats to the cyber security systems. These attacks and vulnerabilities need to be overcome using cyber security and advanced machine learning mechanisms together. This study concentrates on human activity recognition (HAR) problems. A novel method is proposed for recognizing human activity with the assistance of different calculations in order to pick the precise one. The research utilizes HARs rather than human activity recognition from consistency. HAR, the computerized revelation of advancing activities from visual data, is a prominent issue. Semantic assessment of activity chronicles engages the improvement of various vision-dependent on structures, including shrewd observation systems, smart robots, activity-based human-PC interfaces, and noticing systems for individuals. For instance, a way to deal with normally perceived and know the entire class of significant exercises. A number of studies were performed on various joint efforts in a comparable scene, to figure out briefly and to spatially shape complex critical-level activities of a reformist nature. There are different methods to perceive HAR from different sources; this study assures the accuracy of different calculations and then conceives the outcomes utilizing a few lattices like accuracy, precision, recall, and F-measure. The dataset is downloaded from a UCI, and the data is based on a sensor-based gyroscope/accelerometer. Different techniques are implemented to develop a recognition system to build a HAR system; however, this method utilized a dataset to generate possible/precise outcomes. Experiments were carried out on the preprocessing features. SVM, ANN, and K-NN are examples of classifiers and selection methods used to get the desired results. Among all the classifiers, SVM produced the highest result in the dataset, 97.895. In the dataset, K-NN and decision tree produced the same result, 93.64. Dataset decision tree yielded the low result of 93, while SVM produced a result of 97.895. Despite having a vast AI environment, cyber attacks had the largest attack surface. A cyber attack would be catastrophic in future for businesses continuity if the AI perspective is missing in it. © 2024 selection and editorial matter, Inam Ullah Khan, Mariya Ouaissa, Mariyam Ouaissa, Zakaria Abou El Houda and Muhammad Fazal Ijaz; individual chapters, the contributors.

Item Type: Book
Additional Information: cited By 0
Depositing User: Mr Ahmad Suhairi UTP
Date Deposited: 04 Jun 2024 14:20
Last Modified: 04 Jun 2024 14:20
URI: https://khub.utp.edu.my/scholars/id/eprint/20260

Actions (login required)

View Item
View Item