Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (14)
  • Open Access

    ARTICLE

    Ontology-Based Crime News Semantic Retrieval System

    Fiaz Majeed1, Afzaal Ahmad1, Muhammad Awais Hassan2, Muhammad Shafiq3,*, Jin-Ghoo Choi3, Habib Hamam4,5,6,7

    CMC-Computers, Materials & Continua, Vol.77, No.1, pp. 601-614, 2023, DOI:10.32604/cmc.2023.036074

    Abstract Every day, the media reports tons of crimes that are considered by a large number of users and accumulate on a regular basis. Crime news exists on the Internet in unstructured formats such as books, websites, documents, and journals. From such homogeneous data, it is very challenging to extract relevant information which is a time-consuming and critical task for the public and law enforcement agencies. Keyword-based Information Retrieval (IR) systems rely on statistics to retrieve results, making it difficult to obtain relevant results. They are unable to understand the user's query and thus face word mismatches due to context changes… More >

  • Open Access

    ARTICLE

    Discovering the Common Traits of Cybercrimes in Pakistan Using Associative Classification with Ant Colony Optimization

    Abdul Rauf1, Muhammad Asif Khan1,*, Hamid Hussain Awan2, Waseem Shahzad3, Najeeb Ul Husaan4

    Journal of Cyber Security, Vol.4, No.4, pp. 201-222, 2022, DOI:10.32604/jcs.2022.038791

    Abstract In the modern world, law enforcement authorities are facing challenges due to the advanced technology used by criminals to commit crimes. Criminals follow specific patterns to carry out their crimes, which can be identified using machine learning and swarm intelligence approaches. This article proposes the use of the Ant Colony Optimization algorithm to create an associative classification of crime data, which can reveal potential relationships between different features and crime types. The experiments conducted in this research show that this approach can discover various associations among the features of crime data and the specific patterns that major crime types depend… More >

  • Open Access

    ARTICLE

    Crime Prediction Methods Based on Machine Learning: A Survey

    Junxiang Yin*

    CMC-Computers, Materials & Continua, Vol.74, No.2, pp. 4601-4629, 2023, DOI:10.32604/cmc.2023.034190

    Abstract The objective of crime prediction, one of the most important technologies in social computing, is to extract useful information from many existing criminal records to predict the next process-related crime. It can aid the police in obtaining criminal information and warn the public to be vigilant in certain areas. With the rapid growth of big data, the Internet of Things, and other technologies, as well as the increasing use of artificial intelligence in forecasting models, crime prediction models based on deep learning techniques are accelerating. Therefore, it is necessary to classify the existing crime prediction algorithms and compare in depth… More >

  • Open Access

    ARTICLE

    Optimal Weighted Extreme Learning Machine for Cybersecurity Fake News Classification

    Ashit Kumar Dutta1,*, Basit Qureshi2, Yasser Albagory3, Majed Alsanea4, Manal Al Faraj1, Abdul Rahaman Wahab Sait5

    Computer Systems Science and Engineering, Vol.44, No.3, pp. 2395-2409, 2023, DOI:10.32604/csse.2023.027502

    Abstract Fake news and its significance carried the significance of affecting diverse aspects of diverse entities, ranging from a city lifestyle to a country global relativity, various methods are available to collect and determine fake news. The recently developed machine learning (ML) models can be employed for the detection and classification of fake news. This study designs a novel Chaotic Ant Swarm with Weighted Extreme Learning Machine (CAS-WELM) for Cybersecurity Fake News Detection and Classification. The goal of the CAS-WELM technique is to discriminate news into fake and real. The CAS-WELM technique initially pre-processes the input data and Glove technique is… More >

  • Open Access

    ARTICLE

    Awareness about the Online Security Threat and Ways to Secure the Youths

    Yeshi Nidup*

    Journal of Cyber Security, Vol.3, No.3, pp. 133-148, 2021, DOI:10.32604/jcs.2021.024136

    Abstract This study aimed to find out the awareness about the online security threat and understanding of the preventive measuresto secure the youthsfrom online risks. For this, a quantitative method was applied and the survey questionnaire was instituted to collect the data randomly from the youths studying in class eleven and higher. A total of 264 youths, 147 female and 117 male responded to the survey questionnaire. The data was organized and analyzed using Excel data analysis tool package, interpreted and represented in the form of graphs with some explanations. The awareness about the online security threat was found to be… More >

  • Open Access

    ARTICLE

    Target Detection Algorithm in Crime Recognition Using Artificial Intelligence

    Abdulsamad A. AL-Marghilani*

    CMC-Computers, Materials & Continua, Vol.71, No.1, pp. 809-824, 2022, DOI:10.32604/cmc.2022.021185

    Abstract Presently, suspect prediction of crime scenes can be considered as a classification task, which predicts the suspects based on the time, space, and type of crime. Performing digital forensic investigation in a big data environment poses several challenges to the investigational officer. Besides, the facial sketches are widely employed by the law enforcement agencies for assisting the suspect identification of suspects involved in crime scenes. The sketches utilized in the forensic investigations are either drawn by forensic artists or generated through the computer program (composite sketches) based on the verbal explanation given by the eyewitness or victim. Since this suspect… More >

  • Open Access

    ARTICLE

    Prediction of Extremist Behaviour and Suicide Bombing from Terrorism Contents Using Supervised Learning

    Nasir Mahmood*, Muhammad Usman Ghani Khan

    CMC-Computers, Materials & Continua, Vol.70, No.3, pp. 4411-4428, 2022, DOI:10.32604/cmc.2022.013956

    Abstract This study proposes an architecture for the prediction of extremist human behaviour from projected suicide bombings. By linking ‘dots’ of police data comprising scattered information of people, groups, logistics, locations, communication, and spatiotemporal characters on different social media groups, the proposed architecture will spawn beneficial information. This useful information will, in turn, help the police both in predicting potential terrorist events and in investigating previous events. Furthermore, this architecture will aid in the identification of criminals and their associates and handlers. Terrorism is psychological warfare, which, in the broadest sense, can be defined as the utilisation of deliberate violence for… More >

  • Open Access

    ARTICLE

    Safest Route Detection via Danger Index Calculation and K-Means Clustering

    Isha Puthige1, Kartikay Bansal1, Chahat Bindra1, Mahekk Kapur1, Dilbag Singh1, Vipul Kumar Mishra1, Apeksha Aggarwal1, Jinhee Lee2, Byeong-Gwon Kang2, Yunyoung Nam2,*, Reham R. Mostafa3

    CMC-Computers, Materials & Continua, Vol.69, No.2, pp. 2761-2777, 2021, DOI:10.32604/cmc.2021.018128

    Abstract The study aims to formulate a solution for identifying the safest route between any two inputted Geographical locations. Using the New York City dataset, which provides us with location tagged crime statistics; we are implementing different clustering algorithms and analysed the results comparatively to discover the best-suited one. The results unveil the fact that the K-Means algorithm best suits for our needs and delivered the best results. Moreover, a comparative analysis has been performed among various clustering techniques to obtain best results. we compared all the achieved results and using the conclusions we have developed a user-friendly application to provide… More >

  • Open Access

    ARTICLE

    CNN-Based Voice Emotion Classification Model for Risk Detection

    Hyun Yoo1, Ji-Won Baek2, Kyungyong Chung3,*

    Intelligent Automation & Soft Computing, Vol.29, No.2, pp. 319-334, 2021, DOI:10.32604/iasc.2021.018115

    Abstract With the convergence and development of the Internet of things (IoT) and artificial intelligence, closed-circuit television, wearable devices, and artificial neural networks have been combined and applied to crime prevention and follow-up measures against crimes. However, these IoT devices have various limitations based on the physical environment and face the fundamental problem of privacy violations. In this study, voice data are collected and emotions are classified based on an acoustic sensor that is free of privacy violations and is not sensitive to changes in external environments, to overcome these limitations. For the classification of emotions in the voice, the data… More >

  • Open Access

    ARTICLE

    A Fast Detection Method of Network Crime Based on User Portrait

    Yabin Xu1,2,*, Meishu Zhang2, Xiaowei Xu3

    Journal of Information Hiding and Privacy Protection, Vol.3, No.1, pp. 17-28, 2021, DOI:10.32604/jihpp.2021.017497

    Abstract In order to quickly and accurately find the implementer of the network crime, based on the user portrait technology, a rapid detection method for users with abnormal behaviorsis proposed. This method needs to construct the abnormal behavior rule base on various kinds of abnormal behaviors in advance, and construct the user portrait including basic attribute tags, behavior attribute tags and abnormal behavior similarity tagsfor network users who have abnormal behaviors. When a network crime occurs, firstly get the corresponding tag values in all user portraits according to the category of the network crime. Then, use the Naive Bayesian method matching… More >

Displaying 1-10 on page 1 of 14. Per Page