Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (6)
  • Open Access

    ARTICLE

    Discovering the Common Traits of Cybercrimes in Pakistan Using Associative Classification with Ant Colony Optimization

    Abdul Rauf1, Muhammad Asif Khan1,*, Hamid Hussain Awan2, Waseem Shahzad3, Najeeb Ul Husaan4

    Journal of Cyber Security, Vol.4, No.4, pp. 201-222, 2022, DOI:10.32604/jcs.2022.038791

    Abstract In the modern world, law enforcement authorities are facing challenges due to the advanced technology used by criminals to commit crimes. Criminals follow specific patterns to carry out their crimes, which can be identified using machine learning and swarm intelligence approaches. This article proposes the use of the Ant Colony Optimization algorithm to create an associative classification of crime data, which can reveal potential relationships between different features and crime types. The experiments conducted in this research show that this approach can discover various associations among the features of crime data and the specific patterns that major crime types depend… More >

  • Open Access

    ARTICLE

    Container Instrumentation and Enforcement System for Runtime Security of Kubernetes Platform with eBPF

    Songi Gwak, Thien-Phuc Doan, Souhwan Jung*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1773-1786, 2023, DOI:10.32604/iasc.2023.039565

    Abstract Containerization is a fundamental component of modern cloud-native infrastructure, and Kubernetes is a prominent platform of container orchestration systems. However, containerization raises significant security concerns due to the nature of sharing a kernel among multiple containers, which can lead to container breakout or privilege escalation. Kubernetes cannot avoid it as well. While various tools, such as container image scanning and configuration checking, can mitigate container workload vulnerabilities, these are not foolproof and cannot guarantee perfect isolation or prevent every active threat in runtime. As such, a policy enforcement solution is required to tackle the problem, and existing solutions based on… More >

  • Open Access

    ARTICLE

    Real-time Volume Preserving Constraints for Volumetric Model on GPU

    Hongly Va1, Min-Hyung Choi2, Min Hong3,*

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 831-848, 2022, DOI:10.32604/cmc.2022.029576

    Abstract This paper presents a parallel method for simulating real-time 3D deformable objects using the volume preservation mass-spring system method on tetrahedron meshes. In general, the conventional mass-spring system is manipulated as a force-driven method because it is fast, simple to implement, and the parameters can be controlled. However, the springs in traditional mass-spring system can be excessively elongated which cause severe stability and robustness issues that lead to shape restoring, simulation blow-up, and huge volume loss of the deformable object. In addition, traditional method that uses a serial process of the central processing unit (CPU) to solve the system in… More >

  • Open Access

    ARTICLE

    Parallel Cloth Simulation Using OpenGL Shading Language

    Hongly Va1, Min-Hyung Choi2, Min Hong3,*

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 427-443, 2022, DOI:10.32604/csse.2022.020685

    Abstract The primary goal of cloth simulation is to express object behavior in a realistic manner and achieve real-time performance by following the fundamental concept of physic. In general, the mass–spring system is applied to real-time cloth simulation with three types of springs. However, hard spring cloth simulation using the mass–spring system requires a small integration time-step in order to use a large stiffness coefficient. Furthermore, to obtain stable behavior, constraint enforcement is used instead of maintenance of the force of each spring. Constraint force computation involves a large sparse linear solving operation. Due to the large computation, we implement a… More >

  • Open Access

    ARTICLE

    Smart Dynamic Traffic Monitoring and Enforcement System

    Youssef El-Hansali1, Fatma Outay2,*, Ansar Yasar1, Siham Farrag1,3, Muhammad Shoaib4, Muhammad Imran4, Hammad Hussain Awan5

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 2797-2806, 2021, DOI:10.32604/cmc.2021.014812

    Abstract Enforcement of traffic rules and regulations involves a wide range of complex tasks, many of which demand the use of modern technologies. variable speed limits (VSL) control is to change the current speed limit according to the current traffic situation based on the observed traffic conditions. The aim of this study is to provide a simulation-based methodological framework to evaluate (VSL) as an effective Intelligent Transportation System (ITS) enforcement system. The focus of the study is on measuring the effectiveness of the dynamic traffic control strategy on traffic performance and safety considering various performance indicators such as total travel time,… More >

  • Open Access

    ARTICLE

    Impolite Pedestrian Detection by Using Enhanced YOLOv3-Tiny

    Yanming Wang1, 2, 3, Kebin Jia1, 2, 3, Pengyu Liu1, 2, 3, *

    Journal on Artificial Intelligence, Vol.2, No.3, pp. 113-124, 2020, DOI:10.32604/jai.2020.010137

    Abstract In recent years, the problem of “Impolite Pedestrian” in front of the zebra crossing has aroused widespread concern from all walks of life. The traffic sector’s governance measures have become more serious. The traditional way of governance is onsite law enforcement, which requires a lot of manpower and material resources and is low efficiency. An enhanced YOLOv3-tiny model is proposed for pedestrians and vehicle detection in traffic monitoring. By modifying the backbone network structure of YOLOv3- tiny model, introducing deep detachable convolution operation, and designing the basic residual block unit of the network, the feature extraction ability of the backbone… More >

Displaying 1-10 on page 1 of 6. Per Page