Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (7)
  • Open Access

    ARTICLE

    Adaptable and Dynamic Access Control Decision-Enforcement Approach Based on Multilayer Hybrid Deep Learning Techniques in BYOD Environment

    Aljuaid Turkea Ayedh M1,2,*, Ainuddin Wahid Abdul Wahab1,*, Mohd Yamani Idna Idris1,3

    CMC-Computers, Materials & Continua, Vol.80, No.3, pp. 4663-4686, 2024, DOI:10.32604/cmc.2024.055287 - 12 September 2024

    Abstract Organizations are adopting the Bring Your Own Device (BYOD) concept to enhance productivity and reduce expenses. However, this trend introduces security challenges, such as unauthorized access. Traditional access control systems, such as Attribute-Based Access Control (ABAC) and Role-Based Access Control (RBAC), are limited in their ability to enforce access decisions due to the variability and dynamism of attributes related to users and resources. This paper proposes a method for enforcing access decisions that is adaptable and dynamic, based on multilayer hybrid deep learning techniques, particularly the Tabular Deep Neural Network TabularDNN method. This technique transforms… More >

  • Open Access

    ARTICLE

    Container Instrumentation and Enforcement System for Runtime Security of Kubernetes Platform with eBPF

    Songi Gwak, Thien-Phuc Doan, Souhwan Jung*

    Intelligent Automation & Soft Computing, Vol.37, No.2, pp. 1773-1786, 2023, DOI:10.32604/iasc.2023.039565 - 21 June 2023

    Abstract Containerization is a fundamental component of modern cloud-native infrastructure, and Kubernetes is a prominent platform of container orchestration systems. However, containerization raises significant security concerns due to the nature of sharing a kernel among multiple containers, which can lead to container breakout or privilege escalation. Kubernetes cannot avoid it as well. While various tools, such as container image scanning and configuration checking, can mitigate container workload vulnerabilities, these are not foolproof and cannot guarantee perfect isolation or prevent every active threat in runtime. As such, a policy enforcement solution is required to tackle the problem,… More >

  • Open Access

    ARTICLE

    Discovering the Common Traits of Cybercrimes in Pakistan Using Associative Classification with Ant Colony Optimization

    Abdul Rauf1, Muhammad Asif Khan1,*, Hamid Hussain Awan2, Waseem Shahzad3, Najeeb Ul Husaan4

    Journal of Cyber Security, Vol.4, No.4, pp. 201-222, 2022, DOI:10.32604/jcs.2022.038791 - 10 August 2023

    Abstract In the modern world, law enforcement authorities are facing challenges due to the advanced technology used by criminals to commit crimes. Criminals follow specific patterns to carry out their crimes, which can be identified using machine learning and swarm intelligence approaches. This article proposes the use of the Ant Colony Optimization algorithm to create an associative classification of crime data, which can reveal potential relationships between different features and crime types. The experiments conducted in this research show that this approach can discover various associations among the features of crime data and the specific patterns More >

  • Open Access

    ARTICLE

    Real-time Volume Preserving Constraints for Volumetric Model on GPU

    Hongly Va1, Min-Hyung Choi2, Min Hong3,*

    CMC-Computers, Materials & Continua, Vol.73, No.1, pp. 831-848, 2022, DOI:10.32604/cmc.2022.029576 - 18 May 2022

    Abstract This paper presents a parallel method for simulating real-time 3D deformable objects using the volume preservation mass-spring system method on tetrahedron meshes. In general, the conventional mass-spring system is manipulated as a force-driven method because it is fast, simple to implement, and the parameters can be controlled. However, the springs in traditional mass-spring system can be excessively elongated which cause severe stability and robustness issues that lead to shape restoring, simulation blow-up, and huge volume loss of the deformable object. In addition, traditional method that uses a serial process of the central processing unit (CPU)… More >

  • Open Access

    ARTICLE

    Parallel Cloth Simulation Using OpenGL Shading Language

    Hongly Va1, Min-Hyung Choi2, Min Hong3,*

    Computer Systems Science and Engineering, Vol.41, No.2, pp. 427-443, 2022, DOI:10.32604/csse.2022.020685 - 25 October 2021

    Abstract The primary goal of cloth simulation is to express object behavior in a realistic manner and achieve real-time performance by following the fundamental concept of physic. In general, the mass–spring system is applied to real-time cloth simulation with three types of springs. However, hard spring cloth simulation using the mass–spring system requires a small integration time-step in order to use a large stiffness coefficient. Furthermore, to obtain stable behavior, constraint enforcement is used instead of maintenance of the force of each spring. Constraint force computation involves a large sparse linear solving operation. Due to the… More >

  • Open Access

    ARTICLE

    Smart Dynamic Traffic Monitoring and Enforcement System

    Youssef El-Hansali1, Fatma Outay2,*, Ansar Yasar1, Siham Farrag1,3, Muhammad Shoaib4, Muhammad Imran4, Hammad Hussain Awan5

    CMC-Computers, Materials & Continua, Vol.67, No.3, pp. 2797-2806, 2021, DOI:10.32604/cmc.2021.014812 - 01 March 2021

    Abstract Enforcement of traffic rules and regulations involves a wide range of complex tasks, many of which demand the use of modern technologies. variable speed limits (VSL) control is to change the current speed limit according to the current traffic situation based on the observed traffic conditions. The aim of this study is to provide a simulation-based methodological framework to evaluate (VSL) as an effective Intelligent Transportation System (ITS) enforcement system. The focus of the study is on measuring the effectiveness of the dynamic traffic control strategy on traffic performance and safety considering various performance indicators… More >

  • Open Access

    ARTICLE

    Impolite Pedestrian Detection by Using Enhanced YOLOv3-Tiny

    Yanming Wang1, 2, 3, Kebin Jia1, 2, 3, Pengyu Liu1, 2, 3, *

    Journal on Artificial Intelligence, Vol.2, No.3, pp. 113-124, 2020, DOI:10.32604/jai.2020.010137 - 15 July 2020

    Abstract In recent years, the problem of “Impolite Pedestrian” in front of the zebra crossing has aroused widespread concern from all walks of life. The traffic sector’s governance measures have become more serious. The traditional way of governance is onsite law enforcement, which requires a lot of manpower and material resources and is low efficiency. An enhanced YOLOv3-tiny model is proposed for pedestrians and vehicle detection in traffic monitoring. By modifying the backbone network structure of YOLOv3- tiny model, introducing deep detachable convolution operation, and designing the basic residual block unit of the network, the feature… More >

Displaying 1-10 on page 1 of 7. Per Page