Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (8)
  • Open Access

    ARTICLE

    Active Protection Scheme of DNN Intellectual Property Rights Based on Feature Layer Selection and Hyperchaotic Mapping

    Xintao Duan1,2,*, Yinhang Wu1, Zhao Wang1, Chuan Qin3

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 4887-4906, 2025, DOI:10.32604/cmc.2025.064620 - 30 July 2025

    Abstract Deep neural network (DNN) models have achieved remarkable performance across diverse tasks, leading to widespread commercial adoption. However, training high-accuracy models demands extensive data, substantial computational resources, and significant time investment, making them valuable assets vulnerable to unauthorized exploitation. To address this issue, this paper proposes an intellectual property (IP) protection framework for DNN models based on feature layer selection and hyper-chaotic mapping. Firstly, a sensitivity-based importance evaluation algorithm is used to identify the key feature layers for encryption, effectively protecting the core components of the model. Next, the L1 regularization criterion is applied to More >

  • Open Access

    ARTICLE

    Improved Multi-Fusion Black-Winged Kite Algorithm for Optimizing Stochastic Configuration Networks for Lithium Battery Remaining Life Prediction

    Yuheng Yin, Lin Wang*

    Energy Engineering, Vol.122, No.7, pp. 2845-2864, 2025, DOI:10.32604/ee.2025.065889 - 27 June 2025

    Abstract The accurate estimation of lithium battery state of health (SOH) plays an important role in the health management of battery systems. In order to improve the prediction accuracy of SOH, this paper proposes a stochastic configuration network based on a multi-converged black-winged kite search algorithm, called SBKA-CLSCN. Firstly, the indirect health index (HI) of the battery is extracted by combining it with Person correlation coefficients in the battery charging and discharging cycle point data. Secondly, to address the problem that the black-winged kite optimization algorithm (BKA) falls into the local optimum problem and improve the… More >

  • Open Access

    ARTICLE

    UAV 3D Path Planning Based on Improved Chimp Optimization Algorithm

    Wenli Lei1,2,*, Xinghao Wu1,2, Kun Jia1,2, Jinping Han1,2

    CMC-Computers, Materials & Continua, Vol.83, No.3, pp. 5679-5698, 2025, DOI:10.32604/cmc.2025.061268 - 19 May 2025

    Abstract Aiming to address the limitations of the standard Chimp Optimization Algorithm (ChOA), such as inadequate search ability and susceptibility to local optima in Unmanned Aerial Vehicle (UAV) path planning, this paper proposes a three-dimensional path planning method for UAVs based on the Improved Chimp Optimization Algorithm (IChOA). First, this paper models the terrain and obstacle environments spatially and formulates the total UAV flight cost function according to the constraints, transforming the path planning problem into an optimization problem with multiple constraints. Second, this paper enhances the diversity of the chimpanzee population by applying the Sine… More >

  • Open Access

    ARTICLE

    An Improved Honey Badger Algorithm through Fusing Multi-Strategies

    Zhiwei Ye1, Tao Zhao1, Chun Liu1,*, Daode Zhang1, Wanfang Bai2

    CMC-Computers, Materials & Continua, Vol.76, No.2, pp. 1479-1495, 2023, DOI:10.32604/cmc.2023.038787 - 30 August 2023

    Abstract The Honey Badger Algorithm (HBA) is a novel meta-heuristic algorithm proposed recently inspired by the foraging behavior of honey badgers. The dynamic search behavior of honey badgers with sniffing and wandering is divided into exploration and exploitation in HBA, which has been applied in photovoltaic systems and optimization problems effectively. However, HBA tends to suffer from the local optimum and low convergence. To alleviate these challenges, an improved HBA (IHBA) through fusing multi-strategies is presented in the paper. It introduces Tent chaotic mapping and composite mutation factors to HBA, meanwhile, the random control parameter is More >

  • Open Access

    ARTICLE

    Robust Watermarking Algorithm for Medical Images Based on Non-Subsampled Shearlet Transform and Schur Decomposition

    Meng Yang1, Jingbing Li1,2,*, Uzair Aslam Bhatti1,2, Chunyan Shao1, Yen-Wei Chen3

    CMC-Computers, Materials & Continua, Vol.75, No.3, pp. 5539-5554, 2023, DOI:10.32604/cmc.2023.036904 - 29 April 2023

    Abstract With the development of digitalization in healthcare, more and more information is delivered and stored in digital form, facilitating people’s lives significantly. In the meanwhile, privacy leakage and security issues come along with it. Zero watermarking can solve this problem well. To protect the security of medical information and improve the algorithm’s robustness, this paper proposes a robust watermarking algorithm for medical images based on Non-Subsampled Shearlet Transform (NSST) and Schur decomposition. Firstly, the low-frequency subband image of the original medical image is obtained by NSST and chunked. Secondly, the Schur decomposition of low-frequency blocks… More >

  • Open Access

    ARTICLE

    VLSI Implementation of Optimized 2D SIMM Chaotic Map for Image Encryption

    M. Sundar Prakash Balaji1,*, V. R. Vijaykumar2, Kamalraj Subramaniam3, M. Kannan4, V. Ayyem Pillai5

    Intelligent Automation & Soft Computing, Vol.35, No.3, pp. 3155-3168, 2023, DOI:10.32604/iasc.2023.028969 - 17 August 2022

    Abstract The current research work proposed a novel optimization-based 2D-SIMM (Two-Dimensional Sine Iterative chaotic map with infinite collapse Modulation Map) model for image encryption. The proposed 2D-SIMM model is derived out of sine map and Iterative Chaotic Map with Infinite Collapse (ICMIC). In this technique, scrambling effect is achieved with the help of Chaotic Shift Transform (CST). Chaotic Shift Transform is used to change the value of pixels in the input image while the substituted value is cyclically shifted according to the chaotic sequence generated by 2D-SIMM model. These chaotic sequences, generated using 2D-SIMM model, are More >

  • Open Access

    ARTICLE

    An Improved Gorilla Troops Optimizer Based on Lens Opposition-Based Learning and Adaptive β-Hill Climbing for Global Optimization

    Yaning Xiao, Xue Sun*, Yanling Guo, Sanping Li, Yapeng Zhang, Yangwei Wang

    CMES-Computer Modeling in Engineering & Sciences, Vol.131, No.2, pp. 815-850, 2022, DOI:10.32604/cmes.2022.019198 - 14 March 2022

    Abstract Gorilla troops optimizer (GTO) is a newly developed meta-heuristic algorithm, which is inspired by the collective lifestyle and social intelligence of gorillas. Similar to other metaheuristics, the convergence accuracy and stability of GTO will deteriorate when the optimization problems to be solved become more complex and flexible. To overcome these defects and achieve better performance, this paper proposes an improved gorilla troops optimizer (IGTO). First, Circle chaotic mapping is introduced to initialize the positions of gorillas, which facilitates the population diversity and establishes a good foundation for global search. Then, in order to avoid getting… More >

  • Open Access

    ARTICLE

    A Robust Image Watermarking Scheme Using Z-Transform, Discrete Wavelet Transform and Bidiagonal Singular Value Decomposition

    N. Jayashree1,*, R. S. Bhuvaneswaran1

    CMC-Computers, Materials & Continua, Vol.58, No.1, pp. 263-285, 2019, DOI:10.32604/cmc.2019.03924

    Abstract Watermarking is a widely used solution to the problems of authentication and copyright protection of digital media especially for images, videos, and audio data. Chaos is one of the emerging techniques adopted in image watermarking schemes due to its intrinsic cryptographic properties. This paper proposes a new chaotic hybrid watermarking method combining Discrete Wavelet Transform (DWT), Z-transform (ZT) and Bidiagonal Singular Value Decomposition (BSVD). The original image is decomposed into 3-level DWT, and then, ZT is applied on the HH3 and HL3 sub-bands. The watermark image is encrypted using Arnold Cat Map. BSVD for the More >

Displaying 1-10 on page 1 of 8. Per Page