Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (99)
  • Open Access

    ARTICLE

    A Study on Enhancing Chip Detection Efficiency Using the Lightweight Van-YOLOv8 Network

    Meng Huang, Honglei Wei*, Xianyi Zhai

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 531-547, 2024, DOI:10.32604/cmc.2024.048510

    Abstract In pursuit of cost-effective manufacturing, enterprises are increasingly adopting the practice of utilizing recycled semiconductor chips. To ensure consistent chip orientation during packaging, a circular marker on the front side is employed for pin alignment following successful functional testing. However, recycled chips often exhibit substantial surface wear, and the identification of the relatively small marker proves challenging. Moreover, the complexity of generic target detection algorithms hampers seamless deployment. Addressing these issues, this paper introduces a lightweight YOLOv8s-based network tailored for detecting markings on recycled chips, termed Van-YOLOv8. Initially, to alleviate the influence of diminutive, low-resolution markings on the precision of… More >

  • Open Access

    ARTICLE

    YOLOv5ST: A Lightweight and Fast Scene Text Detector

    Yiwei Liu1, Yingnan Zhao1,*, Yi Chen1, Zheng Hu1, Min Xia2

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 909-926, 2024, DOI:10.32604/cmc.2024.047901

    Abstract Scene text detection is an important task in computer vision. In this paper, we present YOLOv5 Scene Text (YOLOv5ST), an optimized architecture based on YOLOv5 v6.0 tailored for fast scene text detection. Our primary goal is to enhance inference speed without sacrificing significant detection accuracy, thereby enabling robust performance on resource-constrained devices like drones, closed-circuit television cameras, and other embedded systems. To achieve this, we propose key modifications to the network architecture to lighten the original backbone and improve feature aggregation, including replacing standard convolution with depth-wise convolution, adopting the C2 sequence module in place of C3, employing Spatial Pyramid… More >

  • Open Access

    ARTICLE

    A Lightweight, Searchable, and Controllable EMR Sharing Scheme

    Xiaohui Yang, Peiyin Zhao*

    CMC-Computers, Materials & Continua, Vol.79, No.1, pp. 1521-1538, 2024, DOI:10.32604/cmc.2024.047666

    Abstract Electronic medical records (EMR) facilitate the sharing of medical data, but existing sharing schemes suffer from privacy leakage and inefficiency. This article proposes a lightweight, searchable, and controllable EMR sharing scheme, which employs a large attribute domain and a linear secret sharing structure (LSSS), the computational overhead of encryption and decryption reaches a lightweight constant level, and supports keyword search and policy hiding, which improves the high efficiency of medical data sharing. The dynamic accumulator technology is utilized to enable data owners to flexibly authorize or revoke the access rights of data visitors to the data to achieve controllability of… More >

  • Open Access

    ARTICLE

    A Lightweight Network with Dual Encoder and Cross Feature Fusion for Cement Pavement Crack Detection

    Zhong Qu1,*, Guoqing Mu1, Bin Yuan2

    CMES-Computer Modeling in Engineering & Sciences, Vol.140, No.1, pp. 255-273, 2024, DOI:10.32604/cmes.2024.048175

    Abstract Automatic crack detection of cement pavement chiefly benefits from the rapid development of deep learning, with convolutional neural networks (CNN) playing an important role in this field. However, as the performance of crack detection in cement pavement improves, the depth and width of the network structure are significantly increased, which necessitates more computing power and storage space. This limitation hampers the practical implementation of crack detection models on various platforms, particularly portable devices like small mobile devices. To solve these problems, we propose a dual-encoder-based network architecture that focuses on extracting more comprehensive fracture feature information and combines cross-fusion modules… More > Graphic Abstract

    A Lightweight Network with Dual Encoder and Cross Feature Fusion for Cement Pavement Crack Detection

  • Open Access

    ARTICLE

    A Hybrid and Lightweight Device-to-Server Authentication Technique for the Internet of Things

    Shaha Al-Otaibi1, Rahim Khan2,*, Hashim Ali2, Aftab Ahmed Khan2, Amir Saeed3, Jehad Ali4,*

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 3805-3823, 2024, DOI:10.32604/cmc.2024.049017

    Abstract The Internet of Things (IoT) is a smart networking infrastructure of physical devices, i.e., things, that are embedded with sensors, actuators, software, and other technologies, to connect and share data with the respective server module. Although IoTs are cornerstones in different application domains, the device’s authenticity, i.e., of server(s) and ordinary devices, is the most crucial issue and must be resolved on a priority basis. Therefore, various field-proven methodologies were presented to streamline the verification process of the communicating devices; however, location-aware authentication has not been reported as per our knowledge, which is a crucial metric, especially in scenarios where… More >

  • Open Access

    ARTICLE

    Lightweight Cross-Modal Multispectral Pedestrian Detection Based on Spatial Reweighted Attention Mechanism

    Lujuan Deng, Ruochong Fu*, Zuhe Li, Boyi Liu, Mengze Xue, Yuhao Cui

    CMC-Computers, Materials & Continua, Vol.78, No.3, pp. 4071-4089, 2024, DOI:10.32604/cmc.2024.048200

    Abstract Multispectral pedestrian detection technology leverages infrared images to provide reliable information for visible light images, demonstrating significant advantages in low-light conditions and background occlusion scenarios. However, while continuously improving cross-modal feature extraction and fusion, ensuring the model’s detection speed is also a challenging issue. We have devised a deep learning network model for cross-modal pedestrian detection based on Resnet50, aiming to focus on more reliable features and enhance the model’s detection efficiency. This model employs a spatial attention mechanism to reweight the input visible light and infrared image data, enhancing the model’s focus on different spatial positions and sharing the… More >

  • Open Access

    ARTICLE

    ASLP-DL —A Novel Approach Employing Lightweight Deep Learning Framework for Optimizing Accident Severity Level Prediction

    Saba Awan1,*, Zahid Mehmood2,*

    CMC-Computers, Materials & Continua, Vol.78, No.2, pp. 2535-2555, 2024, DOI:10.32604/cmc.2024.047337

    Abstract Highway safety researchers focus on crash injury severity, utilizing deep learning—specifically, deep neural networks (DNN), deep convolutional neural networks (D-CNN), and deep recurrent neural networks (D-RNN)—as the preferred method for modeling accident severity. Deep learning’s strength lies in handling intricate relationships within extensive datasets, making it popular for accident severity level (ASL) prediction and classification. Despite prior success, there is a need for an efficient system recognizing ASL in diverse road conditions. To address this, we present an innovative Accident Severity Level Prediction Deep Learning (ASLP-DL) framework, incorporating DNN, D-CNN, and D-RNN models fine-tuned through iterative hyperparameter selection with Stochastic… More >

  • Open Access

    REVIEW

    A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices

    Sunil Kumar1, Dilip Kumar1, Ramraj Dangi2, Gaurav Choudhary3, Nicola Dragoni4, Ilsun You5,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 31-63, 2024, DOI:10.32604/cmc.2023.047084

    Abstract The widespread and growing interest in the Internet of Things (IoT) may be attributed to its usefulness in many different fields. Physical settings are probed for data, which is then transferred via linked networks. There are several hurdles to overcome when putting IoT into practice, from managing server infrastructure to coordinating the use of tiny sensors. When it comes to deploying IoT, everyone agrees that security is the biggest issue. This is due to the fact that a large number of IoT devices exist in the physical world and that many of them have constrained resources such as electricity, memory,… More >

  • Open Access

    ARTICLE

    Lightweight Intrusion Detection Using Reservoir Computing

    Jiarui Deng1,2, Wuqiang Shen1,3, Yihua Feng4, Guosheng Lu5, Guiquan Shen1,3, Lei Cui1,3, Shanxiang Lyu1,2,*

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 1345-1361, 2024, DOI:10.32604/cmc.2023.047079

    Abstract The blockchain-empowered Internet of Vehicles (IoV) enables various services and achieves data security and privacy, significantly advancing modern vehicle systems. However, the increased frequency of data transmission and complex network connections among nodes also make them more susceptible to adversarial attacks. As a result, an efficient intrusion detection system (IDS) becomes crucial for securing the IoV environment. Existing IDSs based on convolutional neural networks (CNN) often suffer from high training time and storage requirements. In this paper, we propose a lightweight IDS solution to protect IoV against both intra-vehicle and external threats. Our approach achieves superior performance, as demonstrated by… More >

  • Open Access

    ARTICLE

    Lightweight Malicious Code Classification Method Based on Improved SqueezeNet

    Li Li*, Youran Kong, Qing Zhang

    CMC-Computers, Materials & Continua, Vol.78, No.1, pp. 551-567, 2024, DOI:10.32604/cmc.2023.045512

    Abstract With the growth of the Internet, more and more business is being done online, for example, online offices, online education and so on. While this makes people’s lives more convenient, it also increases the risk of the network being attacked by malicious code. Therefore, it is important to identify malicious codes on computer systems efficiently. However, most of the existing malicious code detection methods have two problems: (1) The ability of the model to extract features is weak, resulting in poor model performance. (2) The large scale of model data leads to difficulties deploying on devices with limited resources. Therefore,… More >

Displaying 1-10 on page 1 of 99. Per Page