Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (26)
  • Open Access

    ARTICLE

    APPLE_YOLO: Apple Detection Method Based on Channel Pruning and Knowledge Distillation in Complicated Environments

    Xin Ma1,2, Jin Lei3,4,*, Chenying Pei4, Chunming Wu4

    CMC-Computers, Materials & Continua, Vol.86, No.2, pp. 1-17, 2026, DOI:10.32604/cmc.2025.069353 - 09 December 2025

    Abstract This study proposes a lightweight apple detection method employing cascaded knowledge distillation (KD) to address the critical challenges of excessive parameters and high deployment costs in existing models. We introduce a Lightweight Feature Pyramid Network (LFPN) integrated with Lightweight Downsampling Convolutions (LDConv) to substantially reduce model complexity without compromising accuracy. A Lightweight Multi-channel Attention (LMCA) mechanism is incorporated between the backbone and neck networks to effectively suppress complex background interference in orchard environments. Furthermore, model size is compressed via Group_Slim channel pruning combined with a cascaded distillation strategy. Experimental results demonstrate that the proposed model More >

  • Open Access

    ARTICLE

    A Novel Reduced Error Pruning Tree Forest with Time-Based Missing Data Imputation (REPTF-TMDI) for Traffic Flow Prediction

    Yunus Dogan1, Goksu Tuysuzoglu1, Elife Ozturk Kiyak2, Bita Ghasemkhani3, Kokten Ulas Birant1,4, Semih Utku1, Derya Birant1,*

    CMES-Computer Modeling in Engineering & Sciences, Vol.144, No.2, pp. 1677-1715, 2025, DOI:10.32604/cmes.2025.069255 - 31 August 2025

    Abstract Accurate traffic flow prediction (TFP) is vital for efficient and sustainable transportation management and the development of intelligent traffic systems. However, missing data in real-world traffic datasets poses a significant challenge to maintaining prediction precision. This study introduces REPTF-TMDI, a novel method that combines a Reduced Error Pruning Tree Forest (REPTree Forest) with a newly proposed Time-based Missing Data Imputation (TMDI) approach. The REPTree Forest, an ensemble learning approach, is tailored for time-related traffic data to enhance predictive accuracy and support the evolution of sustainable urban mobility solutions. Meanwhile, the TMDI approach exploits temporal patterns… More >

  • Open Access

    ARTICLE

    A Black-Box Speech Adversarial Attack Method Based on Enhanced Neural Predictors in Industrial IoT

    Yun Zhang, Zhenhua Yu*, Xufei Hu, Xuya Cong, Ou Ye

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 5403-5426, 2025, DOI:10.32604/cmc.2025.067120 - 30 July 2025

    Abstract Devices in Industrial Internet of Things are vulnerable to voice adversarial attacks. Studying adversarial speech samples is crucial for enhancing the security of automatic speech recognition systems in Industrial Internet of Things devices. Current black-box attack methods often face challenges such as complex search processes and excessive perturbation generation. To address these issues, this paper proposes a black-box voice adversarial attack method based on enhanced neural predictors. This method searches for minimal perturbations in the perturbation space, employing an optimization process guided by a self-attention neural predictor to identify the optimal perturbation direction. This direction… More >

  • Open Access

    ARTICLE

    Active Protection Scheme of DNN Intellectual Property Rights Based on Feature Layer Selection and Hyperchaotic Mapping

    Xintao Duan1,2,*, Yinhang Wu1, Zhao Wang1, Chuan Qin3

    CMC-Computers, Materials & Continua, Vol.84, No.3, pp. 4887-4906, 2025, DOI:10.32604/cmc.2025.064620 - 30 July 2025

    Abstract Deep neural network (DNN) models have achieved remarkable performance across diverse tasks, leading to widespread commercial adoption. However, training high-accuracy models demands extensive data, substantial computational resources, and significant time investment, making them valuable assets vulnerable to unauthorized exploitation. To address this issue, this paper proposes an intellectual property (IP) protection framework for DNN models based on feature layer selection and hyper-chaotic mapping. Firstly, a sensitivity-based importance evaluation algorithm is used to identify the key feature layers for encryption, effectively protecting the core components of the model. Next, the L1 regularization criterion is applied to More >

  • Open Access

    ARTICLE

    Hierarchical Shape Pruning for 3D Sparse Convolution Networks

    Haiyan Long1, Chonghao Zhang2, Xudong Qiu3, Hai Chen2,*, Gang Chen4,*

    CMC-Computers, Materials & Continua, Vol.84, No.2, pp. 2975-2988, 2025, DOI:10.32604/cmc.2025.065047 - 03 July 2025

    Abstract 3D sparse convolution has emerged as a pivotal technique for efficient voxel-based perception in autonomous systems, enabling selective feature extraction from non-empty voxels while suppressing computational waste. Despite its theoretical efficiency advantages, practical implementations face under-explored limitations: the fixed geometric patterns of conventional sparse convolutional kernels inevitably process non-contributory positions during sliding-window operations, particularly in regions with uneven point cloud density. To address this, we propose Hierarchical Shape Pruning for 3D Sparse Convolution (HSP-S), which dynamically eliminates redundant kernel stripes through layer-adaptive thresholding. Unlike static soft pruning methods, HSP-S maintains trainable sparsity patterns by progressively… More >

  • Open Access

    ARTICLE

    SFPBL: Soft Filter Pruning Based on Logistic Growth Differential Equation for Neural Network

    Can Hu1, Shanqing Zhang2,*, Kewei Tao2, Gaoming Yang1, Li Li2

    CMC-Computers, Materials & Continua, Vol.82, No.3, pp. 4913-4930, 2025, DOI:10.32604/cmc.2025.059770 - 06 March 2025

    Abstract The surge of large-scale models in recent years has led to breakthroughs in numerous fields, but it has also introduced higher computational costs and more complex network architectures. These increasingly large and intricate networks pose challenges for deployment and execution while also exacerbating the issue of network over-parameterization. To address this issue, various network compression techniques have been developed, such as network pruning. A typical pruning algorithm follows a three-step pipeline involving training, pruning, and retraining. Existing methods often directly set the pruned filters to zero during retraining, significantly reducing the parameter space. However, this… More >

  • Open Access

    ARTICLE

    LSBSP: A Lightweight Sharding Method of Blockchain Based on State Pruning for Efficient Data Sharing in IoMT

    Guoqiong Liao1,3, Yinxiang Lei1,2,*, Yufang Xie1, Neal N. Xiong4

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 3309-3335, 2025, DOI:10.32604/cmc.2024.060077 - 17 February 2025

    Abstract As the Internet of Medical Things (IoMT) continues to expand, smart health-monitoring devices generate vast amounts of valuable data while simultaneously raising critical security and privacy challenges. Blockchain technology presents a promising avenue to address these concerns due to its inherent decentralization and security features. However, scalability remains a persistent hurdle, particularly for IoMT applications that involve large-scale networks and resource-constrained devices. This paper introduces a novel lightweight sharding method tailored to the unique demands of IoMT data sharing. Our approach enhances state bootstrapping efficiency and reduces operational overhead by utilizing a dual-chain structure comprising… More >

  • Open Access

    ARTICLE

    PPS-SLAM: Dynamic Visual SLAM with a Precise Pruning Strategy

    Jiansheng Peng1,2,3,4,*, Wei Qian1, Hongyu Zhang1

    CMC-Computers, Materials & Continua, Vol.82, No.2, pp. 2849-2868, 2025, DOI:10.32604/cmc.2024.058028 - 17 February 2025

    Abstract Dynamic visual SLAM (Simultaneous Localization and Mapping) is an important research area, but existing methods struggle to balance real-time performance and accuracy in removing dynamic feature points, especially when semantic information is missing. This paper presents a novel dynamic SLAM system that uses optical flow tracking and epipolar geometry to identify dynamic feature points and applies a regional dynamic probability method to improve removal accuracy. We developed two innovative algorithms for precise pruning of dynamic regions: first, using optical flow and epipolar geometry to identify and prune dynamic areas while preserving static regions on stationary… More >

  • Open Access

    ARTICLE

    Optimizing BERT for Bengali Emotion Classification: Evaluating Knowledge Distillation, Pruning, and Quantization

    Md Hasibur Rahman, Mohammed Arif Uddin, Zinnat Fowzia Ria, Rashedur M. Rahman*

    CMES-Computer Modeling in Engineering & Sciences, Vol.142, No.2, pp. 1637-1666, 2025, DOI:10.32604/cmes.2024.058329 - 27 January 2025

    Abstract The rapid growth of digital data necessitates advanced natural language processing (NLP) models like BERT (Bidirectional Encoder Representations from Transformers), known for its superior performance in text classification. However, BERT’s size and computational demands limit its practicality, especially in resource-constrained settings. This research compresses the BERT base model for Bengali emotion classification through knowledge distillation (KD), pruning, and quantization techniques. Despite Bengali being the sixth most spoken language globally, NLP research in this area is limited. Our approach addresses this gap by creating an efficient BERT-based model for Bengali text. We have explored 20 combinations… More > Graphic Abstract

    Optimizing BERT for Bengali Emotion Classification: Evaluating Knowledge Distillation, Pruning, and Quantization

  • Open Access

    ARTICLE

    Detection and Recognition of Spray Code Numbers on Can Surfaces Based on OCR

    Hailong Wang*, Junchao Shi

    CMC-Computers, Materials & Continua, Vol.82, No.1, pp. 1109-1128, 2025, DOI:10.32604/cmc.2024.057706 - 03 January 2025

    Abstract A two-stage algorithm based on deep learning for the detection and recognition of can bottom spray codes and numbers is proposed to address the problems of small character areas and fast production line speeds in can bottom spray code number recognition. In the coding number detection stage, Differentiable Binarization Network is used as the backbone network, combined with the Attention and Dilation Convolutions Path Aggregation Network feature fusion structure to enhance the model detection effect. In terms of text recognition, using the Scene Visual Text Recognition coding number recognition network for end-to-end training can alleviate… More >

Displaying 1-10 on page 1 of 26. Per Page