Search alternatives:
algorithm etc » algorithm b (Expand Search), algorithm a (Expand Search), algorithm i (Expand Search)
etc function » fc function (Expand Search), spc function (Expand Search), npc function (Expand Search)
algorithm cl » algorithm co (Expand Search), algorithm b (Expand Search), algorithm a (Expand Search)
cl function » l function (Expand Search), cell function (Expand Search), cep function (Expand Search)
algorithm etc » algorithm b (Expand Search), algorithm a (Expand Search), algorithm i (Expand Search)
etc function » fc function (Expand Search), spc function (Expand Search), npc function (Expand Search)
algorithm cl » algorithm co (Expand Search), algorithm b (Expand Search), algorithm a (Expand Search)
cl function » l function (Expand Search), cell function (Expand Search), cep function (Expand Search)
-
1
-
2
Convergence curves obtained by different algorithms on 23 benchmark functions.
Published 2025Subjects: -
3
-
4
-
5
Convergence curves obtained by different algorithms on CEC2022 benchmark functions.
Published 2025Subjects: -
6
Convergence curves on the functions CL4, CL11, CL13, CL14, CL18, CL19, C17F1, C17F2, and C17F4.
Published 2025Subjects: -
7
-
8
-
9
Multi-functional liquid crystal devices based on random binary matrix algorithm
Published 2023“…<p>Multi-functional diffraction gratings have found broad applications in laser processing, medicine, beam manipulation, etc. …”
-
10
-
11
-
12
-
13
-
14
-
15
-
16
-
17
Comparison of UACI among different algorithms.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
18
Comparison of NPCR among different algorithms.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
19
-
20