Search alternatives:
algorithm python » algorithm within (Expand Search), algorithms within (Expand Search), algorithm both (Expand Search)
python function » protein function (Expand Search)
algorithm etc » algorithm _ (Expand Search), algorithm b (Expand Search), algorithm a (Expand Search)
algorithm pre » algorithm where (Expand Search), algorithm used (Expand Search), algorithm from (Expand Search)
etc function » fc function (Expand Search), spc function (Expand Search), npc function (Expand Search)
pre function » spread function (Expand Search), sphere function (Expand Search), three function (Expand Search)
algorithm python » algorithm within (Expand Search), algorithms within (Expand Search), algorithm both (Expand Search)
python function » protein function (Expand Search)
algorithm etc » algorithm _ (Expand Search), algorithm b (Expand Search), algorithm a (Expand Search)
algorithm pre » algorithm where (Expand Search), algorithm used (Expand Search), algorithm from (Expand Search)
etc function » fc function (Expand Search), spc function (Expand Search), npc function (Expand Search)
pre function » spread function (Expand Search), sphere function (Expand Search), three function (Expand Search)
-
61
-
62
Comparison of UACI among different algorithms.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
63
Comparison of NPCR among different algorithms.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
64
-
65
-
66
-
67
-
68
-
69
-
70
-
71
-
72
-
73
Parselmouth for bioacoustics: automated acoustic analysis in Python
Published 2023“…Five years ago, the Python package Parselmouth was released to provide easy and intuitive access to all functionality in the Praat software. …”
-
74
-
75
Multi-functional liquid crystal devices based on random binary matrix algorithm
Published 2023“…<p>Multi-functional diffraction gratings have found broad applications in laser processing, medicine, beam manipulation, etc. …”
-
76
-
77
Pre-trained protein language model.
Published 2023“…This paper proposes a novel idea that develops a pre-trained protein sequence embedding model combined with a one-dimensional convolutional neural network, called Embed-1dCNN, to predict protein hotspot residues. …”
-
78
-
79
-
80
ADT: A Generalized Algorithm and Program for Beyond Born–Oppenheimer Equations of “<i>N</i>” Dimensional Sub-Hilbert Space
Published 2020“…In order to overcome such shortcoming, we develop a generalized algorithm, “ADT” to generate the nonadiabatic equations through symbolic manipulation and to construct highly accurate diabatic surfaces for molecular processes involving excited electronic states. …”