Search alternatives:
algorithm python » algorithm within (Expand Search), algorithms within (Expand Search), algorithm both (Expand Search)
algorithm steps » algorithm shows (Expand Search), algorithm models (Expand Search)
python function » protein function (Expand Search)
steps function » step function (Expand Search), its function (Expand Search), cep function (Expand Search)
algorithm etc » algorithm _ (Expand Search), algorithm b (Expand Search), algorithm a (Expand Search)
etc function » fc function (Expand Search), spc function (Expand Search), npc function (Expand Search)
algorithm python » algorithm within (Expand Search), algorithms within (Expand Search), algorithm both (Expand Search)
algorithm steps » algorithm shows (Expand Search), algorithm models (Expand Search)
python function » protein function (Expand Search)
steps function » step function (Expand Search), its function (Expand Search), cep function (Expand Search)
algorithm etc » algorithm _ (Expand Search), algorithm b (Expand Search), algorithm a (Expand Search)
etc function » fc function (Expand Search), spc function (Expand Search), npc function (Expand Search)
-
121
-
122
-
123
-
124
-
125
-
126
-
127
-
128
-
129
-
130
-
131
-
132
The losses of the training process before and after the optimization of loss function.
Published 2022Subjects: -
133
-
134
Flowchart outlining the spectral analysis reconstruction algorithm for quantitative phase imaging using non-telecentric DHM systems.
Published 2023Subjects: “…developed computational algorithm…”
-
135
-
136
-
137
Comparison of UACI among different algorithms.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
138
Comparison of NPCR among different algorithms.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
139
-
140