بدائل البحث:
using function » using functional (توسيع البحث), sine function (توسيع البحث), waning function (توسيع البحث)
algorithm etc » algorithm b (توسيع البحث), algorithm a (توسيع البحث), algorithm i (توسيع البحث)
etc function » fc function (توسيع البحث), spc function (توسيع البحث), npc function (توسيع البحث)
using function » using functional (توسيع البحث), sine function (توسيع البحث), waning function (توسيع البحث)
algorithm etc » algorithm b (توسيع البحث), algorithm a (توسيع البحث), algorithm i (توسيع البحث)
etc function » fc function (توسيع البحث), spc function (توسيع البحث), npc function (توسيع البحث)
-
1
Multi-functional liquid crystal devices based on random binary matrix algorithm
منشور في 2023"…<p>Multi-functional diffraction gratings have found broad applications in laser processing, medicine, beam manipulation, etc. …"
-
2
-
3
-
4
-
5
-
6
-
7
Curves of sigmoid functions used in our proposed algorithm.
منشور في 2022"…<p>Curves of sigmoid functions used in our proposed algorithm.</p>…"
-
8
-
9
-
10
-
11
Algorithmic flow of the verifiable delay function.
منشور في 2024"…<p>Algorithmic flow of the verifiable delay function.</p>…"
-
12
Benchmark functions T-test for the proposed and compared algorithms.
منشور في 2023"…<p>Benchmark functions T-test for the proposed and compared algorithms.…"
-
13
-
14
Proposed algorithm convergence curves versus other competing algorithms for the seven benchmark functions.
منشور في 2023"…<p>Proposed algorithm convergence curves versus other competing algorithms for the seven benchmark functions.…"
-
15
Graph of convergence of PSO algorithm fitness function.
منشور في 2024"…<p>Graph of convergence of PSO algorithm fitness function.</p>…"
-
16
Comparison of UACI among different algorithms.
منشور في 2025"…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
-
17
Comparison of NPCR among different algorithms.
منشور في 2025"…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
-
18
Convergence curves obtained by different algorithms on 23 benchmark functions.
منشور في 2025الموضوعات: -
19
-
20