Showing 61 - 80 results of 759 for search '(( ((algorithm pca) OR (algorithm etc)) function ) OR ( algorithm python function ))', query time: 0.32s Refine Results
  1. 61
  2. 62
  3. 63
  4. 64
  5. 65

    Information of nodes and pipes of NYN. by Yi Tao (178829)

    Published 2022
    Subjects: “…evolutionary genetic algorithm…”
  6. 66

    The topology of the NYN. by Yi Tao (178829)

    Published 2022
    Subjects: “…evolutionary genetic algorithm…”
  7. 67

    The result of Wilcoxon signed-rand test. by Yi Tao (178829)

    Published 2022
    Subjects: “…evolutionary genetic algorithm…”
  8. 68

    The Simulation and optimization process of pipe diameter selection. by Yi Tao (178829)

    Published 2022
    Subjects: “…evolutionary genetic algorithm…”
  9. 69

    Optional pipe diameter and unit price of NYN. by Yi Tao (178829)

    Published 2022
    Subjects: “…evolutionary genetic algorithm…”
  10. 70

    Optional pipe diameter and unit price of HN. by Yi Tao (178829)

    Published 2022
    Subjects: “…evolutionary genetic algorithm…”
  11. 71

    The topology of HN. by Yi Tao (178829)

    Published 2022
    Subjects: “…evolutionary genetic algorithm…”
  12. 72

    Information of nodes and pipes of HN. by Yi Tao (178829)

    Published 2022
    Subjects: “…evolutionary genetic algorithm…”
  13. 73

    Practical rules for summing the series of the Tweedie probability density function with high-precision arithmetic by NELSON L. DIAS (8078003)

    Published 2019
    “…With these practical rules, simple summation algorithms provide sufficiently robust results for the calculation of the density function and its definite integrals. …”
  14. 74
  15. 75
  16. 76

    Comparison of UACI among different algorithms. by Feixian Liu (22477943)

    Published 2025
    “…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
  17. 77

    Comparison of NPCR among different algorithms. by Feixian Liu (22477943)

    Published 2025
    “…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
  18. 78
  19. 79
  20. 80