Search alternatives:
algorithm python » algorithm within (Expand Search), algorithms within (Expand Search), algorithm both (Expand Search)
algorithm etc » algorithm _ (Expand Search), algorithm b (Expand Search), algorithm a (Expand Search)
algorithm pca » algorithm a (Expand Search), algorithm cl (Expand Search), algorithm co (Expand Search)
pca function » gpcr function (Expand Search), a function (Expand Search), fc function (Expand Search)
algorithm python » algorithm within (Expand Search), algorithms within (Expand Search), algorithm both (Expand Search)
algorithm etc » algorithm _ (Expand Search), algorithm b (Expand Search), algorithm a (Expand Search)
algorithm pca » algorithm a (Expand Search), algorithm cl (Expand Search), algorithm co (Expand Search)
pca function » gpcr function (Expand Search), a function (Expand Search), fc function (Expand Search)
-
61
-
62
-
63
-
64
-
65
-
66
-
67
The result of Wilcoxon signed-rand test.
Published 2022Subjects: “…evolutionary genetic algorithm…”
-
68
The Simulation and optimization process of pipe diameter selection.
Published 2022Subjects: “…evolutionary genetic algorithm…”
-
69
Optional pipe diameter and unit price of NYN.
Published 2022Subjects: “…evolutionary genetic algorithm…”
-
70
Optional pipe diameter and unit price of HN.
Published 2022Subjects: “…evolutionary genetic algorithm…”
-
71
-
72
-
73
Practical rules for summing the series of the Tweedie probability density function with high-precision arithmetic
Published 2019“…With these practical rules, simple summation algorithms provide sufficiently robust results for the calculation of the density function and its definite integrals. …”
-
74
-
75
-
76
Comparison of UACI among different algorithms.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
77
Comparison of NPCR among different algorithms.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
78
-
79
-
80