Search alternatives:
algorithms complex » algorithms combined (Expand Search)
complex functions » complex conditions (Expand Search)
algorithm python » algorithm within (Expand Search), algorithms within (Expand Search), algorithm both (Expand Search)
algorithm etc » algorithm _ (Expand Search), algorithm b (Expand Search), algorithm a (Expand Search)
algorithms complex » algorithms combined (Expand Search)
complex functions » complex conditions (Expand Search)
algorithm python » algorithm within (Expand Search), algorithms within (Expand Search), algorithm both (Expand Search)
algorithm etc » algorithm _ (Expand Search), algorithm b (Expand Search), algorithm a (Expand Search)
-
1
-
2
Convergence curves obtained by different algorithms on 23 benchmark functions.
Published 2025Subjects: -
3
-
4
-
5
Convergence curves obtained by different algorithms on CEC2022 benchmark functions.
Published 2025Subjects: -
6
-
7
-
8
-
9
-
10
-
11
Results of the application of different clustering algorithms to average functional connectivity from healthy subjects.
Published 2023“…<p>A) Resulting cluster inertia from applying the k-means algorithm described in the methods to empirical averaged functional connectivity from healthy subjects, with different numbers of clusters. …”
-
12
-
13
-
14
Python implementation of the Trajectory Adaptive Multilevel Sampling algorithm for rare events and improvements
Published 2021“…In `main.py`, the parameters for the TAMS algorithm are specified (trajectory time, time step, score function, number of particles, type of score threshold, maximum number of iterations, noise level etc.). …”
-
15
Comparison of UACI among different algorithms.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
16
Comparison of NPCR among different algorithms.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
17
-
18
-
19
-
20