بدائل البحث:
against function » against extinction (توسيع البحث), against infection (توسيع البحث)
algorithm three » algorithm where (توسيع البحث), algorithm pre (توسيع البحث)
three function » three functional (توسيع البحث), tree functional (توسيع البحث), time function (توسيع البحث)
algorithm a » algorithm _ (توسيع البحث), algorithm b (توسيع البحث), algorithms _ (توسيع البحث)
a function » _ function (توسيع البحث)
against function » against extinction (توسيع البحث), against infection (توسيع البحث)
algorithm three » algorithm where (توسيع البحث), algorithm pre (توسيع البحث)
three function » three functional (توسيع البحث), tree functional (توسيع البحث), time function (توسيع البحث)
algorithm a » algorithm _ (توسيع البحث), algorithm b (توسيع البحث), algorithms _ (توسيع البحث)
a function » _ function (توسيع البحث)
-
1
-
2
-
3
-
4
-
5
Algorithm and simulation parameters.
منشور في 2024"…While time-consuming, these steps only need to be performed once and then function as look-up tables. Actual pictures of shell spines can then be matched against the list of existing spine shapes, yielding a potential growth pattern which, in turn, gives us matching molecular parameters. …"
-
6
-
7
-
8
Algorithm results based on FE simulated likelihood functions.
منشور في 2020"…<p>(A) Nodule depth estimation by the algorithm with the likelihood functions obtained by FEM simulation. …"
-
9
A hybrid algorithm based on improved threshold function and wavelet transform.
منشور في 2024الموضوعات: -
10
Comparison of UACI among different algorithms.
منشور في 2025"…First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
-
11
Comparison of NPCR among different algorithms.
منشور في 2025"…First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
-
12
Pseudo-code of DMDDPG algorithm.
منشور في 2025"…Next, a reward function is designed by integrating the decoupled multi-agent deterministic deep deterministic policy gradient (DMDDPG) algorithm. …"
-
13
-
14
-
15
Multimodal reference functions.
منشور في 2025"…We performed comparative analyses against other methodologies across various functions and public datasets to assess their effectiveness. …"
-
16
-
17
-
18
-
19
Algorithm operation steps.
منشور في 2025"…To address these issues, this paper proposes an improved object detection algorithm named SCI-YOLO11, which optimizes the YOLO11 framework from three aspects: feature extraction, attention mechanism, and loss function. …"
-
20
The convergence curves of the test functions.
منشور في 2025"…We performed comparative analyses against other methodologies across various functions and public datasets to assess their effectiveness. …"