Search alternatives:
algorithm python » algorithm within (Expand Search), algorithms within (Expand Search), algorithm both (Expand Search)
algorithm brain » algorithm ai (Expand Search), algorithm against (Expand Search), algorithm within (Expand Search)
python function » protein function (Expand Search)
brain function » barrier function (Expand Search), protein function (Expand Search)
algorithm etc » algorithm _ (Expand Search), algorithm b (Expand Search), algorithm a (Expand Search)
etc function » spc function (Expand Search), fc function (Expand Search), npc function (Expand Search)
algorithm python » algorithm within (Expand Search), algorithms within (Expand Search), algorithm both (Expand Search)
algorithm brain » algorithm ai (Expand Search), algorithm against (Expand Search), algorithm within (Expand Search)
python function » protein function (Expand Search)
brain function » barrier function (Expand Search), protein function (Expand Search)
algorithm etc » algorithm _ (Expand Search), algorithm b (Expand Search), algorithm a (Expand Search)
etc function » spc function (Expand Search), fc function (Expand Search), npc function (Expand Search)
-
201
-
202
Hippocampal and cortical activity reflect early hyperexcitability in an Alzheimer's mouse model
Published 2025“…<p dir="ltr">The <i>zip</i> file contains the code for the functional excitation-inhibition ratio (fE/I) and theta-gamma (θ-γ) phase-amplitude coupling (PAC) analyses described in the paper titled "<b>Hippocampal and cortical activity reflect early </b><b>hyperexcitability</b><b> in an Alzheimer's mouse model</b>" submitted to <i>Brain Communications</i> in April 2025.…”
-
203
Data Sheet 1_Alterations in gut microbiota and plasma metabolites: a multi-omics study of mild cognitive impairment in Parkinson’s disease.docx
Published 2025“…We examined fecal and plasma specimens from these participants. Cognitive function was assessed via the Montreal Cognitive Assessment (MoCA). …”
-
204
Data Sheet 1_Investigating neural markers of Alzheimer's disease in posttraumatic stress disorder using machine learning algorithms and magnetic resonance imaging.pdf
Published 2024“…Additionally, we utilized two previously established machine learning-based algorithms, one representing AD-like brain activity (Machine learning-based AD Designation [MAD]) and the other focused on AD-like brain structural changes (AD-like Brain Structure [ABS]). …”
-
205
-
206
Image Encryption Flow Chart.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
207
PNSR and SSIM under different cropping attacks.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
208
NIST test result.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
209
Encrypted and decrypted images.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
210
Lyapunov exponent diagrams of 2D-SQSM.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
211
Bifurcation Diagrams of 2D-SQSM.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
212
Six newly proposed chaotic maps.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
213
PNSR and SSIM under different noise attacks.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
214
Trajectory Diagrams of 2D-SQSM.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
215
Data Sheet 1_Detecting cognitive motor dissociation by functional near-infrared spectroscopy.pdf
Published 2025“…Background<p>Behavioral assessment based on external manifestations of consciousness fails for patients with cognitive motor dissociation (CMD). Functional near-infrared spectroscopy (fNIRS) is an emerging neuroimaging technique that can detect internal brain functional activities. …”
-
216
Data Sheet 2_Detecting cognitive motor dissociation by functional near-infrared spectroscopy.pdf
Published 2025“…Background<p>Behavioral assessment based on external manifestations of consciousness fails for patients with cognitive motor dissociation (CMD). Functional near-infrared spectroscopy (fNIRS) is an emerging neuroimaging technique that can detect internal brain functional activities. …”
-
217
-
218
-
219
-
220
Detailed sequences of primers for PCR.
Published 2025“…<div><p>Epilepsy is a common brain disease that causes different types of seizures, with an incidence rate of nearly 1%. …”