Search alternatives:
algorithm python » algorithm within (Expand Search), algorithms within (Expand Search), algorithm both (Expand Search)
python function » protein function (Expand Search)
algorithm body » algorithm both (Expand Search), algorithm model (Expand Search), algorithm blood (Expand Search)
algorithm etc » algorithm _ (Expand Search), algorithm b (Expand Search), algorithm a (Expand Search)
body function » cost function (Expand Search)
etc function » fc function (Expand Search), spc function (Expand Search), npc function (Expand Search)
algorithm python » algorithm within (Expand Search), algorithms within (Expand Search), algorithm both (Expand Search)
python function » protein function (Expand Search)
algorithm body » algorithm both (Expand Search), algorithm model (Expand Search), algorithm blood (Expand Search)
algorithm etc » algorithm _ (Expand Search), algorithm b (Expand Search), algorithm a (Expand Search)
body function » cost function (Expand Search)
etc function » fc function (Expand Search), spc function (Expand Search), npc function (Expand Search)
-
61
-
62
-
63
-
64
Comparison of UACI among different algorithms.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
65
Comparison of NPCR among different algorithms.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
66
-
67
-
68
-
69
-
70
-
71
-
72
-
73
-
74
-
75
Parselmouth for bioacoustics: automated acoustic analysis in Python
Published 2023“…Five years ago, the Python package Parselmouth was released to provide easy and intuitive access to all functionality in the Praat software. …”
-
76
Multi-functional liquid crystal devices based on random binary matrix algorithm
Published 2023“…<p>Multi-functional diffraction gratings have found broad applications in laser processing, medicine, beam manipulation, etc. …”
-
77
-
78
Comparison of the curves of the DCIOU loss function and the CIOU loss function.
Published 2025Subjects: -
79
-
80