Showing 61 - 80 results of 6,527 for search '(( algorithm etc function ) OR ((( algorithm python function ) OR ( algorithm which function ))))', query time: 0.40s Refine Results
  1. 61

    The result of Wilcoxon signed-rand test. by Yi Tao (178829)

    Published 2022
    Subjects: “…evolutionary genetic algorithm…”
  2. 62

    The Simulation and optimization process of pipe diameter selection. by Yi Tao (178829)

    Published 2022
    Subjects: “…evolutionary genetic algorithm…”
  3. 63

    Optional pipe diameter and unit price of NYN. by Yi Tao (178829)

    Published 2022
    Subjects: “…evolutionary genetic algorithm…”
  4. 64

    Optional pipe diameter and unit price of HN. by Yi Tao (178829)

    Published 2022
    Subjects: “…evolutionary genetic algorithm…”
  5. 65

    The topology of HN. by Yi Tao (178829)

    Published 2022
    Subjects: “…evolutionary genetic algorithm…”
  6. 66

    Information of nodes and pipes of HN. by Yi Tao (178829)

    Published 2022
    Subjects: “…evolutionary genetic algorithm…”
  7. 67
  8. 68
  9. 69
  10. 70

    Practical rules for summing the series of the Tweedie probability density function with high-precision arithmetic by NELSON L. DIAS (8078003)

    Published 2019
    “…With these practical rules, simple summation algorithms provide sufficiently robust results for the calculation of the density function and its definite integrals. …”
  11. 71
  12. 72

    Flowchart of DAPF-RRT algorithm. by Zhenggang Wang (1753657)

    Published 2025
    “…<div><p>In response to the widely used RRT-Connect path planning algorithm in the field of robotic arms, which has problems such as long search time, random node growth, multiple and unsmooth path turns, a path planning algorithm combining dynamic step size and artificial potential field is proposed. …”
  13. 73

    Performance comparison of different algorithms. by Zhenggang Wang (1753657)

    Published 2025
    “…<div><p>In response to the widely used RRT-Connect path planning algorithm in the field of robotic arms, which has problems such as long search time, random node growth, multiple and unsmooth path turns, a path planning algorithm combining dynamic step size and artificial potential field is proposed. …”
  14. 74
  15. 75
  16. 76
  17. 77

    The ALO algorithm optimization flowchart. by Wenjing Wang (181404)

    Published 2024
    “…The total objective function was 1542.54 $/hr, which was an average reduction of 53.55 $/hr compared to the other five algorithms. …”
  18. 78

    The IALO algorithm solution flowchart. by Wenjing Wang (181404)

    Published 2024
    “…The total objective function was 1542.54 $/hr, which was an average reduction of 53.55 $/hr compared to the other five algorithms. …”
  19. 79

    Comparison of UACI among different algorithms. by Feixian Liu (22477943)

    Published 2025
    “…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
  20. 80

    Comparison of NPCR among different algorithms. by Feixian Liu (22477943)

    Published 2025
    “…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”