Search alternatives:
algorithm from » algorithm flow (Expand Search)
algorithm etc » algorithm _ (Expand Search), algorithm b (Expand Search), algorithm a (Expand Search)
from function » from functional (Expand Search), fc function (Expand Search)
etc function » spc function (Expand Search), fc function (Expand Search), npc function (Expand Search)
algorithm from » algorithm flow (Expand Search)
algorithm etc » algorithm _ (Expand Search), algorithm b (Expand Search), algorithm a (Expand Search)
from function » from functional (Expand Search), fc function (Expand Search)
etc function » spc function (Expand Search), fc function (Expand Search), npc function (Expand Search)
-
1
-
2
Convergence curves obtained by different algorithms on 23 benchmark functions.
Published 2025Subjects: -
3
-
4
-
5
Convergence curves obtained by different algorithms on CEC2022 benchmark functions.
Published 2025Subjects: -
6
-
7
-
8
-
9
Flowchart of proposed fitness function algorithm.
Published 2025“…The mathematical model was transformed into a fitness function and a solution was provided with the Tabu Search Algorithm and Simulated Annealing. …”
-
10
-
11
-
12
-
13
-
14
-
15
-
16
Wilcoxon rank sum test results from MWOA and 7 comparison algorithms on CEC2005 functions.
Published 2024“…<p>Wilcoxon rank sum test results from MWOA and 7 comparison algorithms on CEC2005 functions.…”
-
17
Predicted body weights (kg) as a function of time (age in weeks) obtained from MARS algorithm.
Published 2024“…<p>Predicted body weights (kg) as a function of time (age in weeks) obtained from MARS algorithm.…”
-
18
-
19
Drug Release Nanoparticle System Design: Data Set Compilation and Machine Learning Modeling
Published 2025Subjects: -
20
Comparison of UACI among different algorithms.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”