Showing 1 - 20 results of 982 for search '(( algorithm fc function ) OR ( ((algorithm both) OR (algorithm etc)) function ))*', query time: 0.35s Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6

    DataSheet1_The evolution of flexibility and function in the Fc domains of IgM, IgY, and IgE.pdf by Rosaleen A. Calvert (10039787)

    Published 2024
    “…Introduction<p>Antibody Fc regions harbour the binding sites for receptors that mediate effector functions following antigen engagement by the Fab regions. …”
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Comparison of UACI among different algorithms. by Feixian Liu (22477943)

    Published 2025
    “…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
  17. 17

    Comparison of NPCR among different algorithms. by Feixian Liu (22477943)

    Published 2025
    “…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
  18. 18
  19. 19

    The ALO algorithm optimization flowchart. by Wenjing Wang (181404)

    Published 2024
    “…The average running time of the proposed algorithm in Sphere function and Griebank function was 2.67s and 1.64s, respectively. …”
  20. 20

    The IALO algorithm solution flowchart. by Wenjing Wang (181404)

    Published 2024
    “…The average running time of the proposed algorithm in Sphere function and Griebank function was 2.67s and 1.64s, respectively. …”