Showing 81 - 100 results of 215 for search '(( algorithm fc function ) OR ( ((algorithm python) OR (algorithm etc)) function ))*', query time: 0.43s Refine Results
  1. 81
  2. 82
  3. 83
  4. 84
  5. 85
  6. 86
  7. 87
  8. 88
  9. 89

    Contrast enhancement of digital images using dragonfly algorithm by Soumyajit Saha (19726163)

    Published 2024
    “…Comparisons with state-of-art methods ensure the superiority of the proposed algorithm. The Python implementation of the proposed approach is available in this <a href="https://github.com/somnath796/DA_contrast_enhancement" target="_blank">Github repository</a>.…”
  10. 90
  11. 91
  12. 92
  13. 93
  14. 94

    Dataset of networks used in assessing the Troika algorithm for clique partitioning and community detection by Samin Aref (4683934)

    Published 2025
    “…Each network is provided in .gml format or .pkl format which can be read into a networkX graph object using standard functions from the networkX library in Python. For accessing other networks used in the study, please refer to the article for references to the primary sources of those network data.…”
  15. 95
  16. 96
  17. 97

    Image Encryption Flow Chart. by Feixian Liu (22477943)

    Published 2025
    “…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
  18. 98

    PNSR and SSIM under different cropping attacks. by Feixian Liu (22477943)

    Published 2025
    “…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
  19. 99

    NIST test result. by Feixian Liu (22477943)

    Published 2025
    “…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
  20. 100

    Encrypted and decrypted images. by Feixian Liu (22477943)

    Published 2025
    “…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”