Search alternatives:
algorithm python » algorithm within (Expand Search), algorithms within (Expand Search), algorithm both (Expand Search)
algorithm muscle » algorithm using (Expand Search), algorithm used (Expand Search), algorithm model (Expand Search)
python function » protein function (Expand Search)
algorithm etc » algorithm _ (Expand Search), algorithm b (Expand Search), algorithm a (Expand Search)
etc function » fc function (Expand Search), spc function (Expand Search), npc function (Expand Search)
algorithm python » algorithm within (Expand Search), algorithms within (Expand Search), algorithm both (Expand Search)
algorithm muscle » algorithm using (Expand Search), algorithm used (Expand Search), algorithm model (Expand Search)
python function » protein function (Expand Search)
algorithm etc » algorithm _ (Expand Search), algorithm b (Expand Search), algorithm a (Expand Search)
etc function » fc function (Expand Search), spc function (Expand Search), npc function (Expand Search)
-
61
Comparison of UACI among different algorithms.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
62
Comparison of NPCR among different algorithms.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
63
-
64
-
65
-
66
-
67
-
68
-
69
-
70
-
71
Parselmouth for bioacoustics: automated acoustic analysis in Python
Published 2023“…Five years ago, the Python package Parselmouth was released to provide easy and intuitive access to all functionality in the Praat software. …”
-
72
Multi-functional liquid crystal devices based on random binary matrix algorithm
Published 2023“…<p>Multi-functional diffraction gratings have found broad applications in laser processing, medicine, beam manipulation, etc. …”
-
73
-
74
-
75
-
76
ADT: A Generalized Algorithm and Program for Beyond Born–Oppenheimer Equations of “<i>N</i>” Dimensional Sub-Hilbert Space
Published 2020“…In order to overcome such shortcoming, we develop a generalized algorithm, “ADT” to generate the nonadiabatic equations through symbolic manipulation and to construct highly accurate diabatic surfaces for molecular processes involving excited electronic states. …”
-
77
Results of the application of different clustering algorithms to average functional connectivity from healthy subjects.
Published 2023“…<p>A) Resulting cluster inertia from applying the k-means algorithm described in the methods to empirical averaged functional connectivity from healthy subjects, with different numbers of clusters. …”
-
78
-
79
-
80
Python implementation from Symplectic decomposition from submatrix determinants
Published 2021“…Python implementation of the algorithm and demonstration of how to use the functions.…”