Search alternatives:
algorithm python » algorithm within (Expand Search), algorithms within (Expand Search), algorithm both (Expand Search)
python function » protein function (Expand Search)
algorithm novel » algorithmsa novel (Expand Search), algorithm model (Expand Search), algorithm models (Expand Search)
algorithm etc » algorithm _ (Expand Search), algorithm b (Expand Search), algorithm a (Expand Search)
etc function » fc function (Expand Search), spc function (Expand Search), npc function (Expand Search)
algorithm python » algorithm within (Expand Search), algorithms within (Expand Search), algorithm both (Expand Search)
python function » protein function (Expand Search)
algorithm novel » algorithmsa novel (Expand Search), algorithm model (Expand Search), algorithm models (Expand Search)
algorithm etc » algorithm _ (Expand Search), algorithm b (Expand Search), algorithm a (Expand Search)
etc function » fc function (Expand Search), spc function (Expand Search), npc function (Expand Search)
-
161
-
162
List of potential novel associations predicted with a high score and confirmed by the most recent literature works.
Published 2020Subjects: “…community detection algorithms…”
-
163
-
164
Flowchart of proposed algorithm.
Published 2025“…In such networks, nodes depend on non-rechargeable batteries, and once the energy is depleted, the nodes can no longer function, resulting in frequent link failures and reduced network lifetime. …”
-
165
-
166
-
167
-
168
-
169
-
170
-
171
-
172
-
173
-
174
Block diagram of the proposed algorithm for estimation of stationary moving average processes.
Published 2025Subjects: -
175
Comparison of UACI among different algorithms.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
176
Comparison of NPCR among different algorithms.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
177
-
178
-
179
-
180