بدائل البحث:
algorithm python » algorithm within (توسيع البحث), algorithms within (توسيع البحث), algorithm both (توسيع البحث)
python function » protein function (توسيع البحث)
algorithms used » algorithm used (توسيع البحث), algorithms based (توسيع البحث), algorithms using (توسيع البحث)
algorithm etc » algorithm _ (توسيع البحث), algorithm b (توسيع البحث), algorithm a (توسيع البحث)
used function » used functions (توسيع البحث), used functional (توسيع البحث), based function (توسيع البحث)
etc function » fc function (توسيع البحث), spc function (توسيع البحث), npc function (توسيع البحث)
algorithm python » algorithm within (توسيع البحث), algorithms within (توسيع البحث), algorithm both (توسيع البحث)
python function » protein function (توسيع البحث)
algorithms used » algorithm used (توسيع البحث), algorithms based (توسيع البحث), algorithms using (توسيع البحث)
algorithm etc » algorithm _ (توسيع البحث), algorithm b (توسيع البحث), algorithm a (توسيع البحث)
used function » used functions (توسيع البحث), used functional (توسيع البحث), based function (توسيع البحث)
etc function » fc function (توسيع البحث), spc function (توسيع البحث), npc function (توسيع البحث)
-
21
-
22
-
23
-
24
-
25
Comparison of UACI among different algorithms.
منشور في 2025"…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
-
26
Comparison of NPCR among different algorithms.
منشور في 2025"…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
-
27
-
28
Python cv coding screenshots of all developed fingerprints on distinct surfaces.
منشور في 2024الموضوعات: -
29
Contrast enhancement of digital images using dragonfly algorithm
منشور في 2024"…The article deals with contrast enhancement as an optimization problem and uses the Dragonfly Algorithm (DA) to find the optimal grey-level intensity values. …"
-
30
Explained variance ration of the PCA algorithm.
منشور في 2025"…<div><p>Chest X-ray image classification plays an important role in medical diagnostics. Machine learning algorithms enhanced the performance of these classification algorithms by introducing advance techniques. …"
-
31
-
32
-
33
-
34
-
35
-
36
-
37
-
38
Dataset of networks used in assessing the Troika algorithm for clique partitioning and community detection
منشور في 2025"…Each network is provided in .gml format or .pkl format which can be read into a networkX graph object using standard functions from the networkX library in Python. …"
-
39
Curves of sigmoid functions used in our proposed algorithm.
منشور في 2022"…<p>Curves of sigmoid functions used in our proposed algorithm.</p>…"
-
40
Practical rules for summing the series of the Tweedie probability density function with high-precision arithmetic
منشور في 2019"…These implementations need to utilize high-precision arithmetic, and are programmed in the Python programming language. A thorough comparison with existing R functions allows the identification of cases when the latter fail, and provide further guidance to their use.…"