Showing 81 - 100 results of 161 for search '(( algorithm python function ) OR ( ((algorithm python) OR (algorithm etc)) function ))*', query time: 0.26s Refine Results
  1. 81
  2. 82
  3. 83

    Generalized Internal Coordinates for Creative Exploration of Interatomic Geometries by Aleksandr V. Marenich (1283298)

    Published 2025
    “…Our algorithm allows the user to create compound internal coordinates that are functions of other coordinates, as well as special-purpose coordinates for specific classes of problems. …”
  4. 84

    Generalized Internal Coordinates for Creative Exploration of Interatomic Geometries by Aleksandr V. Marenich (1283298)

    Published 2025
    “…Our algorithm allows the user to create compound internal coordinates that are functions of other coordinates, as well as special-purpose coordinates for specific classes of problems. …”
  5. 85

    Generalized Internal Coordinates for Creative Exploration of Interatomic Geometries by Aleksandr V. Marenich (1283298)

    Published 2025
    “…Our algorithm allows the user to create compound internal coordinates that are functions of other coordinates, as well as special-purpose coordinates for specific classes of problems. …”
  6. 86

    Generalized Internal Coordinates for Creative Exploration of Interatomic Geometries by Aleksandr V. Marenich (1283298)

    Published 2025
    “…Our algorithm allows the user to create compound internal coordinates that are functions of other coordinates, as well as special-purpose coordinates for specific classes of problems. …”
  7. 87
  8. 88

    GridScopeRodents: High-Resolution Global Typical Rodents Distribution Projections from 2021 to 2100 under Diverse SSP-RCP Scenarios by Yang Lan (20927512)

    Published 2025
    “…Using occurrence data and environmental variable, we employ the Maximum Entropy (MaxEnt) algorithm within the species distribution modeling (SDM) framework to estimate occurrence probability at a spatial resolution of 1/12° (~10 km). …”
  9. 89
  10. 90
  11. 91

    Hippocampal and cortical activity reflect early hyperexcitability in an Alzheimer's mouse model by Marina Diachenko (19739092)

    Published 2025
    “…</p><p dir="ltr">All data are available upon request. The standalone Python implementation of the fE/I algorithm is available under a CC-BY-NC-SA license at <a href="https://github.com/arthur-ervin/crosci" target="_blank">https://github.com/arthur-ervin/crosci</a>. …”
  12. 92

    Image Encryption Flow Chart. by Feixian Liu (22477943)

    Published 2025
    “…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
  13. 93

    PNSR and SSIM under different cropping attacks. by Feixian Liu (22477943)

    Published 2025
    “…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
  14. 94

    NIST test result. by Feixian Liu (22477943)

    Published 2025
    “…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
  15. 95

    Encrypted and decrypted images. by Feixian Liu (22477943)

    Published 2025
    “…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
  16. 96

    Lyapunov exponent diagrams of 2D-SQSM. by Feixian Liu (22477943)

    Published 2025
    “…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
  17. 97

    Bifurcation Diagrams of 2D-SQSM. by Feixian Liu (22477943)

    Published 2025
    “…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
  18. 98

    Six newly proposed chaotic maps. by Feixian Liu (22477943)

    Published 2025
    “…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
  19. 99

    PNSR and SSIM under different noise attacks. by Feixian Liu (22477943)

    Published 2025
    “…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
  20. 100

    Trajectory Diagrams of 2D-SQSM. by Feixian Liu (22477943)

    Published 2025
    “…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”