Search alternatives:
algorithms using » algorithm using (Expand Search)
algorithm sine » algorithm using (Expand Search), algorithm ai (Expand Search), algorithm i (Expand Search)
using function » using functional (Expand Search), waning function (Expand Search), lung function (Expand Search)
sine function » gene function (Expand Search), time function (Expand Search), state function (Expand Search)
algorithms using » algorithm using (Expand Search)
algorithm sine » algorithm using (Expand Search), algorithm ai (Expand Search), algorithm i (Expand Search)
using function » using functional (Expand Search), waning function (Expand Search), lung function (Expand Search)
sine function » gene function (Expand Search), time function (Expand Search), state function (Expand Search)
-
1
Algorithm Parameter Setting.
Published 2025“…This strategy uses the improved D3QN algorithm combined with the excellent smoothness of the sine function to evaluate driving safety, helping vehicles find suitable gaps in traffic flow. …”
-
2
-
3
-
4
-
5
-
6
-
7
-
8
-
9
-
10
-
11
-
12
-
13
-
14
-
15
-
16
-
17
Comparison of UACI among different algorithms.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
18
Comparison of NPCR among different algorithms.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
19
-
20