بدائل البحث:
algorithm three » algorithm where (توسيع البحث), algorithm pre (توسيع البحث)
three function » three functional (توسيع البحث), tree functional (توسيع البحث), time function (توسيع البحث)
algorithm etc » algorithm b (توسيع البحث), algorithm a (توسيع البحث), algorithm i (توسيع البحث)
etc function » fc function (توسيع البحث), spc function (توسيع البحث), npc function (توسيع البحث)
algorithm three » algorithm where (توسيع البحث), algorithm pre (توسيع البحث)
three function » three functional (توسيع البحث), tree functional (توسيع البحث), time function (توسيع البحث)
algorithm etc » algorithm b (توسيع البحث), algorithm a (توسيع البحث), algorithm i (توسيع البحث)
etc function » fc function (توسيع البحث), spc function (توسيع البحث), npc function (توسيع البحث)
-
1
-
2
Comparison of UACI among different algorithms.
منشور في 2025"…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
-
3
Comparison of NPCR among different algorithms.
منشور في 2025"…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
-
4
-
5
-
6
-
7
Average function evaluation times of the three optimization algorithms.
منشور في 2025"…<p>Average function evaluation times of the three optimization algorithms.…"
-
8
-
9
-
10
-
11
-
12
-
13
Convergence curves obtained by different algorithms on 23 benchmark functions.
منشور في 2025الموضوعات: -
14
-
15
-
16
Comparison between different PSO algorithms on function 1–3.
منشور في 2019"…<p>Comparison between different PSO algorithms on function 1–3.</p>…"
-
17
-
18
Convergence curves obtained by different algorithms on CEC2022 benchmark functions.
منشور في 2025الموضوعات: -
19
Algorithm results based on FE simulated likelihood functions.
منشور في 2020"…<p>(A) Nodule depth estimation by the algorithm with the likelihood functions obtained by FEM simulation. …"
-
20