Search alternatives:
algorithm python » algorithm within (Expand Search), algorithms within (Expand Search), algorithm both (Expand Search)
algorithm used » algorithms used (Expand Search), algorithm based (Expand Search), algorithms based (Expand Search)
used function » used functions (Expand Search), used functional (Expand Search), based function (Expand Search)
algorithm etc » algorithm _ (Expand Search), algorithm b (Expand Search), algorithm a (Expand Search)
algorithm python » algorithm within (Expand Search), algorithms within (Expand Search), algorithm both (Expand Search)
algorithm used » algorithms used (Expand Search), algorithm based (Expand Search), algorithms based (Expand Search)
used function » used functions (Expand Search), used functional (Expand Search), based function (Expand Search)
algorithm etc » algorithm _ (Expand Search), algorithm b (Expand Search), algorithm a (Expand Search)
-
1
EFGs: A Complete and Accurate Implementation of Ertl’s Functional Group Detection Algorithm in RDKit
Published 2025“…Functional groups are widely used in organic chemistry, because they provide a rationale to analyze physicochemical and reactivity properties. …”
-
2
Python-Based Algorithm for Estimating NRTL Model Parameters with UNIFAC Model Simulation Results
Published 2025“…This algorithm conducts a series of procedures: (1) fragmentation of the molecules into functional groups from SMILES, (2) calculation of activity coefficients under predetermined temperature and mole fraction conditions by employing universal quasi-chemical functional group activity coefficient (UNIFAC) model, and (3) regression of NRTL model parameters by employing UNIFAC model simulation results in the differential evolution algorithm (DEA) and Nelder–Mead method (NMM). …”
-
3
<b>Opti2Phase</b>: Python scripts for two-stage focal reducer
Published 2025“…<p dir="ltr"><b>Opti2Phase: Python Scripts for Two-Stage Focal Reducer Design</b></p><p dir="ltr">The folder <b>Opti2Phase</b> contains the Python scripts used to generate the results presented in the manuscript. …”
-
4
-
5
-
6
-
7
Comparison of UACI among different algorithms.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
8
Comparison of NPCR among different algorithms.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
9
-
10
Contrast enhancement of digital images using dragonfly algorithm
Published 2024“…The article deals with contrast enhancement as an optimization problem and uses the Dragonfly Algorithm (DA) to find the optimal grey-level intensity values. …”
-
11
Explained variance ration of the PCA algorithm.
Published 2025“…<div><p>Chest X-ray image classification plays an important role in medical diagnostics. Machine learning algorithms enhanced the performance of these classification algorithms by introducing advance techniques. …”
-
12
-
13
Dataset of networks used in assessing the Troika algorithm for clique partitioning and community detection
Published 2025“…Each network is provided in .gml format or .pkl format which can be read into a networkX graph object using standard functions from the networkX library in Python. …”
-
14
-
15
Convergence curves obtained by different algorithms on 23 benchmark functions.
Published 2025Subjects: -
16
-
17
-
18
-
19
Convergence curves obtained by different algorithms on CEC2022 benchmark functions.
Published 2025Subjects: -
20