Search alternatives:
using function » using functional (Expand Search), sine function (Expand Search), waning function (Expand Search)
algorithm etc » algorithm b (Expand Search), algorithm a (Expand Search), algorithm i (Expand Search)
using function » using functional (Expand Search), sine function (Expand Search), waning function (Expand Search)
algorithm etc » algorithm b (Expand Search), algorithm a (Expand Search), algorithm i (Expand Search)
-
1
-
2
-
3
-
4
-
5
-
6
Curves of sigmoid functions used in our proposed algorithm.
Published 2022“…<p>Curves of sigmoid functions used in our proposed algorithm.</p>…”
-
7
-
8
-
9
Multi-functional liquid crystal devices based on random binary matrix algorithm
Published 2023“…<p>Multi-functional diffraction gratings have found broad applications in laser processing, medicine, beam manipulation, etc. …”
-
10
Algorithmic flow of the verifiable delay function.
Published 2024“…<p>Algorithmic flow of the verifiable delay function.</p>…”
-
11
Benchmark functions T-test for the proposed and compared algorithms.
Published 2023“…<p>Benchmark functions T-test for the proposed and compared algorithms.…”
-
12
-
13
Proposed algorithm convergence curves versus other competing algorithms for the seven benchmark functions.
Published 2023“…<p>Proposed algorithm convergence curves versus other competing algorithms for the seven benchmark functions.…”
-
14
Graph of convergence of PSO algorithm fitness function.
Published 2024“…<p>Graph of convergence of PSO algorithm fitness function.</p>…”
-
15
Comparison of UACI among different algorithms.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
16
Comparison of NPCR among different algorithms.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
17
Comparison results on benchmark functions with traditional algorithms.
Published 2023“…<p>Comparison results on benchmark functions with traditional algorithms.</p>…”
-
18
Proposed algorithm mean and standard deviation (StDev) versus compared algorithms for the benchmark functions.
Published 2023“…<p>Proposed algorithm mean and standard deviation (StDev) versus compared algorithms for the benchmark functions.…”
-
19
-
20