Search alternatives:
processing algorithm » modeling algorithm (Expand Search), routing algorithm (Expand Search), tracking algorithm (Expand Search)
robust algorithm » forest algorithm (Expand Search), best algorithm (Expand Search), forest algorithms (Expand Search)
update algorithm » pass algorithm (Expand Search), data algorithms (Expand Search), ipca algorithm (Expand Search)
data processing » image processing (Expand Search)
element update » element data (Expand Search)
processing algorithm » modeling algorithm (Expand Search), routing algorithm (Expand Search), tracking algorithm (Expand Search)
robust algorithm » forest algorithm (Expand Search), best algorithm (Expand Search), forest algorithms (Expand Search)
update algorithm » pass algorithm (Expand Search), data algorithms (Expand Search), ipca algorithm (Expand Search)
data processing » image processing (Expand Search)
element update » element data (Expand Search)
-
61
-
62
Example of addroundkey process.
Published 2025“…<div><p>In the digital era, the security of images, as critical carriers of information, is paramount for national security, military strategy, and personal privacy protection. Therefore, developing efficient and cost-effective image encryption technologies to ensure the security of image data during transmission has become an urgent necessity. …”
-
63
-
64
Enhancing the Robustness of Vehicle Re-Identification in Intelligent Transportation Systems
Published 2025“…</p><p><br></p><p dir="ltr">We developed a comprehensive data set generation pipeline that uses vehicle detection algorithms with confidence scores to select optimal Regions of Interest (ROI) for image cropping. …”
-
65
-
66
-
67
-
68
-
69
-
70
-
71
-
72
-
73
-
74
-
75
-
76
-
77
-
78
-
79
-
80