Search alternatives:
processing algorithm » modeling algorithm (Expand Search), routing algorithm (Expand Search), tracking algorithm (Expand Search)
data processing » image processing (Expand Search)
developing box » developing oxo (Expand Search), developing broad (Expand Search), developing work (Expand Search)
ipca algorithm » wgcna algorithm (Expand Search), cscap algorithm (Expand Search), ii algorithm (Expand Search)
box algorithm » best algorithm (Expand Search), _ algorithm (Expand Search), ii algorithm (Expand Search)
element ipca » element data (Expand Search)
processing algorithm » modeling algorithm (Expand Search), routing algorithm (Expand Search), tracking algorithm (Expand Search)
data processing » image processing (Expand Search)
developing box » developing oxo (Expand Search), developing broad (Expand Search), developing work (Expand Search)
ipca algorithm » wgcna algorithm (Expand Search), cscap algorithm (Expand Search), ii algorithm (Expand Search)
box algorithm » best algorithm (Expand Search), _ algorithm (Expand Search), ii algorithm (Expand Search)
element ipca » element data (Expand Search)
-
1
-
2
Assignment of Hungarian Algorithm.
Published 2025“…In this paper, a new tracking mechanism is proposed for real-time tracking, which is based on the 2D LiDAR data structure with the Simple Online and Real-Time Tracking (SORT) algorithm. …”
-
3
-
4
-
5
-
6
-
7
-
8
-
9
-
10
-
11
Example of S-box.
Published 2025“…<div><p>In the digital era, the security of images, as critical carriers of information, is paramount for national security, military strategy, and personal privacy protection. Therefore, developing efficient and cost-effective image encryption technologies to ensure the security of image data during transmission has become an urgent necessity. …”
-
12
-
13
-
14
Example of addroundkey process.
Published 2025“…<div><p>In the digital era, the security of images, as critical carriers of information, is paramount for national security, military strategy, and personal privacy protection. Therefore, developing efficient and cost-effective image encryption technologies to ensure the security of image data during transmission has become an urgent necessity. …”
-
15
-
16
-
17
-
18
Example of byte substitution Process.
Published 2025“…<div><p>In the digital era, the security of images, as critical carriers of information, is paramount for national security, military strategy, and personal privacy protection. Therefore, developing efficient and cost-effective image encryption technologies to ensure the security of image data during transmission has become an urgent necessity. …”
-
19
-
20