بدائل البحث:
method algorithm » network algorithm (توسيع البحث), means algorithm (توسيع البحث), mean algorithm (توسيع البحث)
based encryption » image encryption (توسيع البحث), data encryption (توسيع البحث)
elements method » element method (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), novel algorithm (توسيع البحث), modbo algorithm (توسيع البحث)
data code » data model (توسيع البحث), data came (توسيع البحث)
method algorithm » network algorithm (توسيع البحث), means algorithm (توسيع البحث), mean algorithm (توسيع البحث)
based encryption » image encryption (توسيع البحث), data encryption (توسيع البحث)
elements method » element method (توسيع البحث)
code algorithm » cosine algorithm (توسيع البحث), novel algorithm (توسيع البحث), modbo algorithm (توسيع البحث)
data code » data model (توسيع البحث), data came (توسيع البحث)
-
81
-
82
-
83
-
84
Encrypted and decrypted images.
منشور في 2025"…Evaluated using multiple chaos performance metrics, the 2D-SQSM demonstrates high Lyapunov exponents, and sample entropy, with chaotic characteristics superior to some advanced chaotic maps proposed in recent years. Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. …"
-
85
-
86
-
87
-
88
-
89
-
90
-
91
-
92
Convergence curve of the DBO algorithm.
منشور في 2025"…The improved Dung Beetle Optimization algorithm, Back Propagation Neural Network, Finite Element Analysis, and Response Surface Methodology provide a strong guarantee for the selection of robot polishing process parameters. …"
-
93
Algorithm parameter settings employed in the experiments on simulated data.
منشور في 2024الموضوعات: -
94
-
95
-
96
Code and data for the paper "Investigating machine learning algorithms to classify label-free images of pancreatic neuroendocrine neoplasms"
منشور في 2025"…<p dir="ltr">Code and data for analysis detailed in the paper "Investigating machine learning algorithms to classify label-free images of pancreatic neuroendocrine neoplasms." …"
-
97
-
98
Paillier homomorphic encryption and decryption.
منشور في 2024"…To address these challenges, this paper proposes a federated learning-based intrusion detection algorithm (NIDS-FGPA) that utilizes gradient similarity model aggregation. …"
-
99
-
100
Image Encryption Flow Chart.
منشور في 2025"…Evaluated using multiple chaos performance metrics, the 2D-SQSM demonstrates high Lyapunov exponents, and sample entropy, with chaotic characteristics superior to some advanced chaotic maps proposed in recent years. Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. …"