بدائل البحث:
generation algorithm » genetic algorithm (توسيع البحث), selection algorithm (توسيع البحث), segmentation algorithm (توسيع البحث)
code encryption » image encryption (توسيع البحث)
generation algorithm » genetic algorithm (توسيع البحث), selection algorithm (توسيع البحث), segmentation algorithm (توسيع البحث)
code encryption » image encryption (توسيع البحث)
-
1
-
2
-
3
-
4
Co-authorship network (graph generated using the force-directed Fruchterman-Reingold algorithm).
منشور في 2025"…<p>Co-authorship network (graph generated using the force-directed Fruchterman-Reingold algorithm).…"
-
5
-
6
-
7
-
8
-
9
Convergence curve of the DBO algorithm.
منشور في 2025"…For curved workpieces, the curvature adaptive interpolation method is introduced to generate trajectories. An adaptive impedance control strategy is implemented to enhance force control, and PD iteration and RBF neural networks are used to ensure stable contact force and accuracy. …"
-
10
-
11
-
12
-
13
Data Encryption and Compression
منشور في 2024"…Advanced compression techniques, including <b>Huffman coding</b> and <b>Lempel-Ziv algorithms</b>, are covered to illustrate their practical applications in modern data systems. …"
-
14
-
15
Comparison of UACI among different algorithms.
منشور في 2025"…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
-
16
Comparison of NPCR among different algorithms.
منشور في 2025"…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
-
17
-
18
-
19
-
20