بدائل البحث:
generation algorithm » genetic algorithm (توسيع البحث), detection algorithm (توسيع البحث), segmentation algorithm (توسيع البحث)
selection algorithm » detection algorithm (توسيع البحث), detection algorithms (توسيع البحث), prediction algorithms (توسيع البحث)
code encryption » image encryption (توسيع البحث)
generation algorithm » genetic algorithm (توسيع البحث), detection algorithm (توسيع البحث), segmentation algorithm (توسيع البحث)
selection algorithm » detection algorithm (توسيع البحث), detection algorithms (توسيع البحث), prediction algorithms (توسيع البحث)
code encryption » image encryption (توسيع البحث)
-
1
Convergence curve of the DBO algorithm.
منشور في 2025"…The improved Dung Beetle Optimization algorithm, Back Propagation Neural Network, Finite Element Analysis, and Response Surface Methodology provide a strong guarantee for the selection of robot polishing process parameters. …"
-
2
-
3
-
4
-
5
Co-authorship network (graph generated using the force-directed Fruchterman-Reingold algorithm).
منشور في 2025"…<p>Co-authorship network (graph generated using the force-directed Fruchterman-Reingold algorithm).…"
-
6
-
7
Number of features selected.
منشور في 2025"…In this paper, a Lean-based hybrid Intrusion Detection framework using Particle Swarm Optimization and Genetic Algorithm (PSO-GA) to select the features and Extreme Learning Machine and Bootstrap Aggregation (ELM-BA) to classify the features is introduced. …"
-
8
Data Encryption and Compression
منشور في 2024"…Advanced compression techniques, including <b>Huffman coding</b> and <b>Lempel-Ziv algorithms</b>, are covered to illustrate their practical applications in modern data systems. …"
-
9
-
10
Correlation heatmap of selected features.
منشور في 2025"…In this paper, a Lean-based hybrid Intrusion Detection framework using Particle Swarm Optimization and Genetic Algorithm (PSO-GA) to select the features and Extreme Learning Machine and Bootstrap Aggregation (ELM-BA) to classify the features is introduced. …"
-
11
Comparison of UACI among different algorithms.
منشور في 2025"…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
-
12
Comparison of NPCR among different algorithms.
منشور في 2025"…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
-
13
-
14
-
15
-
16
-
17
-
18
Schematic diagram of the multi-objective optimization algorithm.
منشور في 2025الموضوعات: "…objective optimization algorithm…"
-
19
Image 2_A comparison of design algorithms for choosing the training population in genomic models.jpeg
منشور في 2025"…Classical exchange-type algorithms from optimal design theory can be employed for this purpose. …"
-
20
Image 8_A comparison of design algorithms for choosing the training population in genomic models.jpeg
منشور في 2025"…Classical exchange-type algorithms from optimal design theory can be employed for this purpose. …"