يعرض 1 - 20 نتائج من 190 نتيجة بحث عن '(( force ((generation algorithm) OR (selection algorithm)) ) OR ( code encryption algorithm ))', وقت الاستعلام: 0.38s تنقيح النتائج
  1. 1

    Convergence curve of the DBO algorithm. حسب Ma Haohao (22177538)

    منشور في 2025
    "…The improved Dung Beetle Optimization algorithm, Back Propagation Neural Network, Finite Element Analysis, and Response Surface Methodology provide a strong guarantee for the selection of robot polishing process parameters. …"
  2. 2
  3. 3
  4. 4
  5. 5

    Co-authorship network (graph generated using the force-directed Fruchterman-Reingold algorithm). حسب Philippine Dupé (21485482)

    منشور في 2025
    "…<p>Co-authorship network (graph generated using the force-directed Fruchterman-Reingold algorithm).…"
  6. 6
  7. 7

    Number of features selected. حسب Islam Zada (21755819)

    منشور في 2025
    "…In this paper, a Lean-based hybrid Intrusion Detection framework using Particle Swarm Optimization and Genetic Algorithm (PSO-GA) to select the features and Extreme Learning Machine and Bootstrap Aggregation (ELM-BA) to classify the features is introduced. …"
  8. 8

    Data Encryption and Compression حسب Chandra Shekhar Ram (20325126)

    منشور في 2024
    "…Advanced compression techniques, including <b>Huffman coding</b> and <b>Lempel-Ziv algorithms</b>, are covered to illustrate their practical applications in modern data systems. …"
  9. 9
  10. 10

    Correlation heatmap of selected features. حسب Islam Zada (21755819)

    منشور في 2025
    "…In this paper, a Lean-based hybrid Intrusion Detection framework using Particle Swarm Optimization and Genetic Algorithm (PSO-GA) to select the features and Extreme Learning Machine and Bootstrap Aggregation (ELM-BA) to classify the features is introduced. …"
  11. 11

    Comparison of UACI among different algorithms. حسب Feixian Liu (22477943)

    منشور في 2025
    "…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
  12. 12

    Comparison of NPCR among different algorithms. حسب Feixian Liu (22477943)

    منشور في 2025
    "…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
  13. 13

    Comparison of different algorithms. حسب Zhijian Qu (6920060)

    منشور في 2025
    الموضوعات: "…objective optimization algorithm…"
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    Schematic diagram of the multi-objective optimization algorithm. حسب Zhijian Qu (6920060)

    منشور في 2025
    الموضوعات: "…objective optimization algorithm…"
  19. 19

    Image 2_A comparison of design algorithms for choosing the training population in genomic models.jpeg حسب Alexandra Stadler (20718002)

    منشور في 2025
    "…Classical exchange-type algorithms from optimal design theory can be employed for this purpose. …"
  20. 20

    Image 8_A comparison of design algorithms for choosing the training population in genomic models.jpeg حسب Alexandra Stadler (20718002)

    منشور في 2025
    "…Classical exchange-type algorithms from optimal design theory can be employed for this purpose. …"