يعرض 21 - 40 نتائج من 76 نتيجة بحث عن 'algorithm etc function', وقت الاستعلام: 0.11s تنقيح النتائج
  1. 21

    Lens imaging opposition-based learning. حسب Yuqi Xiong (12343771)

    منشور في 2025
    الموضوعات:
  2. 22
  3. 23

    Generalized Internal Coordinates for Creative Exploration of Interatomic Geometries حسب Aleksandr V. Marenich (1283298)

    منشور في 2025
    "…Our algorithm allows the user to create compound internal coordinates that are functions of other coordinates, as well as special-purpose coordinates for specific classes of problems. …"
  4. 24

    Generalized Internal Coordinates for Creative Exploration of Interatomic Geometries حسب Aleksandr V. Marenich (1283298)

    منشور في 2025
    "…Our algorithm allows the user to create compound internal coordinates that are functions of other coordinates, as well as special-purpose coordinates for specific classes of problems. …"
  5. 25

    Generalized Internal Coordinates for Creative Exploration of Interatomic Geometries حسب Aleksandr V. Marenich (1283298)

    منشور في 2025
    "…Our algorithm allows the user to create compound internal coordinates that are functions of other coordinates, as well as special-purpose coordinates for specific classes of problems. …"
  6. 26

    Generalized Internal Coordinates for Creative Exploration of Interatomic Geometries حسب Aleksandr V. Marenich (1283298)

    منشور في 2025
    "…Our algorithm allows the user to create compound internal coordinates that are functions of other coordinates, as well as special-purpose coordinates for specific classes of problems. …"
  7. 27

    Image Encryption Flow Chart. حسب Feixian Liu (22477943)

    منشور في 2025
    "…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
  8. 28

    PNSR and SSIM under different cropping attacks. حسب Feixian Liu (22477943)

    منشور في 2025
    "…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
  9. 29

    NIST test result. حسب Feixian Liu (22477943)

    منشور في 2025
    "…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
  10. 30

    Encrypted and decrypted images. حسب Feixian Liu (22477943)

    منشور في 2025
    "…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
  11. 31

    Lyapunov exponent diagrams of 2D-SQSM. حسب Feixian Liu (22477943)

    منشور في 2025
    "…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
  12. 32

    Bifurcation Diagrams of 2D-SQSM. حسب Feixian Liu (22477943)

    منشور في 2025
    "…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
  13. 33

    Six newly proposed chaotic maps. حسب Feixian Liu (22477943)

    منشور في 2025
    "…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
  14. 34

    PNSR and SSIM under different noise attacks. حسب Feixian Liu (22477943)

    منشور في 2025
    "…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
  15. 35

    Trajectory Diagrams of 2D-SQSM. حسب Feixian Liu (22477943)

    منشور في 2025
    "…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
  16. 36
  17. 37

    Routing optimization tool implemented as an interactive dashboard for use by community health programs in Ifanadiana District. حسب Mauricianot Randriamihaja (9091488)

    منشور في 2024
    "…Parameters of the algorithm (e.g. visit times, number of monthly visits) can be changed via the left-hand side panel and key output information (number of personnel-days, etc.) is provided for each fokontany and Commune in the table underneath the map. …"
  18. 38

    Image 1_Diabetic kidney disease: m6A modification as a marker of disease progression and subtype classification.tif حسب Wenzhe Li (815057)

    منشور في 2025
    "…Gene set variation analysis algorithm was used to evaluate the functional pathway enrichment of m6A modified subtypes. …"
  19. 39

    Image 3_Diabetic kidney disease: m6A modification as a marker of disease progression and subtype classification.tif حسب Wenzhe Li (815057)

    منشور في 2025
    "…Gene set variation analysis algorithm was used to evaluate the functional pathway enrichment of m6A modified subtypes. …"
  20. 40

    Image 2_Diabetic kidney disease: m6A modification as a marker of disease progression and subtype classification.tif حسب Wenzhe Li (815057)

    منشور في 2025
    "…Gene set variation analysis algorithm was used to evaluate the functional pathway enrichment of m6A modified subtypes. …"