بدائل البحث:
algorithm etc » algorithm _ (توسيع البحث), algorithm b (توسيع البحث), algorithm a (توسيع البحث)
etc function » spc function (توسيع البحث), fc function (توسيع البحث), npc function (توسيع البحث)
algorithm etc » algorithm _ (توسيع البحث), algorithm b (توسيع البحث), algorithm a (توسيع البحث)
etc function » spc function (توسيع البحث), fc function (توسيع البحث), npc function (توسيع البحث)
-
21
-
22
Drug Release Nanoparticle System Design: Data Set Compilation and Machine Learning Modeling
منشور في 2025الموضوعات: -
23
Generalized Internal Coordinates for Creative Exploration of Interatomic Geometries
منشور في 2025"…Our algorithm allows the user to create compound internal coordinates that are functions of other coordinates, as well as special-purpose coordinates for specific classes of problems. …"
-
24
Generalized Internal Coordinates for Creative Exploration of Interatomic Geometries
منشور في 2025"…Our algorithm allows the user to create compound internal coordinates that are functions of other coordinates, as well as special-purpose coordinates for specific classes of problems. …"
-
25
Generalized Internal Coordinates for Creative Exploration of Interatomic Geometries
منشور في 2025"…Our algorithm allows the user to create compound internal coordinates that are functions of other coordinates, as well as special-purpose coordinates for specific classes of problems. …"
-
26
Generalized Internal Coordinates for Creative Exploration of Interatomic Geometries
منشور في 2025"…Our algorithm allows the user to create compound internal coordinates that are functions of other coordinates, as well as special-purpose coordinates for specific classes of problems. …"
-
27
Image Encryption Flow Chart.
منشور في 2025"…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
-
28
PNSR and SSIM under different cropping attacks.
منشور في 2025"…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
-
29
NIST test result.
منشور في 2025"…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
-
30
Encrypted and decrypted images.
منشور في 2025"…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
-
31
Lyapunov exponent diagrams of 2D-SQSM.
منشور في 2025"…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
-
32
Bifurcation Diagrams of 2D-SQSM.
منشور في 2025"…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
-
33
Six newly proposed chaotic maps.
منشور في 2025"…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
-
34
PNSR and SSIM under different noise attacks.
منشور في 2025"…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
-
35
Trajectory Diagrams of 2D-SQSM.
منشور في 2025"…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
-
36
-
37
Routing optimization tool implemented as an interactive dashboard for use by community health programs in Ifanadiana District.
منشور في 2024"…Parameters of the algorithm (e.g. visit times, number of monthly visits) can be changed via the left-hand side panel and key output information (number of personnel-days, etc.) is provided for each fokontany and Commune in the table underneath the map. …"
-
38
Image 1_Diabetic kidney disease: m6A modification as a marker of disease progression and subtype classification.tif
منشور في 2025"…Gene set variation analysis algorithm was used to evaluate the functional pathway enrichment of m6A modified subtypes. …"
-
39
Image 3_Diabetic kidney disease: m6A modification as a marker of disease progression and subtype classification.tif
منشور في 2025"…Gene set variation analysis algorithm was used to evaluate the functional pathway enrichment of m6A modified subtypes. …"
-
40
Image 2_Diabetic kidney disease: m6A modification as a marker of disease progression and subtype classification.tif
منشور في 2025"…Gene set variation analysis algorithm was used to evaluate the functional pathway enrichment of m6A modified subtypes. …"