Search alternatives:
algorithm sine » algorithm using (Expand Search), algorithms using (Expand Search), algorithm ai (Expand Search)
sine function » gene function (Expand Search), time function (Expand Search), state function (Expand Search)
algorithm sine » algorithm using (Expand Search), algorithms using (Expand Search), algorithm ai (Expand Search)
sine function » gene function (Expand Search), time function (Expand Search), state function (Expand Search)
-
41
Details of parameter settings.
Published 2025“…The experimental results showed that GWOA achieved better convergence speed and solution accuracy than other algorithms in most test functions, especially in multimodal and compositional optimization problems, with an Overall Efficiency (OE) value of 74.46%. …”
-
42
The structure of a tension/compression spring.
Published 2025“…The experimental results showed that GWOA achieved better convergence speed and solution accuracy than other algorithms in most test functions, especially in multimodal and compositional optimization problems, with an Overall Efficiency (OE) value of 74.46%. …”
-
43
Iteration curves in ablation study.
Published 2025“…The experimental results showed that GWOA achieved better convergence speed and solution accuracy than other algorithms in most test functions, especially in multimodal and compositional optimization problems, with an Overall Efficiency (OE) value of 74.46%. …”
-
44
Comparison of Common and the Proposed .
Published 2025“…The experimental results showed that GWOA achieved better convergence speed and solution accuracy than other algorithms in most test functions, especially in multimodal and compositional optimization problems, with an Overall Efficiency (OE) value of 74.46%. …”
-
45
Iteration curves in pressure vessel design.
Published 2025“…The experimental results showed that GWOA achieved better convergence speed and solution accuracy than other algorithms in most test functions, especially in multimodal and compositional optimization problems, with an Overall Efficiency (OE) value of 74.46%. …”
-
46
GWOA vs WOA flowchart.
Published 2025“…The experimental results showed that GWOA achieved better convergence speed and solution accuracy than other algorithms in most test functions, especially in multimodal and compositional optimization problems, with an Overall Efficiency (OE) value of 74.46%. …”
-
47
Iteration curves in piston lever design.
Published 2025“…The experimental results showed that GWOA achieved better convergence speed and solution accuracy than other algorithms in most test functions, especially in multimodal and compositional optimization problems, with an Overall Efficiency (OE) value of 74.46%. …”
-
48
Iteration curves in speed reducer design.
Published 2025“…The experimental results showed that GWOA achieved better convergence speed and solution accuracy than other algorithms in most test functions, especially in multimodal and compositional optimization problems, with an Overall Efficiency (OE) value of 74.46%. …”
-
49
Running environment.
Published 2025“…The experimental results showed that GWOA achieved better convergence speed and solution accuracy than other algorithms in most test functions, especially in multimodal and compositional optimization problems, with an Overall Efficiency (OE) value of 74.46%. …”
-
50
The structure of a piston lever.
Published 2025“…The experimental results showed that GWOA achieved better convergence speed and solution accuracy than other algorithms in most test functions, especially in multimodal and compositional optimization problems, with an Overall Efficiency (OE) value of 74.46%. …”
-
51
Results of the GWOA qualitative analysis (F1-F8).
Published 2025“…The experimental results showed that GWOA achieved better convergence speed and solution accuracy than other algorithms in most test functions, especially in multimodal and compositional optimization problems, with an Overall Efficiency (OE) value of 74.46%. …”
-
52
-
53
Image Encryption Flow Chart.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
54
PNSR and SSIM under different cropping attacks.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
55
NIST test result.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
56
Encrypted and decrypted images.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
57
Lyapunov exponent diagrams of 2D-SQSM.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
58
Bifurcation Diagrams of 2D-SQSM.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
59
Six newly proposed chaotic maps.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
-
60
PNSR and SSIM under different noise attacks.
Published 2025“…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”