Showing 41 - 60 results of 62 for search 'algorithm sine function', query time: 0.19s Refine Results
  1. 41

    Details of parameter settings. by Yanzhao Gu (21192659)

    Published 2025
    “…The experimental results showed that GWOA achieved better convergence speed and solution accuracy than other algorithms in most test functions, especially in multimodal and compositional optimization problems, with an Overall Efficiency (OE) value of 74.46%. …”
  2. 42

    The structure of a tension/compression spring. by Yanzhao Gu (21192659)

    Published 2025
    “…The experimental results showed that GWOA achieved better convergence speed and solution accuracy than other algorithms in most test functions, especially in multimodal and compositional optimization problems, with an Overall Efficiency (OE) value of 74.46%. …”
  3. 43

    Iteration curves in ablation study. by Yanzhao Gu (21192659)

    Published 2025
    “…The experimental results showed that GWOA achieved better convergence speed and solution accuracy than other algorithms in most test functions, especially in multimodal and compositional optimization problems, with an Overall Efficiency (OE) value of 74.46%. …”
  4. 44

    Comparison of Common and the Proposed . by Yanzhao Gu (21192659)

    Published 2025
    “…The experimental results showed that GWOA achieved better convergence speed and solution accuracy than other algorithms in most test functions, especially in multimodal and compositional optimization problems, with an Overall Efficiency (OE) value of 74.46%. …”
  5. 45

    Iteration curves in pressure vessel design. by Yanzhao Gu (21192659)

    Published 2025
    “…The experimental results showed that GWOA achieved better convergence speed and solution accuracy than other algorithms in most test functions, especially in multimodal and compositional optimization problems, with an Overall Efficiency (OE) value of 74.46%. …”
  6. 46

    GWOA vs WOA flowchart. by Yanzhao Gu (21192659)

    Published 2025
    “…The experimental results showed that GWOA achieved better convergence speed and solution accuracy than other algorithms in most test functions, especially in multimodal and compositional optimization problems, with an Overall Efficiency (OE) value of 74.46%. …”
  7. 47

    Iteration curves in piston lever design. by Yanzhao Gu (21192659)

    Published 2025
    “…The experimental results showed that GWOA achieved better convergence speed and solution accuracy than other algorithms in most test functions, especially in multimodal and compositional optimization problems, with an Overall Efficiency (OE) value of 74.46%. …”
  8. 48

    Iteration curves in speed reducer design. by Yanzhao Gu (21192659)

    Published 2025
    “…The experimental results showed that GWOA achieved better convergence speed and solution accuracy than other algorithms in most test functions, especially in multimodal and compositional optimization problems, with an Overall Efficiency (OE) value of 74.46%. …”
  9. 49

    Running environment. by Yanzhao Gu (21192659)

    Published 2025
    “…The experimental results showed that GWOA achieved better convergence speed and solution accuracy than other algorithms in most test functions, especially in multimodal and compositional optimization problems, with an Overall Efficiency (OE) value of 74.46%. …”
  10. 50

    The structure of a piston lever. by Yanzhao Gu (21192659)

    Published 2025
    “…The experimental results showed that GWOA achieved better convergence speed and solution accuracy than other algorithms in most test functions, especially in multimodal and compositional optimization problems, with an Overall Efficiency (OE) value of 74.46%. …”
  11. 51

    Results of the GWOA qualitative analysis (F1-F8). by Yanzhao Gu (21192659)

    Published 2025
    “…The experimental results showed that GWOA achieved better convergence speed and solution accuracy than other algorithms in most test functions, especially in multimodal and compositional optimization problems, with an Overall Efficiency (OE) value of 74.46%. …”
  12. 52
  13. 53

    Image Encryption Flow Chart. by Feixian Liu (22477943)

    Published 2025
    “…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
  14. 54

    PNSR and SSIM under different cropping attacks. by Feixian Liu (22477943)

    Published 2025
    “…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
  15. 55

    NIST test result. by Feixian Liu (22477943)

    Published 2025
    “…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
  16. 56

    Encrypted and decrypted images. by Feixian Liu (22477943)

    Published 2025
    “…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
  17. 57

    Lyapunov exponent diagrams of 2D-SQSM. by Feixian Liu (22477943)

    Published 2025
    “…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
  18. 58

    Bifurcation Diagrams of 2D-SQSM. by Feixian Liu (22477943)

    Published 2025
    “…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
  19. 59

    Six newly proposed chaotic maps. by Feixian Liu (22477943)

    Published 2025
    “…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”
  20. 60

    PNSR and SSIM under different noise attacks. by Feixian Liu (22477943)

    Published 2025
    “…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …”