يعرض 1 - 20 نتائج من 152 نتيجة بحث عن 'force ((generation algorithm) OR (encryption algorithm))', وقت الاستعلام: 0.19s تنقيح النتائج
  1. 1
  2. 2
  3. 3
  4. 4

    Comparison of UACI among different algorithms. حسب Feixian Liu (22477943)

    منشور في 2025
    "…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
  5. 5

    Comparison of NPCR among different algorithms. حسب Feixian Liu (22477943)

    منشور في 2025
    "…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
  6. 6

    Encrypted and decrypted images. حسب Feixian Liu (22477943)

    منشور في 2025
    "…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
  7. 7

    Co-authorship network (graph generated using the force-directed Fruchterman-Reingold algorithm). حسب Philippine Dupé (21485482)

    منشور في 2025
    "…<p>Co-authorship network (graph generated using the force-directed Fruchterman-Reingold algorithm).…"
  8. 8

    Image Encryption Flow Chart. حسب Feixian Liu (22477943)

    منشور في 2025
    "…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
  9. 9
  10. 10
  11. 11
  12. 12

    Convergence curve of the DBO algorithm. حسب Ma Haohao (22177538)

    منشور في 2025
    "…For curved workpieces, the curvature adaptive interpolation method is introduced to generate trajectories. An adaptive impedance control strategy is implemented to enhance force control, and PD iteration and RBF neural networks are used to ensure stable contact force and accuracy. …"
  13. 13
  14. 14

    The Rössler attractors in XY plane. حسب Nasreen Zulfiqar (21601226)

    منشور في 2025
    الموضوعات:
  15. 15

    Decrypted Chair image from حسب Nasreen Zulfiqar (21601226)

    منشور في 2025
    الموضوعات:
  16. 16

    Cipher Black image. حسب Nasreen Zulfiqar (21601226)

    منشور في 2025
    الموضوعات:
  17. 17

    Chair () decrypted image. حسب Nasreen Zulfiqar (21601226)

    منشور في 2025
    الموضوعات:
  18. 18

    Hailstones () cipher image. حسب Nasreen Zulfiqar (21601226)

    منشور في 2025
    الموضوعات:
  19. 19

    Results of energy analysis. حسب Nasreen Zulfiqar (21601226)

    منشور في 2025
    الموضوعات:
  20. 20

    The Rössler attractors in 3D. حسب Nasreen Zulfiqar (21601226)

    منشور في 2025
    الموضوعات: