يعرض 1 - 18 نتائج من 18 نتيجة بحث عن 'multiple force generation algorithm', وقت الاستعلام: 0.17s تنقيح النتائج
  1. 1

    Comparison of UACI among different algorithms. حسب Feixian Liu (22477943)

    منشور في 2025
    "…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
  2. 2

    Comparison of NPCR among different algorithms. حسب Feixian Liu (22477943)

    منشور في 2025
    "…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
  3. 3

    Model output of different pairs of parameters. حسب Yen-Ju Chen (354876)

    منشور في 2025
    "…However, whether human vision employs a similarly global computation remains unclear due to the absence of appropriate methods for manipulating similarity matrices across multiple elements within a stimulus. To investigate how “temporal similarity structures” influence human visual segmentation, we developed a stimulus generation algorithm based on Vision Transformer. …"
  4. 4

    Image Encryption Flow Chart. حسب Feixian Liu (22477943)

    منشور في 2025
    "…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
  5. 5

    PNSR and SSIM under different cropping attacks. حسب Feixian Liu (22477943)

    منشور في 2025
    "…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
  6. 6

    NIST test result. حسب Feixian Liu (22477943)

    منشور في 2025
    "…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
  7. 7

    Encrypted and decrypted images. حسب Feixian Liu (22477943)

    منشور في 2025
    "…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
  8. 8

    Lyapunov exponent diagrams of 2D-SQSM. حسب Feixian Liu (22477943)

    منشور في 2025
    "…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
  9. 9

    Bifurcation Diagrams of 2D-SQSM. حسب Feixian Liu (22477943)

    منشور في 2025
    "…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
  10. 10

    Six newly proposed chaotic maps. حسب Feixian Liu (22477943)

    منشور في 2025
    "…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
  11. 11

    PNSR and SSIM under different noise attacks. حسب Feixian Liu (22477943)

    منشور في 2025
    "…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
  12. 12

    Trajectory Diagrams of 2D-SQSM. حسب Feixian Liu (22477943)

    منشور في 2025
    "…Based on the 2D-SQSM, this paper further designs a highly robust color image encryption algorithm. First, by introducing different hash functions multiple times, the correlation between the key and plaintext is enhanced, significantly improving resistance against brute-force attacks; second, cyclic shifting and segmentation-recombination operations are applied separately to the three RGB channels to effectively disrupt pixel distribution and significantly reduce spatial correlation between pixels; finally, the chaotic sequence generated by the 2D-SQSM is utilized for XOR diffusion, further enhancing the randomness and diffusion capability of the ciphertext. …"
  13. 13
  14. 14

    Additional data for the polyanion sodium cathode materials dataset حسب Martin Hoffmann Petersen (13626778)

    منشور في 2024
    "…</p><p dir="ltr">All NEB calculations are performed using the ASE version 3.23.0 NEB wrapper with the FIRE optimization algorithm. Five intermediate images were used in the NEB optimization, converging to a maximum atom-wise force of 0.03ev/Å. …"
  15. 15

    3D Deformable cell based model. حسب Roland M. Dries (6620132)

    منشور في 2025
    "…When the actual length deviates from the rest length, a restorative force is generated (push or pull). Image (B6) illustrates <i>Volume conservation</i>. …"
  16. 16

    Landscape17 حسب Vlad Carare (22092515)

    منشور في 2025
    "…The NEB algorithm optimizes these interpolations of 20 images with a 50 eV/Å spring constant and convergence criterion of 10<sup>−2</sup> eV/Å for the maximum force component. …"
  17. 17

    Polyanion sodium cathode materials dataset حسب Martin Hoffmann Petersen (13626778)

    منشور في 2025
    "…<p dir="ltr">We have created a polyanion sodium cathode materials dataset that includes optimizations of structures to the lowest energy, ab initio molecular dynamics simulations trajectories sampled at 1000K, and structures generated from ML-driven molecular dynamics simulation at 1000K using active learning algorithms. …"
  18. 18

    Supporting data for "Fracture and Non-linear Response of Biopolymer Network with Dynamic Cross-linkers" حسب Bingxian Tang (9151802)

    منشور في 2025
    "…A MATLAB script is also provided, outlining the methodology for generating the network. It details the input parameters, such as line density and crosslink number, as well as the algorithms employed for filament arrangement and crosslink determination. …"