Results 1 to 10 of about 193,886 (292)
A robust color image encryption algorithm based on 2D-SQSM hyperchaotic map and cyclic shift scrambling. [PDF]
This paper proposes a structurally simplified 2D quadratic sine map (2D-SQSM). This map effectively addresses the insufficient chaos performance of traditional chaotic maps while avoiding the overly complex structures of emerging chaotic maps.
Feixian Liu, Shulei Wu
doaj +2 more sources
Research of UAV 3D path planning based on improved Dwarf mongoose algorithm with multiple strategies [PDF]
Unmanned Aerial Vehicles (UAVs) consistently encounter complex operational environments during task execution. To enhance UAV adaptability in such environments, improve rapid and efficient path planning capabilities, and reduce operational costs, this ...
Lixin Mu +3 more
doaj +2 more sources
Nowadays, problems such as greenhouse effect and air pollution become increasingly prominent. The power generation process should pay attention to the fuel cost and reduce the pollution to the environment.
Yun-Peng Li +2 more
doaj +1 more source
A new Multi Sine-Cosine algorithm for unconstrained optimization problems.
The Sine-Cosine algorithm (SCA) is a population-based metaheuristic algorithm utilizing sine and cosine functions to perform search. To enable the search process, SCA incorporates several search parameters. But sometimes, these parameters make the search
Muhammad Zubair Rehman +4 more
doaj +1 more source
Euler’s integrals and multiple sine functions [PDF]
We show that Euler’s famous integrals whose integrands contain the logarithm of the sine function are expressed via multiple sine functions.
Koyama Shin-ya, Kurokawa Nobushige
openaire +2 more sources
This paper proposes a novel hybrid arithmetic–trigonometric optimization algorithm (ATOA) using different trigonometric functions for complex and continuously evolving real-time problems.
P. Arun Mozhi Devan +5 more
doaj +1 more source
Keyed Parallel Hash Algorithm Based on Multiple Chaotic Maps (KPHA-MCM)
Hash functions are considered as the core of cryptography, which are the basic technique used for data security. Cryptographic hash functions also can be used to achieve the integrity of large data such as the data stored in a hard disk and set of ...
Roayat Ismail Abdelfatah +2 more
doaj +1 more source
Short-term load forecasting is viewed as one promising technology for demand prediction under the most critical inputs for the promising arrangement of power plant units.
Lichao Sun +4 more
doaj +1 more source
Zeta functions and normalized multiple sine functions [PDF]
By using normalized multiple sine functions we show expressions for special values of zeta functions and L-functions containing ζ(3), ζ(5), etc. Our result reveals the importance of division values of normalized multiple sine functions. Properties of multiple Hurwitz zeta functions are crucial for the proof.
Koyama, Shin-ya, Kurokawa, Nobushige
openaire +2 more sources
SinLU: Sinu-Sigmoidal Linear Unit
Non-linear activation functions are integral parts of deep neural architectures. Given the large and complex dataset of a neural network, its computational complexity and approximation capability can differ significantly based on what activation function
Ashis Paul +4 more
doaj +1 more source

