Research Article
SQLite Encryption Method for Embedded Databases Based on Chaos Algorithm
Figure 6
Iterative curves of SSA and LCSSA under 4 benchmark functions.
(a) Iterative convergence curve when is used as the benchmark function |
(b) Iterative convergence curve when is used as the benchmark function |
(c) Iterative convergence curve when is used as the benchmark function |
(d) Iterative convergence curve when is used as the benchmark function |