Research Article
SQLite Encryption Method for Embedded Databases Based on Chaos Algorithm
Table 2
Eight benchmark function parameter settings.
| Benchmark function | Ranges | Dimension | Optimal extreme value |
| | [-110, 110] | 35 | 0 | | [-20, 20] | 35 | 0 | | [-110, 110] | 35 | 0 | | [-110, 110] | 35 | 0 |
|
|