Showing 821 - 840 results of 1,987 for search '(( algorithm b function ) OR ((( algorithm python function ) OR ( algorithm both function ))))', query time: 0.54s Refine Results
  1. 821

    Fuzzy weight. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  2. 822

    Block diagram of lattice-based cryptography. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  3. 823

    Weight of the quantum techniques. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  4. 824

    Block description of homomorphic encryption. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  5. 825

    Fuzzy pairwise comparison matrix. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  6. 826

    Triangular fuzzy numbers. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  7. 827

    Fuzzy AHP process. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  8. 828

    Normalized weight. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  9. 829

    Meta-analysis of some recent related works. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  10. 830

    Triangular fuzzy number scale. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  11. 831

    Hierarchy of quantum techniques and alternatives. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  12. 832

    Crisp weight. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  13. 833
  14. 834

    Incremental Inverse Design of Desired Soybean Phenotypes by Joseph Zavorskas (19761296)

    Published 2024
    “…The limitations of inverse design in genotype-to-bulk phenotype (G-BP) mapping can be addressed via an established design paradigm: “design, build, test, learn” (DBTL), where computational inverse design automates both the design and learn phases. In any context, inverse design is limited by the fundamental “one-to-many” nature of the inverse function. …”
  15. 835
  16. 836
  17. 837

    Strategic Integration of Machine Learning in the Design of Excellent Hybrid Perovskite Solar Cells by Zhaosheng Zhang (4603021)

    Published 2025
    “…The ideal combination of descriptors and algorithms identified was MBTR + CustomCNN, with an <i>R</i><sup>2</sup> of 0.94. …”
  18. 838

    Table 1_SRC is a potential target of Arctigenin in treating triple-negative breast cancer: based on machine learning algorithms, molecular modeling and in Vitro test.xlsx by Yuezhou Huang (9998177)

    Published 2025
    “…Machine learning algorithms were employed to identify hub genes, followed by validation through molecular docking, molecular dynamics (MD) simulations, and surface plasmon resonance (SPR) assays. …”
  19. 839

    Table 2_SRC is a potential target of Arctigenin in treating triple-negative breast cancer: based on machine learning algorithms, molecular modeling and in Vitro test.xlsx by Yuezhou Huang (9998177)

    Published 2025
    “…Machine learning algorithms were employed to identify hub genes, followed by validation through molecular docking, molecular dynamics (MD) simulations, and surface plasmon resonance (SPR) assays. …”
  20. 840

    Table 3_SRC is a potential target of Arctigenin in treating triple-negative breast cancer: based on machine learning algorithms, molecular modeling and in Vitro test.docx by Yuezhou Huang (9998177)

    Published 2025
    “…Machine learning algorithms were employed to identify hub genes, followed by validation through molecular docking, molecular dynamics (MD) simulations, and surface plasmon resonance (SPR) assays. …”