Showing 301 - 320 results of 956 for search '(( algorithm fibrin function ) OR ((( algorithm python function ) OR ( algorithm both function ))))', query time: 0.42s Refine Results
  1. 301

    Data Sheet 1_Antibodies and cryptographic hash functions: quantifying the specificity paradox.pdf by Robert J. Petrella (5146220)

    Published 2025
    “…The results illustrate and quantify how the humoral immune system achieves both high specificity and high degeneracy simultaneously by effectively decoupling the two properties, similarly to programs in cryptography called secure hash algorithms (SHAs), which display the same paradoxical features. …”
  2. 302

    Data Sheet 2_Antibodies and cryptographic hash functions: quantifying the specificity paradox.pdf by Robert J. Petrella (5146220)

    Published 2025
    “…The results illustrate and quantify how the humoral immune system achieves both high specificity and high degeneracy simultaneously by effectively decoupling the two properties, similarly to programs in cryptography called secure hash algorithms (SHAs), which display the same paradoxical features. …”
  3. 303
  4. 304

    Reinforcement Learning-Based Hybrid Force/Position Control of Redundant Manipulators under Time Delays by Mojtaba Radan Kashani (20150034)

    Published 2025
    “…This paper introduces a semi-model-free framework, the Force/Position Reinforcement Learning Super-Twisting Algorithm (F/P-RL-STA), which avoids explicit space separation and reduces dependency on accurate models. …”
  5. 305
  6. 306
  7. 307
  8. 308
  9. 309
  10. 310
  11. 311
  12. 312

    Fuzzy weight. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  13. 313

    Block diagram of lattice-based cryptography. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  14. 314

    Weight of the quantum techniques. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  15. 315

    Block description of homomorphic encryption. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  16. 316

    Fuzzy pairwise comparison matrix. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  17. 317

    Triangular fuzzy numbers. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  18. 318

    Fuzzy AHP process. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  19. 319

    Normalized weight. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  20. 320

    Meta-analysis of some recent related works. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”