Showing 941 - 960 results of 4,841 for search '(( algorithm from function ) OR ((( algorithm python function ) OR ( algorithm a function ))))', query time: 0.39s Refine Results
  1. 941
  2. 942
  3. 943
  4. 944
  5. 945
  6. 946
  7. 947
  8. 948
  9. 949
  10. 950
  11. 951
  12. 952
  13. 953

    Plot of coverage attenuation function. by Junjie He (700642)

    Published 2024
    “…Additionally, sensitivity analysis was conducted to explore the effect of different parameters on the maximum fire risk value that can be covered by a fire station. A compromise coordinated siting scheme with a hierarchy of fire stations can be obtained by solving the proposed model. …”
  14. 954
  15. 955
  16. 956
  17. 957

    Fuzzy weight. by Sultan H. Almotiri (14029251)

    Published 2024
    “…However, in the pursuit of complexity, vulnerabilities may be introduced inadvertently, posing a substantial danger to software security. Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  18. 958

    Block diagram of lattice-based cryptography. by Sultan H. Almotiri (14029251)

    Published 2024
    “…However, in the pursuit of complexity, vulnerabilities may be introduced inadvertently, posing a substantial danger to software security. Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  19. 959

    Weight of the quantum techniques. by Sultan H. Almotiri (14029251)

    Published 2024
    “…However, in the pursuit of complexity, vulnerabilities may be introduced inadvertently, posing a substantial danger to software security. Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  20. 960

    Block description of homomorphic encryption. by Sultan H. Almotiri (14029251)

    Published 2024
    “…However, in the pursuit of complexity, vulnerabilities may be introduced inadvertently, posing a substantial danger to software security. Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”