يعرض 961 - 980 نتائج من 4,841 نتيجة بحث عن '(( algorithm from function ) OR ((( algorithm python function ) OR ( algorithm a function ))))', وقت الاستعلام: 0.46s تنقيح النتائج
  1. 961

    Fuzzy pairwise comparison matrix. حسب Sultan H. Almotiri (14029251)

    منشور في 2024
    "…However, in the pursuit of complexity, vulnerabilities may be introduced inadvertently, posing a substantial danger to software security. Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …"
  2. 962

    Triangular fuzzy numbers. حسب Sultan H. Almotiri (14029251)

    منشور في 2024
    "…However, in the pursuit of complexity, vulnerabilities may be introduced inadvertently, posing a substantial danger to software security. Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …"
  3. 963

    Fuzzy AHP process. حسب Sultan H. Almotiri (14029251)

    منشور في 2024
    "…However, in the pursuit of complexity, vulnerabilities may be introduced inadvertently, posing a substantial danger to software security. Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …"
  4. 964

    Normalized weight. حسب Sultan H. Almotiri (14029251)

    منشور في 2024
    "…However, in the pursuit of complexity, vulnerabilities may be introduced inadvertently, posing a substantial danger to software security. Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …"
  5. 965

    Meta-analysis of some recent related works. حسب Sultan H. Almotiri (14029251)

    منشور في 2024
    "…However, in the pursuit of complexity, vulnerabilities may be introduced inadvertently, posing a substantial danger to software security. Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …"
  6. 966

    Triangular fuzzy number scale. حسب Sultan H. Almotiri (14029251)

    منشور في 2024
    "…However, in the pursuit of complexity, vulnerabilities may be introduced inadvertently, posing a substantial danger to software security. Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …"
  7. 967

    Hierarchy of quantum techniques and alternatives. حسب Sultan H. Almotiri (14029251)

    منشور في 2024
    "…However, in the pursuit of complexity, vulnerabilities may be introduced inadvertently, posing a substantial danger to software security. Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …"
  8. 968

    Crisp weight. حسب Sultan H. Almotiri (14029251)

    منشور في 2024
    "…However, in the pursuit of complexity, vulnerabilities may be introduced inadvertently, posing a substantial danger to software security. Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …"
  9. 969
  10. 970
  11. 971
  12. 972
  13. 973
  14. 974
  15. 975
  16. 976

    Data Sheet 1_Systematic pan-cancer analysis identifies PKNOX1 as a potential prognostic and immunological biomarker and its functional validation.docx حسب Kan Liu (250462)

    منشور في 2025
    "…The correlations between PKNOX1 expression and MDSC immune infiltration and immune cells were analyzed using the TIDE algorithm and the ESTIMATE algorithm. PKNOX1 -interacting proteins and expression-related genes were analysed via the STRING and TIMER 2.0 platforms, and the functions of PKNOX1 in tumors and the cell pathways involved were predicted via KEGG enrichment analysis. …"
  17. 977
  18. 978
  19. 979
  20. 980