Showing 821 - 840 results of 2,635 for search '(( algorithm from function ) OR ((( algorithm python function ) OR ( algorithm blood function ))))', query time: 0.59s Refine Results
  1. 821

    Fuzzy weight. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  2. 822

    Block diagram of lattice-based cryptography. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  3. 823

    Weight of the quantum techniques. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  4. 824

    Block description of homomorphic encryption. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  5. 825

    Fuzzy pairwise comparison matrix. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  6. 826

    Triangular fuzzy numbers. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  7. 827

    Fuzzy AHP process. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  8. 828

    Normalized weight. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  9. 829

    Meta-analysis of some recent related works. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  10. 830

    Triangular fuzzy number scale. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  11. 831

    Hierarchy of quantum techniques and alternatives. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  12. 832

    Crisp weight. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  13. 833
  14. 834

    Computational Pipeline for Accelerating the Design of Glycomimetics by Yao Xiao (227567)

    Published 2025
    “…The GA-generated structures were then subjected to molecular dynamics (MD) simulation, and the performance was evaluated for three post-MD approaches to computing interaction energies: the scoring function from AutoDock Vina-Carb, as well as the generalized Born and Poisson–Boltzmann surface area (GBSA/PBSA) implementations within the AMBER molecular mechanical (MM) force field. …”
  15. 835

    Network Structure of Primary Component Contrastive learning (PiCCL). by Yiming Kuang (22120458)

    Published 2025
    “…<p>PiCCL is a multiview contrastive learning algorithm, <i>P</i> views are generated from each sample image and fed into a multiplex Siamese network. …”
  16. 836

    High-Coverage Stereoproteome Mapping Uncovers Pervasive Protein Stereoisomerization Associated with Neurodegeneration by Xia Xu (83500)

    Published 2025
    “…This method employs multidimensional isomeric separation, advanced algorithms, and stereoisomer-specific retention time shifts. …”
  17. 837

    High-Coverage Stereoproteome Mapping Uncovers Pervasive Protein Stereoisomerization Associated with Neurodegeneration by Xia Xu (83500)

    Published 2025
    “…This method employs multidimensional isomeric separation, advanced algorithms, and stereoisomer-specific retention time shifts. …”
  18. 838

    High-Coverage Stereoproteome Mapping Uncovers Pervasive Protein Stereoisomerization Associated with Neurodegeneration by Xia Xu (83500)

    Published 2025
    “…This method employs multidimensional isomeric separation, advanced algorithms, and stereoisomer-specific retention time shifts. …”
  19. 839

    High-Coverage Stereoproteome Mapping Uncovers Pervasive Protein Stereoisomerization Associated with Neurodegeneration by Xia Xu (83500)

    Published 2025
    “…This method employs multidimensional isomeric separation, advanced algorithms, and stereoisomer-specific retention time shifts. …”
  20. 840

    High-Coverage Stereoproteome Mapping Uncovers Pervasive Protein Stereoisomerization Associated with Neurodegeneration by Xia Xu (83500)

    Published 2025
    “…This method employs multidimensional isomeric separation, advanced algorithms, and stereoisomer-specific retention time shifts. …”