يعرض 301 - 320 نتائج من 954 نتيجة بحث عن '(( algorithm python function ) OR ( ((algorithm python) OR (algorithm both)) function ))*', وقت الاستعلام: 0.30s تنقيح النتائج
  1. 301
  2. 302
  3. 303

    Data Sheet 1_Antibodies and cryptographic hash functions: quantifying the specificity paradox.pdf حسب Robert J. Petrella (5146220)

    منشور في 2025
    "…The results illustrate and quantify how the humoral immune system achieves both high specificity and high degeneracy simultaneously by effectively decoupling the two properties, similarly to programs in cryptography called secure hash algorithms (SHAs), which display the same paradoxical features. …"
  4. 304

    Data Sheet 2_Antibodies and cryptographic hash functions: quantifying the specificity paradox.pdf حسب Robert J. Petrella (5146220)

    منشور في 2025
    "…The results illustrate and quantify how the humoral immune system achieves both high specificity and high degeneracy simultaneously by effectively decoupling the two properties, similarly to programs in cryptography called secure hash algorithms (SHAs), which display the same paradoxical features. …"
  5. 305
  6. 306

    Reinforcement Learning-Based Hybrid Force/Position Control of Redundant Manipulators under Time Delays حسب Mojtaba Radan Kashani (20150034)

    منشور في 2025
    "…This paper introduces a semi-model-free framework, the Force/Position Reinforcement Learning Super-Twisting Algorithm (F/P-RL-STA), which avoids explicit space separation and reduces dependency on accurate models. …"
  7. 307
  8. 308
  9. 309
  10. 310
  11. 311
  12. 312
  13. 313
  14. 314

    Fuzzy weight. حسب Sultan H. Almotiri (14029251)

    منشور في 2024
    "…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …"
  15. 315

    Block diagram of lattice-based cryptography. حسب Sultan H. Almotiri (14029251)

    منشور في 2024
    "…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …"
  16. 316

    Weight of the quantum techniques. حسب Sultan H. Almotiri (14029251)

    منشور في 2024
    "…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …"
  17. 317

    Block description of homomorphic encryption. حسب Sultan H. Almotiri (14029251)

    منشور في 2024
    "…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …"
  18. 318

    Fuzzy pairwise comparison matrix. حسب Sultan H. Almotiri (14029251)

    منشور في 2024
    "…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …"
  19. 319

    Triangular fuzzy numbers. حسب Sultan H. Almotiri (14029251)

    منشور في 2024
    "…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …"
  20. 320

    Fuzzy AHP process. حسب Sultan H. Almotiri (14029251)

    منشور في 2024
    "…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …"