Search alternatives:
algorithm python » algorithms within (Expand Search)
within function » fibrin function (Expand Search), python function (Expand Search), protein function (Expand Search)
algorithm both » algorithm blood (Expand Search), algorithm b (Expand Search), algorithm etc (Expand Search)
algorithm python » algorithms within (Expand Search)
within function » fibrin function (Expand Search), python function (Expand Search), protein function (Expand Search)
algorithm both » algorithm blood (Expand Search), algorithm b (Expand Search), algorithm etc (Expand Search)
-
521
Block diagram of lattice-based cryptography.
Published 2024“…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
-
522
Weight of the quantum techniques.
Published 2024“…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
-
523
Block description of homomorphic encryption.
Published 2024“…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
-
524
Fuzzy pairwise comparison matrix.
Published 2024“…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
-
525
Triangular fuzzy numbers.
Published 2024“…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
-
526
Fuzzy AHP process.
Published 2024“…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
-
527
Normalized weight.
Published 2024“…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
-
528
Meta-analysis of some recent related works.
Published 2024“…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
-
529
Triangular fuzzy number scale.
Published 2024“…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
-
530
Hierarchy of quantum techniques and alternatives.
Published 2024“…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
-
531
Crisp weight.
Published 2024“…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
-
532
-
533
-
534
-
535
Incremental Inverse Design of Desired Soybean Phenotypes
Published 2024“…The limitations of inverse design in genotype-to-bulk phenotype (G-BP) mapping can be addressed via an established design paradigm: “design, build, test, learn” (DBTL), where computational inverse design automates both the design and learn phases. In any context, inverse design is limited by the fundamental “one-to-many” nature of the inverse function. …”
-
536
Optimal progressively censored reliability sampling plans for log-location-scale distributions
Published 2025“…<p>Here, we introduce a variable neighborhood search algorithm-based approach to determine the minimum sample sizes required for progressively censored reliability sampling plans within the flexible family of log-location-scale family of distributions, which includes Weibull and log-logistic distributions. …”
-
537
-
538
Table 1_SRC is a potential target of Arctigenin in treating triple-negative breast cancer: based on machine learning algorithms, molecular modeling and in Vitro test.xlsx
Published 2025“…Machine learning algorithms were employed to identify hub genes, followed by validation through molecular docking, molecular dynamics (MD) simulations, and surface plasmon resonance (SPR) assays. …”
-
539
Table 2_SRC is a potential target of Arctigenin in treating triple-negative breast cancer: based on machine learning algorithms, molecular modeling and in Vitro test.xlsx
Published 2025“…Machine learning algorithms were employed to identify hub genes, followed by validation through molecular docking, molecular dynamics (MD) simulations, and surface plasmon resonance (SPR) assays. …”
-
540
Table 3_SRC is a potential target of Arctigenin in treating triple-negative breast cancer: based on machine learning algorithms, molecular modeling and in Vitro test.docx
Published 2025“…Machine learning algorithms were employed to identify hub genes, followed by validation through molecular docking, molecular dynamics (MD) simulations, and surface plasmon resonance (SPR) assays. …”