Showing 521 - 540 results of 1,453 for search '(( algorithm within function ) OR ( ((algorithm python) OR (algorithm both)) function ))*', query time: 0.27s Refine Results
  1. 521

    Block diagram of lattice-based cryptography. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  2. 522

    Weight of the quantum techniques. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  3. 523

    Block description of homomorphic encryption. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  4. 524

    Fuzzy pairwise comparison matrix. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  5. 525

    Triangular fuzzy numbers. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  6. 526

    Fuzzy AHP process. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  7. 527

    Normalized weight. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  8. 528

    Meta-analysis of some recent related works. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  9. 529

    Triangular fuzzy number scale. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  10. 530

    Hierarchy of quantum techniques and alternatives. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  11. 531

    Crisp weight. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  12. 532
  13. 533
  14. 534
  15. 535

    Incremental Inverse Design of Desired Soybean Phenotypes by Joseph Zavorskas (19761296)

    Published 2024
    “…The limitations of inverse design in genotype-to-bulk phenotype (G-BP) mapping can be addressed via an established design paradigm: “design, build, test, learn” (DBTL), where computational inverse design automates both the design and learn phases. In any context, inverse design is limited by the fundamental “one-to-many” nature of the inverse function. …”
  16. 536

    Optimal progressively censored reliability sampling plans for log-location-scale distributions by Chien-Tai Lin (22673615)

    Published 2025
    “…<p>Here, we introduce a variable neighborhood search algorithm-based approach to determine the minimum sample sizes required for progressively censored reliability sampling plans within the flexible family of log-location-scale family of distributions, which includes Weibull and log-logistic distributions. …”
  17. 537
  18. 538

    Table 1_SRC is a potential target of Arctigenin in treating triple-negative breast cancer: based on machine learning algorithms, molecular modeling and in Vitro test.xlsx by Yuezhou Huang (9998177)

    Published 2025
    “…Machine learning algorithms were employed to identify hub genes, followed by validation through molecular docking, molecular dynamics (MD) simulations, and surface plasmon resonance (SPR) assays. …”
  19. 539

    Table 2_SRC is a potential target of Arctigenin in treating triple-negative breast cancer: based on machine learning algorithms, molecular modeling and in Vitro test.xlsx by Yuezhou Huang (9998177)

    Published 2025
    “…Machine learning algorithms were employed to identify hub genes, followed by validation through molecular docking, molecular dynamics (MD) simulations, and surface plasmon resonance (SPR) assays. …”
  20. 540

    Table 3_SRC is a potential target of Arctigenin in treating triple-negative breast cancer: based on machine learning algorithms, molecular modeling and in Vitro test.docx by Yuezhou Huang (9998177)

    Published 2025
    “…Machine learning algorithms were employed to identify hub genes, followed by validation through molecular docking, molecular dynamics (MD) simulations, and surface plasmon resonance (SPR) assays. …”