Showing 241 - 260 results of 880 for search 'algorithm both function', query time: 0.19s Refine Results
  1. 241

    Data Sheet 1_Antibodies and cryptographic hash functions: quantifying the specificity paradox.pdf by Robert J. Petrella (5146220)

    Published 2025
    “…The results illustrate and quantify how the humoral immune system achieves both high specificity and high degeneracy simultaneously by effectively decoupling the two properties, similarly to programs in cryptography called secure hash algorithms (SHAs), which display the same paradoxical features. …”
  2. 242

    Data Sheet 2_Antibodies and cryptographic hash functions: quantifying the specificity paradox.pdf by Robert J. Petrella (5146220)

    Published 2025
    “…The results illustrate and quantify how the humoral immune system achieves both high specificity and high degeneracy simultaneously by effectively decoupling the two properties, similarly to programs in cryptography called secure hash algorithms (SHAs), which display the same paradoxical features. …”
  3. 243
  4. 244

    Reinforcement Learning-Based Hybrid Force/Position Control of Redundant Manipulators under Time Delays by Mojtaba Radan Kashani (20150034)

    Published 2025
    “…This paper introduces a semi-model-free framework, the Force/Position Reinforcement Learning Super-Twisting Algorithm (F/P-RL-STA), which avoids explicit space separation and reduces dependency on accurate models. …”
  5. 245
  6. 246
  7. 247
  8. 248
  9. 249
  10. 250
  11. 251
  12. 252

    Fuzzy weight. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  13. 253

    Block diagram of lattice-based cryptography. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  14. 254

    Weight of the quantum techniques. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  15. 255

    Block description of homomorphic encryption. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  16. 256

    Fuzzy pairwise comparison matrix. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  17. 257

    Triangular fuzzy numbers. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  18. 258

    Fuzzy AHP process. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  19. 259

    Normalized weight. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”
  20. 260

    Meta-analysis of some recent related works. by Sultan H. Almotiri (14029251)

    Published 2024
    “…Our study addresses five major components of the quantum method to overcome these challenges: lattice-based cryptography, fully homomorphic algorithms, quantum key distribution, quantum hash functions, and blind quantum algorithms. …”