Zobrazeno 1 - 8
of 8
pro vyhledávání: '"H. G. Govardhana Reddy"'
Autor:
Xiujun Zhang, H. G. Govardhana Reddy, Arcot Usha, M. C. Shanmukha, Mohammad Reza Farahani, Mehdi Alaeiyan
Publikováno v:
Mathematical Biosciences and Engineering, Vol 20, Iss 2, Pp 3594-3609 (2023)
The use of topological descriptors is the key method, regardless of great advances taking place in the field of drug design. Descriptors portray the chemical characteristic of a molecule in numerical form, that is used for QSAR/QSPR models. The numer
Externí odkaz:
https://doaj.org/article/34b854cbd5734426bac3b580e1f5e7d3
Autor:
N. . J., Krishna Kumar1, H. G., Govardhana Reddy2, Sajjanara, Veeresha A.3, Sisodia, Dharini Raje4, R., Shekhar5
Publikováno v:
Webology. 2022, Vol. 19 Issue 2, p1783-1791. 9p.
Publikováno v:
Journal of Discrete Mathematical Sciences and Cryptography. 25:1157-1171
Autor:
Xiujun Zhang, H. G. Govardhana Reddy, Arcot Usha, M. C. Shanmukha, Mohammad Reza Farahani, Mehdi Alaeiyan
Publikováno v:
Mathematical Biosciences and Engineering. 20:3594-3609
The use of topological descriptors is the key method, regardless of great advances taking place in the field of drug design. Descriptors portray the chemical characteristic of a molecule in numerical form, that is used for QSAR/QSPR models. The numer
Autor:
Devi, S. Shenbaga1 ss1338@srmist.edu.in, Dhanalakshmi, S.2 dhanalas1@srmist.edu.in
Publikováno v:
IAENG International Journal of Applied Mathematics. Jun2024, Vol. 54 Issue 6, p1233-1239. 7p.
Publikováno v:
Zika & Mosquito Week; 2/17/2023, p1875-1875, 1p
Data security is paramount in our modern world, and the symbiotic relationship between machine learning and cryptography has recently taken center stage. The vulnerability of traditional cryptosystems to human error and evolving cyber threats is a pr
Autor:
Nirbhay Kumar Chaubey, Neha Chaubey
With the increasing power of computing, cybersecurity faces mounting threats, making digital systems more vulnerable to attacks. While modern cryptography used to be compelling, it now shows vulnerabilities against rapidly growing computational capab