Search Results - (( java application based algorithm ) OR ( using iterative protocol algorithm ))
Search alternatives:
- protocol algorithm »
- application based »
- java application »
- using iterative »
-
1
On the security of digital signature protocol based on iterated function systems.
Published 2011“…A Diffie-Hellman algorithm is used to improve the security of the proposed protocol by generating the number of iteration that is used to find the attractor of the iterated function system, which is used to calculate the public key and the signature. …”
Get full text
Get full text
Get full text
Article -
2
Task-based assessment on various optimization protocols of computed tomography Pulmonary Angiography examination
Published 2021“…The standard CTPA protocols were altered on its tube potential, pitch factor and iterative reconstruction algorithm (IR). …”
Get full text
Get full text
Get full text
Article -
3
The impact of tube current and iterative reconstruction algorithm on dose and image quality of infant CT head examination
Published 2022“…The examination was performed by using 128 multi-slice CT (Ingenuity Core, Philips, Netherlands) and varying the tube current and iterative reconstruction algorithm (iDose4) levels. …”
Get full text
Get full text
Article -
4
Quantitative study of iterative reconstruction algorithms of spect/ct in bone scan: a clinical and phantom study
Published 2024“…For all algorithms, increasing the iteration numbers elevated RC, SUV, and noise, while SNR dropped. …”
Get full text
Get full text
Monograph -
5
A new public key cryptosystem based on IFS
Published 2010“…In the proposed public-key encryption algorithm, generate iterated function systems as a global public element, then its Hutchinson operator is used as a public key. …”
Get full text
Get full text
Get full text
Article -
6
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Article -
7
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
8
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Efficiency analysis for public key systems based on fractal functions.
Published 2011“…In this study we propose a new public key cryptosystem based on Iterated Function Systems (IFS). Results: In the proposed protocol, the attractor of the IFS is used to obtain public key from private one, which is then used with the attractor again to encrypt and decrypt the messages. …”
Get full text
Get full text
Get full text
Article -
10
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
11
Impact of low-dose protocols on computed tomography of lung cancer screening on the intrinsic performance metrics: a phantom study
Published 2023“…The slices were 5 mm thick and reconstructed using a standard reconstruction kernel, for example B80f and 170f, combined with FBP or various IR Results: The low dose group used an acquisition parameter with 100 kVp and a pitch of 0.9, while the standard dose used a pitch of 0.75. …”
Get full text
Get full text
Conference or Workshop Item -
12
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
-
14
-
15
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
17
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
19
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The selected methodology for the application development is based on prototyping methodology. …”
Get full text
Get full text
Final Year Project -
20
