Search Results - (( java application reoptimize algorithm ) OR ( using iterative protocol algorithm ))
Search alternatives:
- application reoptimize »
- protocol algorithm »
- java application »
- using iterative »
-
1
On the security of digital signature protocol based on iterated function systems.
Published 2011“…A Diffie-Hellman algorithm is used to improve the security of the proposed protocol by generating the number of iteration that is used to find the attractor of the iterated function system, which is used to calculate the public key and the signature. …”
Get full text
Get full text
Get full text
Article -
2
Task-based assessment on various optimization protocols of computed tomography Pulmonary Angiography examination
Published 2021“…The standard CTPA protocols were altered on its tube potential, pitch factor and iterative reconstruction algorithm (IR). …”
Get full text
Get full text
Get full text
Article -
3
The impact of tube current and iterative reconstruction algorithm on dose and image quality of infant CT head examination
Published 2022“…The examination was performed by using 128 multi-slice CT (Ingenuity Core, Philips, Netherlands) and varying the tube current and iterative reconstruction algorithm (iDose4) levels. …”
Get full text
Get full text
Article -
4
Quantitative study of iterative reconstruction algorithms of spect/ct in bone scan: a clinical and phantom study
Published 2024“…For all algorithms, increasing the iteration numbers elevated RC, SUV, and noise, while SNR dropped. …”
Get full text
Get full text
Monograph -
5
A new public key cryptosystem based on IFS
Published 2010“…In the proposed public-key encryption algorithm, generate iterated function systems as a global public element, then its Hutchinson operator is used as a public key. …”
Get full text
Get full text
Get full text
Article -
6
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Article -
7
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…Among hash algorithms, MD5 is the most used hash function algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Efficiency analysis for public key systems based on fractal functions.
Published 2011“…In this study we propose a new public key cryptosystem based on Iterated Function Systems (IFS). Results: In the proposed protocol, the attractor of the IFS is used to obtain public key from private one, which is then used with the attractor again to encrypt and decrypt the messages. …”
Get full text
Get full text
Get full text
Article -
9
Impact of low-dose protocols on computed tomography of lung cancer screening on the intrinsic performance metrics: a phantom study
Published 2023“…The slices were 5 mm thick and reconstructed using a standard reconstruction kernel, for example B80f and 170f, combined with FBP or various IR Results: The low dose group used an acquisition parameter with 100 kVp and a pitch of 0.9, while the standard dose used a pitch of 0.75. …”
Get full text
Get full text
Conference or Workshop Item -
10
Quantification and segmentation of breast cancer diagnosis: efficient hardware accelerator approach
Published 2022“…In combination, mammogram quantification creates a long-standing focus area. The algorithm proposed must reduce complexity and target data points distributed in iterative, and boost cluster centroid merged into a single updating process to evade the large storage requirement. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Impact of BPL penalty functions and PSF models in PET/CT radial spatial resolution recovery
Published 2024“…Radial distance effects on spatial resolution under the NCI protocol (OSEM+TOF+PSF+BPL with β450) and varying BPL β values (β 200-1200) were evaluated using fitted function slopes. …”
Get full text
Get full text
Monograph -
12
Evaluation of Clustering and Multi-hop Routing Protocols in Mobile Ad-hoc Sensor Networks
Published 2015“…One of the techniques to conserve more energy is through topology management using clustering network. A HEED (Hybrid, Energy-Efficient, Distributed) is one of the clustering algorithm for sensor networks. …”
Get full text
Get full text
Proceeding -
13
Numerical investigation of treated brain glioma model using a two-stage successive over-relaxation method
Published 2023“…The computational complexity analysis is also used and concludes that the TSSOR method is faster compared to the TSGS and GS methods. …”
Get full text
Get full text
Article -
14
-
15
Radiation dose, cancer risk and diagnostic performance of computed tomography pulmonary angiography examination
Published 2021“…The phantom was scanned with CTPA local protocol using different tube potentials and pitch factors. …”
Get full text
Get full text
Thesis
