Search Results - (( java application reoptimize algorithm ) OR ( using iterative protocol algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1

    On the security of digital signature protocol based on iterated function systems. by M. G. AL-Saidi, Nadia, Md. Said, Mohamad Rushdan

    Published 2011
    “…A Diffie-Hellman algorithm is used to improve the security of the proposed protocol by generating the number of iteration that is used to find the attractor of the iterated function system, which is used to calculate the public key and the signature. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    The impact of tube current and iterative reconstruction algorithm on dose and image quality of infant CT head examination by Muhammad, N.A., Karim, M.K.A., Harun, H.H., Rahman, M.A.A., Azlan, R.N.R.M., Sumardi, N.F.

    Published 2022
    “…The examination was performed by using 128 multi-slice CT (Ingenuity Core, Philips, Netherlands) and varying the tube current and iterative reconstruction algorithm (iDose4) levels. …”
    Get full text
    Get full text
    Article
  4. 4

    Quantitative study of iterative reconstruction algorithms of spect/ct in bone scan: a clinical and phantom study by Hao, Lau Lik

    Published 2024
    “…For all algorithms, increasing the iteration numbers elevated RC, SUV, and noise, while SNR dropped. …”
    Get full text
    Get full text
    Monograph
  5. 5

    A new public key cryptosystem based on IFS by Mohammed G. Al-Saidi, Nadia, Md. Said, Mohamad Rushdan

    Published 2010
    “…In the proposed public-key encryption algorithm, generate iterated function systems as a global public element, then its Hutchinson operator is used as a public key. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Efficiency analysis for public key systems based on fractal functions. by M. G. AL-Saidi, Nadia, Md. Said, Mohamad Rushdan, M. Ahmed, Adil

    Published 2011
    “…In this study we propose a new public key cryptosystem based on Iterated Function Systems (IFS). Results: In the proposed protocol, the attractor of the IFS is used to obtain public key from private one, which is then used with the attractor again to encrypt and decrypt the messages. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Impact of low-dose protocols on computed tomography of lung cancer screening on the intrinsic performance metrics: a phantom study by Karim, M.K.A., Khalidi, M. E., Chew, M. T., Kechik, M. M. A., Mazlan, D., Ng, K. H.

    Published 2023
    “…The slices were 5 mm thick and reconstructed using a standard reconstruction kernel, for example B80f and 170f, combined with FBP or various IR Results: The low dose group used an acquisition parameter with 100 kVp and a pitch of 0.9, while the standard dose used a pitch of 0.75. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Quantification and segmentation of breast cancer diagnosis: efficient hardware accelerator approach by Othman, Khairulnizam

    Published 2022
    “…In combination, mammogram quantification creates a long-standing focus area. The algorithm proposed must reduce complexity and target data points distributed in iterative, and boost cluster centroid merged into a single updating process to evade the large storage requirement. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Impact of BPL penalty functions and PSF models in PET/CT radial spatial resolution recovery by Si, Wang Jie

    Published 2024
    “…Radial distance effects on spatial resolution under the NCI protocol (OSEM+TOF+PSF+BPL with β450) and varying BPL β values (β 200-1200) were evaluated using fitted function slopes. …”
    Get full text
    Get full text
    Monograph
  12. 12

    Evaluation of Clustering and Multi-hop Routing Protocols in Mobile Ad-hoc Sensor Networks by Jambli, M.N., Hendrick, A., Julaihi, A.A., Abdullah, J., Suhaili, S.M.

    Published 2015
    “…One of the techniques to conserve more energy is through topology management using clustering network. A HEED (Hybrid, Energy-Efficient, Distributed) is one of the clustering algorithm for sensor networks. …”
    Get full text
    Get full text
    Proceeding
  13. 13

    Numerical investigation of treated brain glioma model using a two-stage successive over-relaxation method by Hussain, A., Muthuvalu, M.S., Faye, I., Zafar, M., Inc, M., Afzal, F., Iqbal, M.S.

    Published 2023
    “…The computational complexity analysis is also used and concludes that the TSSOR method is faster compared to the TSGS and GS methods. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Radiation dose, cancer risk and diagnostic performance of computed tomography pulmonary angiography examination by Haspi Harun, Hanif

    Published 2021
    “…The phantom was scanned with CTPA local protocol using different tube potentials and pitch factors. …”
    Get full text
    Get full text
    Thesis