Dissertationen zum Thema „New protocol“
Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an
Machen Sie sich mit Top-50 Dissertationen für die Forschung zum Thema "New protocol" bekannt.
Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.
Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.
Sehen Sie die Dissertationen für verschiedene Spezialgebieten durch und erstellen Sie Ihre Bibliographie auf korrekte Weise.
Lukovicsová, Nicola. „The history of diplomatic protocol with the emphasis on French influence on diplomatic protocol and new cultural influences on today´s diplomatic protocol“. Master's thesis, Vysoká škola ekonomická v Praze, 2014. http://www.nusl.cz/ntk/nusl-193888.
Der volle Inhalt der QuelleRedden, Toby Lynn. „New Referral Hepatitis C Protocol: The New Standard“. Diss., North Dakota State University, 2014. https://hdl.handle.net/10365/27581.
Der volle Inhalt der QuelleTalkington, Gregory Joshua. „Shepherding Network Security Protocols as They Transition to New Atmospheres: A New Paradigm in Network Protocol Analysis“. Thesis, University of North Texas, 2019. https://digital.library.unt.edu/ark:/67531/metadc1609134/.
Der volle Inhalt der QuelleWu, Chen. „A new TCP protocol based on end-to-end available bandwidth measurement /“. View abstract or full-text, 2005. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202005%20WU.
Der volle Inhalt der QuelleHorn, Stacey Lynn. „Evaluation of a new standardized modified ramp protocol : the modified BSU ramp protocol“. Virtual Press, 1999. http://liblink.bsu.edu/uhtbin/catkey/1129626.
Der volle Inhalt der QuelleSchool of Physical Education
Tudorache, Ion Gabriel. „Peripheral Routing Protocol : a new routing protocol proposal for a realistic WSN mobility model“. Thesis, University of Leeds, 2014. http://etheses.whiterose.ac.uk/7871/.
Der volle Inhalt der QuelleShivarudraiah, Ranjitha. „STCP: A New Transport Protocol for High-Speed Networks“. Digital Archive @ GSU, 2009. http://digitalarchive.gsu.edu/cs_theses/67.
Der volle Inhalt der QuelleROSEMBERG, MARCIO RICARDO. „SRAP: A NEW AUTHENTICATION PROTOCOL FOR SEMANTIC WEB APPLICATIONS“. PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 2014. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=24515@1.
Der volle Inhalt der QuelleCOORDENAÇÃO DE APERFEIÇOAMENTO DO PESSOAL DE ENSINO SUPERIOR
PROGRAMA DE EXCELENCIA ACADEMICA
Normalmente, aplicações semânticas utilizam o conceito de linked data, onde é possível obter dados de diversas fontes e em múltiplos formatos. Desta forma, as aplicações semânticas processam muito mais dados do que as aplicações tradicionais. Uma vez que nem todas as informações são públicas, alguma forma de autenticação será imposta ao usuário. Consultar dados de múltiplas fontes pode requerer muitos pedidos de autenticação, normalmente através de uma combinação de conta de usuário e senha. Tais operações consomem tempo e, considerando-se o tempo extra que uma aplicação semântica leva para processar os dados coletados, pode tornar a experiência frustrante e incômoda para os usuários, devendo ser minimizado, sempre que possível. O propósito desta dissertação é o de analisar e comparar as técnicas de autenticação disponíveis para as aplicações semânticas e propor um protocolo mais rápido e mais seguro para autenticação em aplicações semânticas.
Usually, Linked Data makes Semantic Web Applications query much more information for processing than traditional Web applications. Since not all information is public, some form of authentication may be imposed on the user. Querying data from multiple data sources might require many authentication prompts. Such time consuming operations, added to the extra amount of time a Semantic Web application needs to process the data it collects might be frustrating to the users and should be minimized. The purpose of this thesis is to analyze and compare several Semantic Web authentication techniques available, leading to the proposal of a faster and more secure authentication protocol for Semantic Web Applications.
Sivada, Siva Rupesh. „A new multicasting protocol based on modified reverse path forwarding /“. Available to subscribers only, 2009. http://proquest.umi.com/pqdweb?did=1797219891&sid=3&Fmt=2&clientId=1509&RQT=309&VName=PQD.
Der volle Inhalt der QuelleNikolaev, Ruslan. „A New QoS Routing Protocol for Mobile Ad-hoc Network“. Available to subscribers only, 2009. http://proquest.umi.com/pqdweb?did=1796121001&sid=2&Fmt=2&clientId=1509&RQT=309&VName=PQD.
Der volle Inhalt der QuelleSabouri, Shirin. „A new multiparametric MRI protocol for diagnosis of prostate cancer“. Thesis, University of British Columbia, 2017. http://hdl.handle.net/2429/62882.
Der volle Inhalt der QuelleScience, Faculty of
Physics and Astronomy, Department of
Graduate
Aronica, Pietro. „Development of a new protocol for computatinal site-directed mutagenesis“. Thesis, Imperial College London, 2016. http://hdl.handle.net/10044/1/40433.
Der volle Inhalt der QuelleDatson, Hugh Edward. „The development of a new protocol for directional dust monitoring“. Thesis, University of Leeds, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.530840.
Der volle Inhalt der QuelleSivada, Siva Rupesh. „A New Multicasting Protocol Based On Modified Reverse Path Forwarding“. OpenSIUC, 2008. https://opensiuc.lib.siu.edu/theses/429.
Der volle Inhalt der QuelleLong, Shitian. „Database syncrhonization between devices : A new synchronization protocol for SQLite databases“. Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-46712.
Der volle Inhalt der QuelleYan, Shuqian. „Implementation and evaluation of QoSMIC, a new Internet multicast routing protocol“. Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape7/PQDD_0003/MQ45998.pdf.
Der volle Inhalt der QuelleParr, Gerard Patrick. „A new self-stabilizing bridge protocol for extended-local area networks“. Thesis, University of Ulster, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.317565.
Der volle Inhalt der QuelleChandramohan, Vijay. „Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol“. [Tampa, Fla.] : University of South Florida, 2003. http://purl.fcla.edu/fcla/etd/SFE0000128.
Der volle Inhalt der QuelleMitra, Bijeta. „Development of new protocols towards construction of bioactive hetero cyclic compounds“. Thesis, University of North Bengal, 2021. http://ir.nbu.ac.in/handle/123456789/4368.
Der volle Inhalt der QuelleHoll, David J. „A performance analysis of TCP and STP implementations and proposals for new QoS classes for TCP/IP“. Link to electronic thesis, 2003. http://www.wpi.edu/Pubs/ETD/Available/etd-0501103-111419.
Der volle Inhalt der QuelleKeywords: TCP; RED; satellite; PEP; STP; performance enhancing proxy; segment caching; IP-ABR; Internet; bandwidth reservation; IP-VBR; congestion avoidance; bandwidth sharing. Includes bibliographical references (p. 98-99).
GRAMAJO, JAVIER GUSTAVO SANTIVANEZ. „D-RAMA: A NEW ACCESS PROTOCOL FOR THIRD GENERATION WIRELESS INTEGRATED SERVICES“. PONTIFÍCIA UNIVERSIDADE CATÓLICA DO RIO DE JANEIRO, 1998. http://www.maxwell.vrac.puc-rio.br/Busca_etds.php?strSecao=resultado&nrSeq=7498@1.
Der volle Inhalt der QuelleTELECOMUNICAÇÕES BRASILEIRAS S/A
Existe um crescente interesse na introdução de serviços integrados no ambiente de comunicações móveis e sem fio. Estes serviços podem incluir, em alguns casos, informação na forma de áudio, vídeo, imagens e dados simultaneamente junto com o serviço existente de voz nas redes celulares. Devido à necessidade por maior faixa, o aumento da capacidade da interface rádio continuará sendo um dos principais requisitos para a introdução destes novos serviços. Para atender esta necessidade, vários métodos de acesso estão sendo propostos. Esta tese propõe um novo protocolo de acesso, D-RAMA, que visa extender os métodos de acesso determinísticos TRAMA e FRAMA. A validação do algoritmo é feita por meio de simulação considerando diversas interfaces rádio, assim como diferentes tipos de tráfegos.
Third generation systems will present several new enhancements while compared with current second generation technologies. Some of the most important ones are the support of integrated services (audio, video, data) as well as speech, operation in different radio environments with several propagation conditions and increased capacity. These features demand an efficient media access control (MAC) protocol, supporting both Constant Bit Rate (CBR) and Variable Bit Rate (VBR) traffic types with different Quality of Service (QoS) requeriments. In order to supply this demand, several packet access methods are being proposed. This thesis presents a new media access protocol, D-RAMA (Dynamic Priorities Resource Auction Multiple Access) and FRAMA (Fair resource Auction Multiple Access) methods, and is designed to fulfill the requirements of third generation systems. The protocol is validated through simulations, considering several radio interfaces and traffic sources.
Masmali, Ali Mohammed. „Development of a tear ferning test protocol and a new grading scale“. Thesis, Cardiff University, 2010. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.646158.
Der volle Inhalt der QuelleNanukuttan, Sreejith V. „Development of a new test protocol for the permit ion migration test“. Thesis, Queen's University Belfast, 2007. https://pure.qub.ac.uk/portal/en/theses/development-of-a-new-test-protocol-for-the-permit-ion-migration-test(1c6008d6-3dba-4249-8a11-08e6a61fd295).html.
Der volle Inhalt der QuelleDelgado, Segura Sergi. „Towards a better understanding of Bitcoin: from system analyses to new protocol designs“. Doctoral thesis, Universitat Autònoma de Barcelona, 2018. http://hdl.handle.net/10803/664349.
Der volle Inhalt der QuelleBitcoin has kicked off one of the biggest paradigm shifts of the last century regarding how we understand and use money. The birth of criptocurrencies lays the foundations of a new financial system, where the need of trusted third parties, or central authorities, has been replaced by cryptography and an open flow of information between all the actors of the system. By sharing all the information regarding the operations of the system, all users can eventually agree in a distributed ledger, known as blockchain. Such a paradigm shift, however, poses some threads that, if not properly handled, may compromise the security of the system. In this thesis we have studied two of the core components of Bitcoin: its P2P network, and the set of unspent Bitcoins. Such analysis aimed to spot the strengths and weaknesses of the system in order to design solutions for them. The outcomes of our analyses have been, on the one side, characterizing the cryptocurrency P2P networks and, on the other side, spotting one of the current Bitcoin scalability problems: the unprofitable coins. Moreover, after analysing the system and obtaining a deep understanding of it, the thesis has focused on designing protocols to extend Bitcoin’s functionality in different payment scenarios. First, we have designed a solution to reduce the likelihood of a merchant of being deceived when accepting zero-confirmation transactions. Finally, we have designed a fair protocol for data trading using Bitcoin, where the exchange between data and coins is performed atomically.
Robinson, James Beresford. „Lntp : the implementation and performance of a new local area network transport protocol“. Thesis, University of British Columbia, 1987. http://hdl.handle.net/2429/26523.
Der volle Inhalt der QuelleScience, Faculty of
Computer Science, Department of
Graduate
Ijaz, Muhammad. „TRASMISSION CONTROL PROTOCOL (TCP) PERFORMANCE EVALUATION IN MANET“. Thesis, Blekinge Tekniska Högskola, Avdelningen för telekommunikationssystem, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-5097.
Der volle Inhalt der QuelleN.W.F.P PAKISTAN. Mobile no: 0092-3339173438
Melloh, Markus. „Intercultural comparison of effect modification and cost-utility of surgical and conservative treatment of chronic low back pain : a study protocol /“. Bern, 2007. http://www.public-health-edu.ch/new/Abstracts/MM_18.09.07.pdf.
Der volle Inhalt der QuelleCanbolat, Musa Aykut. „A new multi-channel MAC protocol for wireless ad hoc networks with single transceiver“. Thesis, Wichita State University, 2007. http://hdl.handle.net/10057/1508.
Der volle Inhalt der QuelleThesis (M.S): Wichita State University, College of Engineering, Dept. of Electrical and Computer Engineering
"July 2007."
Mauk, Andrew W. „A new modeling protocol for G-protein coupled receptors : molecular simulation of phospholipid assemblies“. Thesis, Georgia Institute of Technology, 1996. http://hdl.handle.net/1853/11033.
Der volle Inhalt der QuelleKhengar, Piyush. „Design and performance evaluation of a new routing protocol for mobile ad hoc networks“. Thesis, King's College London (University of London), 2004. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.408590.
Der volle Inhalt der QuelleIbrahim, Idris Skloul. „A new routing protocol for ad hoc wireless networks design, implementation and performance evaluation“. Thesis, Heriot-Watt University, 2011. http://hdl.handle.net/10399/2472.
Der volle Inhalt der QuelleCanbolat, Musa Aykut Cetinkaya Coskun. „A new multi-channel MAC protocol for wireless ad hoc networks with single transceiver /“. Thesis, A link to full text of this thesis in SOAR, 2007. http://hdl.handle.net/10057/1508.
Der volle Inhalt der QuelleStepana, Daniel Topaleku Motenava. „A Protocol For Epidemiological Pathfinder Oral Health Survey In Papua New Guinea Defence Force“. Thesis, Faculty of Dentistry, 1999. http://hdl.handle.net/2123/4188.
Der volle Inhalt der QuelleEroglu, Muammer. „A New Stack Architecture For Sensor Networks“. Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607590/index.pdf.
Der volle Inhalt der QuelleTuran, Ulas. „Implementing And Evaluating The Coordination Layer Andtime-synchronization Of A New Protocol For Industrialcommunication Networks“. Master's thesis, METU, 2011. http://etd.lib.metu.edu.tr/upload/12613576/index.pdf.
Der volle Inhalt der Quelleinterface layer that provides time-slotted access to the shared medium based on an accurate clock synchronization of the distributed controller devices and coordination layer that decides the ownership of real-time slots. In this thesis, coordination layer protocol of D3RIP family and the IEEE 1588 time synchronization protocol is implemented and tested on the real hardware system that resembles a factory plant floor. In the end, we constructed a system that runs an instance of D3RIP family with 3ms time-slots that guarantees 6.6ms latency for the real-time packets of control application. The results proved that our implementation may be used in distributed controller realizations and encouraged us to further improve the timing constraints.
Anna, Kiran Babu. „A NEW FRAMEWORK FOR QOS PROVISIONING IN WIRELESS LANS USING THE P-PERSISTENT MAC PROTOCOL“. Doctoral diss., University of Central Florida, 2010. http://digital.library.ucf.edu/cdm/ref/collection/ETD/id/2381.
Der volle Inhalt der QuellePh.D.
School of Electrical Engineering and Computer Science
Engineering and Computer Science
Computer Science PhD
Judge, John Thomas. „A new model for the marginal distribution of HTTP request rate“. School of Electrical, Computer and Telecommunications Engineering - Faculty of Informatics, 2004. http://ro.uow.edu.au/theses/265.
Der volle Inhalt der QuelleCalarasanu, Stefania Ana. „Improvement of a text detection chain and the proposition of a new evaluation protocol for text detection algorithms“. Thesis, Paris 6, 2015. http://www.theses.fr/2015PA066524/document.
Der volle Inhalt der QuelleThe growing number of text detection approaches proposed in the literature requires a rigorous performance evaluation and ranking. An evaluation protocol relies on three elements: a reliable text reference, a matching strategy and finally a set of metrics. The few existing evaluation protocols often lack accuracy either due to inconsistent matching or due to unrepresentative metrics. In this thesis we propose a new evaluation protocol that tackles most of the drawbacks faced by currently used evaluation methods. This work is focused on three main contributions: firstly, we introduce a complex text reference representation that does not constrain text detectors to adopt a specific detection granularity level or annotation representation; secondly, we propose a set of matching rules capable of evaluating any type of scenario that can occur between a text reference and a detection; and finally we show how we can analyze a set of detection results, not only through a set of metrics, but also through an intuitive visual representation. A frequent challenge for many Text Understanding Systems is to tackle the variety of text characteristics in born-digital and natural scene images for which current OCRs are not well adapted. For example, texts in perspective are frequently present in real-word images because the camera capture angle is not normal to the plane containing the text regions. Despite the ability of some detectors to accurately localize such text objects, the recognition stage fails most of the time. In this thesis we also propose a rectification procedure capable of correcting highly distorted texts evaluated on a very challenging dataset
Shinohara, Kiyomi. „Protocol registration and selective outcome reporting in recent psychiatry trials: new antidepressants and cognitive behavioural therapies“. Kyoto University, 2016. http://hdl.handle.net/2433/217138.
Der volle Inhalt der QuelleLööw, Linn. „The Principle of Subsidiarity : An Examination of the Swedish Parliament’s Application of the New Protocol on Subsidiarity“. Thesis, Uppsala universitet, Juridiska institutionen, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-196923.
Der volle Inhalt der QuelleNorén, Henrik. „Industrial Ethernet and new possibilities - Simplifying function tests of industrial devices“. Thesis, Institutionen för systemteknik, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-52533.
Der volle Inhalt der QuelleWhat do you do if you are implementing a new fieldbus protocol in your embed- ded industrial system and want to test it? This was the question that a group of engineers at ABB Corporate Research was asking themselves. Normally, the easiest way would probably be to buy a matching device supporting the same protocol and hook it up to the system. You might also need some equipment to listen in on the traffic between the two, so you’d need to buy that too.
But what if you are working with a limited budget? Or what if this protocol is fairly new, and matching devices are hard to find? Or what if you want to test cases that can’t normally be achieved with normal usage?
Normally, with traditional fieldbus standards, this could be complicated. You would probably need an additional sample of your new system, with some cus- tom made test code, and use this to test the original system. This is not a bad method, but this report will give an example of the new possibilities that comes with the new Ethernet base fieldbus standards emerging on the market today. It will highlight the possibility to create a test tool for your industrial system to use on a standard PC.
”Why?” you might ask. The report suggests that this solution is cheap, fast and flexible. First of all, no special hardware was needed, which had a posi- tive impact on cost. The only thing used was a PC and some standard office equipment.
Second, once the test tool was created, new test cases was really fast and easy to make. The test tool was designed to function as a general framework for creating dynamic test sequences based on Ethernet.
Third, the tool is flexible enough to test a lot of different cases, even cases not allowed by the standard. It made it possible to test cases that would have required the use of several samples of test system simultaneously to work. Also, because Ethernet is such a well known standard, there are a lot of existing software tools at your disposal. For example, free software for capturing and analyzing the test results was used during the tests. Furthermore, since the test tool was designed to be easily extendable to handle more protocols, it is even more flexible and useable for future similar problems.
Smith, Sean. „Trocantheric Femoral Fractures - a retrospective cohort study comparing reoperation rates before and after implementation of new treatment protocol“. Thesis, Örebro universitet, Institutionen för medicinska vetenskaper, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-86763.
Der volle Inhalt der QuelleTrinh, Tuyet Anh Nipunporn Voramongkol. „Factors related to the acceptance of the new antenatal care protocol among health personnel in Suphan Buri province, Thailand /“. Abstract, 2007. http://mulinet3.li.mahidol.ac.th/thesis/2550/cd399/4938009.pdf.
Der volle Inhalt der QuelleHagström, Jesper, und Lukas Lindblom. „Performance of Network and Transport Protocols in the Implementation of a New Cryptocurrency“. Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-240985.
Der volle Inhalt der QuelleDet har föreslagits att kryptovalutor har potential att fungera som ett globalt digitalt betalmedel. Den bakomliggande tekniken medför dock att alla kryptovalutor har brister. Dessa brister är växande när parametrar skalas upp. Detta understryker vikten av snabba och pålitliga överföringar av data och passande val vid implementering av protokoll för att hantera transaktionerna. Forskning inom området för effektiv dataöverföring inom kryptovalutor tillåter fler möjligheter i betraktande av lösningar till storskaliga nätverk. Dessvärre har en begränsad mängd forskning bedrivits som specifikt understödjer utvecklingen av kryptovalutor genom jämförelse av protokollprestanda. Denna studie medverkar i utvecklingen av en ny kryptovaluta, föreslagen av HAJ Enterprise. Rapporten använder ett teoretiskt ramverk av ekonomiska perspektiv på kryptovalutor för att undersöka om den föreslagna kryptovalutan kan klassas som good money. Vidare är det huvudsakliga syftet med studien att identifiera vilka befintliga transportprotokoll, med tillhörande parametrar, som skulle vara mest lämpade att implementera i den föreslagna kryptovalutan. För att besvara dessa frågor mäts fördröjning, genomströmning och tillförlitlighet av protokoll i en testmiljö som simulerar ett verkligt fall med dataöverföring mellan långa avstånd. Dessa resultat jämförs därefter med resultat från liknande studier. Från resultaten kunde rapporten visa att den föreslagna kryptovalutan kan klassificeras som en form av pengar, då inneboende värde kunde identifieras genom kryptovalutans monetära policy. Det var också visat att TCP IPv6 hade bäst prestanda gällande dataöverföring. Men med hänsyn till den globala etablering av IPv6 föreslås TCP IPv4 med en paketstorlek inom en räckvidd mellan 1024 till 2048 byte som mest fördelaktig. Fortsatt forskning inom området och utökade tester inom olika miljöer krävs för ett mer nyanserat resultat.
Nashwan, Shadi Ismail. „Performance analysis of a new dynamic authentication protocol DAKA of 3G mobile systems based on a novel Cryptography algorithm 'Anglia'“. Thesis, Anglia Ruskin University, 2009. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.492950.
Der volle Inhalt der QuelleSathitwiriyawong, Chanboon. „New protocol-less LAN bridge algorithms designed for the efficient handling of topology reconfigurations and an improved resilience to frame errors“. Thesis, University of Salford, 1996. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.360443.
Der volle Inhalt der QuelleZHUANG, WEN-SHENG, und 莊文勝. „New protocol for digital multisignatures“. Thesis, 1993. http://ndltd.ncl.edu.tw/handle/39328893560840516116.
Der volle Inhalt der QuelleLIN, CHUNG-SUNG, und 林中嵩. „A New Public Key Distribution Protocol“. Thesis, 1993. http://ndltd.ncl.edu.tw/handle/61815890571008908295.
Der volle Inhalt der Quelle淡江大學
資訊工程研究所
81
Sharing resource or exchanging information through computer network between mainframes or between nodes of a large-scale network become widely accepted by the computer users. Meanwhile, many important and secret information must be transmitted through network, which makes the necessity of network security of information flowing in the network. However, this result in another problem - "How to administrator, store, and distribute the key efficiently and safely?", especially when the nodes on nowadays open network system are often over one thousand. Consequently, the application of public key distribution protocol on the network is more and more important. Thus, the main purpose of this thesis is to offer a new public key distribution protocol, using a new method to accomplish the distribution of key on the network. Since Diffie and Hellman develop the first public key distribution protocol from discrete exponential in 1976, there are continuously many public key distribution protocol announced. All these systems make use of the numeric feature of one-way function and one-way trapdoor function to achieve the transfer and distribution of key. In the thesis, an infinite differentiable function and the commutative feature of differential function are used to develop a new public key distribution protocol. This distribution protocol can be used to distribute a function, and its security is based on the grade of difficulty in the calculation of symbol integral. At last, a system which computed the differential of triangle function is given as an example to put the public key distribution protocol in practice.
Kuo, Chn-Jung, und 郭至容. „A New Voting Protocol With Electronic Board“. Thesis, 1994. http://ndltd.ncl.edu.tw/handle/64197675064742495072.
Der volle Inhalt der Quelle國立交通大學
資訊管理研究所
82
With the development of computer networks, it''s feasible. to apply anonymous and verifiable voting on today''s computer networks. To protect the privacy of voters and prevent tally center from cheating, a voting protocol is needed. This research first enumerates the requirements of a just voting scheme. Protocols proposed to date are either too complex or do not meet all the requirements of a sound voting scheme. In this thesis, we propose a new voting protocol that has the following properties: (1)An electronic bulletin board is used to reveal the voting process to prevent the tally center from cheating; (2)The power of tally center is divided into two parts; (3)Voters'' privacy can be protected by using cryptography; (4)Each voter may check that his/her vote has been counted.
„Multi-destination control protocol: a new distributed scheduling protocol for optical flow switching network“. Thesis, 2011. http://library.cuhk.edu.hk/record=b6075125.
Der volle Inhalt der QuelleThe Internet traffic has been growing tremendously. China Telecom predicts that the compound annual growth rate of IP traffic for the next decade is at 56% - 80% and the backbone capacity will grow by another two orders of magnitudes. Furthermore, the power consumption incurred by the next generation of huge electronic IP packet switching routers in the backbone will exceed gigawatts. In view of the grave enviromnental concerns, there is a great need for a more efficient way of transporting and switching the bits. This thesis investigates a new all-optical networking technology called optical flow switching (OFS). OFS bypasses electronic routers, and provides end-to-end transparent connections, thus taking full advantage of the enormous transmission capacity of optical networks and enjoying the extremely low error rate of transparent data transmission. The most important point about OFS is that it reduces the electrical power consumption by off-loading the huge electronic routers, which could be a major constraint for future Internet growth. Unlike many other exotic all-optical switching technologies, OFS is immediately deployable using the current optical technologies, Therefore OFS is very attractive for the next generation optical networks.
Qian, Zhengfeng.
Adviser: Kwok-wai Cheung.
Source: Dissertation Abstracts International, Volume: 73-04, Section: B, page: .
Thesis (Ph.D.)--Chinese University of Hong Kong, 2011.
Includes bibliographical references (leaves 113-118).
Electronic reproduction. Hong Kong : Chinese University of Hong Kong, [2012] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Electronic reproduction. [Ann Arbor, MI] : ProQuest Information and Learning, [201-] System requirements: Adobe Acrobat Reader. Available via World Wide Web.
Abstract also in Chinese.