Dissertations / Theses on the topic 'T-schema'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 43 dissertations / theses for your research on the topic 'T-schema.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Richards, Daniel J. "Grounding the T-schema." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ61942.pdf.
Full textStampoultzis, Michael. "The use of XML schema and XSLT rules for product information personalization." Thesis, City University London, 2004. http://openaccess.city.ac.uk/8453/.
Full textDarr, Tim, John Hamilton, and Ronald Fernandes. "Design Considerations for XML-Based T&E Standards." International Foundation for Telemetering, 2011. http://hdl.handle.net/10150/595666.
Full textThe next generation of telemetry systems will rely heavily on XML-based standards. Multiple standards are currently being developed and reviewed by the T&E community, including iNET's Metadata Description Language (MDL), the XML-version of IRIG 106, Chapter 9 (TMATS XML), the Instrumentation Hardware Abstraction Language (IHAL), and the Data Display Markup Language (DDML). In this paper, we share design considerations for developing XML-based T&E standards, gained from our experiences in designing IHAL and DDML.
Braido, Valentina. "The Notion of Truth through Dialetheism, Deflationism and Fictionalism." Doctoral thesis, Università degli studi di Padova, 2017. http://hdl.handle.net/11577/3424894.
Full textIl presente lavoro interseca tre diversi ambiti concernenti il predicato di verità: l’ambito semantico, che vede al centro le teorie che si occupano della risoluzione dei paradossi semantici che coinvolgono il predicato di verità; quello ontologico, nel quale sono interessate le teorie che si interrogano su quale sia la natura della verità; e l’ambito, per così dire, del discorso, all’interno del quale si muovono le teorie che analizzano in che modo debba essere inteso il discorso riguardo al predicato di verità. Lo scopo di questo lavoro è analizzare le conseguenze che emergono da alcuni specifici modi in cui questi tre ambiti possono interagire tra di loro. Nei primi tre capitoli sono esposte le caratteristiche peculiari delle teorie corrispondenti alle tre aree del predicato di verità, rispettivamente dialeteismo, deflazionismo e finzionalismo. Le possibili combinazioni tra queste teorie saranno l’argomento dei due capitoli successivi. Infine, il lavoro si conclude con un nuovo tentativo di rendere conto del paradosso del mentitore.
Choi, Sul-young. "Maximal (0,1,2,...t)-cliques of some association schemes /." The Ohio State University, 1985. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487261553059595.
Full textSmiley, W. J. "Collision detection scheme for unmanned aircraft using passive Panospheric§T§M Imaging sensor." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape8/PQDD_0002/MQ44858.pdf.
Full textSander, Amy Janay Boswell. "Toward an integration of Beck's cognitive theory and Bowlby's attachment theory : self-schema and adult attachment classification in relation to depressive symptoms /." Access restricted to users with UT Austin EID Full text (PDF) from UMI/Dissertation Abstracts International, 2001. http://wwwlib.umi.com/cr/utexas/fullcit?p3035975.
Full textRahman, S. M. Hasibur. "IP Multicasting over DVB-T/H and eMBMS : Efficient System Spectral Efficiency Schemes for Wireless TV Distributions." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-18134.
Full textHackl, Daniela [Verfasser], Michael [Akademischer Betreuer] Schemann, Dirk [Akademischer Betreuer] Haller, and Anne [Akademischer Betreuer] Krug. "Influence of toll-like receptor ligands on the generation and function of regulatory T cells / Daniela Hackl. Gutachter: Dirk Haller ; Anne Krug ; Michael Schemann. Betreuer: Michael Schemann." München : Universitätsbibliothek der TU München, 2012. http://d-nb.info/1031514872/34.
Full textHeid, Irina [Verfasser], Michael [Akademischer Betreuer] Schemann, Bernhard [Akademischer Betreuer] Küster, and Jens T. [Akademischer Betreuer] Siveke. "Molecular carcinogenesis, development of new therapeutic strategies and multimodal imaging in murine endogenous pancreatic cancer / Irina Heid. Gutachter: Bernhard Küster ; Jens T. Siveke ; Michael Schemann. Betreuer: Michael Schemann." München : Universitätsbibliothek der TU München, 2013. http://d-nb.info/1038526825/34.
Full textConrad, Heinke [Verfasser], Helga [Akademischer Betreuer] Bernhard, Christian [Akademischer Betreuer] Peschel, and Michael [Akademischer Betreuer] Schemann. "Generierung von zytotoxischen T-Zellen gegen das tumorassoziierte Antigen HER2 / Heinke Conrad. Gutachter: Christian Peschel ; Michael Schemann. Betreuer: Helga Bernhard." München : Universitätsbibliothek der TU München, 2006. http://d-nb.info/1058141406/34.
Full textGrüner, Barbara Maria [Verfasser], Angelika [Akademischer Betreuer] Schnieke, Michael [Akademischer Betreuer] Schemann, and Jens T. [Akademischer Betreuer] Siveke. "Molecular and proteomic analysis of signaling pathways in pancreatic ductal adenocarcinoma using genetically engineered mouse models / Barbara Maria Grüner. Gutachter: Angelika Schnieke ; Jens T. Siveke ; Michael Schemann. Betreuer: Michael Schemann." München : Universitätsbibliothek der TU München, 2012. http://d-nb.info/1031512365/34.
Full textYomsatieankul, Warisa [Verfasser], and T. [Akademischer Betreuer] Sonar. "High-Order Non-Oscillatory Schemes Using Meshfree Interpolating Moving Least Squares Reconstruction for Hyperbolic Conservation Laws / Warisa Yomsatieankul ; Betreuer: T. Sonar." Braunschweig : Technische Universität Braunschweig, 2010. http://d-nb.info/1175827363/34.
Full textSchmees, Christian [Verfasser], Christian [Akademischer Betreuer] Prinz, Dirk [Akademischer Betreuer] Haller, and Michael [Akademischer Betreuer] Schemann. "Hemmung der Proliferation von T-Lymphozyten durch Helicobacter pylori als Mechanismus der Immunevasion / Christian Schmees. Gutachter: Dirk Haller ; Michael Schemann. Betreuer: Christian Prinz." München : Universitätsbibliothek der TU München, 2006. http://d-nb.info/1058141333/34.
Full textMoradi, Eshkafti Milad Verfasser], and Hartmut [Gutachter] [Pasternak. "Influence of various welding sequence schemes on the load bearing capacity of square hollow section T-joint / Milad Moradi Eshkafti ; Gutachter: Hartmut Pasternak." Cottbus : BTU Cottbus - Senftenberg, 2018. http://d-nb.info/1151520985/34.
Full textJacque-Sabatier, Françoise. "CORRECTEURS DE FLUX V. T. D. POUR LES SCHEMAS CENTRES S [exposant] α [indice] β ET APPLICATION A L'ETUDE DES ECOULEMENTS COMPRESSIBLES INSTATIONNAIRES DANS LES CANALISATIONS DE MOTEURS." Paris 6, 1987. http://www.theses.fr/1987PA066441.
Full textRüssel, Jörn [Verfasser], Ingo Akademischer Betreuer] Hansmann, and Werner [Akademischer Betreuer] [Schempp. "Molekulare Charakterisierung der chromosomalen Bruchpunkte einer mit chronischer lymphatischer Leukämie assoziierten konstitutionellen Translokation t(6;9)(p12;p24) / Jörn Rüssel. Betreuer: Ingo Hansmann ; Werner Schempp." Halle, Saale : Universitäts- und Landesbibliothek Sachsen-Anhalt, 2009. http://d-nb.info/1024896072/34.
Full textHiller, Julia [Verfasser], Wolfgang [Akademischer Betreuer] Liebl, Claudia I. [Akademischer Betreuer] Traidl-Hoffmann, Michael [Akademischer Betreuer] Schemann, and Werner [Akademischer Betreuer] Back. "Differential regulation of T cell responses by pathogenic and apathogenic microorganisms / Julia Hiller. Gutachter: Claudia I. Traidl-Hoffmann ; Michael Schemann ; Wolfgang Liebl ; Werner Back. Betreuer: Wolfgang Liebl." München : Universitätsbibliothek der TU München, 2012. http://d-nb.info/1024567443/34.
Full textHeinemann, Christina [Verfasser], Thomas [Akademischer Betreuer] Korn, and Michael [Akademischer Betreuer] Schemann. "IL-12 antagonizes IL-23 in autoimmune inflammation by Blimp1-dependent programming of CD4+ effector T cells into suppressive IL-10 producers / Christina Heinemann. Gutachter: Thomas Korn ; Michael Schemann. Betreuer: Thomas Korn." München : Universitätsbibliothek der TU München, 2014. http://d-nb.info/1065376480/34.
Full textLucas, D. Pulane. "Disruptive Transformations in Health Care: Technological Innovation and the Acute Care General Hospital." VCU Scholars Compass, 2013. http://scholarscompass.vcu.edu/etd/2996.
Full textHýl, Petr. "Slovinské národní divadlo v Lublani." Master's thesis, Vysoké učení technické v Brně. Fakulta architektury, 2009. http://www.nusl.cz/ntk/nusl-215582.
Full text"Automating GD&T Schema for Mechanical Assemblies." Master's thesis, 2016. http://hdl.handle.net/2286/R.I.40226.
Full textDissertation/Thesis
Masters Thesis Mechanical Engineering 2016
Young, Ryan. "The Liar Paradox: A Consistent and Semantically Closed Solution." Phd thesis, 2011. http://hdl.handle.net/1885/8898.
Full text"3-D Conformance Analysis of Manufacturing Plans Using M-Maps, by Explicating Formal GD&T Schema from the Process Plan." Master's thesis, 2015. http://hdl.handle.net/2286/R.I.34868.
Full textDissertation/Thesis
Masters Thesis Mechanical Engineering 2015
Velegrakis, Yannis. "Managing schema mappings in highly heterogeneous environments." 2005. http://link.library.utoronto.ca/eir/EIRdetail.cfm?Resources__ID=232736&T=F.
Full textManeva-Jakimoska, Karolina Burmester Mike. "Anonymous T-out-of-N threshold signature schemes." Diss., 2006. http://etd.lib.fsu.edu/theses/available/04092006-135341.
Full textAdvisor: Mike Burmester, Florida State University,College of Arts amd Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed June 19, 2006). Document formatted into pages; contains viii, 40 pages. Includes bibliographical references.
Perng, Chi-Yow, and 彭集佑. "A Group-Oriented (t,n) Threshold Signature and A Verification Scheme." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/96544494483252549316.
Full text國立中興大學
應用數學系
88
Along with the great progress of technology,the paper document is converted to digital document gradually. The computer network is so popular that messages could be sent out by it instead of human’s power recently. However, the computer network is not always secure. The signature scheme and verification scheme are more and more important with transmitting messages or documents through the computer network. In our current society, one can do little thing, and team can do everything. In this thesis, we propose two schemes: One is an efficient group-oriented (t,n) threshold signature; another is a group-oriented (t,n) verification. There holds advantages of message recovery and message linkage in both schemes. Moreover, the transmission cost is lower than those proposals so far. Therefore, our methods can be applied to the realities.
Tsai, Chun-Wei, and 蔡俊偉. "Implementation and Evaluation of Applying Channel Estimation Scheme in DVB-T Receiver." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/q7m98p.
Full text國立臺北科技大學
電子電腦與通訊產業研發碩士專班
95
This paper’s principal is based on channel estimation scheme of OFDM systems by way of using FPTC to replace conventional system’s channel estimation for obtaining better BER performance of DVB-T receivers. In this paper, the second section mention, the characteristics and advantages of OFDM modulation and transmission parameters of DVB-T system. The third section compares the simulation result of one-tap equalizer and FPTC. The fourth section presents the performance of using FPTC channel estimation scheme in real DVB-T receiving signals. Finally, after using PLD and FPTC to replace the conventional synchronization and channel estimation scheme of DVB-T receiver. The reception performance increases 30.7% and 29.3%, respectively, in fixed and 40km/hr cases.
Chen, Pai-Li, and 陳百立. "Implementation and Evaluation of Applying Synchronization Estimation Scheme in DVB-T Receiver." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/qfv8eg.
Full text國立臺北科技大學
電子電腦與通訊產業研發碩士專班
95
DVB-T employs Orthogonal Frequency Division Multiplexing (OFDM) as its modulation method. OFDM is known for its better transmission rate, however, it is quite strict with requirements of synchronization. This paper describes, applies, and evaluates three different synchronization architectures for DVB-T system, including Maximum Likelihood Detection (ML), Ensemble Correlation Detection (ECD), and Part Likelihood Detection (PLD), which are used to reduce the BER performance at the receiving side due to timing offset and frequency offset. Finally, after using PLD and Frequency Domain Pilot Time Domain Correlation Method(FPTC)to replace the conventional synchronization and channel estimation scheme of DVB-T receiver. The reception performance increases 30.7% and 29.3%, respectively, in fixed and 40km/hr cases.
Chen, Sheng-Feng, and 陳昇鋒. "A non-symmetric T-R based PAPR Reduction Scheme with Multi-peak cancellation." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/572epb.
Full text國立東華大學
電機工程學系
105
Technology about Orthogonal Frequency Division Multiplexing(OFDM) is used widely in digital communication system nowadays, but a problem called Peak-to-Average Power Ratio(PAPR) severely degrades the performance of OFDM. Bigger value of PAPR which causes distortion of signal when Power Amplifier(PA) attempts to amplify it, and the distortion also lowers the efficiency of PA and increases the complexity of both analog to digital and digital to analog converters (A/D and D/A). In this thesis, we propose a method called "non-symmetric T-R based PAPR Reduction Scheme with Multi-peak cancellation" to improve PAPR. In this method, we first use the algorithm of non-symmetric T-R to set PRTs, then generate the best peak reduction tone, and coordinate with PAPR Reduction Scheme with Multi-peak cancellation to achieve the purpose of lower PAPR. The T-R based PAPR Reduction Scheme we suggested, according to the computer simulation, can lower the value of PAPR more efficiently than conventional tone reservation can.
Chen, Jiun Ming, and 陳俊名. "A Electronic Voting Protocol Based upon t-out-of-n Oblivious Signature Scheme." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/38302440303546954407.
Full text長庚大學
電機工程學系
101
E-voting is an online system which simulates the vote of citizen in real life. It considers the security. The properties fit in with the voting situation in real life. Simply speaking, it lets people vote electronically and online to save time, manpower and material resources. It also let citizen vote simple and easily. The project proposes a real-time voting system achieving privacy and authenticity using mobile devices. We consider the strategy and application of Oblivious Signatures in mobile devices. We also consider the real-time voting result achieving privacy and authenticity, make a complete research and discussion, and research the voting application of mobile devices, to propose an new E-voting method for mobile devices. The method can let users vote by using the mobile devices, which users take along with themselves all the time. It let users vote more convenient using the function of mobile devices. Also, considering the data protection of mobile network application, privacy of person and authenticity of information, we designs a security protocol possessing privacy and authenticity. Finally we implement the protocol on the mobile phone to let uses vote via their smart phones. This system can be used in not only every kinds of voting but also survey of rates of candidate which people are going to vote. Our system achieves soundness, completeness, fairness, privacy, verifiability, eligibility, and unreusability. It also guarantees that no one, including servers, can cheat users. It can be used in centralized and decentralized modes.
Chi, YU-Ting, and 紀育婷. "Synchronization Schemes for DAB, DVB-T and IEEE 802.16a Systems." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/w7eu44.
Full text國立交通大學
電子工程系所
92
The goal of this research is to design synchronization schemes for Eureka 147 DAB, DVB-T, and IEEE 802.16a DL TDD systems. We apply the maximum likelihood criterion to the estimations of symbol timing and fractional frequency offset for all these three systems. For Eureka DAB 147, the frame synchronization is done by exploiting two sliding windows to calculate energy and then detect null symbol. The integral frequency offset can be estimated after FFT by a differential matched filter using PRS. For DVB-T, the integral frequency synchronization is done by exploiting the continual pilots of two symbols in the frequency domain. Frame detection is done by matching the 1~16 bits of TPS. For IEEE 802.16a DL, the fixed-location pilots are used to estimate integral frequency and frame start. The performances of proposed methods are examined in both AWGN channel and multipath channel. Simulation results show that the investigated and proposed methods are effective in achieving the required synchronizations tasks.
Chiang, Jei-Kuo, and 姜瑞國. "Multiuser Detection Scheme for TDMA Mobile System Using T/2-MMSE Decision-Feedback Receiver." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/43516096861268603271.
Full text元智大學
電機與資訊工程研究所
87
The concept of multiuser detection was originally developed in the CDMA system, where multiple co-channel user signals using the same time duration and frequency band can be simultaneously received and demodulated by exploiting different spreading codes. This feature makes the CDMA system capable of achieving a greater theoretical capacity than 2nd-generation TDMA based mobile systems. As is noted for all existing TDMA systems, different mobiles within the same cell and using the same uplink frequency channel are assigned to different time slots for transmission, thus limiting the overall system capacity. In this thesis we propose and investigate a multiuser detection scheme that may double the capacity of TDMA system. Basically, it allows two co-channel users to occupy the same time slot and then be detected simultaneously in the base station. In so doing, the training sequences of both the co-channel users are reasonably assumed to be different, synchronized, and known by the system. And, it is required to use multiple base-station antennas for spatial-diversity reception to combat not only the inter-symbol interference (ISI) but also the co-channel interference (CCI). Hence, Spatial diversity reception can lead to both the capacity expansion and the BER performance improvement. In addition, for time variant channel, we use two kinds of methods to make the receiver adapted to the change of the channel. First, we adopt interpolated channel estimates to obtain the changing channel response between the regularly appearing training segments. Second, we also propose a RLS-MIMO DFE to achieve multiuser detection. Finally, We will use computer simulation to compare these two kinds of methods, and the results are shown in chapter 4.
Sander, Amy Janay Boswell 1973. "Toward an integration of Beck's cognitive theory and Bowlby's attachment theory : self-schema and adult attachment classification in relation to depressive symptoms." 2001. http://hdl.handle.net/2152/10828.
Full textWu, Shu-Zhen, and 吳淑貞. "DESIGNING A SOFTWARE CONFIGURATION MANAGEMENT SCHEME IN THE SOFTWARE DEVELOPMENT LIFE CYCLE FOR T COMPANY." Thesis, 1993. http://ndltd.ncl.edu.tw/handle/21423335457953961752.
Full text大同工學院
事業經營研究所
81
Software Configuration Management (SCM) is the discipline of identifying the configuration of a system at discrete points in time for the purpose of systematically controlling changes to this configuration and maintaining the integrity and traceability of this configuration throughout the system life cycle. The purpose of this study is to design an appropriate managerial procedure of SCM for T Company, based on the general theory of SCM as well as the characteristics of projects developed by T Company. Software Configuration Management has four major parts: (1) identification, concerning with giving names to or providing labels for software configuration items (SCIs) and baselines as well as tracing their parentage, (2) control, an administrative mechanism for initializing, preparing, evaluating and approving/ disapproving all proposals for changing SCIs, (3) auditing, a process that should be performed periodically during the life cycle to reduce the likelihood of aberrant software behavior, (4) status accounting, providing a history of the three other configuration components by storing them in a database or in files.
Chang, Chia-Yu, and 張家玉. "Efficient computational schemes for supervised learning ofmultivariate t mixture models with missing information." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/30114475996940869491.
Full text東海大學
統計學系
95
A finite mixture model using the multivariate t distribution has been well recognized as a robust extension of Gaussian mixtures. This paper presents an efficient PX-EM algorithm for supervised learning of multivariate t mixture models in the presence of missing values. To simplify the development of new theoretic results and facilitate the implementation of the PX-EM algorithm, two auxiliary indicator matrices are incorporated into the model and shown to be effective. The proposed methodology is a generalized approach for robust mixture models that allow analysts to handle real-world multivariate data sets with complex missing patterns. The performance of computational aspects is investigated through a simulation study and the procedure is also applied to the analysis of real data with varying proportions of artificially missing values.
Ho, Yi-Jan, and 賀逸然. "T-C Scheme for the Linearized Equations of the Viscous Conservation Laws around a Viscous Shock Profile." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/98544925877643125498.
Full text國立臺灣師範大學
數學系
102
Assume Fi is a viscous shock profile of the viscous hyperbolic conservation laws. We are concerned with the stability and the solution structure for the initial value problem of the viscous hyperbolic conservation laws around the viscous shock wave Fi. The T-C scheme is used to estimate the solution of the linearized equations around viscous shock profile Fi. The detail proofs for the transversal wave operator of the T-C scheme are given in this thesis.
He, Yi Xuan, and 何懿軒. "An Efficient t–out–of–n Proxy Oblivious Signature Scheme and its Application on Online Lottery System." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/45446543169715486051.
Full text長庚大學
電機工程學系
102
People changed in the habits of life gradually along with the advancement of technology and internet. The digital generation compared to the traditional living pattern is more convenient. An online lottery system needs to have perfect secure features so as to achieve the fairness. Functionality of the digital signature exactly can construct well for the working model. Due to the past signature schemes couldn't completely match the needs about scenarios of online lottery and offer consummate security and fairness. We propose an efficient t–out–of–n proxy oblivious signature scheme based on RSA cryptosystem. In response to the scenario of online lottery combines signatures of proxy and oblivious, and explain the analysis of security and argumentation. Furthermore, we applied in the smartphones equipped with the Android system. Compare to the traditional lottery game, it's more convenient for the users.
SONG, YONG-GUANG, and 宋永光. "Analogues of Erdos-Ko-Rado theorem for t-designs in some classical association schemes." Thesis, 1987. http://ndltd.ncl.edu.tw/handle/96990051522714152325.
Full text國立交通大學
應用數學研究所
75
Erdos-Ko-Rado (1961)和Rands (1982)的兩篇論文分別探討了固定集合 上子集合間相交的性質,亦即是在Johnson schemes 的結構下討論諸點分佈的情形。 在本篇論文裡,就另外二個古典的結合架構(分別定義在向量子空間上和矩陣上), 我們分別證得相關結果。
Cao, Jian. "Computation of High-Dimensional Multivariate Normal and Student-t Probabilities Based on Matrix Compression Schemes." Diss., 2020. http://hdl.handle.net/10754/662613.
Full textChen, Kuo-Lun, and 陳國倫. "Signing a Message by a Group of Signers and Verifying a Signature by a Group of Verifiers Using (t, n) Threshold Scheme." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/81531832239793045879.
Full text國立中正大學
資訊工程研究所
87
In the ordinary signature schemes, one single signer can generate a digital signature for a document by himself. By verifying the signature, anyone can verify the validity of the signature. However, in some situations, there may be many signers in one group or many verifiers in one group. For the signers, they may wish to generate a group signature instead of many personal signatures for the same document. For the verifiers, they may wish that the signature only be verified when sufficient group members attend the verification. Especially when the content of the document can be recovered from the signature, the responsibility of verification should be shared among some group members. In this thesis, the concept of secret sharing is introduced briefly first and some previous proposed schemes are reviewed. And then by employing the concept of secret sharing, we proposed two modified signature schemes. One of these two schemes is a signature scheme with (t, n) threshold group-oriented. The other is a signature scheme with (t, n) shared verification. In the first scheme, any t or more than t members of the group can cooperate to generate the group signature. The first scheme is based on the factorization problem. The proposed scheme also provides the linkage property between signed message blocks to detect a removal by an eavesdropper. In the second scheme, also by employing the concept of the (t, n) threshold secret sharing scheme, any single signer can sign a message to a group of n verifiers. Once the group receives the signature, any t or more than t verifiers in the group can cooperate to verify the signature. The proposed scheme is more efficient than the previous schemes. The proposed scheme is more efficient than the previous schemes. In both of the schemes, the property of message recovery is also added into the schemes, the plaintext can be recovered from the signature.
Guntoro, Andre T. [Verfasser]. "Algorithm, application mapping, design and realization of the time-frequency representation with flexible kernels based on their lifting scheme / von Andre T. Guntoro." 2009. http://d-nb.info/998567876/34.
Full textMaldonado, Ana Carolina. "Cuadrángulos generalizados esquemas de Johnson y álgebras de Terwilliger /." Doctoral thesis, 2004. http://hdl.handle.net/11086/88.
Full textEl trabajo de tesis se enmarca dentro de la Combinatoria Algebraica. Estudiamos dos casos particulares de esquemas de asociación: los provenientes de cuadrángulos generalizados y los esquemas de Johnson. Descomponemos en ideales simples las álgebras de Terwilliger asociadas (T-álgebras) y describimos en forma explícita los T-módulos irreducibles. Los cálculos realizados para los esquemas de Johnson pueden ser aplicados para describir explicítamente la T-álgebra de los hipercubos (recientemente estudiada por Go).