Дисертації з теми "T-schema"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-43 дисертацій для дослідження на тему "T-schema".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте дисертації для різних дисциплін та оформлюйте правильно вашу бібліографію.
Richards, Daniel J. "Grounding the T-schema." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 2001. http://www.collectionscanada.ca/obj/s4/f2/dsk3/ftp04/MQ61942.pdf.
Повний текст джерелаStampoultzis, Michael. "The use of XML schema and XSLT rules for product information personalization." Thesis, City University London, 2004. http://openaccess.city.ac.uk/8453/.
Повний текст джерелаDarr, Tim, John Hamilton, and Ronald Fernandes. "Design Considerations for XML-Based T&E Standards." International Foundation for Telemetering, 2011. http://hdl.handle.net/10150/595666.
Повний текст джерелаThe next generation of telemetry systems will rely heavily on XML-based standards. Multiple standards are currently being developed and reviewed by the T&E community, including iNET's Metadata Description Language (MDL), the XML-version of IRIG 106, Chapter 9 (TMATS XML), the Instrumentation Hardware Abstraction Language (IHAL), and the Data Display Markup Language (DDML). In this paper, we share design considerations for developing XML-based T&E standards, gained from our experiences in designing IHAL and DDML.
Braido, Valentina. "The Notion of Truth through Dialetheism, Deflationism and Fictionalism." Doctoral thesis, Università degli studi di Padova, 2017. http://hdl.handle.net/11577/3424894.
Повний текст джерелаIl presente lavoro interseca tre diversi ambiti concernenti il predicato di verità: l’ambito semantico, che vede al centro le teorie che si occupano della risoluzione dei paradossi semantici che coinvolgono il predicato di verità; quello ontologico, nel quale sono interessate le teorie che si interrogano su quale sia la natura della verità; e l’ambito, per così dire, del discorso, all’interno del quale si muovono le teorie che analizzano in che modo debba essere inteso il discorso riguardo al predicato di verità. Lo scopo di questo lavoro è analizzare le conseguenze che emergono da alcuni specifici modi in cui questi tre ambiti possono interagire tra di loro. Nei primi tre capitoli sono esposte le caratteristiche peculiari delle teorie corrispondenti alle tre aree del predicato di verità, rispettivamente dialeteismo, deflazionismo e finzionalismo. Le possibili combinazioni tra queste teorie saranno l’argomento dei due capitoli successivi. Infine, il lavoro si conclude con un nuovo tentativo di rendere conto del paradosso del mentitore.
Choi, Sul-young. "Maximal (0,1,2,...t)-cliques of some association schemes /." The Ohio State University, 1985. http://rave.ohiolink.edu/etdc/view?acc_num=osu1487261553059595.
Повний текст джерелаSmiley, W. J. "Collision detection scheme for unmanned aircraft using passive Panospheric§T§M Imaging sensor." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape8/PQDD_0002/MQ44858.pdf.
Повний текст джерелаSander, Amy Janay Boswell. "Toward an integration of Beck's cognitive theory and Bowlby's attachment theory : self-schema and adult attachment classification in relation to depressive symptoms /." Access restricted to users with UT Austin EID Full text (PDF) from UMI/Dissertation Abstracts International, 2001. http://wwwlib.umi.com/cr/utexas/fullcit?p3035975.
Повний текст джерелаRahman, S. M. Hasibur. "IP Multicasting over DVB-T/H and eMBMS : Efficient System Spectral Efficiency Schemes for Wireless TV Distributions." Thesis, Mittuniversitetet, Institutionen för informationsteknologi och medier, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-18134.
Повний текст джерелаHackl, Daniela [Verfasser], Michael [Akademischer Betreuer] Schemann, Dirk [Akademischer Betreuer] Haller, and Anne [Akademischer Betreuer] Krug. "Influence of toll-like receptor ligands on the generation and function of regulatory T cells / Daniela Hackl. Gutachter: Dirk Haller ; Anne Krug ; Michael Schemann. Betreuer: Michael Schemann." München : Universitätsbibliothek der TU München, 2012. http://d-nb.info/1031514872/34.
Повний текст джерелаHeid, Irina [Verfasser], Michael [Akademischer Betreuer] Schemann, Bernhard [Akademischer Betreuer] Küster, and Jens T. [Akademischer Betreuer] Siveke. "Molecular carcinogenesis, development of new therapeutic strategies and multimodal imaging in murine endogenous pancreatic cancer / Irina Heid. Gutachter: Bernhard Küster ; Jens T. Siveke ; Michael Schemann. Betreuer: Michael Schemann." München : Universitätsbibliothek der TU München, 2013. http://d-nb.info/1038526825/34.
Повний текст джерелаConrad, Heinke [Verfasser], Helga [Akademischer Betreuer] Bernhard, Christian [Akademischer Betreuer] Peschel, and Michael [Akademischer Betreuer] Schemann. "Generierung von zytotoxischen T-Zellen gegen das tumorassoziierte Antigen HER2 / Heinke Conrad. Gutachter: Christian Peschel ; Michael Schemann. Betreuer: Helga Bernhard." München : Universitätsbibliothek der TU München, 2006. http://d-nb.info/1058141406/34.
Повний текст джерелаGrüner, Barbara Maria [Verfasser], Angelika [Akademischer Betreuer] Schnieke, Michael [Akademischer Betreuer] Schemann, and Jens T. [Akademischer Betreuer] Siveke. "Molecular and proteomic analysis of signaling pathways in pancreatic ductal adenocarcinoma using genetically engineered mouse models / Barbara Maria Grüner. Gutachter: Angelika Schnieke ; Jens T. Siveke ; Michael Schemann. Betreuer: Michael Schemann." München : Universitätsbibliothek der TU München, 2012. http://d-nb.info/1031512365/34.
Повний текст джерелаYomsatieankul, Warisa [Verfasser], and T. [Akademischer Betreuer] Sonar. "High-Order Non-Oscillatory Schemes Using Meshfree Interpolating Moving Least Squares Reconstruction for Hyperbolic Conservation Laws / Warisa Yomsatieankul ; Betreuer: T. Sonar." Braunschweig : Technische Universität Braunschweig, 2010. http://d-nb.info/1175827363/34.
Повний текст джерелаSchmees, Christian [Verfasser], Christian [Akademischer Betreuer] Prinz, Dirk [Akademischer Betreuer] Haller, and Michael [Akademischer Betreuer] Schemann. "Hemmung der Proliferation von T-Lymphozyten durch Helicobacter pylori als Mechanismus der Immunevasion / Christian Schmees. Gutachter: Dirk Haller ; Michael Schemann. Betreuer: Christian Prinz." München : Universitätsbibliothek der TU München, 2006. http://d-nb.info/1058141333/34.
Повний текст джерелаMoradi, Eshkafti Milad Verfasser], and Hartmut [Gutachter] [Pasternak. "Influence of various welding sequence schemes on the load bearing capacity of square hollow section T-joint / Milad Moradi Eshkafti ; Gutachter: Hartmut Pasternak." Cottbus : BTU Cottbus - Senftenberg, 2018. http://d-nb.info/1151520985/34.
Повний текст джерелаJacque-Sabatier, Françoise. "CORRECTEURS DE FLUX V. T. D. POUR LES SCHEMAS CENTRES S [exposant] α [indice] β ET APPLICATION A L'ETUDE DES ECOULEMENTS COMPRESSIBLES INSTATIONNAIRES DANS LES CANALISATIONS DE MOTEURS". Paris 6, 1987. http://www.theses.fr/1987PA066441.
Повний текст джерелаRüssel, Jörn [Verfasser], Ingo Akademischer Betreuer] Hansmann, and Werner [Akademischer Betreuer] [Schempp. "Molekulare Charakterisierung der chromosomalen Bruchpunkte einer mit chronischer lymphatischer Leukämie assoziierten konstitutionellen Translokation t(6;9)(p12;p24) / Jörn Rüssel. Betreuer: Ingo Hansmann ; Werner Schempp." Halle, Saale : Universitäts- und Landesbibliothek Sachsen-Anhalt, 2009. http://d-nb.info/1024896072/34.
Повний текст джерелаHiller, Julia [Verfasser], Wolfgang [Akademischer Betreuer] Liebl, Claudia I. [Akademischer Betreuer] Traidl-Hoffmann, Michael [Akademischer Betreuer] Schemann, and Werner [Akademischer Betreuer] Back. "Differential regulation of T cell responses by pathogenic and apathogenic microorganisms / Julia Hiller. Gutachter: Claudia I. Traidl-Hoffmann ; Michael Schemann ; Wolfgang Liebl ; Werner Back. Betreuer: Wolfgang Liebl." München : Universitätsbibliothek der TU München, 2012. http://d-nb.info/1024567443/34.
Повний текст джерелаHeinemann, Christina [Verfasser], Thomas [Akademischer Betreuer] Korn, and Michael [Akademischer Betreuer] Schemann. "IL-12 antagonizes IL-23 in autoimmune inflammation by Blimp1-dependent programming of CD4+ effector T cells into suppressive IL-10 producers / Christina Heinemann. Gutachter: Thomas Korn ; Michael Schemann. Betreuer: Thomas Korn." München : Universitätsbibliothek der TU München, 2014. http://d-nb.info/1065376480/34.
Повний текст джерелаLucas, D. Pulane. "Disruptive Transformations in Health Care: Technological Innovation and the Acute Care General Hospital." VCU Scholars Compass, 2013. http://scholarscompass.vcu.edu/etd/2996.
Повний текст джерелаHýl, Petr. "Slovinské národní divadlo v Lublani." Master's thesis, Vysoké učení technické v Brně. Fakulta architektury, 2009. http://www.nusl.cz/ntk/nusl-215582.
Повний текст джерела"Automating GD&T Schema for Mechanical Assemblies." Master's thesis, 2016. http://hdl.handle.net/2286/R.I.40226.
Повний текст джерелаDissertation/Thesis
Masters Thesis Mechanical Engineering 2016
Young, Ryan. "The Liar Paradox: A Consistent and Semantically Closed Solution." Phd thesis, 2011. http://hdl.handle.net/1885/8898.
Повний текст джерела"3-D Conformance Analysis of Manufacturing Plans Using M-Maps, by Explicating Formal GD&T Schema from the Process Plan." Master's thesis, 2015. http://hdl.handle.net/2286/R.I.34868.
Повний текст джерелаDissertation/Thesis
Masters Thesis Mechanical Engineering 2015
Velegrakis, Yannis. "Managing schema mappings in highly heterogeneous environments." 2005. http://link.library.utoronto.ca/eir/EIRdetail.cfm?Resources__ID=232736&T=F.
Повний текст джерелаManeva-Jakimoska, Karolina Burmester Mike. "Anonymous T-out-of-N threshold signature schemes." Diss., 2006. http://etd.lib.fsu.edu/theses/available/04092006-135341.
Повний текст джерелаAdvisor: Mike Burmester, Florida State University,College of Arts amd Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed June 19, 2006). Document formatted into pages; contains viii, 40 pages. Includes bibliographical references.
Perng, Chi-Yow, and 彭集佑. "A Group-Oriented (t,n) Threshold Signature and A Verification Scheme." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/96544494483252549316.
Повний текст джерела國立中興大學
應用數學系
88
Along with the great progress of technology,the paper document is converted to digital document gradually. The computer network is so popular that messages could be sent out by it instead of human’s power recently. However, the computer network is not always secure. The signature scheme and verification scheme are more and more important with transmitting messages or documents through the computer network. In our current society, one can do little thing, and team can do everything. In this thesis, we propose two schemes: One is an efficient group-oriented (t,n) threshold signature; another is a group-oriented (t,n) verification. There holds advantages of message recovery and message linkage in both schemes. Moreover, the transmission cost is lower than those proposals so far. Therefore, our methods can be applied to the realities.
Tsai, Chun-Wei, and 蔡俊偉. "Implementation and Evaluation of Applying Channel Estimation Scheme in DVB-T Receiver." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/q7m98p.
Повний текст джерела國立臺北科技大學
電子電腦與通訊產業研發碩士專班
95
This paper’s principal is based on channel estimation scheme of OFDM systems by way of using FPTC to replace conventional system’s channel estimation for obtaining better BER performance of DVB-T receivers. In this paper, the second section mention, the characteristics and advantages of OFDM modulation and transmission parameters of DVB-T system. The third section compares the simulation result of one-tap equalizer and FPTC. The fourth section presents the performance of using FPTC channel estimation scheme in real DVB-T receiving signals. Finally, after using PLD and FPTC to replace the conventional synchronization and channel estimation scheme of DVB-T receiver. The reception performance increases 30.7% and 29.3%, respectively, in fixed and 40km/hr cases.
Chen, Pai-Li, and 陳百立. "Implementation and Evaluation of Applying Synchronization Estimation Scheme in DVB-T Receiver." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/qfv8eg.
Повний текст джерела國立臺北科技大學
電子電腦與通訊產業研發碩士專班
95
DVB-T employs Orthogonal Frequency Division Multiplexing (OFDM) as its modulation method. OFDM is known for its better transmission rate, however, it is quite strict with requirements of synchronization. This paper describes, applies, and evaluates three different synchronization architectures for DVB-T system, including Maximum Likelihood Detection (ML), Ensemble Correlation Detection (ECD), and Part Likelihood Detection (PLD), which are used to reduce the BER performance at the receiving side due to timing offset and frequency offset. Finally, after using PLD and Frequency Domain Pilot Time Domain Correlation Method(FPTC)to replace the conventional synchronization and channel estimation scheme of DVB-T receiver. The reception performance increases 30.7% and 29.3%, respectively, in fixed and 40km/hr cases.
Chen, Sheng-Feng, and 陳昇鋒. "A non-symmetric T-R based PAPR Reduction Scheme with Multi-peak cancellation." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/572epb.
Повний текст джерела國立東華大學
電機工程學系
105
Technology about Orthogonal Frequency Division Multiplexing(OFDM) is used widely in digital communication system nowadays, but a problem called Peak-to-Average Power Ratio(PAPR) severely degrades the performance of OFDM. Bigger value of PAPR which causes distortion of signal when Power Amplifier(PA) attempts to amplify it, and the distortion also lowers the efficiency of PA and increases the complexity of both analog to digital and digital to analog converters (A/D and D/A). In this thesis, we propose a method called "non-symmetric T-R based PAPR Reduction Scheme with Multi-peak cancellation" to improve PAPR. In this method, we first use the algorithm of non-symmetric T-R to set PRTs, then generate the best peak reduction tone, and coordinate with PAPR Reduction Scheme with Multi-peak cancellation to achieve the purpose of lower PAPR. The T-R based PAPR Reduction Scheme we suggested, according to the computer simulation, can lower the value of PAPR more efficiently than conventional tone reservation can.
Chen, Jiun Ming, and 陳俊名. "A Electronic Voting Protocol Based upon t-out-of-n Oblivious Signature Scheme." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/38302440303546954407.
Повний текст джерела長庚大學
電機工程學系
101
E-voting is an online system which simulates the vote of citizen in real life. It considers the security. The properties fit in with the voting situation in real life. Simply speaking, it lets people vote electronically and online to save time, manpower and material resources. It also let citizen vote simple and easily. The project proposes a real-time voting system achieving privacy and authenticity using mobile devices. We consider the strategy and application of Oblivious Signatures in mobile devices. We also consider the real-time voting result achieving privacy and authenticity, make a complete research and discussion, and research the voting application of mobile devices, to propose an new E-voting method for mobile devices. The method can let users vote by using the mobile devices, which users take along with themselves all the time. It let users vote more convenient using the function of mobile devices. Also, considering the data protection of mobile network application, privacy of person and authenticity of information, we designs a security protocol possessing privacy and authenticity. Finally we implement the protocol on the mobile phone to let uses vote via their smart phones. This system can be used in not only every kinds of voting but also survey of rates of candidate which people are going to vote. Our system achieves soundness, completeness, fairness, privacy, verifiability, eligibility, and unreusability. It also guarantees that no one, including servers, can cheat users. It can be used in centralized and decentralized modes.
Chi, YU-Ting, and 紀育婷. "Synchronization Schemes for DAB, DVB-T and IEEE 802.16a Systems." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/w7eu44.
Повний текст джерела國立交通大學
電子工程系所
92
The goal of this research is to design synchronization schemes for Eureka 147 DAB, DVB-T, and IEEE 802.16a DL TDD systems. We apply the maximum likelihood criterion to the estimations of symbol timing and fractional frequency offset for all these three systems. For Eureka DAB 147, the frame synchronization is done by exploiting two sliding windows to calculate energy and then detect null symbol. The integral frequency offset can be estimated after FFT by a differential matched filter using PRS. For DVB-T, the integral frequency synchronization is done by exploiting the continual pilots of two symbols in the frequency domain. Frame detection is done by matching the 1~16 bits of TPS. For IEEE 802.16a DL, the fixed-location pilots are used to estimate integral frequency and frame start. The performances of proposed methods are examined in both AWGN channel and multipath channel. Simulation results show that the investigated and proposed methods are effective in achieving the required synchronizations tasks.
Chiang, Jei-Kuo, and 姜瑞國. "Multiuser Detection Scheme for TDMA Mobile System Using T/2-MMSE Decision-Feedback Receiver." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/43516096861268603271.
Повний текст джерела元智大學
電機與資訊工程研究所
87
The concept of multiuser detection was originally developed in the CDMA system, where multiple co-channel user signals using the same time duration and frequency band can be simultaneously received and demodulated by exploiting different spreading codes. This feature makes the CDMA system capable of achieving a greater theoretical capacity than 2nd-generation TDMA based mobile systems. As is noted for all existing TDMA systems, different mobiles within the same cell and using the same uplink frequency channel are assigned to different time slots for transmission, thus limiting the overall system capacity. In this thesis we propose and investigate a multiuser detection scheme that may double the capacity of TDMA system. Basically, it allows two co-channel users to occupy the same time slot and then be detected simultaneously in the base station. In so doing, the training sequences of both the co-channel users are reasonably assumed to be different, synchronized, and known by the system. And, it is required to use multiple base-station antennas for spatial-diversity reception to combat not only the inter-symbol interference (ISI) but also the co-channel interference (CCI). Hence, Spatial diversity reception can lead to both the capacity expansion and the BER performance improvement. In addition, for time variant channel, we use two kinds of methods to make the receiver adapted to the change of the channel. First, we adopt interpolated channel estimates to obtain the changing channel response between the regularly appearing training segments. Second, we also propose a RLS-MIMO DFE to achieve multiuser detection. Finally, We will use computer simulation to compare these two kinds of methods, and the results are shown in chapter 4.
Sander, Amy Janay Boswell 1973. "Toward an integration of Beck's cognitive theory and Bowlby's attachment theory : self-schema and adult attachment classification in relation to depressive symptoms." 2001. http://hdl.handle.net/2152/10828.
Повний текст джерелаWu, Shu-Zhen, and 吳淑貞. "DESIGNING A SOFTWARE CONFIGURATION MANAGEMENT SCHEME IN THE SOFTWARE DEVELOPMENT LIFE CYCLE FOR T COMPANY." Thesis, 1993. http://ndltd.ncl.edu.tw/handle/21423335457953961752.
Повний текст джерела大同工學院
事業經營研究所
81
Software Configuration Management (SCM) is the discipline of identifying the configuration of a system at discrete points in time for the purpose of systematically controlling changes to this configuration and maintaining the integrity and traceability of this configuration throughout the system life cycle. The purpose of this study is to design an appropriate managerial procedure of SCM for T Company, based on the general theory of SCM as well as the characteristics of projects developed by T Company. Software Configuration Management has four major parts: (1) identification, concerning with giving names to or providing labels for software configuration items (SCIs) and baselines as well as tracing their parentage, (2) control, an administrative mechanism for initializing, preparing, evaluating and approving/ disapproving all proposals for changing SCIs, (3) auditing, a process that should be performed periodically during the life cycle to reduce the likelihood of aberrant software behavior, (4) status accounting, providing a history of the three other configuration components by storing them in a database or in files.
Chang, Chia-Yu, and 張家玉. "Efficient computational schemes for supervised learning ofmultivariate t mixture models with missing information." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/30114475996940869491.
Повний текст джерела東海大學
統計學系
95
A finite mixture model using the multivariate t distribution has been well recognized as a robust extension of Gaussian mixtures. This paper presents an efficient PX-EM algorithm for supervised learning of multivariate t mixture models in the presence of missing values. To simplify the development of new theoretic results and facilitate the implementation of the PX-EM algorithm, two auxiliary indicator matrices are incorporated into the model and shown to be effective. The proposed methodology is a generalized approach for robust mixture models that allow analysts to handle real-world multivariate data sets with complex missing patterns. The performance of computational aspects is investigated through a simulation study and the procedure is also applied to the analysis of real data with varying proportions of artificially missing values.
Ho, Yi-Jan, and 賀逸然. "T-C Scheme for the Linearized Equations of the Viscous Conservation Laws around a Viscous Shock Profile." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/98544925877643125498.
Повний текст джерела國立臺灣師範大學
數學系
102
Assume Fi is a viscous shock profile of the viscous hyperbolic conservation laws. We are concerned with the stability and the solution structure for the initial value problem of the viscous hyperbolic conservation laws around the viscous shock wave Fi. The T-C scheme is used to estimate the solution of the linearized equations around viscous shock profile Fi. The detail proofs for the transversal wave operator of the T-C scheme are given in this thesis.
He, Yi Xuan, and 何懿軒. "An Efficient t–out–of–n Proxy Oblivious Signature Scheme and its Application on Online Lottery System." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/45446543169715486051.
Повний текст джерела長庚大學
電機工程學系
102
People changed in the habits of life gradually along with the advancement of technology and internet. The digital generation compared to the traditional living pattern is more convenient. An online lottery system needs to have perfect secure features so as to achieve the fairness. Functionality of the digital signature exactly can construct well for the working model. Due to the past signature schemes couldn't completely match the needs about scenarios of online lottery and offer consummate security and fairness. We propose an efficient t–out–of–n proxy oblivious signature scheme based on RSA cryptosystem. In response to the scenario of online lottery combines signatures of proxy and oblivious, and explain the analysis of security and argumentation. Furthermore, we applied in the smartphones equipped with the Android system. Compare to the traditional lottery game, it's more convenient for the users.
SONG, YONG-GUANG, and 宋永光. "Analogues of Erdos-Ko-Rado theorem for t-designs in some classical association schemes." Thesis, 1987. http://ndltd.ncl.edu.tw/handle/96990051522714152325.
Повний текст джерела國立交通大學
應用數學研究所
75
Erdos-Ko-Rado (1961)和Rands (1982)的兩篇論文分別探討了固定集合 上子集合間相交的性質,亦即是在Johnson schemes 的結構下討論諸點分佈的情形。 在本篇論文裡,就另外二個古典的結合架構(分別定義在向量子空間上和矩陣上), 我們分別證得相關結果。
Cao, Jian. "Computation of High-Dimensional Multivariate Normal and Student-t Probabilities Based on Matrix Compression Schemes." Diss., 2020. http://hdl.handle.net/10754/662613.
Повний текст джерелаChen, Kuo-Lun, and 陳國倫. "Signing a Message by a Group of Signers and Verifying a Signature by a Group of Verifiers Using (t, n) Threshold Scheme." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/81531832239793045879.
Повний текст джерела國立中正大學
資訊工程研究所
87
In the ordinary signature schemes, one single signer can generate a digital signature for a document by himself. By verifying the signature, anyone can verify the validity of the signature. However, in some situations, there may be many signers in one group or many verifiers in one group. For the signers, they may wish to generate a group signature instead of many personal signatures for the same document. For the verifiers, they may wish that the signature only be verified when sufficient group members attend the verification. Especially when the content of the document can be recovered from the signature, the responsibility of verification should be shared among some group members. In this thesis, the concept of secret sharing is introduced briefly first and some previous proposed schemes are reviewed. And then by employing the concept of secret sharing, we proposed two modified signature schemes. One of these two schemes is a signature scheme with (t, n) threshold group-oriented. The other is a signature scheme with (t, n) shared verification. In the first scheme, any t or more than t members of the group can cooperate to generate the group signature. The first scheme is based on the factorization problem. The proposed scheme also provides the linkage property between signed message blocks to detect a removal by an eavesdropper. In the second scheme, also by employing the concept of the (t, n) threshold secret sharing scheme, any single signer can sign a message to a group of n verifiers. Once the group receives the signature, any t or more than t verifiers in the group can cooperate to verify the signature. The proposed scheme is more efficient than the previous schemes. The proposed scheme is more efficient than the previous schemes. In both of the schemes, the property of message recovery is also added into the schemes, the plaintext can be recovered from the signature.
Guntoro, Andre T. [Verfasser]. "Algorithm, application mapping, design and realization of the time-frequency representation with flexible kernels based on their lifting scheme / von Andre T. Guntoro." 2009. http://d-nb.info/998567876/34.
Повний текст джерелаMaldonado, Ana Carolina. "Cuadrángulos generalizados esquemas de Johnson y álgebras de Terwilliger /." Doctoral thesis, 2004. http://hdl.handle.net/11086/88.
Повний текст джерелаEl trabajo de tesis se enmarca dentro de la Combinatoria Algebraica. Estudiamos dos casos particulares de esquemas de asociación: los provenientes de cuadrángulos generalizados y los esquemas de Johnson. Descomponemos en ideales simples las álgebras de Terwilliger asociadas (T-álgebras) y describimos en forma explícita los T-módulos irreducibles. Los cálculos realizados para los esquemas de Johnson pueden ser aplicados para describir explicítamente la T-álgebra de los hipercubos (recientemente estudiada por Go).