To see the other types of publications on this topic, follow the link: Hierarchical schemes.

Dissertations / Theses on the topic 'Hierarchical schemes'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Hierarchical schemes.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

MURALIDHAR, KURUDI HANUMANTHARAO. "HIERARCHICAL SCHEMES FOR ROUTING AND FLOW CONTROL IN COMMUNICATION NETWORKS." Diss., The University of Arizona, 1985. http://hdl.handle.net/10150/187913.

Full text
Abstract:
This dissertation describes three different hierarchical schemes for routing and flow control in communication networks. The basic idea in these schemes is to distribute the decision making capability among different hierarchical levels. A part of the decision is made at the lower level of network nodes and another part is made at the higher level of Coordinators. Specific problems at the lower level of nodes and the higher level of Coordinators are formulated in an optimization framework and solutions to these problems result in the overall control scheme. Two modes of operation for the Coord
APA, Harvard, Vancouver, ISO, and other styles
2

Castiglione, Arcangelo. "New Insights on cryptographic hierarchical access control: models, schemes and analysis." Doctoral thesis, Universita degli studi di Salerno, 2016. http://hdl.handle.net/10556/2489.

Full text
Abstract:
2014 - 2015<br>Nowadays the current network-centric world has given rise to several security concerns regarding the access control management, which en- sures that only authorized users are given access to certain resources or tasks. In particular, according to their respective roles and respon- sibilities, users are typically organized into hierarchies composed of several disjoint classes (security classes). A hierarchy is characterized by the fact that some users may have more access rights than others, according to a top-down inclusion paradigm following speci c hier- archical depen
APA, Harvard, Vancouver, ISO, and other styles
3

Giang, Truong Minh Triet, and trietgiang@yahoo com. "Efficient Admission Control Schemes in Cellular IP Networks." RMIT University. Electrical and Computer Engineering, 2006. http://adt.lib.rmit.edu.au/adt/public/adt-VIT20060829.113000.

Full text
Abstract:
The thesis reviews current admission control schemes in cellular IP networks. It proposes an improved version of Threshold Access Sharing and a new scheme: weight-based scheme. Finally, an admission control scheme for hierarchical cellular network is introduced.
APA, Harvard, Vancouver, ISO, and other styles
4

Fidelman, Emily S. "Metadata Quality and the Use of Hierarchical Schemes to Determine Meta Keywords: An Exploration." Thesis, School of Information and Library Science, 2006. http://hdl.handle.net/1901/288.

Full text
Abstract:
This study explores the impact of vocabulary scheme arrangement on the quality of author-generated metadata, specifically specificity and frequency of vocabulary terms chosen from schemes to describe websites. By evaluating vocabulary assigned using hierarchical and flat schemes, and by comparing these evaluations, this study seeks to isolate the arrangement of the scheme used from other variables, such as skill level and intentions of metadata generators, which have been the focus of previous research into the viability of author-generated metadata. This study suggests a relationship betwee
APA, Harvard, Vancouver, ISO, and other styles
5

Alexander, Simon. "Two- and Three-Dimensional Coding Schemes for Wavelet and Fractal-Wavelet Image Compression." Thesis, University of Waterloo, 2001. http://hdl.handle.net/10012/1180.

Full text
Abstract:
This thesis presents two novel coding schemes and applications to both two- and three-dimensional image compression. Image compression can be viewed as methods of functional approximation under a constraint on the amount of information allowable in specifying the approximation. Two methods of approximating functions are discussed: Iterated function systems (IFS) and wavelet-based approximations. IFS methods approximate a function by the fixed point of an iterated operator, using consequences of the Banach contraction mapping principle. Natural images under a wavelet basis have char
APA, Harvard, Vancouver, ISO, and other styles
6

Zabanoot, Zaid Ahmed Said. "Modelling and Analysis of Resource Management Schemes in Wireless Networks. Analytical Models and Performance Evaluation of Handoff Schemes and Resource Re-Allocation in Homogeneous and Heterogeneous Wireless Cellular Networks." Thesis, University of Bradford, 2011. http://hdl.handle.net/10454/5383.

Full text
Abstract:
Over recent years, wireless communication systems have been experiencing a dramatic and continuous growth in the number of subscribers, thus placing extra demands on system capacity. At the same time, keeping Quality of Service (QoS) at an acceptable level is a critical concern and a challenge to the wireless network designer. In this sense, performance analysis must be the first step in designing or improving a network. Thus, powerful mathematical tools for analysing most of the performance metrics in the network are required. A good modelling and analysis of the wireless cellular networks wi
APA, Harvard, Vancouver, ISO, and other styles
7

Tomaras, Panagiotis J. "Decomposition of general queueing network models : an investigation into the implementation of hierarchical decomposition schemes of general closed queueing network models using the principle of minimum relative entropy subject to fully decomposable constraints." Thesis, University of Bradford, 1989. http://hdl.handle.net/10454/4212.

Full text
Abstract:
Decomposition methods based on the hierarchical partitioning of the state space of queueing network models offer powerful evaluation tools for the performance analysis of computer systems and communication networks. These methods being conventionally implemented capture the exact solution of separable queueing network models but their credibility differs when applied to general queueing networks. This thesis provides a universal information theoretic framework for the implementation of hierarchical decomposition schemes, based on the principle of minimum relative entropy given fully decomposab
APA, Harvard, Vancouver, ISO, and other styles
8

Spence, James B. "Habitat analysis by hierarchical scheme and stream geomorphology." Huntington, WV : [Marshall University Libraries], 2005. http://www.marshall.edu/etd/descript.asp?ref=555.

Full text
Abstract:
Theses (M.S.)--Marshall University, 2005.<br>Title from document title page. Includes abstract. Document formatted into pages: contains ix, 139 p. including illustrations and map. Bibliography: p. 83-89.
APA, Harvard, Vancouver, ISO, and other styles
9

Bakolas, Efstathios. "A Hierarchical On-Line Path Planning Scheme using Wavelets." Thesis, Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/14489.

Full text
Abstract:
The main objective of this thesis is to present a new path planning scheme for solving the shortest (collision-free) path problem for an agent (vehicle) operating in a partially known environment. We present two novel algorithms to solve the planning problem. For both of these approaches we assume that the agent has detailed knowledge of the environment and the obstacles only in the vicinity of its current position. Far away obstacles or the final destination are only partially known and may even change dynamically at each instant of time. The path planning scheme is based on information gathe
APA, Harvard, Vancouver, ISO, and other styles
10

Jimenez, Carrizosa Miguel. "Hierarchical control scheme for multi-terminal high voltage direct current power networks." Thesis, Paris 11, 2015. http://www.theses.fr/2015PA112039/document.

Full text
Abstract:
Cette thèse traite de la commande hiérarchique de réseaux à courant continu multi-terminaux à haute tension (MT-HVDC) intégrant des sources d'énergie renouvelables à grande échelle. Le schéma de contrôle proposé est composé de quatre ‘couches’ : le contrôle local où se trouvent les convertisseurs de puissance, avec une échelle de temps de l’ordre de la milliseconde ; le contrôle primaire qui est décentralisé et appliqué à plusieurs terminaux avec une échelle du temps de l’ordre de la seconde ; un niveau de commande où la communication est prise en compte et où l’approche de Modèle du Commande
APA, Harvard, Vancouver, ISO, and other styles
11

Lee, Tiffany T. "The Influence of Negative Information on Trust in Virtual Teams." Scholar Commons, 2015. http://scholarcommons.usf.edu/etd/5887.

Full text
Abstract:
Organizational work is characterized by positive as well as often negative work behaviors from employees. The same may be said of work done in virtual teams, where computer-mediated communication among team members can be particularly uncivil and inflammatory (Wilson, Straus, & McEvily, 2006). Accordingly, trust has been theorized as more difficult to develop in these types of teams compared to traditional face to face teams. Using a computer simulation of a collaborative team task, this study examined how individuals in virtual teams integrate conflicting pieces of positive and negative infor
APA, Harvard, Vancouver, ISO, and other styles
12

Bukhari, Fakhri A. "A hierarchical evolutionary algorithmic design (HEAD) system for generating and evolving building design models." Thesis, Queensland University of Technology, 2011. https://eprints.qut.edu.au/50964/1/Fakhri_Bukhari_Thesis.pdf.

Full text
Abstract:
This thesis develops a detailed conceptual design method and a system software architecture defined with a parametric and generative evolutionary design system to support an integrated interdisciplinary building design approach. The research recognises the need to shift design efforts toward the earliest phases of the design process to support crucial design decisions that have a substantial cost implication on the overall project budget. The overall motivation of the research is to improve the quality of designs produced at the author's employer, the General Directorate of Major Works (GDM
APA, Harvard, Vancouver, ISO, and other styles
13

Liu, Jia. "Heterogeneous Sensor Data based Online Quality Assurance for Advanced Manufacturing using Spatiotemporal Modeling." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/78722.

Full text
Abstract:
Online quality assurance is crucial for elevating product quality and boosting process productivity in advanced manufacturing. However, the inherent complexity of advanced manufacturing, including nonlinear process dynamics, multiple process attributes, and low signal/noise ratio, poses severe challenges for both maintaining stable process operations and establishing efficacious online quality assurance schemes. To address these challenges, four different advanced manufacturing processes, namely, fused filament fabrication (FFF), binder jetting, chemical mechanical planarization (CMP), and th
APA, Harvard, Vancouver, ISO, and other styles
14

Lebreton, Olivier. "Adaptation du modèle de la Construction-Intégration de Kintsch à la compréhension des énoncés et à la résolution des problèmes arithmétiques complexes." Phd thesis, Université de la Réunion, 2011. http://tel.archives-ouvertes.fr/tel-00716841.

Full text
Abstract:
Cette recherche a pour objet la compréhension des énoncés de problèmes arithmétiques complexes et leur résolution. Les problèmes complexes choisis combinent des problèmes simples de types Changement et Combinaison. Ce travail s'appuie sur le modèle de la Construction-Intégration de Kintsch. Les résultats montrent qu'il existe une relation entre le niveau d'expertise en compréhension de textes narratifs et la résolution des problèmes arithmétiques complexes. Comprendre un texte narratif ou un énoncé de problème complexe exige de la part des lecteurs la construction d'un réseau propositionnel hi
APA, Harvard, Vancouver, ISO, and other styles
15

Lo, Kuen-Rong, and 羅坤榮. "Channel Assignment Schemes for Hierarchical Cellular Systems." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/84177540136138851638.

Full text
Abstract:
博士<br>國立交通大學<br>電子工程系<br>88<br>In this dissertation, channel assignment schemes of hierarchical cellular systems with overlaying macrocells and overlaid microcells are studied. First, a combined channel assignment (CCA) mechanism is proposed. The objective of the proposed CCA mechanism is to reduce the new-call blocking probability, decrease forced termination probability, and increase the channel utilization for the whole system. The proposed CCA mechanism combines overflow, underflow, and reversible schemes to redu
APA, Harvard, Vancouver, ISO, and other styles
16

Liao, Hui-Ju, and 廖慧如. "Verifiable Multisecret Sharing Schemes for Hierarchical Organizations." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/65795086106572970518.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>資訊管理系<br>88<br>As the coming of Internet age, it is not an unreachable dream that all of the enterprises can use computer and network systems to realize the electronic safe and the cryptographic key management. A secret sharing scheme is a crucial technology to achieve these goals. In 1979, Shamir [SH79] and Blakley [BL79] independently developed two efficient threshold secret sharing schemes. Since then, several researchers proposed threshold secret sharing schemes for different applications. The main assumption of most threshold secret sharing schemes is that all partic
APA, Harvard, Vancouver, ISO, and other styles
17

Huang, Chun-Ming, and 黃俊銘. "Hierarchical GOP Coding Schemes for Video Streaming Applications." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/78771736648771459267.

Full text
Abstract:
博士<br>國立清華大學<br>資訊工程學系<br>93<br>In this thesis, we present two hierarchical GOP (Groups-of-Pictures) coding schemes for supporting VCR-like functions and error resilience in video streaming systems. For supporting VCR-like functions, our approach is based upon reshaping the ordinary linear encoded GOP structure into a hierarchical binary tree encoded GOP structure to reduce the transmission overhead caused by frame dependencies. The resulted video streaming system can immediately provide all directions video playback with any speed-up factor. We additionally propose a proximity-based approxima
APA, Harvard, Vancouver, ISO, and other styles
18

Chang, Tsung-Hsiang, and 張琮翔. "Hierarchical Data Gathering Schemes in Wireless Sensor Networks." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/40026536607064080061.

Full text
Abstract:
碩士<br>逢甲大學<br>資訊工程所<br>94<br>Wireless sensor networks (WSNs) are composed of a large number of sensor nodes. These sensors with low-power, low-cost processor, and have the capability of wireless communication. Sensor nodes are usually deployed in some regions to collect useful data and transmit it to the distant base station. However, due to the limited battery power, if each node transmits its sensing data to the base station directly, it will consume more energy and drain the energy off quickly, even though the transmission delay is minimized. In this paper, we proposed Hierarchical Data Gat
APA, Harvard, Vancouver, ISO, and other styles
19

Lee, Ting-Ying, and 李定穎. "Design and Applications of Hierarchical Key Management Schemes." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/10605275460660308737.

Full text
Abstract:
碩士<br>東海大學<br>資訊工程與科學系<br>92<br>In this thesis, we do deep research and discussion to the hierarchical key management structure including of Lin’s discrete logarithm method proposed in 1997 and a lot of scholar’s suggestion and improved methods. We also apply it and smart card cooperatively on video on demand (VOD) system to carry out content protection, video classification and user management mechanisms. But because the smart card is the equipment of low computational ability, the operation amount in the VOD system must be quite low. So, we also propose a hierarchical key manageme
APA, Harvard, Vancouver, ISO, and other styles
20

Yen, Chen Wen, and 陳玟燕. "Design and Applications of Hierarchical Key Management Schemes." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/45343925832352608439.

Full text
Abstract:
碩士<br>國防管理學院<br>國防資訊研究所<br>96<br>One of the problems encountered in storage and retrieval of technical documents is that the legal users are always hindered from accessing the confidential documents. This study provides a mechanism to categorize the documents to different classes according to the level of secrecy and then protect each class with hierarchical cryptograph keys. By doing so, the access control of documents in different classes become clear-cut and firm. The theories composed of hierarchical cryptograph keys include Polynomial Functions, Inverse Matrix and ElGamal theory. In summa
APA, Harvard, Vancouver, ISO, and other styles
21

Chang, Wen Li, and 張紋莉. "Hierarchical Twin Visual Secrets Sharing Schemes without Pixel Expansion." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/78465336320544607465.

Full text
Abstract:
碩士<br>嶺東科技大學<br>資訊科技應用研究所<br>96<br>Visual cryptology, the theme of this research, was first proposed by Naor and Shamir in 1994. Its greatest advantage in decryption requires only superimposing the share images, no complicated computation or cryptology is required. Most traditional visual cryptology technologies are based on pixel expansion, they produce share images that are far larger than the original secret images; and the halftoning is used to handle the gray-scale images. This research utilizes the techniques of bit-level analysis and superimposition to replace the traditional halfton
APA, Harvard, Vancouver, ISO, and other styles
22

Yu, Su-Fang, and 余書芳. "Using Inside-class Information to Construct Hierarchical Classification Schemes." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/56944679707475149031.

Full text
Abstract:
碩士<br>國立中正大學<br>資訊工程研究所<br>99<br>Researches on the construction of hierarchical architecture in document classification usually focus on the adjustment of hierarchy and commonly use the global information for preprocessing. Most of them build the new architecture without considering the changing of local site during the adjustments, and restrain the effects to the local information in the preprocessing. For solving the problem, we have proposed two methods for adjusting the traditional methods, TOP Local Feature for feature extraction and Level Term Weighting for term weighting. By using the i
APA, Harvard, Vancouver, ISO, and other styles
23

Fuh-Gwo, Jeng. "A Study of Key Management Schemes for Hierarchical Access Control." 2006. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0005-1808200608571800.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Jeng, Fuh-Gwo, and 鄭富國. "A Study of Key Management Schemes for Hierarchical Access Control." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/92614478330503408722.

Full text
Abstract:
博士<br>國立中興大學<br>資訊科學系所<br>94<br>Hierarchical access control is discussing about the access rights among a group of users in an organization where all the users and their authorized data are ranked and organized into a hierarchy such that any user on a higher level can access those data encrypted by the users below him; however, the opposite is not allowed. Generally speaking, there are two approaches of hierarchies for the access control problem. One is called a partial-order user hierarchy, where all the subjects and objects are organized into a hierarchy over a partial order relation, and th
APA, Harvard, Vancouver, ISO, and other styles
25

Lee, Jia-Hao, and 李家豪. "A Study of Hierarchical Key Management Schemes Based on Elliptic Curves." Thesis, 2003. http://ndltd.ncl.edu.tw/handle/07709634314661621941.

Full text
Abstract:
碩士<br>東海大學<br>資訊工程與科學系<br>91<br>In a user hierarchy that users are authorized and classified into different privilege classes, a user belonging to higher-privileged class will have access right to messages created or owned by users in a lower-privileged class; while the opposite is not allowed. To meet the access control requirement in a user hierarchy, Lin proposed a dynamic key management scheme suitable for hierarchical control systems and that appeared in Computer Communications. It is useful in solving the key management problem for a privileged hierarchy using related parameters. However
APA, Harvard, Vancouver, ISO, and other styles
26

Chiu, Shian-Ren, and 邱顯仁. "Study of Hierarchical Tampering Detection and Recovery Schemes for Digital Images." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/80485277939778786629.

Full text
Abstract:
碩士<br>銘傳大學<br>資訊管理學系碩士班<br>98<br>In recent years, digital watermarking technology has been widely used for protection and integrity authentication of digital images property rights. Image integrity authentication is usually accomplished with a fragile watermarking scheme, which means to embed an image of feature values as an authentication message. When image integrity needs to be authenticated, the embedded authentication message in the image is extracted for comparison with the image feature values to identify whether the image has been tampered with and to locate the affected area. However,
APA, Harvard, Vancouver, ISO, and other styles
27

Lin, Hsiu-Pei, and 林秀蓓. "A Study on Hierarchical Multiple Visual Secret Sharing Schemes and Application." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/24801493801524653962.

Full text
Abstract:
碩士<br>嶺東科技大學<br>資訊科技應用研究所<br>95<br>The key advantage of visual cryptography is in the decryption process that is to decrypt the share image stacks, does not require complex computation nor is any cryptographic knowledge needed. Based on the interaction operation of share images of odd levels of black-and-white and gray-level visual cryptography, which have two black pixels and two white pixels; and share images of even levels, which has three black pixels and one white pixel. Based on the interaction operation of share images of color visual cryptography, which has two cyan pixels and two whit
APA, Harvard, Vancouver, ISO, and other styles
28

Yu, Chun-Jen, and 游純仁. "A Study on Dymanic Key Management Schemes in MANET Hierarchical Cluster Networks." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/78982542246911205478.

Full text
Abstract:
碩士<br>大葉大學<br>資訊管理學系碩士在職專班<br>93<br>Limited by the ability of nodes, multi-hop routing, dynamic topology, self-organization and autonomy, the key management with many calculations is not suitable for MANET. In the procedures of key management, nodes will be more inefficient and unsafe in the communication among them when their number is increasing. Moreover, we cannot classify which kind of risk the node will meet, as there is no clear line of defense in the MANET. This causes a serious problem in personal privacy and data safety, because our transmitting data in networks will easily be interc
APA, Harvard, Vancouver, ISO, and other styles
29

Huang, Nan-Hsiang, and 黃南翔. "Dynamic Access Control Schemes for Hierarchical-clustering-based Mobile Ad Hoc Networks." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/51841956299135145749.

Full text
Abstract:
碩士<br>大葉大學<br>資訊管理學系碩士班<br>97<br>The applications of group computing and communication motivate the requirement to provide group access control in mobile ad hoc networks (MANETs). Due to the dynamic membership and lack of centralized trusted authority, they make access control more challenging in MANETs. Recently, several researchers have proposed group access control schemes in MANETs based on a variety of threshold signatures. However, these schemes cannot actually satisfy MANETs’ dynamic environments. This is because the threshold-based schemes cannot be achieved when the number of members
APA, Harvard, Vancouver, ISO, and other styles
30

Chen, Tzu-Jung, and 陳姿蓉. "Prefetching and Caching Schemes for IoT Data in Hierarchical Edge Computing Architecture." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/q7me7w.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Shih-Chuan, Chuang. "Hierarchical Grid-Based Data Dissemination Schemes for Mobility Support in Wireless Sensor Networks." 2006. http://www.cetd.com.tw/ec/thesisdetail.aspx?etdun=U0016-1303200709332307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Chuang, Shih-Chuan, and 莊汜玔. "Hierarchical Grid-Based Data Dissemination Schemes for Mobility Support in Wireless Sensor Networks." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/69311809881625086272.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

"Three Essays on Comparative Simulation in Three-level Hierarchical Data Structure." Doctoral diss., 2017. http://hdl.handle.net/2286/R.I.46248.

Full text
Abstract:
abstract: Though the likelihood is a useful tool for obtaining estimates of regression parameters, it is not readily available in the fit of hierarchical binary data models. The correlated observations negate the opportunity to have a joint likelihood when fitting hierarchical logistic regression models. Through conditional likelihood, inferences for the regression and covariance parameters as well as the intraclass correlation coefficients are usually obtained. In those cases, I have resorted to use of Laplace approximation and large sample theory approach for point and interval estimates suc
APA, Harvard, Vancouver, ISO, and other styles
34

Su, Yu-An, and 蘇俞安. "A hierarchical secret sharing scheme." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/29635387611639142580.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Chang, Chao-Yi, and 張兆儀. "A Hierarchical Dynamic Group Signature Scheme." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/65091453055868104354.

Full text
Abstract:
碩士<br>國立交通大學<br>資訊科學系所<br>92<br>The concept of “group signature” means that, in a group, any member can sign on behalf of the group anonymously. While there is a dispute, a group manager assigned by the system will “open” the signature and make the signer public. For any one except the group manager, this kind of signatures satisfies not only the security properties but also “anonymity”. This thesis is based on the construction of group signature in [15], and adds the idea of “Hierarchy”. A manager of a higher group, can open not only the group signatures of this group, but also the group sign
APA, Harvard, Vancouver, ISO, and other styles
36

Lin, Wei-Cheng, and 林威丞. "Distributed Login Scheme in Hierarchical P2P Architectures." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/70730173851035808020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Yang, Zong-Lin, and 楊宗霖. "Hierarchical Fragile Watermarking Scheme for Image Authentication." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/43910475624556196430.

Full text
Abstract:
碩士<br>國立東華大學<br>資訊工程學系<br>93<br>Recently, the image processing technique and the internet technology are more and more advanced and popular. However, digital images over the internet can be easily manipulated and tampered using current image processing tools that are readily available as commercial packages. Therefore, it is difficult to determine whether an image is authentic or not. The protection and enforcement of intellectual property rights for digital image has then become an important issue. In this thesis, a simple hierarchical fragile watermarking scheme for image authentication is
APA, Harvard, Vancouver, ISO, and other styles
38

Hsieh, Chung-Kai, and 謝仲凱. "Hierarchical Watermarking Scheme for Image Authentication and Recovery." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/57527862985549255885.

Full text
Abstract:
碩士<br>國立中興大學<br>資訊科學研究所<br>92<br>In this thesis, we present an efficient and effective digital watermarking method for image tamper protection and recovery. Our method is efficient as it only uses simple operations such as parity check and the comparison between the average intensities. It is effective because the detection is hierarchical structured such that the accuracy of tamper localization can be ensured. That is, if a tampered block, as small as 2×2 pixels, is not detected in level-1 inspection, it will be detected in level-2 or level-3 inspection with probability nearly 1. Our method i
APA, Harvard, Vancouver, ISO, and other styles
39

Kung, Yu-Chieh, and 龔郁傑. "Investigations for a MPLS High Performance Hierarchical Multicast Scheme." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/05318353961911294373.

Full text
Abstract:
碩士<br>逢甲大學<br>通訊工程所<br>92<br>The multicast scheme with its 1-to-many property can effectively reduce the network bandwidth requirement of group communications. This multicast method can be adopted in video conferencing, distance learning, web TV, and duplicated email delivery. However, because core routers in multicast systems have to record status of each group, the increase of group number causes the increase of core router loading. This result limits multicast's scalability. Though the aggregated tree scheme can reduce the number of status records of core routers, meanwhile, it causes e
APA, Harvard, Vancouver, ISO, and other styles
40

Mei, Jhu-Shyuan, and 梅竹軒. "The Hierarchical Path-Selection Scheme Based on Multihoming NEMO." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/j5ce29.

Full text
Abstract:
碩士<br>國立嘉義大學<br>資訊工程學系研究所<br>97<br>The Network Mobility (NEMO) protocol allows a mobile network (MONET) to move around and maintains session connectivity of nodes in the MONET. In real world, the topology of the MONET may be very complex. To increase session reliability of the MONET, the concept of multihoming in NEMO is proposed. In the multihoming environment, the MONET has more than one path to connect to the Internet and these paths can be maintained simultaneously. But the loop routing problem may occur in such an environment. In this paper, we proposed a Hierarchical Path-Selection Schem
APA, Harvard, Vancouver, ISO, and other styles
41

Su, Hui-Po, and 蘇暉博. "Secure Hierarchical Bitcoin Wallet Scheme Against Privilege Escalation Attacks." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/kuku5v.

Full text
Abstract:
碩士<br>國立中山大學<br>資訊工程學系研究所<br>106<br>As the rising popularity of Bitcoin, people tend to use Bitcoin wallets to managing the keys for spending or receiving funds. Instead of generating pairs of keys randomly which are hard to be stored, hierarchical deterministic (HD) wallets derive all the keys from a single seed, thus storing that seed is sufficient to recover keys. In an HD wallet, it allows users to generate child public keys from parent public keys without knowledge of any private key. A suitable case for this feature is that an auditor is permitted to derive all the public keys for auditi
APA, Harvard, Vancouver, ISO, and other styles
42

Chen, Taicheng, and 陳泰成. "Hierarchical Image-based Walkthrough Scheme with Local Optimal Camera Sampling." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/03255559950336296371.

Full text
Abstract:
碩士<br>國立成功大學<br>資訊工程研究所<br>88<br>Recently, image-based rendering (IBR) has become one of most active research areas in computer graphics. This technique is a hybrid of both computer graphics and computer vision. Compared with traditional graphics, IBR has two advantages: (1) its complexity is in proportion to image resolution rather than scene complexity, and (2) it potentially saves time-consuming modeling time to generate highly realistic objects. In this thesis, we employ the image-based rendering technique to walkthrough complex scenes that usually consist more than one million
APA, Harvard, Vancouver, ISO, and other styles
43

Huang, Chi-Huan, and 黃紀寰. "A Proxy-based Fast Handover Scheme for Hierarchical Mobile IPv6." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/40070269659249620075.

Full text
Abstract:
碩士<br>國立交通大學<br>資訊科學與工程研究所<br>98<br>The Internet Engineering Task Force (IETF) provides the mobile IPv6 (MIPv6) to support the mobility management of the mobile node (MN). However, MN supporting the MIPv6 suffers from long handover latency and packet loss. For real-time multimedia service such as VoIP and IPTV, the handover latency is not acceptable for service provisioning. Although IETF proposes the Fast Handover for Mobile IPv6 (FMIPv6) to solve the problem, these protocols require modification to the MN and aggravate the difficulty for getting popularity. IETF also provides the Proxy Mobil
APA, Harvard, Vancouver, ISO, and other styles
44

Maa, Yeong-Chang. "A hierarchical directory scheme for large-scale cache coherent multiprocessors." 1994. https://scholarworks.umass.edu/dissertations/AAI9420654.

Full text
Abstract:
Cache coherence problem is a major concern in the design of shared-memory multiprocessors. As the number of processors scales to higher orders of magnitude, traditional bus-based snoopy cache coherence schemes broadcast as notification medium are no longer adequate. Instead, the directory-based scheme is a promising approach to deal with the large-scale cache coherence problem. However, the storage overhead of (full-map) directory scheme becomes too prohibitive as the system size increases. This dissertation champions the use of hierarchical full-map directory (HFMD) to reduce the storage requ
APA, Harvard, Vancouver, ISO, and other styles
45

Fang, Li-Chin, and 方儷瑾. "A Hierarchical Visual Multi-Secret Sharing Scheme without Pixel Expansion." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/07232603250679221563.

Full text
Abstract:
碩士<br>中興大學<br>資訊科學系所<br>95<br>Traditional visual secret sharing scheme has provided sufficient security for a secret image by breaking it into share images (called shares). In current technology, multiple secret images can be hidden in the same set of shares after one of the shares is rotated at different degrees. However, these schemes are limited to (2, 2) or (3, 3)-visual secret sharing. Furthermore, the sizes of the shares will be expanded. In this thesis, we propose an improved visual multi-secret sharing scheme that adopts a hierarchical concept to manage the shares. The first secret
APA, Harvard, Vancouver, ISO, and other styles
46

Chen, Ying-lun, and 陳英倫. "Application and Design of Time-Bound Hierarchical Key Assignment Scheme." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/55557703396712850471.

Full text
Abstract:
碩士<br>朝陽科技大學<br>資訊管理系碩士班<br>95<br>In the systems of distributed environments, the users and the resources can be classified into a number of disjoint classes Ci, S={C1,C2,...,Cm} according to their importance, and these classes usually can be organized as a hierarchy tree through the partially ordered relation "<=", where "Cj<=Ci" means that the privilege belonging to Ci is higher than or equal to the privilege belonging to Cj. In the practice, hierarchical structures can be applied to many organizations such as government, military and enterprise. In order to control access to these resources
APA, Harvard, Vancouver, ISO, and other styles
47

Chen, Yi-Ju, and 陳奕儒. "A 6T Transpose SRAM using Hierarchical-Bitline-Steering Control Scheme." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/knv282.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Tiwari, Mayank. "Fully Resilient Non-Interactive ID-Based Hierarchical Key Agreement." Thesis, 2018. https://etd.iisc.ac.in/handle/2005/4352.

Full text
Abstract:
Non-Interactive Key Agreement (NIKA) is a cryptographic primitive which allows two parties to agree on a shared secret key without any interaction. Identity-based Non-Interactive Key Agreement (ID-NIKA) allows each party to compute shared secret key using its own secret key and the peer's identity. ID-NIKA can be used to establish shared secret keys in ad-hoc networks using minimal battery power and communication. Mobile Ad-hoc NETwork (MANET) is a network of mobile and moderately resource constrained devices communicating through a wireless medium. Examples of standard MANET devices ar
APA, Harvard, Vancouver, ISO, and other styles
49

Wu, Chih-Jen, and 鄔智仁. "A HIERARCHICAL CLUSTERING CHANNEL ASSIGNMENT SCHEME FOR MULTI-CHANNEL WIRELESS NETWORKS." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/01402476635845315673.

Full text
Abstract:
碩士<br>國立清華大學<br>通訊工程研究所<br>94<br>Channel assignment is an important issue in high throughput multi-channel wireless networks. Previous works on channel assignment use a common control channel to negotiate data channels by exchanging RTS/CTS. However, these schemes require time synchronous mechanism for starting to negotiation in each contention window, which is hard to achieve in wireless networks. Moreover, the above negotiation-based scheme may incur the channel switching delay during channel assignment in each hop of a multi-hop communication. In this paper, we propose an asynchronous schem
APA, Harvard, Vancouver, ISO, and other styles
50

Ho, Chia-Chao, and 何嘉兆. "An Efficient Date-constraint Hierarchical Key Management Scheme for Mobile Agents." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/02243315691057860410.

Full text
Abstract:
碩士<br>朝陽科技大學<br>資訊管理系碩士班<br>97<br>The core competencies that a mobile agent possesses are free-roaming between different Internet environment, and autonomous environment detection and adaptation while executing the tasks that are assigned by the users. Because of these competencies, the concept of mobile agent is widely used in many different fields, such as Internet business, wireless communication, and information security technologies and etc... In 1983, Akl and Taylor [1] suggested the concept of superkey to resolve the key management issues faced by the mobile agent. Later in 1998, Volker
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!