• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 547
  • 275
  • 80
  • 78
  • 71
  • 30
  • 26
  • 25
  • 19
  • 17
  • 10
  • 7
  • 6
  • 6
  • 6
  • Tagged with
  • 1472
  • 188
  • 146
  • 106
  • 104
  • 96
  • 94
  • 89
  • 81
  • 68
  • 68
  • 66
  • 60
  • 58
  • 58
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
161

Optimization of Sweep Visually Evoked Potential (sVEP) in Adults

Yadav, Naveen Kumar January 2008 (has links)
Purpose and hypothesis: The purpose of this study was to optimize and standardize the following parameters of sweep Visually Evoked Potential (sVEP) in adults: criteria for fitting the regression line to estimate threshold, luminance, electrode placement, temporal frequency, sweep direction, presence of fixation target and stimulus area. The hypothesis is that the parameters chosen will have an impact on the measured visual acuity, contrast threshold and on the number of viable sVEP plots. Methods: The Power Diva software, Version 1.9 was used for this study. Five gold cup active electrodes, one reference electrode and one ground electrode were used to measure the Electroencephalography (EEG) signals. Six adult participants (aged 17 to 35 years), with corrected to normal visual acuity and no history of ocular disease took part in each experiment, except for the repeatability experiment in which 3 subjects participated. Four criteria for regression line fitting were compared. Psychophysical thresholds were used to validate the sVEP measures for the different criterion and repeatability of sVEP was estimated for 10 sessions. The effect of luminance (25 cd/m2, 50 cd/m2, 100 cd/m2), electrode placement (Power Diva and ISCEV), temporal frequency (6 Hz, 7.5 Hz, 10 Hz), sweep direction, fixation target and stimulus area were investigated. A repeated measure ANOVA statistical method was used to analyze the average threshold and the number of viable plots out of five active channels for all subjects. Results: Criterion 2 and 3 gave better visual acuity, higher contrast sensitivity, better repeatability and gave results that were closer to the psychophysical threshold than criterion 0 and 1. Luminance of 25 cd/m2 gave significantly fewer viable readings than 50 and 100 cd/m2 while measuring visual acuity (F = 5.11, df = 2, p = 0.0295). Temporal frequency of 7.5 Hz gave significantly more viable readings than 6 and 10 Hz while measuring visual acuity (F = 50.53, df = 2, p < 0.0001) and contrast threshold (F = 9.87, df = 2,p = 0.0043). There was a highly significant interaction of criterion with temporal frequency (F = 1536.98, df = 6, p < 0.0001) while measuring contrast threshold. There was a significant interaction of criterion with sweep direction (F = 4.26, df = 3, p = 0.0231) and for the number of readings (F = 3.75, df = 3, p = 0.0343) while measuring visual acuity. There was an interaction of criterion with sweep direction (F = 4.97, df = 3, p = 0.0136) while measuring contrast threshold at a spatial frequency of 1 cpd. There was a significant effect of fixation target (F = 7.64, df = 1, p = 0.0396) while measuring visual acuity. There was a significant effect of stimulus area (F = 11.78, df = 4, p < 0.0001) on the number of readings while measuring contrast threshold. Conclusion: The sVEP parameters chosen do have a significant effect on visual acuity, contrast threshold and on the number of viable readings. The following parameters are recommended in adults on the basis of results; Criterion 2 or 3 for fitting regression line (C2 - regression line fitted from the signal peak amplitude to the last data point with a signal to noise ratio (SNR) >1; C3 – similar to criterion 2, but the threshold should be within sweep range used), luminance of 50 or 100 cd/m2 , either Power Diva (PD) or International Society for Clinical Electrophysiology of Vision (ISCEV) electrode placement, temporal frequency of 7.5 Hz, either sweep direction, measurement with the central fixation target, larger stimulus area.
162

The Theory and Applications of Homomorphic Cryptography

Henry, Kevin January 2008 (has links)
Homomorphic cryptography provides a third party with the ability to perform simple computations on encrypted data without revealing any information about the data itself. Typically, a third party can calculate one of the encrypted sum or the encrypted product of two encrypted messages. This is possible due to the fact that the encryption function is a group homomorphism, and thus preserves group operations. This makes homomorphic cryptosystems useful in a wide variety of privacy preserving protocols. A comprehensive survey of known homomorphic cryptosystems is provided, including formal definitions, security assumptions, and outlines of security proofs for each cryptosystem presented. Threshold variants of several homomorphic cryptosystems are also considered, with the first construction of a threshold Boneh-Goh-Nissim cryptosystem given, along with a complete proof of security under the threshold semantic security game of Fouque, Poupard, and Stern. This approach is based on Shoup's approach to threshold RSA signatures, which has been previously applied to the Paillier and Damg\aa rd-Jurik cryptosystems. The question of whether or not this approach is suitable for other homomorphic cryptosystems is investigated, with results suggesting that a different approach is required when decryption requires a reduction modulo a secret value. The wide variety of protocols utilizing homomorphic cryptography makes it difficult to provide a comprehensive survey, and while an overview of applications is given, it is limited in scope and intended to provide an introduction to the various ways in which homomorphic cryptography is used beyond simple addition or multiplication of encrypted messages. In the case of strong conditional oblivious tranfser, a new protocol implementing the greater than predicate is presented, utilizing some special properties of the Boneh-Goh-Nissim cryptosystem to achieve security against a malicious receiver.
163

Optimization of Sweep Visually Evoked Potential (sVEP) in Adults

Yadav, Naveen Kumar January 2008 (has links)
Purpose and hypothesis: The purpose of this study was to optimize and standardize the following parameters of sweep Visually Evoked Potential (sVEP) in adults: criteria for fitting the regression line to estimate threshold, luminance, electrode placement, temporal frequency, sweep direction, presence of fixation target and stimulus area. The hypothesis is that the parameters chosen will have an impact on the measured visual acuity, contrast threshold and on the number of viable sVEP plots. Methods: The Power Diva software, Version 1.9 was used for this study. Five gold cup active electrodes, one reference electrode and one ground electrode were used to measure the Electroencephalography (EEG) signals. Six adult participants (aged 17 to 35 years), with corrected to normal visual acuity and no history of ocular disease took part in each experiment, except for the repeatability experiment in which 3 subjects participated. Four criteria for regression line fitting were compared. Psychophysical thresholds were used to validate the sVEP measures for the different criterion and repeatability of sVEP was estimated for 10 sessions. The effect of luminance (25 cd/m2, 50 cd/m2, 100 cd/m2), electrode placement (Power Diva and ISCEV), temporal frequency (6 Hz, 7.5 Hz, 10 Hz), sweep direction, fixation target and stimulus area were investigated. A repeated measure ANOVA statistical method was used to analyze the average threshold and the number of viable plots out of five active channels for all subjects. Results: Criterion 2 and 3 gave better visual acuity, higher contrast sensitivity, better repeatability and gave results that were closer to the psychophysical threshold than criterion 0 and 1. Luminance of 25 cd/m2 gave significantly fewer viable readings than 50 and 100 cd/m2 while measuring visual acuity (F = 5.11, df = 2, p = 0.0295). Temporal frequency of 7.5 Hz gave significantly more viable readings than 6 and 10 Hz while measuring visual acuity (F = 50.53, df = 2, p < 0.0001) and contrast threshold (F = 9.87, df = 2,p = 0.0043). There was a highly significant interaction of criterion with temporal frequency (F = 1536.98, df = 6, p < 0.0001) while measuring contrast threshold. There was a significant interaction of criterion with sweep direction (F = 4.26, df = 3, p = 0.0231) and for the number of readings (F = 3.75, df = 3, p = 0.0343) while measuring visual acuity. There was an interaction of criterion with sweep direction (F = 4.97, df = 3, p = 0.0136) while measuring contrast threshold at a spatial frequency of 1 cpd. There was a significant effect of fixation target (F = 7.64, df = 1, p = 0.0396) while measuring visual acuity. There was a significant effect of stimulus area (F = 11.78, df = 4, p < 0.0001) on the number of readings while measuring contrast threshold. Conclusion: The sVEP parameters chosen do have a significant effect on visual acuity, contrast threshold and on the number of viable readings. The following parameters are recommended in adults on the basis of results; Criterion 2 or 3 for fitting regression line (C2 - regression line fitted from the signal peak amplitude to the last data point with a signal to noise ratio (SNR) >1; C3 – similar to criterion 2, but the threshold should be within sweep range used), luminance of 50 or 100 cd/m2 , either Power Diva (PD) or International Society for Clinical Electrophysiology of Vision (ISCEV) electrode placement, temporal frequency of 7.5 Hz, either sweep direction, measurement with the central fixation target, larger stimulus area.
164

The Theory and Applications of Homomorphic Cryptography

Henry, Kevin January 2008 (has links)
Homomorphic cryptography provides a third party with the ability to perform simple computations on encrypted data without revealing any information about the data itself. Typically, a third party can calculate one of the encrypted sum or the encrypted product of two encrypted messages. This is possible due to the fact that the encryption function is a group homomorphism, and thus preserves group operations. This makes homomorphic cryptosystems useful in a wide variety of privacy preserving protocols. A comprehensive survey of known homomorphic cryptosystems is provided, including formal definitions, security assumptions, and outlines of security proofs for each cryptosystem presented. Threshold variants of several homomorphic cryptosystems are also considered, with the first construction of a threshold Boneh-Goh-Nissim cryptosystem given, along with a complete proof of security under the threshold semantic security game of Fouque, Poupard, and Stern. This approach is based on Shoup's approach to threshold RSA signatures, which has been previously applied to the Paillier and Damg\aa rd-Jurik cryptosystems. The question of whether or not this approach is suitable for other homomorphic cryptosystems is investigated, with results suggesting that a different approach is required when decryption requires a reduction modulo a secret value. The wide variety of protocols utilizing homomorphic cryptography makes it difficult to provide a comprehensive survey, and while an overview of applications is given, it is limited in scope and intended to provide an introduction to the various ways in which homomorphic cryptography is used beyond simple addition or multiplication of encrypted messages. In the case of strong conditional oblivious tranfser, a new protocol implementing the greater than predicate is presented, utilizing some special properties of the Boneh-Goh-Nissim cryptosystem to achieve security against a malicious receiver.
165

Power Analysis of Sub-threshold Logics for Security Applications

Haghighizadeh, Farhad January 2012 (has links)
Requirements of ultra-low power for many portable devices have drawn increased attention to digital sub-threshold logic design. Major reductions in power consumption and frequency of operation degradation due to the exponential decrease of the drain current in the sub-threshold region has made this logic an excellent choice, particularly for ultra-low power applications where performance is not the primary concern. Examples include RFID, wireless sensor networks and biomedical implantable devices. Along with energy consumption, security is another compelling requirement for these applications. Power analysis attacks, such as Correlation Power Analysis (CPA), are a powerful type of side channel attacks that are capable of performing a non-invasive attack with minimum equipment. As such, they present a serious threat to devices with secret information inside. This research analyzes sub-threshold logics from a previously unexplored perspective, side channel information leakage. Various transistor level and RTL circuits are implemented in the sub-threshold region as well as in the strong inversion region (normally the standard region of operation) using a 65 nm process. Measures, such as Difference of Mean Energies (DME), Normalized Energy Deviation (NED) and Normalized Standard Deviation (NSD) are employed to evaluate the implemented architectures. A CPA attack is also performed on more complex designs and the obtained correlation coefficients are used to compare sub-threshold and strong inversion logics. This research demonstrates that sub-threshold does not only increase the security against side channel attacks, but can also decrease the amount of leaked information. This research also shows that a circuit operating at sub-threshold consumes considerably less energy than the same circuit operating in strong inversion and the level of its instantaneous power consumption is significantly lower. Therefore, the noise power required to cover the secret information decreases and the attack may be dramatically more difficult due to major increase in the number of required power traces and run time. Thus, this research is important for identifying sub-threshold as a future viable technology for secure embedded applications.
166

Ultra low-power fault-tolerant SRAM design in 90nm CMOS technology

Wang, Kuande 15 July 2010 (has links)
With the increment of mobile, biomedical and space applications, digital systems with low-power consumption are required. As a main part in digital systems, low-power memories are especially desired. Reducing the power supply voltages to sub-threshold region is one of the effective approaches for ultra low-power applications. However, the reduced Static Noise Margin (SNM) of Static Random Access Memory (SRAM) imposes great challenges to the subthreshold SRAM design. The conventional 6-transistor SRAM cell does not function properly at sub-threshold supply voltage range because it has no enough noise margin for reliable operation. In order to achieve ultra low-power at sub-threshold operation, previous research work has demonstrated that the read and write decoupled scheme is a good solution to the reduced SNM problem. A Dual Interlocked Storage Cell (DICE) based SRAM cell was proposed to eliminate the drawback of conventional DICE cell during read operation. This cell can mitigate the singleevent effects, improve the stability and also maintain the low-power characteristic of subthreshold SRAM, In order to make the proposed SRAM cell work under different power supply voltages from 0.3 V to 0.6 V, an improved replica sense scheme was applied to produce a reference control signal, with which the optimal read time could be achieved. In this thesis, a 2K~8 bits SRAM test chip was designed, simulated and fabricated in 90nm CMOS technology provided by ST Microelectronics. Simulation results suggest that the operating frequency at VDD = 0.3 V is up to 4.7 MHz with power dissipation 6.0 ÊW, while it is 45.5 MHz at VDD = 0.6 V dissipating 140 ÊW. However, the area occupied by a single cell is larger than that by conventional SRAM due to additional transistors used. The main contribution of this thesis project is that we proposed a new design that could simultaneously solve the ultra low-power and radiation-tolerance problem in large capacity memory design.
167

Input-Specific Metaplasticity by a Local Switch in NMDA Receptors

Lee, Ming-Chia January 2009 (has links)
<p>At excitatory synapses, NMDAR-mediated synaptic plasticity occurs in response to activity inputs by modifying synaptic strength. While comprehensive studies have been focused on the induction and expression mechanisms underlying synaptic plasticity, it is less clear whether and how synaptic plasticity itself can be subjected to regulations. The presence of "plasticity of plasticity", or meta-plasticity, has been proposed as an essential mechanism to ensure a proper working range of plasticity, which may also offer an additional layer of information storage capacity. However, it remains elusive whether and how meta-plasticity occurs at single synapses and what molecular substrates are locally utilized. Here, I develop systems allowing for sustained alterations of individual synaptic inputs. By implementing a history of inactivity at single synapses, I demonstrate that individual synaptic inputs control synaptic molecular composition homosynaptically, while allowing heterosynaptic integration along dendrites. Furthermore, I report that subunit-specific regulation of NMDARs at single synapses mediates a novel form of input-specific metaplasticity. Prolonged suppression of synaptic releases at single synapses enhances synaptic NMDAR-mediated currents and increases the number of functional NMDARs containing NR2B. Interestingly, synaptic NMDAR composition is adjusted by spontaneous glutamate release rather than evoked activity. I also demonstrate that inactivated synapses with more NMDARs containing NR2B acquire a lower induction threshold for long-term synaptic potentiation. Together, these results suggest that at single synapses, spontaneous release primes the synapse by modifying its synaptic state with specific molecular compositions, which in turn determine the synaptic gain in an input-specific manner.</p> / Dissertation
168

Scaling Opportunities for Bulk Accumulation and Inversion MOSFETs for Gigascale Integration

Murali, Raghunath 20 February 2004 (has links)
The objective of this research is to comprehensively compare bulk accumulation and inversion MOSFETs, and find application areas where each is superior.Short channel effect (SCE) models for accumulation and inversion MOSFETs are derived that accurately predict threshold voltage, subthreshold swing, and subthreshold current. A source/drain junction depth dependent characteristic length is derived that can be used to rapidly assess the impact of junction depth scaling on minimum channel length. A fast circuit simulation methodology is developed that uses physically based I-V models to simulate inversion and accumulation MOSFET inverter chains, and is found to be accurate over a wide range of supply voltages. The simulation methodology can be used for rapid technology optimization, and performance prediction. Design guidelines are proposed for accumulation MOSFET design; the guidelines result in a low process sensitivity, low SCE, and a subthreshold current less than the allowable limit. The relative performance advantage of accumulation/inversion MOSFETs is gate-technology dependent. In critical comparisons, on-current is evaluated by means of a full band Monte Carlo device simulation. Gate-leakage, and band-to-band tunneling leakage at the drain-substrate region are included in the performance analysis. For mid-bandgap metal gate, accumulation MOSFETs perform better than inversion MOSFETs for hi-performance (HiP) and low-operating power (LOP) applications. For tunable metal gate technology, inversion MOSFETs always perform better than accumulation MOSFETs. For dual poly technology, accumulation MOSFETs perform better than inversion MOSFETs for low standby power (LSTP) applications. A comprehensive scaling analysis has been performed on accumulation and inversion MOSFETs using both SCE models and 2-D simulations. Results show that accumulation MOSFETs can scale better than inversion MOSFETs for mid-bandgap metal gate HiP, and LOP applications; and poly gate LSTP applications.
169

The Non-Linear Relationship Between Inflation and Relative Price Variability

Lee, Ya-hsuan 28 June 2011 (has links)
In this paper, we have employed the Kourtellos et al. (2007) threshold model to examine the relationship between inflation and relative price variability in Hong Kong, Argentina, Germany, Japan, Mexico and Philippines. Empirical results from Hong Kong, Japan and Mexico show that inflation are endogenous variables, and the relationship between these two variables appears to be a V shape for Hong Kong and Japan. However, the relationship appears to be positive for Mexico. Empirical results fail to reject the hypothesis of exogenous inflation for Argentina, Germany and Philippines, and the relationship between these two variables appears to be a V shape for Philippines and Argentina. There is no significant relationship between these two variables for Germany.
170

Non-Linear Okun¡¦s law for Taiwan

Wu, Yi-ling 29 June 2011 (has links)
This paper apply a threshold model to examine the nonlinear relationship between economic growth and unemployment rate. The key innovation of our model is that it takes into account endogenous explanatory variables and endogenous threshold variables. Empirical results show that Okun¡¦s law is nonlinear. Among different models under consideration,the absolute value of Okun¡¦s coefficient during contraction period is larger than that during expansion period.

Page generated in 0.0322 seconds