• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 202
  • 144
  • 111
  • 1
  • Tagged with
  • 3005
  • 341
  • 337
  • 263
  • 237
  • 208
  • 199
  • 181
  • 180
  • 151
  • 144
  • 121
  • 118
  • 112
  • 110
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
141

Paralinguistic vocal control of interactive media : how untapped elements of voice might enhance the role of non-speech voice input in the user's experience of multimedia

Al Hashimi, Sama'a January 2007 (has links)
Much interactive media development, especially commercial development, implies the dominance of the visual modality, with sound as a limited supporting channel. The development of multimedia technologies such as augmented reality and virtual reality has further revealed a distinct partiality to visual media. Sound, however, and particularly voice, have many aspects which have yet to be adequately investigated. Exploration of these aspects may show that sound can, in some respects, be superior to graphics in creating immersive and expressive interactive experiences. With this in mind, this thesis investigates the use of non-speech voice characteristics as a complementary input mechanism in controlling multimedia applications. It presents a number of projects that employ the paralinguistic elements of voice as input to interactive media including both screen-based and physical systems. These projects are used as a means of exploring the factors that seem likely to affect users' preferences and interaction patterns during non-speech voice control. This exploration forms the basis for an examination of potential roles for paralinguistic voice input. The research includes the conceptual and practical development of the projects and a set of evaluative studies. The work submitted for Ph.D. comprises practical projects (50 percent) and a written dissertation (50 percent). The thesis aims to advance understanding of how voice can be used both on its own and in combination with other input mechanisms in controlling multimedia applications. It offers a step forward in the attempts to integrate the paralinguistic components of voice as a complementary input mode to speech input applications in order to create a synergistic combination that might let the strengths of each mode overcome the weaknesses of the other.
142

Pairing-based cryptosystems and key agreement protocols

Cheng, Zhaohui January 2007 (has links)
For a long time, pairings on elliptic curves have been considered to be destructive in elliptic curve cryptography. Only recently after some pioneering works, particularly the well-known Boneh-Franklin identity-based encryption (IBE), pairings have quickly become an important tool to construct novel cryptographic schemes. In this thesis, several new cryptographic schemes with pairings are proposed, which are both efficient and secure with respect to a properly defined security model, and some relevant previous schemes are revisited. IBE provides a public key encryption mechanism where a public key can be an arbitrary string such as an entity identifier and unwieldy certificates are unnecessary. Based on the Sakai-Kasahara key construction, an IBE scheme which is secure in the Boneh-Franklin IBE model is constructed, and two identity-based key encapsulation mechanisms are proposed. These schemes achieve the best efficiency among the existing schemes to date. Recently Al-Riyami and Paterson introduced the certificateless public key encryption (CL-PKE) paradigm, which eliminates the need of certificates and at the same time retains the desirable properties of IBE without the key escrow problem. The security formulation of CL-PKE is revisited and a strong security model for this type of mechanism is defined. Following a heuristic approach, three efficient CL-PKE schemes which are secure in the defined strong security model are proposed. Identity-based two-party key agreement protocols from pairings are also investigated. The Bellare-Rogaway key agreement model is enhanced and within the model several previously unproven protocols in the literature are formally analysed. In considering that the user identity may be sensitive information in many environments, an identity-based key agreement protocol with unilateral identity privacy is proposed.
143

An efficient multichannel wireless sensor networks MAC protocol based on IEEE 802.11 distributed co-ordinated function

Campbell, Carlene January 2011 (has links)
This research aimed to create new knowledge and pioneer a path in the area relating to future trends in the WSN, by resolving some of the issues at the MAC layer in Wireless Sensor Networks. This work introduced a Multi-channel Distributed Coordinated Function (MC-DCF) which takes advantage of multi-channel assignment. The backoff algorithm of the IEEE 802.11 distributed coordination function (DCF) was modified to invoke channel switching, based on threshold criteria in order to improve the overall throughput for wireless sensor networks. This work commenced by surveying different protocols: contention-based MAC protocols, transport layer protocols, cross-layered design and multichannel multi-radio assignments. A number of existing protocols were analysed, each attempting to resolve one or more problems faced by the current layers. The 802.15.4 performed very poorly at high data rate and at long range. Therefore 802.15.4 is not suitable for sensor multimedia or surveillance system with streaming data for future multichannel multi-radio systems. A survey on 802.11 DCF - which was designed mainly for wireless networks –supports and confirm that it has a power saving mechanism which is used to synchronise nodes. However it uses a random back-off mechanism that cannot provide deterministic upper bounds on channel access delay and as such cannot support real-time traffic. The weaknesses identified by surveying this protocol form the backbone of this thesis The overall aim for this thesis was to introduce multichannel with single radio as a new paradigm for IEEE 802.11 Distributed Coordinated Function (DCF) in wireless sensor networks (WSNs) that is used in a wide range of applications, from military application, environmental monitoring, medical care, smart buildings and other industry and to extend WSNs with multimedia capability which sense for instance sounds or motion, video sensor which capture video events of interest. Traditionally WSNs do not need high data rate and throughput, since events are normally captured periodically. With the paradigm shift in technology, multimedia streaming has become more demanding than data sensing applications as such the need for high data rate protocol for WSN which is an emerging technology in this area. The IEEE 802.11 can support data rates up to 54Mbps and 802.11 DCF was designed specifically for use in wireless networks. This thesis focused on designing an algorithm that applied multichannel to IEEE 802.11 DCF back-off algorithm to reduce the waiting time of a node and increase throughput when attempting to access the medium. Data collection in WSN tends to suffer from heavy congestion especially nodes nearer to the sink node. Therefore, this thesis proposes a contention based MAC protocol to address this problem from the inspiration of the 802.11 DCF backoff algorithm resulting from a comparison of IEEE 802.11 and IEEE 802.15.4 for Future Green Multichannel Multi-radio Wireless Sensor Networks.
144

Optical wireless communication systems employing dual header pulse interval modulation (DH-PIM)

Aldibbiat, Nawras Mohamed January 2001 (has links)
Indoor optical wireless communication systems have been shown to be viable alternatives to radio systems for indoor networks because optical wireless systems offer a huge unlicensed bandwidth, high data rates, secure connectivity, immunity to electromagnetic interference and prevention from multipath fading. However, optical wireless systems are subject to multipath distortion and are governed by eye safety standards. Therefore, a modulation scheme is required that is capable of providing high speed and good immunity to multipath dispersion on indoor optical channels. In this thesis, a critical review of optical wireless systems and suitable modulation schemes has been presented. A new modulation scheme called dual header pulse interval modulation (DH-PTh1) is presented. A comprehensive theoretical analysis supported by computer simulations has been carried out to study characteristics of DH-PTh1. Novel expressions for the DH-PTh1 pulse train, symbol length, bandwidth requirement, packet transmission rate, transmission capacity, Fourier transform, power spectral density, slot and packet error rates and power requirement and penalty due to multipath propagation have been presented. Results from the analyses have been compared with OaK, PPM and DPTh1 modulation schemes. It has been shown that DH-PTh1 is a viable alternative scheme for indoor optical wireless communications, due to its built-in symbol synchronisation and relatively easy slot synchronisation. Compared with PPM and DPIM, DH-PIM offers shorter symbol lengths, improved transmission rates, increased transmission capacity, improved bandwidth requirement and better immunity to multipath dispersion when the dispersion is high. However these features are at the expense of a slightly higher optical power requirement and increased probability of error. The proposed scheme is suitable for applications where there is a need for high throughput.
145

New security notions for identity based encryption

Srinivasan, Sriramkrishnan January 2010 (has links)
No description available.
146

Provable security in practice : Analysis of SSH and CBC mode with padding

Watson, Gaven James January 2010 (has links)
No description available.
147

Error Resilience Scheme in H.264/AVC and UEP Application in DVB-H Link Layer

Tan, Keyu January 2011 (has links)
No description available.
148

Towards trustworthy virtualisation : improving the trusted virtual infrastructure

Gebhardt, Carl January 2010 (has links)
No description available.
149

Performance evaluation by aggregation of on-off traffic in processor sharing and related systems

Amaradasa, Vindya January 2008 (has links)
No description available.
150

Numerical Modelling of Material Dispersions for UWB and Metamaterial Applications Using the Finnite-Difference Time-Domain Method

Zhao, Yan January 2007 (has links)
No description available.

Page generated in 0.0129 seconds