• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2433
  • 1093
  • 247
  • 242
  • 234
  • 219
  • 126
  • 94
  • 63
  • 51
  • 39
  • 38
  • 29
  • 28
  • 27
  • Tagged with
  • 5861
  • 1393
  • 927
  • 818
  • 743
  • 618
  • 567
  • 558
  • 547
  • 528
  • 506
  • 485
  • 454
  • 432
  • 424
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
191

An ethical and legal commentary on access to renal dialysis programmes in public hospitals in South Africa: reflections on Thiagraj Soobramoney versus the Minister of Health (Kwa-Zulu Natal) 1997

Billa, Manyangane Raymond 26 August 2010 (has links)
MSc(Med), Bioethics and Health Law, Faculty of Health Sciences, University of the Witwatersrand / The current exclusion criteria for accessing renal dialysis in South African public hospitals places great emphasis on the allocation of scarce resources. The case of Soobramoney at the Constitutional Court highlighted the ethical and legal implications of providing this scarce resource. Mr. Soobramoney was denied access to renal dialysis on the basis of scarce resources and he did not qualify for care due to not meeting the criteria set for renal care. The Soobramoney case was considered mainly on the basis of scarce allocation of resources and offering treatment on an emergency basis. It was argued by the appellant that the state had an obligation to provide him with the treatment in terms of s 27(3) read with s 11 of the Constitution (para 14). This report takes a different slant and looks at the quality of life argument for increasing access to renal dialysis for those denied it based on current South African protocols. In exploring this concept one would venture to offer a definition of ‘quality of life’ according to Brown as an overall sense of well-being. This includes an individual’s satisfaction with their own lives (Brown, 2007: 72). A health related quality of life extends the definition to include the way a person’s v health affects their ability to carry out normal social and physical activities (ibid). A case is made for increasing access by developing programmes to cater for those in need of enhancing their quality of life. This is what is being motivated for in cases similar to Soobramoney, especially those with comorbid disease. The quality of life argument is based on the fact that there are indications in literature that patients with end-stage renal disease rate their own quality of life to be as important as the quality of life of the general population. Furthermore, there is no indication that the elderly live more miserable lives when they are on dialysis. The idea of respect for persons is highlighted - respect for the autonomous choices patients make concerning how they live their lives and including respect for them towards the end of their lives. Finally, I reflect on some legal issues concerned with the Soobramoney versus the Minister of Health Kwa-Zulu Natal 1997.
192

Policy for managing access to intelligence information in post-apartheid South Africa

Africa, Sandra Elizabeth 10 March 2008 (has links)
ABSTRACT Under apartheid, the South African intelligence services operated in secrecy and without the framework of a Constitution upholding basic human rights. The situation changed drastically with the introduction of a democratic political dispensation in 1994, and with the adoption of the Republic of South Africa Constitution Act, 1996. One of the fundamental rights contained in the Bill of Rights (Chapter 2 of the Constitution) was the right of access to information. The subsequent passage of legislation to give effect to this right, required all state structures - including the civilian intelligence services, the National Intelligence Agency and the South African Secret Service - to actively disclose information about themselves, and to receive and respond to requests for access to records that were made in terms of the enabling legislation. The main issue with which the study is concerned - the balance between secrecy and transparency in a democracy - is one of a wider set of concerns related to democratic control and accountability of the intelligence and security services. The study explores policy options for reconciling the public’s right to information with the intelligence services’ need for a degree of secrecy with which to conduct their work. Inter alia, it compares the policy choices of three countries about how their intelligence services should function in relation to access to information legislation. The research reveals that there was uneven and erratic compliance by the intelligence services with key provisions of the Promotion of Access to Information Act, 2000, up to and including August 2005. The weaknesses arose because of the absence of clear policy on how to implement the Act in relation to the intelligence services, and in relation to information held by the intelligence and security services. The study therefore argues the need for a comprehensive policy package, which sets criteria for the conditions under which information should be protected from disclosure, and the criteria for determining when information no longer requires such protection. Finally, it argues for strict oversight of the intelligence services’ choices around secrecy and transparency.
193

Risk management in HIV/AIDS: ethical and economic issues concerning the restriction of HAART access only to adherent patients

Chawana, Richard 15 February 2011 (has links)
MSc (Med), Bioethics and Health Law, Faculty of Health Sciences, University of the Witwatersrand / South Africa, like many other developing nations, is faced with the challenge of mobilising resources to fight the HIV/AIDS pandemic. There is a huge budget gap between the ideal and actual funding provided to achieve universal access to highly active antiretroviral therapy (HAART), which leads to the inevitable rationing of HAART. Although healthcare spending has been increasing in South Africa, new demands are being placed on the HAART roll out programmes. This is particularly due to the emergence of HIV drug resistance (HIVDR). Because non-adherence to HAART is strongly linked to drug resistance, this is a major threat to any successful HAART programme. In the face of restricted resources, this research report looks at some of the ethical and economic implications of non-adherence to HAART. I suggest that there is merit in considering that HAART be restricted only to adherent patients.
194

Modes de consommation et modes d'accès des biens culturels à l'ère numérique : le cas du livre / Consumer Behavior and Access to Cultural Goods in the Digital Age : An analysis of the Book Market

Thierry, Clémence 19 October 2015 (has links)
Structurée autour de trois chapitres, cette thèse contribue à enrichir la perception et la compréhension des modes de consommation et des modes d'accès au livre a l'ère numérique. Nous abordons trois principales questions que sont les effets de longue traîne dans la demande de livres, la substituabilité e entre les modes d'accès au livre et l'articulation des prix des livres papier et numériques. Notre démarche est de considérer la multiplicité du marché e du livre, en tenant compte de sa sphère marchande et non marchande, et de la dualité de format du livre, papier et numérique. Nous avons dans un premier chapitre analysé la distribution des emprunts en bibliothèques publiques et étudié de la sorte des modes de consommation différents du star système. Pour expliquer cette diversité consommée en bibliothèques, le deuxième chapitre questionne l'articulation des modes d'accès au livre. Nos résultats montrent une complémentarité des pratiques d'emprunt et d'achat de livres et une indépendance des pratiques de téléchargement de livres numériques. La question du prix des livres numériques pouvant en partie expliquer cette indépendance, le troisième chapitre analyse la tarification des livres numériques. Nous avons montré qu'elle se structure principalement en miroir des prix des livres papier. Notre analyse se fonde sur trois bases de données originales, a savoir : les emprunts de fiction en bibliothèques parisiennes réalisés entre janvier et avril 2012 ; une large enquête réalisée auprès des usagers des bibliothèques parisiennes en 2014 ; et une étude des prix des meilleures ventes de 2011 de livres numériques en France et aux Etats-Unis. A partir de ces données empiriques, ce travail de recherche montre des modes de consommation et une offre du marché du livre papier et numérique qui s'articulent davantage qu'ils ne s'opposent. / This thesis enlightens the understanding of consumer behavior and access to cultural goods in the digital age. We discuss three main issues : the impact of the long tail effect on the book demand, the substitutability between books from different access points, and the articulation between the price of paper books and digital books. Our approach is to consider the diversity of the book market through its trade and non-trade spheres and the duality between book formats - digital or not. In the _rst chapter of this dissertation, we analyze demand for fiction books in public lending libraries. Our results reveal that book consumption is unrelated to the star system. In order to explain the diversity of book borrowing in libraries, the second chapter questions the articulation between the different access points. Our analysis reveals the complementarity between borrowing practices and purchase of books and the independence of the downloading of digital books practices. The price of digital books can be an explanation of this independence, that's why the third chapter analyses the structuration of digital books prices. Our results show that the pricing system of digital books mainly mirrors the pricing system of paper books. Our analysis of these three chapters are based on three original databases : the borrowing of fiction books in Parisian libraries between January and April 2012 ; a survey made in Parisian libraries in 2014 ; and a study of the prices of best-seller digital books in France and in the United States. Based on this empirical data collection, the present research demonstrates that consumer behavior and the paper book and digital book market are more often correlated than opposed.
195

Does Microfinance Reduce Poverty? A Study of Latin America

Franco, Nicholas January 2011 (has links)
Thesis advisor: Richard McGowan / Thesis advisor: Robert Murphy / Microfinance has been heralded as the solution to global poverty by optimists in the development field. Many regard the practice of extending unprecedented financial access to the poor through small loans as a necessary and important tool in the development process. The industry has grown and changed shape over the last two decades and recently has come under fire. The new face of microfinance has included for-profit lenders, usurious interest rates, loan sharks, and suicides. Many critics are beginning to question the ethics, practices and efficacy of microfinance. They claim that microfinance cannot make more than a marginal impact on poverty, and more serious development efforts should address structural causes of underdevelopment. This paper will examine the effects microfinance on extreme poverty as defined by the poverty headcount ratio at $2 a day and $1.25 a day. The study will focus on the Latin America and Caribbean. Through regression analysis, this paper measures the effects of microfinance on the poverty rate while controlling for structural economic changes. We will conclude that microfinance has a statistically significant effect on extreme poverty in this region. These results are an important response to critics who posit that the costs of microfinance outweigh the benefits. / Thesis (BA) — Boston College, 2011. / Submitted to: Boston College. College of Arts and Sciences. / Discipline: Economics Honors Program. / Discipline: Economics.
196

A study on propagation characteristics and interference of spread spectrum code division multiple access cellular radio systems.

January 1995 (has links)
by Kwok Ming Shan. / Thesis (M.Phil.)--Chinese University of Hong Kong, 1995. / Includes bibliographical references (leaves 102-[109]). / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Cellular Radio Systems --- p.3 / Chapter 1.2 --- Code Division Multiple Access (CDMA) --- p.7 / Chapter 1.2.1 --- Direct Sequence CDMA (DS-CDMA) --- p.8 / Chapter 1.2.2 --- Frequency Hopping CDMA (FH-GDMA) --- p.11 / Chapter 1.2.3 --- Time Hopping CDMA (TH-CDMA) --- p.12 / Chapter 1.3 --- Propagation Characteristics --- p.12 / Chapter 1.3.1 --- Signal Strength Prediction - Path Loss --- p.13 / Chapter 1.3.2 --- Signal Variability --- p.17 / Chapter 1.3.3 --- Delay Spread --- p.23 / Chapter 1.3.4 --- Coherence Bandwidth --- p.23 / Chapter 1.4 --- Power Control in Cellular Radio Systems --- p.24 / Chapter 1.4.1 --- Centralized Power Control --- p.24 / Chapter 1.4.2 --- Distributed Power Control --- p.25 / Chapter 1.4.3 --- CDMA Power Control --- p.29 / Chapter 2 --- Contributions --- p.39 / Chapter 3 --- ACI Analysis of the Reverse-Link --- p.41 / Chapter 3.1 --- Adjacent Cell Interference --- p.42 / Chapter 3.2 --- Adjacent Cell Interference Analysis --- p.43 / Chapter 3.2.1 --- Interference Analysis of Hexagonal Cells --- p.43 / Chapter 3.2.2 --- Interference Analysis of Circular Cell Structure --- p.47 / Chapter 3.3 --- Closed-form of Adjacent Cell Interference --- p.51 / Chapter 3.4 --- Generalization to Irregular Cell Structure --- p.54 / Chapter 3.5 --- Conclusions --- p.57 / Chapter 4 --- ACI Analysis of Reverse-Link with Log-normal Shadowing --- p.59 / Chapter 4.1 --- Interference with Shadowing --- p.59 / Chapter 4.2 --- Conclusions --- p.66 / Chapter 5 --- ACI Analysis of Microcell --- p.68 / Chapter 5.1 --- Propagation Characteristics of Microcellular Radio Systems --- p.69 / Chapter 5.2 --- CDMA Microcellular Radio Systems --- p.70 / Chapter 5.3 --- Results and Discussions --- p.74 / Chapter 5.4 --- Conclusions --- p.76 / Chapter 6 --- Outage Probability Analysis of Imperfect Power Control --- p.77 / Chapter 6.1 --- Fast Fading of Signal --- p.78 / Chapter 6.2 --- Imperfect Power Control in CDMA --- p.81 / Chapter 6.3 --- Conclusions --- p.85 / Chapter 7 --- Conclusions --- p.88 / Chapter 8 --- Examples of CDMA Cellular Radio Systems --- p.91 / Chapter 8.1 --- Qualcomm CDMA system --- p.91 / Chapter 8.1.1 --- Forward-link --- p.92 / Chapter 8.1.2 --- Reverse-link --- p.93 / Chapter 8.1.3 --- Reverse-Link Open-Loop Power Control --- p.94 / Chapter 8.1.4 --- Reverse-Link Closed-Loop Power Control --- p.95 / Chapter 8.1.5 --- Forward-Link Power Control --- p.96 / Chapter 8.2 --- Interdigital Broadband CDMA System --- p.96 / Appendix --- p.97 / Chapter A --- Derivation of the PDF of the fast fading signal power --- p.97 / Chapter B --- Derivation of the Mean-to-standard deviation ratio --- p.98 / Chapter C --- Acronyms --- p.100 / Bibliography --- p.102
197

On the theoretical aspects of multi-carrier spread spectrum systems.

January 1996 (has links)
by Tsan-Fai Ho. / Thesis (M.Phil.)--Chinese University of Hong Kong, 1996. / Includes bibliographical references (leaves 64-68). / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Review on spread spectrum communications --- p.1 / Chapter 1.2 --- The spread spectrum techniques --- p.2 / Chapter 1.2.1 --- Direct Sequence (DS) Systems --- p.2 / Chapter 1.2.2 --- Frequency Hopping (FH) Systems --- p.2 / Chapter 1.2.3 --- Time Hopping (TH) Systems --- p.4 / Chapter 1.2.4 --- Hybrid Systems --- p.4 / Chapter 1.3 --- Existing Applications of the spread spectrum systems --- p.5 / Chapter 1.4 --- Organization of the thesis --- p.6 / Chapter 2 --- The Concept of Duality --- p.7 / Chapter 2.1 --- Multi-Carrier Systems - An Overview --- p.7 / Chapter 2.2 --- Orthogonal Frequency Division Multiplexing --- p.8 / Chapter 2.2.1 --- Bandwidth Efficiency --- p.9 / Chapter 2.2.2 --- Spectral Efficiency --- p.10 / Chapter 2.2.3 --- Effects of fading --- p.11 / Chapter 2.3 --- Applications of OFDM in multiple access --- p.13 / Chapter 2.3.1 --- ST-CDMA --- p.13 / Chapter 2.3.2 --- MC-DS-CDMA --- p.14 / Chapter 2.3.3 --- OFDM-CDMA --- p.15 / Chapter 2.4 --- Duality - Time-Frequency Interrelation --- p.16 / Chapter 3 --- Performance of Multi-Carrier CDMA System --- p.17 / Chapter 3.1 --- System Model --- p.17 / Chapter 3.2 --- Performance Analysis --- p.20 / Chapter 3.2.1 --- Gaussian Channel --- p.20 / Chapter 3.2.2 --- Fading Channel --- p.24 / Chapter 3.3 --- Performance with Pulse Shape --- p.33 / Chapter 3.4 --- Appendix --- p.34 / Chapter 4 --- Signal Design Criteria for MC-CDMA System --- p.36 / Chapter 4.1 --- Existence of Signal Distortion --- p.37 / Chapter 4.2 --- Measures of the Signal Envelope Fluctuation --- p.38 / Chapter 4.3 --- Complementary Sequences --- p.41 / Chapter 4.4 --- Crest Factors --- p.42 / Chapter 4.4.1 --- Time-limited Pulse --- p.43 / Chapter 4.4.2 --- Ideally Band-Limited Pulses --- p.43 / Chapter 4.4.3 --- Shaped Pulses --- p.45 / Chapter 4.5 --- Spectrally Efficient Complementary (SEC) Sequences --- p.48 / Chapter 4.6 --- Construction of Spectrally Efficient Complementary(SEC) Sequences --- p.50 / Chapter 4.7 --- Generalized Multiphase Spectrally Efficient Complementary Sequences --- p.55 / Chapter 5 --- Summary and Future Extensions --- p.58 / Chapter 5.1 --- Summary of the Results --- p.58 / Chapter 5.2 --- Topics for Future Research --- p.59 / Appendix / Chapter A --- Exhaustive search of MPSEC sequences --- p.61 / Chapter B --- Papers derived from this thesis --- p.63 / Bibliography --- p.64
198

New adaptive transmission schemes for MC-CDMA systems.

January 1999 (has links)
by Yin-Man Lee. / Thesis (M.Phil.)--Chinese University of Hong Kong, 1999. / Includes bibliographical references (leaves 82-[87]). / Abstracts in English and Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Overview of MC-CDMA --- p.1 / Chapter 1.2 --- System Model --- p.3 / Chapter 1.3 --- Receiver Optimization --- p.7 / Chapter 1.4 --- Transmitter Optimization --- p.9 / Chapter 1.5 --- Nonlinearly Constrained Optimization --- p.10 / Chapter 1.6 --- Outline of Thesis --- p.11 / Chapter 2 --- Centralized Transmitter Optimization for MC-CDMA Systems --- p.13 / Chapter 2.1 --- Introduction --- p.13 / Chapter 2.2 --- Problem Development --- p.15 / Chapter 2.3 --- Lagrangian Optimization Approaches --- p.16 / Chapter 2.3.1 --- Penalty Function Method --- p.17 / Chapter 2.3.2 --- Barrier Function Method --- p.19 / Chapter 2.3.3 --- Powell's Method and Augmented Lagrangian Method --- p.21 / Chapter 2.4 --- Optimal FDMA System --- p.23 / Chapter 2.5 --- Modified Centralized Optimization Schemes --- p.25 / Chapter 2.6 --- Performance --- p.27 / Chapter 2.6.1 --- Typical Behavior --- p.27 / Chapter 2.6.2 --- Average Performance --- p.32 / Chapter 2.7 --- Summary --- p.38 / Chapter 3 --- Decentralized Transmitter Optimization for MC-CDMA Sys- tems --- p.39 / Chapter 3.1 --- Introduction --- p.39 / Chapter 3.2 --- System Model --- p.41 / Chapter 3.3 --- Optimization --- p.42 / Chapter 3.3.1 --- Receiver Optimization --- p.43 / Chapter 3.3.2 --- Single-user Transmitter Optimization --- p.44 / Chapter 3.3.3 --- Decentralized Transmission Scheme --- p.45 / Chapter 3.3.4 --- Multirate Transmission with Decentralized Transmission Scheme --- p.47 / Chapter 3.4 --- Performance --- p.48 / Chapter 3.5 --- Summary --- p.57 / Chapter 4 --- Performance Evaluation of Various Adaptive Transmission Schemes --- p.59 / Chapter 4.1 --- Introduction --- p.59 / Chapter 4.2 --- Comparison of Different Adaptive Transmission Schemes --- p.61 / Chapter 4.3 --- Adaptive Transmission Schemes with K > M --- p.64 / Chapter 4.4 --- Modified Adaptive Transmission Scheme with Graceful Degrada- tion in the SNR --- p.68 / Chapter 4.5 --- Summary --- p.71 / Chapter 5 --- Conclusions and Future Work --- p.73 / Chapter 5.1 --- Conclusions --- p.73 / Chapter 5.2 --- Future Work --- p.75 / A The Hungarian Method for Optimal Frequency Assignment --- p.76 / Bibliography --- p.82
199

Asynchronous memory design.

January 1998 (has links)
by Vincent Wing-Yun Sit. / Thesis submitted in: June 1997. / Thesis (M.Phil.)--Chinese University of Hong Kong, 1998. / Includes bibliographical references (leaves 1-4 (3rd gp.)). / Abstract also in Chinese. / TABLE OF CONTENTS / LIST OF FIGURES / LIST OF TABLES / ACKNOWLEDGEMENTS / ABSTRACT / Chapter 1. --- INTRODUCTION --- p.1 / Chapter 1.1 --- ASYNCHRONOUS DESIGN --- p.2 / Chapter 1.1.1 --- POTENTIAL ADVANTAGES --- p.2 / Chapter 1.1.2 --- DESIGN METHODOLOGIES --- p.2 / Chapter 1.1.3 --- SYSTEM CHARACTERISTICS --- p.3 / Chapter 1.2 --- ASYNCHRONOUS MEMORY --- p.5 / Chapter 1.2.1 --- MOTIVATION --- p.5 / Chapter 1.2.2 --- DEFINITION --- p.9 / Chapter 1.3 --- PROPOSED MEMORY DESIGN --- p.10 / Chapter 1.3.1 --- CONTROL INTERFACE --- p.10 / Chapter 1.3.2 --- OVERVIEW --- p.11 / Chapter 1.3.3 --- HANDSHAKE CONTROL PROTOCOL --- p.13 / Chapter 2. --- THEORY --- p.16 / Chapter 2.1 --- VARIABLE BIT LINE LOAD --- p.17 / Chapter 2.1.1 --- DEFINITION --- p.17 / Chapter 2.1.2 --- ADVANTAGE --- p.17 / Chapter 2.2 --- CURRENT SENSING COMPLETION DETECTION --- p.18 / Chapter 2.2.1 --- BLOCK DIAGRAM --- p.19 / Chapter 2.2.2 --- GENERAL LSD CURRENT SENSOR --- p.21 / Chapter 2.2.3 --- CMOS LSD CURRENT SENSOR --- p.23 / Chapter 2.3 --- VOLTAGE SENSING COMPLETION DETECTION --- p.28 / Chapter 2.3.1 --- DATA READING IN MEMORY CIRCUIT --- p.29 / Chapter 2.3.2 --- BLOCK DIAGRAM --- p.30 / Chapter 2.4 --- MULTIPLE DELAYS COMPLETION GENERATION --- p.32 / Chapter 2.4.1 --- ADVANTAGE --- p.32 / Chapter 2.4.2 --- BLOCK DIAGRAM --- p.33 / Chapter 3. --- IMPLEMENTATION --- p.35 / Chapter 3.1 --- 1M-BIT SRAM FRAMEWORK --- p.36 / Chapter 3.1.1 --- INTRODUCTION --- p.36 / Chapter 3.1.2 --- FRAMEWORK --- p.36 / Chapter 3.2 --- CONTROL CIRCUIT --- p.40 / Chapter 3.2.1 --- CONTROL SIGNALS --- p.40 / Chapter 3.2.1.1 --- EXTERNAL CONTROL SIGNALS --- p.40 / Chapter 3.2.1.2 --- INTERNAL CONTROL SIGNALS --- p.41 / Chapter 3.2.2 --- READ / WRITE STATE TRANSITION GRAPHS --- p.42 / Chapter 3.2.3 --- IMPLEMENTATION --- p.43 / Chapter 3.3 --- BIT LINE SEGMENTATION --- p.45 / Chapter 3.3.1 --- FOUR REGIONS SEGMENTATION --- p.46 / Chapter 3.3.2 --- OPERATION --- p.50 / Chapter 3.3.3 --- MEMORY CELL --- p.51 / Chapter 3.4 --- CURRENT SENSING COMPLETION DETECTION --- p.52 / Chapter 3.4.1 --- ONE BIT DATA BUS --- p.53 / Chapter 3.4.2 --- EIGHT BITS DATA BUS --- p.55 / Chapter 3.5 --- VOLTAGE SENSING COMPLETION DETECTION --- p.57 / Chapter 3.5.1 --- ONE BIT DATA BUS --- p.57 / Chapter 3.5.2 --- EIGHT BITS DATA BUS --- p.59 / Chapter 3.6 --- MULTIPLE DELAYS COMPLETION GENERATION --- p.60 / Chapter 4. --- SIMULATION --- p.63 / Chapter 4.1 --- SIMULATION ENVIRONMENT --- p.64 / Chapter 4.1.1 --- SIMULATION PARAMETERS --- p.64 / Chapter 4.1.2 --- MEMORY TIMING SPECIFICATIONS --- p.64 / Chapter 4.1.3 --- BIT LINE LOAD DETERMINATION --- p.67 / Chapter 4.2 --- BENCHMARK SIMULATION --- p.69 / Chapter 4.2.1 --- CIRCUIT SCHEMATIC --- p.69 / Chapter 4.2.2 --- RESULTS --- p.71 / Chapter 4.3 --- CURRENT SENSING COMPLETION DETECTION --- p.73 / Chapter 4.3.1 --- CIRCUIT SCHEMATIC --- p.73 / Chapter 4.3.2 --- SENSE AMPLIFIER CURRENT CHARACTERISTICS --- p.75 / Chapter 4.3.3 --- RESULTS --- p.76 / Chapter 4.3.4 --- OBSERVATIONS --- p.80 / Chapter 4.4 --- VOLTAGE SENSING COMPLETION DETECTION --- p.82 / Chapter 4.4.1 --- CIRCUIT SCHEMATIC --- p.82 / Chapter 4.4.2 --- RESULTS --- p.83 / Chapter 4.5 --- MULTIPLE DELAYS COMPLETION GENERATION --- p.89 / Chapter 4.5.1 --- CIRCUIT SCHEMATIC --- p.89 / Chapter 4.5.2 --- RESULTS --- p.90 / Chapter 5. --- TESTING --- p.97 / Chapter 5.1 --- TEST CHIP DESIGN --- p.98 / Chapter 5.1.1 --- BLOCK DIAGRAM --- p.98 / Chapter 5.1.2 --- SCHEMATIC --- p.100 / Chapter 5.1.3 --- LAYOUT --- p.102 / Chapter 5.2 --- HSPICE POST-LAYOUT SIMULATION RESULTS --- p.104 / Chapter 5.2.1 --- GRAPHICAL RESULTS --- p.105 / Chapter 5.2.2 --- VOLTAGE SENSING COMPLETION DETECTION --- p.108 / Chapter 5.2.3 --- MULTIPLE DELAYS COMPLETION GENERATION --- p.114 / Chapter 5.3 --- MEASUREMENTS --- p.117 / Chapter 5.3.1 --- LOGIC RESULTS --- p.118 / Chapter 5.3.1.1 --- METHOD --- p.118 / Chapter 5.3.1.2 --- RESULTS --- p.118 / Chapter 5.3.2 --- TIMING RESULTS --- p.119 / Chapter 5.3.2.1 --- METHOD --- p.119 / Chapter 5.3.2.2 --- GRAPHICAL RESULTS --- p.121 / Chapter 5.3.2.3 --- VOLTAGE SENSING COMPLETION DETECTION --- p.123 / Chapter 5.3.2.4 --- MULTIPLE DELAYS COMPLETION GENERATION --- p.125 / Chapter 6. --- DISCUSSION --- p.127 / Chapter 6.1 --- CURRENT SENSING COMPLETION DETECTION --- p.128 / Chapter 6.1.1 --- COMMENTS AND CONCLUSION --- p.128 / Chapter 6.1.2 --- SUGGESTION --- p.128 / Chapter 6.2 --- VOLTAGE SENSING COMPLETION DETECTION --- p.129 / Chapter 6.2.1 --- RESULTS COMPARISON --- p.129 / Chapter 6.2.1.1 --- GENERAL --- p.129 / Chapter 6.2.1.2 --- BIT LINE LOAD --- p.132 / Chapter 6.2.1.3 --- BIT LINE SEGMENTATION --- p.133 / Chapter 6.2.2 --- RESOURCE CONSUMPTION --- p.133 / Chapter 6.2.2.1 --- AREA --- p.133 / Chapter 6.2.2.2 --- POWER --- p.134 / Chapter 6.2.3 --- COMMENTS AND CONCLUSION --- p.134 / Chapter 6.3 --- MULTIPLE DELAY COMPLETION GENERATION --- p.135 / Chapter 6.3.1 --- RESULTS COMPARISON --- p.135 / Chapter 6.3.1.1 --- GENERAL --- p.135 / Chapter 6.3.1.2 --- BIT LINE LOAD --- p.136 / Chapter 6.3.1.3 --- BIT LINE SEGMENTATION --- p.137 / Chapter 6.3.2 --- RESOURCE CONSUMPTION --- p.138 / Chapter 6.3.2.1 --- AREA --- p.138 / Chapter 6.3.2.2 --- POWER --- p.138 / Chapter 6.3.3 --- COMMENTS AND CONCLUSION --- p.138 / Chapter 6.4 --- GENERAL COMMENTS --- p.139 / Chapter 6.4.1 --- COMPARISON OF THE THREE TECHNIQUES --- p.139 / Chapter 6.4.2 --- BIT LINE SEGMENTATION --- p.141 / Chapter 6.5 --- APPLICATION --- p.142 / Chapter 6.6 --- FURTHER DEVELOPMENTS --- p.144 / Chapter 6.6.1 --- INTERACE WITH TWO-PHASE HCP --- p.144 / Chapter 6.6.2 --- DATA BUS EXPANSION --- p.146 / Chapter 6.6.3 --- SPEED OPTIMIZATION --- p.147 / Chapter 6.6.4 --- MODIFIED WRITE COMPLETION METHOD --- p.150 / Chapter 7. --- CONCLUSION --- p.152 / Chapter 7.1 --- PROBLEM DEFINITION --- p.152 / Chapter 7.2 --- IMPLEMENTATION --- p.152 / Chapter 7.3 --- EVALUATION --- p.153 / Chapter 7.4 --- COMMENTS AND SUGGESTIONS --- p.155 / Chapter 8. --- REFERENCES --- p.R-l / Chapter 9. --- APPENDIX --- p.A-l / Chapter 9.1 --- HSPICE SIMULATION PARAMETERS --- p.A-l / Chapter 9.1.1 --- TYPICAL SIMULATION CONDITION --- p.A-l / Chapter 9.1.2 --- FAST SIMULATION CONDITION --- p.A-3 / Chapter 9.1.3 --- SLOW SIMULATION CONDITION --- p.A-4 / Chapter 9.2 --- SRAM CELL LAYOUT AND NETLIST --- p.A-5 / Chapter 9.3 --- TEST CHIP SPECIFICATIONS --- p.A-8 / Chapter 9.3.1 --- GENERAL SPECIFICATIONS --- p.A-8 / Chapter 9.3.2 --- PIN ASSIGNMENT --- p.A-9 / Chapter 9.3.3 --- TIMING DIAGRAMS AND SPECIFICATIONS --- p.A-10 / Chapter 9.3.4 --- SCHEMATICS AND LAYOUTS --- p.A-11 / Chapter 9.3.4.1 --- STANDARD MEMORY COMPONENTS --- p.A-12 / Chapter 9.3.4.2 --- DVSCD AND MDCG COMPONENTS --- p.A-20 / Chapter 9.3.5 --- MICROPHOTOGRAPH --- p.A-25
200

Study on elliptic curve public key cryptosystems with application of pseudorandom number generator.

January 1998 (has links)
by Yuen Ching Wah. / Thesis (M.Phil.)--Chinese University of Hong Kong, 1998. / Includes bibliographical references (leaves 61-[63]). / Abstract also in Chinese. / Chapter 1 --- Introduction --- p.1 / Chapter 1.1 --- Why use cryptography? --- p.1 / Chapter 1.2 --- Why is authentication important ? --- p.2 / Chapter 1.3 --- What is the relationship between authentication and digital sig- nature? --- p.3 / Chapter 1.4 --- Why is random number important? --- p.3 / Chapter 2 --- Background --- p.5 / Chapter 2.1 --- Cryptography --- p.5 / Chapter 2.1.1 --- Symmetric key cryptography --- p.5 / Chapter 2.1.2 --- Asymmetric key cryptography --- p.7 / Chapter 2.1.3 --- Authentication --- p.8 / Chapter 2.2 --- Elliptic curve cryptography --- p.9 / Chapter 2.2.1 --- Mathematical background for Elliptic curve cryptography --- p.10 / Chapter 2.3 --- Pseudorandom number generator --- p.12 / Chapter 2.3.1 --- Linear Congruential Generator --- p.13 / Chapter 2.3.2 --- Inversive Congruential Generator --- p.13 / Chapter 2.3.3 --- PN-sequence generator --- p.14 / Chapter 2.4 --- Digital Signature Scheme --- p.14 / Chapter 2.5 --- Babai's lattice vector algorithm --- p.16 / Chapter 2.5.1 --- First Algorithm: Rounding Off --- p.17 / Chapter 2.5.2 --- Second Algorithm: Nearest Plane --- p.17 / Chapter 3 --- Several Digital Signature Schemes --- p.18 / Chapter 3.1 --- DSA --- p.19 / Chapter 3.2 --- Nyberg-Rueppel Digital Signature --- p.21 / Chapter 3.3 --- EC.DSA --- p.23 / Chapter 3.4 --- EC-Nyberg-Rueppel Digital Signature Scheme --- p.26 / Chapter 4 --- Miscellaneous Digital Signature Schemes and their PRNG --- p.29 / Chapter 4.1 --- DSA with LCG --- p.30 / Chapter 4.2 --- DSA with PN-sequence --- p.33 / Chapter 4.2.1 --- Solution --- p.35 / Chapter 4.3 --- DSA with ICG --- p.39 / Chapter 4.3.1 --- Solution --- p.40 / Chapter 4.4 --- EC_DSA with PN-sequence --- p.43 / Chapter 4.4.1 --- Solution --- p.44 / Chapter 4.5 --- EC一DSA with LCG --- p.45 / Chapter 4.5.1 --- Solution --- p.46 / Chapter 4.6 --- EC-DSA with ICG --- p.46 / Chapter 4.6.1 --- Solution --- p.47 / Chapter 4.7 --- Nyberg-Rueppel Digital Signature with PN-sequence --- p.48 / Chapter 4.7.1 --- Solution --- p.49 / Chapter 4.8 --- Nyberg-Rueppel Digital Signature with LCG --- p.50 / Chapter 4.8.1 --- Solution --- p.50 / Chapter 4.9 --- Nyberg-Rueppel Digital Signature with ICG --- p.51 / Chapter 4.9.1 --- Solution --- p.52 / Chapter 4.10 --- EC- Nyberg-Rueppel Digital Signature with LCG --- p.53 / Chapter 4.10.1 --- Solution --- p.54 / Chapter 4.11 --- EC- Nyberg-Rueppel Digital Signature with PN-sequence --- p.55 / Chapter 4.11.1 --- Solution --- p.56 / Chapter 4.12 --- EC-Nyberg-Rueppel Digital Signature with ICG --- p.56 / Chapter 4.12.1 --- Solution --- p.57 / Chapter 5 --- Conclusion --- p.59 / Bibliography --- p.61

Page generated in 0.123 seconds