• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • 1
  • 1
  • Tagged with
  • 4
  • 4
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

A random jitter RMS measurement method using AND and OR operations

Lee, Jae Wook, 1972- 21 September 2010 (has links)
Jitter is defined as timing uncertainties of digital signals at their intended ideal positions in time. While it undermines valuable clock budget and limits the maximum clock frequency in I/O circuitry, it is one of the most difficult parameters to measure accurately due to the small value and randomness. This thesis proposes a random jitter RMS measurement method using AND and OR operations, which targets BIST applications. This thesis is organized as follows. Chapter 1 introduces the motivation of the proposed work. It includes a comparison between two major approaches to jitter measurement. Chapter 2 explains the proposed random jitter estimation method in detail. Chapter 3 describes circuit implementations with design considerations. Chapter 4 demonstrates estimation results from circuit level simulation runs. Chapter 5 discusses the source of error in the jitter estimation and concludes. / text
2

A Study of Managerial Competencies Training Effectiveness of Supervisory Management.

Yang, Ya-Lan 13 July 2009 (has links)
Since global economy is getting worse for two years, the banking industry is much worse than any other industry especially. Human capital becomes the strength of companies for surviving. In addition, it is a challenge for companies to train and retain the talents depending upon limited resources and fund. However, it is a critical issue to evaluate whether training programs work and raise the organization performance. Therefore, we are going to discuss if the performance of supervisor is improved after the supervisors took the training programs of management competency. This research method is based on questionnaires. According to the result, trainees satisfied with the settlement of courses. Moreover, direct managers are satisfied with the improvement of performance of those supervisors who took the training courses. Within the dimensions, we found that the performance of communication improved the most. Supervisors play an intermediate role to facilitate the performance of corporations. The improvement of communication can help the performance of supervisors. Additionally, the ability of communication is an important trait for supervisors to get promoted. The research result follows the research hypothesis. The results show that the satisfaction of training course settlement has obvious positive influence on effectiveness of management competency. The Gamma is .33(P<.05). The results show that it is effective for companies raise management abilities of employees by spending time and money in training programs.
3

A Novel Authenticity of an Image Using Visual Cryptography

Koshta, Prashant Kumar, Thakur, Shailendra Singh 01 April 2012 (has links)
Information security in the present era is becoming very important in communication and data storage. Data transferred from one party to another over an insecure channel (e.g., Internet) can be protected by cryptography. The encrypting technologies of traditional and modern cryptography are usually used to avoid the message from being disclosed. Public-key cryptography usually uses complex mathematical computations to scramble the message. / A digital signature is an important public-key primitive that performs the function of conventional handwritten signatures for entity authentication, data integrity, and non-repudiation, especially within the electronic commerce environment. Currently, most conventional digital signature schemes are based on mathematical hard problems. These mathematical algorithms require computers to perform the heavy and complex computations to generate and verify the keys and signatures. In 1995, Naor and Shamir proposed a visual cryptography (VC) for binary images. VC has high security and requires simple computations. The purpose of this thesis is to provide an alternative to the current digital signature technology. We introduce a new digital signature scheme based on the concept of a non-expansion visual cryptography. A visual digital signature scheme is a method to enable visual verification of the authenticity of an image in an insecure environment without the need to perform any complex computations. We proposed scheme generates visual shares and manipulates them using the simple Boolean operations OR rather than generating and computing large and long random integer values as in the conventional digital signature schemes currently in use.
4

Robuste Produktionsprogrammplanung in der hierarchischen Produktionsplanung für in der Industrie eingesetzte operative Produktionsplanungen und -steuerungen

Englberger, Julian 10 October 2014 (has links)
Dieser Beitrag basiert auf einer Planungshierarchie zur Produktionsplanung und -steuerung, die üblicherweise in der industriellen Praxis verwendet wird. In der Produktionsprogrammplanung werden meist deterministische Planungsparameter unterstellt. Tatsächlich sind insbesondere die Bedarfe zum Planungszeitpunkt nicht bekannt und somit unsicher. Zur Berücksichtigung dieser Unsicherheit wird in der aktuellen Forschung insbesondere die szenariobasierte robuste Optimierung verwendet. In diesem Forschungsvorhaben wird untersucht, wie eine robuste Produktionsprogrammplanung in einer solchen Planungshierarchie eingesetzt werden kann.

Page generated in 0.1121 seconds