• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 119
  • 8
  • 8
  • 2
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 157
  • 81
  • 80
  • 79
  • 57
  • 53
  • 45
  • 44
  • 32
  • 31
  • 18
  • 16
  • 16
  • 15
  • 13
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

Pixellated, textured, heaped space: a design forum

Wong, Kai-ho, Kenneth., 王啓豪. January 2002 (has links)
published_or_final_version / Architecture / Master / Master of Architecture
52

MTV Asia headquarters

Creighton, Chie-wei, Eve., 林綺薇. January 1996 (has links)
published_or_final_version / Architecture / Master / Master of Architecture
53

The urban environmental park

Chan, Chi-keong, Johnson, 陳志強 January 1995 (has links)
published_or_final_version / Architecture / Master / Master of Architecture
54

Improving pedestrian connectivity in Tsim Sha Tsui

葉偉林, Yip, Wai-lam, William. January 2002 (has links)
published_or_final_version / Urban Design / Master / Master of Urban Design
55

Hong Kong international port terminal

Kwan, Kit-ling, Xenia., 關潔玲. January 1998 (has links)
published_or_final_version / Architecture / Master / Master of Architecture
56

[Cine + Scene]-ic City in Tsim Sha Tsui

Lee, Ka-kuen, Chris. January 1998 (has links)
published_or_final_version / Architecture / Master / Master of Architecture
57

The relationship between ilm and khabar in the work of al-Shafii

Shukri, Abdul Salam Muhammad January 1999 (has links)
This study examines in detail the basis of al-Shafi`i's arguments for the supremacy of oral tradition over communal legal practice. It concentrates on one broad issue, the definition of `ilm (knowledge) and one technical issue, the problem of authenticating a particular khabar (oral tradition or report, plural akhbar, ) and its binding nature, especially a report of the category known as the specialists' report (khabar al-khassa). On the first issue, this study examines the concept of knowledge based on reports (`ilm al-khabar) because it had an important influence on al-Shafi`i. This is followed by a detailed account of al-Shafi`i's own discussion of `ilm. It brings out clearly that al-Shafi`i means religious law when discussing `ilm. It also shows how knowledge of religious law can be obtained. Al-Shafi`i's approach is to restrict the argument to knowledge of specialised and debatable points, rather than what is generally accepted. He seeks to prove the indispensability in this area of specialists' knowledge of reliable documentation external to the law itself. The following chapter deals with the question of authenticating a khabar from the Prophet (a hadith), not as purely technical question but within a polemical context in which the practical difficulty of authenticating a khabar was used by those opposed to the intellectual dominance of oral tradition as a reason not to use the khabar. In the final chapter al- Shaf i's arguments with two identifiable schools of opposing thought, ahl al-kaläm and ahl al-figh, are examined in detail. The thesis as a whole gives a significant insight into the efficacy and durability of al-Shafi`i's arguments, not so much by defeating his opponents' arguments but by buttressing those of the defenders and advocates of oral tradition.
58

The feasibility of enhancing transport coordination between railway and bus operations in Tsim Sha Tsui

Chung, Chor-mei., 鍾楚媚. January 2000 (has links)
published_or_final_version / Transport Policy and Planning / Master / Master of Arts
59

Analyse et conception de fonctions de hachage cryptographiques

Manuel, Stéphane 23 November 2010 (has links) (PDF)
Une fonction de hachage est une fonction prenant comme argument un élément de taille arbitraire finie et renvoyant un élément de longueur fixée. Il existe différents types de fonctions de hachage qui correspondent à autant de domaines d'utilisation. Parmi ces fonctions, les fonctions de hachage cryptographiques se distinguent par la variété des missions qui leur sont confiées et par l'exigence qui leur est faîte de respecter de nombreux impératifs de sécurité. Les fonctions de hachage cryptographiques les plus utilisées en pratiques appartiennent à la famille MD-SHA, dont les membres les plus connus sont les fonctions MD5 et SHA-1. Durant ces dernières années, de nouvelles techniques de crytptanalyses ont fait leur apparition. Ces techniques, bien que très complexes, se sont montrés si efficaces qu'elles ont conduit à l'abandon de l'utilisation des fonctions MD5 et SHA-1, et à l'ouverture d'une compétition internationale pour le développement d'un nouvel algorithme de hachage cryptographique. Les travaux de recherche que nous avons menés dans le cadre de cette thèse s'inscrivent à la fois dans une démarche d'analyse et de conception. Nous étudions les nouvelles avancées dans la cryptanalyse des fonctions de hachage, et plus particulièrement leurs mise en oeuvre dans le cadre des fonctions SHA-0 et SHA-1. Nous présentons à ce titre la meilleure attaque pratique connue à ce jour contre SHA-0 et proposons la première classification des vecteurs de perturbations utilisés par les attaques par collision contre la fonction SHA-1. Nous abordons ensuite la conception de nouvelle fonctions par le biais des fonction XOR-Hash et FSB.
60

Statistinė SHA-3 konkurso maišos funkcijų analizė / Statistical analysis of hash functions from sha-3 competition

Orvidaitė, Halina 04 July 2014 (has links)
Pagrindinis magistro baigiamojo darbo tikslas buvo, pasinaudojant NIST SHA-3 maišos algoritmų kompresijos funkcijomis, sukurti pseudo-atsitiktinių skaičių generatorių ir atliktų juo sugeneruotų sekų statistinius testus. Darbo metu surinkau pagrindinę teorinę bazę, reikalingą, norint susipaţinti su naujosiomis SHA-3 maišos funkcijomis bei NIST pateikiamu statistinių testų paketu. Detaliai išanalizavau algoritmus, kurie šiuo metu yra maišos funkcijų standartai, ir kurių savybių tenkinimas yra minimalus reikalavimas SHA-3 algoritmų kandidatams. Detaliai pristačiau kiekvieną iš penkių finalinių SHA-3 algoritmų, testavimo algoritmus, kurie yra pateikti statistinių testų pakete: aptariau jų idėją ir tikslą, pateikiamus įvesties kintamuosius, atliekamus algoritmų ţingsnius, reikalavimus funkcijoms paduodamiems kintamiesiems bei gautų rezultatų interpretavimo aspektus. Taip pat pristačiau sugalvotą pseudo-atsitiktinių skaičių generatoriaus algoritmą ir jo Java realizaciją. Sugeneravus testinių duomenų paketą, jį įvertinau NIST statistinių testų pagalba. / The main aim of my final master paper work was to gather theoretical basis, which provides description of cryptology and it‘s elements, valid hash function standards and NIST competition for SHA-3. During my studies I’ve gathered needed information to understand hash algorithms which are represented by five finalists of NIST SHA-3 competition. I’ve analyzed algorithms of current hash function standards and main requirements participants must fulfil in order to become a winner of a competition in detail. I’ve represented each SHA-3 finalist’s function with deep analysis. Also I’ve gathered theoretical basis, which provides description of US National Institute of Standards and Technology created Statistical Test Suite. This statistical test suite is testing binary streams generated by random or pseudorandom number generators. I have given a detailed description of algorithms in given statistical suite: I have provided the main idea and aim of those tests, variables used for input, steps of those algorithms, requirements for input data and possible interpretation of results. Also I’ve introduced an algorithm of pseudorandom numbers generator and have given its’ realization in Java. Finally I’ve created a test data suite and have assessed it with NIST provided statistical test suite.

Page generated in 0.0296 seconds