• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 1800
  • 665
  • 324
  • 317
  • 106
  • 85
  • 71
  • 55
  • 23
  • 21
  • 17
  • 12
  • 11
  • 10
  • Tagged with
  • 622
  • 220
  • 197
  • 160
  • 138
  • 128
  • 125
  • 123
  • 118
  • 114
  • 113
  • 113
  • 111
  • 109
  • 106
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
61

Performance of Product Codes Based on Chinese Remainder Theorem Codes / 以孫子定理碼構成的乘積碼之性能

Wong Yiew Gin, 黃耀進 January 2002 (has links)
碩士 / 國立交通大學 / 電信工程系 / 90 / Residue number systems and redundant residue number systems (RRNS) codes are derived and developed from the the Chinese Remainder Theorem (CRT). RRNS codes are thus also known as CRT codes. The purpose of this thesis is to examine the performance of product codes based on CRT codes. An (n,k) RRNS code is a maximum-minimum distance block code therefore possesses the same distance property as that of Reed-Solomom (RS) codes, yielding a t=(n-k)/2 error-correcting capability. As the code length of an RRNS code can be adaptively adjusted, it is suitable for use in applications that require incremental redundancy. We investigate some issues concerning the design of RRNS-based product codes. Because of the nature of RRNS codes, two different symbol mapping methods are considered, resulting in systematic and nonsystematic RRNS codes. To improve the performance, erasure decoding is also investigated in this thesis. The performance of product RRNS codes is evaluated by computer simulation under AWGN and flat Rayleigh fading. Some analytic performance bounds are also computed and compared with the simulated results. Finally we suggest some practical and efficient decoder design rules based on our findings.
62

Color Image Sharing by Chinese Remainder Theorem / 以中國餘式定理實作彩色影像分享

Hsieh, Pei-Yang, 謝沛洋 January 2014 (has links)
碩士 / 國立清華大學 / 資訊系統與應用研究所 / 102 / Due to the fast growth of information technology, we can get plenty of information over the Internet in time. However, some secret information cannot be released in public. Thus, information security plays an important role. A (k, n) threshold scheme for secret image sharing might be a useful method to protect a secret image. It distributes a secret image to n shadow images preserved by n participants. If we collect at least k shadow images, we can reveal the secret image. Fewer than k shadow images cannot reveal the secret image. In this thesis, based on Ulutas’s scheme [Ulut2009], we implement a useful image sharing and revealing system which uses color image as secret image and Chinese remainder theorem to reveal the secret image. The proposed method needs a necessary image to ensure that we can reveal the lossless secret image. However, if we do not use the necessary image, we can still reveal the distortion image with only the difference of the least significant bit. In the experimental results, we demonstrate the PSNR value between an original image and the revealed image is over 50 dB. It shows that the proposed approach is a simple but efficient secret image sharing approach.
63

Image Sharing Schemes based upon Chinese Remainder Theorem / 基於中國餘式定理的影像分享機制

Chun-Chieh Chuang, 莊竣傑 January 2009 (has links)
碩士 / 臺北市立教育大學 / 資訊科學系碩士班 / 97 / Most secret image sharing schemes produce shadows with an equal size including the well known Shamir’s and Thien-Lin’s approaches that are based upon polynomial interpolation. In this paper we design a novel threshold secret image scheme using Chinese remainder theorem, which generates shadows with different sizes. To share an image secretly among n participants, our scheme depends on a set of n pre-determined relative prime moduli to encode the image into n shadows by Chinese remainder theorem which are distributed to the n participants such that every group of r participants could recover the image by using their shadows and moduli, while any group of less than r participants cannot. Owing to the design that a shadow is a collection of the remainders of its corresponding modulus in our scheme, the size of the shadow is dependent on that of the modulus. As compared to those conventional secret image sharing schemes that produce shadows with the same size, our scheme is more flexible due to the reason that by choosing a proper set of relative prime moduli the dealer is able to generate and distribute shadows with different sizes to the participants according to their degrees of importance.
64

A key-lock-pair mechanism based on generalized Chinese remainder theorem / 以廣義中國餘數定理為基礎的鍵鎖對技術

CHEN, CHANG-PU, 陳長樸 January 1986 (has links)
碩士 / 國立中興大學 / 應用數學研究所 / 74 /
65

A Chinese Remainder Theorem based CDN-P2P Video-On-Demand System / 基於中國餘式定理的 CDN-P2P 隨選視訊系統

Chen-Hui Chung, 鍾珍慧 January 2013 (has links)
碩士 / 國立中央大學 / 資訊工程學系 / 101 / In recent years, IPTV service has been popular with the growth of broadband networks. More and more content providers and service providers try to provide their own IPTV services to their users with copyright content. To prevent copyright protected videos from illegal users watching, legal users must install set-top box or media player which is provided by the service provider. Neither installing set-top box takes lots of time and cost nor most of videos played by specific media player cause the leakage path which violate copyright protection. How to provide a safer environment for content service providers and how to save cost and time in installing set-up box are the two main issues in this paper. In this paper, we try to provide an environment with Chinese Remainder Theorem based group key management and linear Network coding to solve the illegal watching problems. And we also verify the videos can only been watched by legal users. After the experiment results, we discuss the advantage of the proposed system that service provider only need to control a few sub-chunks of video to prevent from illegal watching behavior.
66

Forward Error Correction Codes Based on Chinese Remainder Theorem / 基於中國餘式定理之前向錯誤更正碼

洪裕翔 January 2010 (has links)
碩士 / 國立清華大學 / 資訊工程學系 / 98
67

An Investigation of Appraisal Method on The Remainder of partial takings in eminent domain cases / 土地徵收剩餘地個案估價方法之探討

Tung-Jung Chiang,, 江東融 January 2016 (has links)
碩士 / 逢甲大學 / 土地管理所 / 104 / 申請專利中 暫不公開
68

Image Sharing and Recovering Based on Chinese Remainder Theorem / 基於中國餘式定理的影像分享及還原

Chien, Yu Ling, 簡鈺玲 January 2016 (has links)
碩士 / 國立清華大學 / 資訊系統與應用研究所 / 104 / According to the success of the Internet, Information security becomes an important issue to the human beings. To avoid the information is carried by only a single individual, how to share the secret information to the participants would be an important subject. According to the (k,n)-threshold scheme, the data are partitioned into n shadows which are distributed to n participants. By collecting at least k out of n shadows, we can completely recover the original data. Otherwise, we could not recover the original data. We propose a new method to improve the implementation method of Ulutas [Ulut2009] based on Chinese remainder theorem in this thesis. The advantage of our method in this thesis is that we not only simplify the method, but also guarantee the recovered image would not get distorted. Experiments for three color images are provided for demonstration.
69

O Brasil e o "brasileiro" em O primo Basílio : análise sobre Basílio de Brito

Razera, Gisélle January 2016 (has links)
Esta tese é resultado de um estudo sobre O Primo Basílio (1978) que estabelece a composição da personagem Basílio de Brito como centro da investigação. A leitura deste romance evidencia uma série de lacunas e, no intuito de preencher as mais ligadas a Basílio, buscou-se resgatar o panorama histórico de onde Eça de Queirós colheu informações para dar movimento à trama em que essa figura atua, efetuando-se, assim, uma engenharia reversa. É premissa deste trabalho que o romance queirosiano de adultério – sem negligenciar o estatuto ficcional – contém informações que comunicam fatos da história de Portugal e do Brasil, as quais estão acomodadas em camada subjacente do texto devido ao afastamento temporal da época em que foi escrito. O ponto de partida das pesquisas aqui apresentadas foi um dado do romance sobre o qual não foram encontrados estudos: Basílio acumulou fortuna no Brasil no mercado de ações ligado aos negócios da borracha do alto Paraguai. A partir dessa informação, foram investigadas as condições econômicas luso-brasileiras da segunda metade do Oitocentos, incluindo um estudo detalhado sobre a emigração portuguesa para o Brasil e também sobre o imaginário de Eldorado associado à antiga América Portuguesa. Objetivou-se discutir as escolhas autorais de Eça de Queirós que o levaram a atribuir caracteres a Basílio não usuais na representação de outros torna-viagem (“brasileiros”) da dramaturgia e da literatura produzida em Portugal no século XIX. Essa discussão evidenciou que Basílio foi criado segundo um modelo de representação francês, uma vez que a abordagem de Eça de Queirós situa os dilemas socioeconômicos portugueses em um contexto mais abrangente, não limitado à histórica inter-relação entre Portugal e Brasil. Além disso, apresenta uma chave de leitura distanciada daquelas que costumam enquadrar a atuação de Basílio apenas como o pivô da ruína de um matrimônio burguês. / This thesis, which is the outcome of a study about the book O Primo Basílio (1978), centers its inquiry at the constitution of the character Basílio de Brito. The reading of this novel distinctly shows a series of gaps, and, in order to fill the ones closer to Basílio, it became paramount to research the historical background from which Eça de Queirós gathered the information to move forward the plot in which the character acts, thus, bringing about a reverse engineering. It is the premise of this work that Queirós´s novel of adultery – without neglecting the fictional statute - contains information that communicate historical facts about Portugal and Brazil, which are placed at the underlying level of the text, due to the chronological distancing at the time it has been written. The starting point of the presented researches has been a data from the novel about which no studies have been found: Basílio built a fortune in the Brazilian stock market of rubber at the upper Paraguay region. Starting with this information, the economic conditions of Portugal and Brazil during the second half of the 1800s were investigated, including a thorough study about Portuguese emigration to Brazil, and about the imaginary of Eldorado associated to the ancient Portuguese America. The goal was to discuss Eça´s writing choices that made him give Basílio unusual traits in the representation of other remainders – “Brazilians” – in Portuguese Drama and Literature of the 19th Century. This discussion made clear that Basílio was created in accordance with a French representation model, since Eça de Queirós´s approach places the Portuguese socioeconomic dilemmas in a broader context, not limited to the historical inter-relation between Portugal and Brazil. Besides, it opens a key for reading distanced from the ones that frame Basílio´s role solely as the pivot of the ruin of a bourgeois matrimony.
70

Divisão euclidiana : um olhar para o resto

Soppelsa, Janete Jacinta Carrer January 2016 (has links)
Este trabalho estuda a possibilidade de se aprofundar o conceito de divisão Euclidiana, no Ensino Fundamental, de modo a evidenciar a relevância e o significado para o resto. Oferece algumas considerações sobre a divisão, além de uma análise de vários livros didáticos, dissertações de mestrado e tese de doutorado sobre o tema. Apresenta uma proposta didática baseada nos Registros de Representação Semiótica, de Raymond Duval e nos Cenários para Investigação, de Ole Skovsmose. Essa proposta foi implementada e validada em uma turma do 7º Ano de uma escola municipal de Garibaldi, RS. A análise dos registros coletados e dos diálogos estabelecidos mostra que a sequência didática foi bem sucedida tanto nos avanços logrados pelos alunos na compreensão dos conteúdos, quanto no engajamento com a proposta, levantamento de hipóteses, elaboração de conclusões e justificativas. / In this work we study the possibility of enhancing the Euclidian division concept in high school level in order to evidence the relevance and meaning to the remainder. We offer some considerations about the division, beyond of an analysis of various text books, Masters degree dissertations and Ph.D theses related to this subject. We present a didactic proposal based on Raymond Duval’s Registers of Semiotic Representation and Ole Skovsmose’s Investigation Scenarios. This proposal was implemented and validated with a 7th year class of a municipal school in Garibaldi, RS. The analysis of the collected data and actual dialogs show that the didactic sequence was successful regarding the contents comprehension advancement obtained by the students as well as the participation with the proposal, the confection of hypotheses and the elaboration of conclusions and justifications.

Page generated in 0.13 seconds