111 |
A Java Framework for Broadcast Encryption Algorithms / Ett ramverk i Java för prestandatest av broadcast-krypteringsalgoritmerHesselius, Tobias, Savela, Tommy January 2004 (has links)
<p>Broadcast encryption is a fairly new area in cryptology. It was first addressed in 1992, and the research in this area has been large ever since. In short, broadcast encryption is used for efficient and secure broadcasting to an authorized group of users. This group can change dynamically, and in some cases only one-way communication between the sender and receivers is available. An example of this is digital TV transmissions via satellite, in which only the paying customers can decrypt and view the broadcast. </p><p>The purpose of this thesis is to develop a general Java framework for implementation and performance analysis of broadcast encryption algorithms. In addition to the actual framework a few of the most common broadcast encryption algorithms (Complete Subtree, Subset Difference, and the Logical Key Hierarchy scheme) have been implemented in the system. </p><p>This master’s thesis project was defined by and carried out at the Information Theory division at the Department of Electrical Engineering (ISY), Linköping Institute of Technology, during the first half of 2004.</p>
|
112 |
Investigation and implementation of data transmission look-ahead D flip-flopsYongyi, Yuan January 2004 (has links)
<p>This thesis investigates four D flip-flops with data transmission look-ahead circuits. Based on logical effort and power-delay products to resize all the transistor widths along the critical path in µm CMOS technology. The main goal is to verify and proof this kind of circuits can be used when the input data have low switching probabilities. From comparing the average energy consumption between the normal D flip-flops and D flip-flops with look-ahead circuits, D flip-flops with look-ahead circuits consume less power when the data switching activities are low.</p>
|
113 |
The Applicability of LFA on Development Projects in PeruGustafson Backman, Jenny January 2004 (has links)
<p>A1302</p><p>Introduction: Peru is a country that is undergoing a process of democratic transformation. Local and international development agencies are established in Peru in order to support this process. In the last decade, there has been an encouragement for these agencies to use strategic management in their project work. The Logical Framework Approach (LFA) is an objective-oriented approach that has become widely employed for the planning, implementation and evaluation of development projects. The so called “vertical logic” of the LFA, rests on the assumption that project stakeholders can predetermine and agree on how certain activities will lead to the accomplishment of a hierarchy of formally stated goals.</p><p>Purpose: The purpose of this thesis is to analyze the applicability of the vertical logic of LFA on development projects in Peru.</p><p>Theoretical framework: The theoretical framework of this paper is based on theories and arguments raised for and against Management By Objectives (MBO) from which the LFA originates. In addition, the special features of the development sector are discussed in regard to this rational goal approach.</p><p>Method: This paper has been carried out as a Minor Field Study (MFS) in Peru where representatives of local as well as international development agencies have been interviewed.</p><p>Empirical findings and Analysis: This paper highlights the special characteristics of development work in Peru. Projects are typically large with abstract, complex goals and multiple stakeholders. In addition, they are carried out in an environment typified by significant instability and change. These characteristics potentially make some of the features inherent in the vertical logic of LFA, such as strict planning and goal congruency, unrealistic. This potentially limits its usefulness as a strategic management tool.</p>
|
114 |
Strategic brand management in a growing and innovative specialty chemical industry / by H.S. SteenekampSteenekamp, Hendrik Stephanus January 2008 (has links)
Thesis (M.B.A.)--North-West University, Potchefstroom Campus, 2009.
|
115 |
A Model for Managing Data IntegrityMallur, Vikram 22 September 2011 (has links)
Consistent, accurate and timely data are essential to the functioning of a modern organization. Managing the integrity of an organization’s data assets in a systematic manner is a challenging task in the face of continuous update, transformation and processing to support business operations. Classic approaches to constraint-based integrity focus on logical consistency within a database and reject any transaction that violates consistency, but leave unresolved how to fix or manage violations. More ad hoc approaches focus on the accuracy of the data and attempt to clean data assets after the fact, using queries to flag records with potential violations and using manual efforts to repair. Neither approach satisfactorily addresses the problem from an organizational point of view.
In this thesis, we provide a conceptual model of constraint-based integrity management (CBIM) that flexibly combines both approaches in a systematic manner to provide improved integrity management. We perform a gap analysis that examines the criteria that are desirable for efficient management of data integrity. Our approach involves creating a Data Integrity Zone and an On Deck Zone in the database for separating the clean data from data that violates integrity constraints. We provide tool support for specifying constraints in a tabular form and generating triggers that flag violations of dependencies. We validate this by performing case studies on two systems used to manage healthcare data: PAL-IS and iMED-Learn. Our case studies show that using views to implement the zones does not cause any significant increase in the running time of a process.
|
116 |
Contra Chalmers : on consciousness and conceivabilityPrimmer, Jennifer-Wrae 21 July 2010
This thesis presents and evaluates David Chalmers argument that the existence of phenomenal conscious experience constitutes a permanent barrier to the reductive aspirations of a purely materialistic neuroscience. My aim is to defend the possibility of a reductive explanation of consciousness, and argue that continued research in neuroscience and neurophysiology can result in a successful materialistic or reductive solution to the hard problem of consciousness. My argument against Chalmers is two-fold. First, I challenge Chalmers claim that consciousness does not logically supervene on the physical. And second, I argue that his conceivability argument is implausible.
|
117 |
A Model for Managing Data IntegrityMallur, Vikram 22 September 2011 (has links)
Consistent, accurate and timely data are essential to the functioning of a modern organization. Managing the integrity of an organization’s data assets in a systematic manner is a challenging task in the face of continuous update, transformation and processing to support business operations. Classic approaches to constraint-based integrity focus on logical consistency within a database and reject any transaction that violates consistency, but leave unresolved how to fix or manage violations. More ad hoc approaches focus on the accuracy of the data and attempt to clean data assets after the fact, using queries to flag records with potential violations and using manual efforts to repair. Neither approach satisfactorily addresses the problem from an organizational point of view.
In this thesis, we provide a conceptual model of constraint-based integrity management (CBIM) that flexibly combines both approaches in a systematic manner to provide improved integrity management. We perform a gap analysis that examines the criteria that are desirable for efficient management of data integrity. Our approach involves creating a Data Integrity Zone and an On Deck Zone in the database for separating the clean data from data that violates integrity constraints. We provide tool support for specifying constraints in a tabular form and generating triggers that flag violations of dependencies. We validate this by performing case studies on two systems used to manage healthcare data: PAL-IS and iMED-Learn. Our case studies show that using views to implement the zones does not cause any significant increase in the running time of a process.
|
118 |
Logical connectors in efl writing: Learners' Use and InstructionMoreno Pichastor, MªCarmen 05 May 2006 (has links)
The aim of the present study was to analyse leaners’ use of logical connectors within the EFL classroom setting as well as to provide insights into the effects of instruction on their acquisition process. To this aim, two different types of instructional treatments (i.e. explicit versus implicit) were implemented on two groups of secondary school learners’ to determine progress in the use of logical connectors by comparing the two teaching approaches. The explicit instructional approach was operationalised on the basis of the principles underlying the "focus on form" paradigm providing extensive opportunities for communicative practice together with an explicit type of feedback. In contrast, the implicit one provided learners with exposure to the target items by means of reading comprehension passages and vocabulary work, with fewer opportunities for productive use of the language and an implicit type of feedback. Results showed that both types of instructional treatments proved to be beneficial for learners increasing their use of connectors in written texts. However, the approach that incorporated an explicit focus on form proved to be more effective to enhance learners’ accurate production of the target items. In addition to this, the study also focuses on task demands (free or controlled) regarding accuracy in connector use. Finally, wrong uses of connectors are analysed taking into account aspects such as function and/or type of connector in an attempt to create a taxonomy of logical connector errors. It is suggested that specific types of errors may be found within local or global discourse levels affecting learners’ discourse competence in various ways.
|
119 |
Investigation and implementation of data transmission look-ahead D flip-flopsYongyi, Yuan January 2004 (has links)
This thesis investigates four D flip-flops with data transmission look-ahead circuits. Based on logical effort and power-delay products to resize all the transistor widths along the critical path in µm CMOS technology. The main goal is to verify and proof this kind of circuits can be used when the input data have low switching probabilities. From comparing the average energy consumption between the normal D flip-flops and D flip-flops with look-ahead circuits, D flip-flops with look-ahead circuits consume less power when the data switching activities are low.
|
120 |
Contra Chalmers : on consciousness and conceivabilityPrimmer, Jennifer-Wrae 21 July 2010 (has links)
This thesis presents and evaluates David Chalmers argument that the existence of phenomenal conscious experience constitutes a permanent barrier to the reductive aspirations of a purely materialistic neuroscience. My aim is to defend the possibility of a reductive explanation of consciousness, and argue that continued research in neuroscience and neurophysiology can result in a successful materialistic or reductive solution to the hard problem of consciousness. My argument against Chalmers is two-fold. First, I challenge Chalmers claim that consciousness does not logically supervene on the physical. And second, I argue that his conceivability argument is implausible.
|
Page generated in 0.0923 seconds