Browse Source

refactor: clean up image extensions

develop
Ezerous 3 years ago
parent
commit
d8dd5c97e8
  1. 4
      chapters/2.theoretical-background/2.1.hash-functions.tex
  2. 4
      chapters/2.theoretical-background/2.2.asymmetric-cryptography.tex
  3. 2
      chapters/2.theoretical-background/2.3.merkle-trees.tex
  4. 2
      chapters/2.theoretical-background/2.7.ipfs.tex
  5. 2
      chapters/3.application-design/3.8.implementation-methodology-specification.tex
  6. 2
      chapters/4.application-implementation/4.1.implementation-methodology.tex
  7. 2
      chapters/4.application-implementation/4.3.implementation-architecture.tex
  8. 2
      chapters/4.application-implementation/4.3.implementation-architecture/4.3.2.concordia-application-service.tex
  9. 2
      chapters/4.application-implementation/4.3.implementation-architecture/4.3.3.concordia-contracts-migrator.tex
  10. 2
      chapters/4.application-implementation/4.3.implementation-architecture/4.3.4.concordia-pinner-service.tex
  11. 2
      chapters/4.application-implementation/4.3.implementation-architecture/4.3.8.service-communication.tex
  12. 2
      chapters/4.application-implementation/4.5.implemented-parts.tex
  13. 2
      misc/title-page.tex
  14. BIN
      thesis.pdf

4
chapters/2.theoretical-background/2.1.hash-functions.tex

@ -4,7 +4,7 @@
\begin{figure}[H]
\centering
\includegraphics[width=.9\textwidth]{assets/figures/chapter-2/2.1.hash-functions-1.png}
\includegraphics[width=.9\textwidth]{assets/figures/chapter-2/2.1.hash-functions-1}
\caption{Λειτουργία συνάρτησης κατακερματισμού}
\end{figure}
@ -19,7 +19,7 @@
\begin{figure}[H]
\centering
\includegraphics[width=.9\textwidth]{assets/figures/chapter-2/2.1.hash-functions-2.png}
\includegraphics[width=.9\textwidth]{assets/figures/chapter-2/2.1.hash-functions-2}
\caption{Παράδειγμα λειτουργίας συνάρτησης κατακερματισμού}
\end{figure}

4
chapters/2.theoretical-background/2.2.asymmetric-cryptography.tex

@ -11,7 +11,7 @@
\begin{figure}[H]
\centering
\includegraphics[width=.95\textwidth]{assets/figures/chapter-2/2.2.asymmetric-key-generation.png}
\includegraphics[width=.95\textwidth]{assets/figures/chapter-2/2.2.asymmetric-key-generation}
\caption{Παραγωγή ασύμμετρου ζεύγους κλειδιών}
\end{figure}
@ -30,7 +30,7 @@
\begin{figure}[H]
\centering
\includegraphics[width=.95\textwidth]{assets/figures/chapter-2/2.2.asymmetric-end-to-end-communication.png}
\includegraphics[width=.95\textwidth]{assets/figures/chapter-2/2.2.asymmetric-end-to-end-communication}
\caption{Κρυπτογράφηση απ' άκρη σ' άκρη}
\end{figure}

2
chapters/2.theoretical-background/2.3.merkle-trees.tex

@ -6,7 +6,7 @@
\begin{figure}[H]
\centering
\includegraphics[width=.85\textwidth]{assets/figures/chapter-2/2.3.merkle-tree.png}
\includegraphics[width=.85\textwidth]{assets/figures/chapter-2/2.3.merkle-tree}
\caption{Παράδειγμα δυαδικού δένδρου Merkle}
\end{figure}

2
chapters/2.theoretical-background/2.7.ipfs.tex

@ -13,7 +13,7 @@
\vspace{-\baselineskip}
\begin{enumitemcenteredfigure}
\includegraphics[width=\textwidth]{assets/figures/chapter-2/2.7.merkle-dag.png}
\includegraphics[width=\textwidth]{assets/figures/chapter-2/2.7.merkle-dag}
\caption[Παράδειγμα Merkle DAG]{Παράδειγμα Merkle DAG\footnotemark}
\end{enumitemcenteredfigure}
\vspace{-\baselineskip}

2
chapters/3.application-design/3.8.implementation-methodology-specification.tex

@ -21,7 +21,7 @@
\begin{figure}[H]
\centering
\includegraphics[width=\textwidth]{assets/figures/chapter-3/3.8.implementation-methodology-specification-sprints.png}
\includegraphics[width=\textwidth]{assets/figures/chapter-3/3.8.implementation-methodology-specification-sprints}
\caption{Διαχωρισμός σε Sprint (στάδιο σχεδίασης)}
\label{figure:3.8.implementation-methodology-specification-sprints}
\end{figure}

2
chapters/4.application-implementation/4.1.implementation-methodology.tex

@ -28,7 +28,7 @@
\begin{figure}[H]
\centering
\includegraphics[width=\textwidth]{assets/figures/chapter-4/4.1.implementation-methodology-kanban.png}
\includegraphics[width=\textwidth]{assets/figures/chapter-4/4.1.implementation-methodology-kanban}
\caption{Στιγμιότυπο οθόνης της διαδικτυακής υπηρεσίας Trello}
\label{figure:4.1.implementation-methodology-kanban}
\end{figure}

2
chapters/4.application-implementation/4.3.implementation-architecture.tex

@ -51,7 +51,7 @@
\begin{figure}[H]
\centering
\includegraphics[width=\textwidth]{assets/figures/chapter-4/4.3.architecture-architecture-overview.png}
\includegraphics[width=\textwidth]{assets/figures/chapter-4/4.3.architecture-architecture-overview}
\caption{Διάγραμμα αρχιτεκτονικής συστήματος}
\label{figure:4-3-architecture-overview}
\end{figure}

2
chapters/4.application-implementation/4.3.implementation-architecture/4.3.2.concordia-application-service.tex

@ -33,7 +33,7 @@
\begin{figure}[H]
\centering
\includegraphics[width=.9\textwidth]{assets/figures/chapter-4/4.3.architecture-4.3.2.concordia-application-architecture.png}
\includegraphics[width=.9\textwidth]{assets/figures/chapter-4/4.3.architecture-4.3.2.concordia-application-architecture}
\caption{Αρχιτεκτονική υπηρεσίας Concordia Application}
\label{figure:4-3-concordia-application-architecture}
\end{figure}

2
chapters/4.application-implementation/4.3.implementation-architecture/4.3.3.concordia-contracts-migrator.tex

@ -8,7 +8,7 @@
\begin{figure}[H]
\centering
\includegraphics[width=.75\textwidth]{assets/figures/chapter-4/4.3.architecture-4.3.3.concordia-contracts-migrator-architecture.png}
\includegraphics[width=.75\textwidth]{assets/figures/chapter-4/4.3.architecture-4.3.3.concordia-contracts-migrator-architecture}
\caption{Αρχιτεκτονική υπηρεσίας Concordia Contracts Migrator}
\label{figure:4-3-concordia-contracts-migrator-architecture}
\end{figure}

2
chapters/4.application-implementation/4.3.implementation-architecture/4.3.4.concordia-pinner-service.tex

@ -8,7 +8,7 @@
\begin{figure}[H]
\centering
\includegraphics[width=.75\textwidth]{assets/figures/chapter-4/4.3.architecture-4.3.4.concordia-pinner-architecture.png}
\includegraphics[width=.75\textwidth]{assets/figures/chapter-4/4.3.architecture-4.3.4.concordia-pinner-architecture}
\caption{Αρχιτεκτονική υπηρεσίας Concordia Pinner}
\label{figure:4-3-concordia-pinner-architecture}
\end{figure}

2
chapters/4.application-implementation/4.3.implementation-architecture/4.3.8.service-communication.tex

@ -6,7 +6,7 @@
\begin{figure}[H]
\centering
\includegraphics[width=\textwidth]{assets/figures/chapter-4/4.3.communications-diagram.png}
\includegraphics[width=\textwidth]{assets/figures/chapter-4/4.3.communications-diagram}
\caption{Γράφος οπτικοποίησης των καναλιών επικοινωνίας των μικροϋπηρεσιών}
\label{figure:4-3-communications-graph}
\end{figure}

2
chapters/4.application-implementation/4.5.implemented-parts.tex

@ -41,7 +41,7 @@
\begin{figure}[H]
\centering
\includegraphics[width=\textwidth]{assets/figures/chapter-4/4.6.design-implementation-differences-sprints.png}
\includegraphics[width=\textwidth]{assets/figures/chapter-4/4.6.design-implementation-differences-sprints}
\caption{Διαχωρισμός σε Sprint (στάδιο υλοποίησης)}
\label{figure:4.5.design-implementation-differences-sprints}
\end{figure}

2
misc/title-page.tex

@ -1,4 +1,4 @@
\universityLogo{assets/figures/auth-logo.png}
\universityLogo{assets/figures/auth-logo}
\title{Αυτόνομο κοινωνικό δίκτυο βασισμένο σε τεχνολογίες αποκέντρωσης}

BIN
thesis.pdf

Binary file not shown.
Loading…
Cancel
Save