Open Access. Powered by Scholars. Published by Universities.®
- Discipline
- Keyword
-
- Computer science (10)
- Algorithms (5)
- Cryptography (3)
- Applied mathematics (2)
- Approximation (2)
-
- Artificial intelligence (2)
- Decision making (2)
- Genetic algorithms (2)
- Internet (2)
- Resource allocation (2)
- Sociology (2)
- Statistics (2)
- Wireless networks (2)
- Access control (1)
- Accuracy (1)
- Assam (1)
- Bulletin boards (1)
- Candidates (1)
- Caste (1)
- Clustering (1)
- Code Division Multiple Access (1)
- Colonialism (1)
- Color (1)
- Communication (1)
- Community (1)
- Connectivity (1)
- Construction (1)
- Cranes & hoists (1)
- Datasets (1)
- Decomposition (1)
- Publication
- Publication Type
Articles 1 - 18 of 18
Full-Text Articles in Entire DC Network
Randomized Algorithms For Resource Allocation In Device To Device Communication., Subhankar Ghosal Dr.
Randomized Algorithms For Resource Allocation In Device To Device Communication., Subhankar Ghosal Dr.
Doctoral Theses
In device to device (D2D) communication, two users residing in close proximity can directly communicate between them, through a common channel, without the need of a base station. A pair of D2D users forms a link and a channel needs to be allocated to it. The interference relationship among the active links at time t is modelled as an interference graph g(t). To establish interference-free communication, we have to assign a channel vector C(t) and a power vector corresponding to the active links such that the required signal to interference plus noise ratio (SINR) is satisfied for each link. Since …
Morphological Network: Network With Morphological Neurons., Ranjan Mondal Dr.
Morphological Network: Network With Morphological Neurons., Ranjan Mondal Dr.
Doctoral Theses
Image processing with traditional approaches mainly use the tools of linear systems. However, linear approaches are not well suited and may even fail to solve problems involving geometrical aspects of the image. Thus, nonlinear geometric approaches like morphological operations are very popular in those cases. Morphological operations are nonlinear operations based on a set and lattice-theoretic methodology for image analysis that are capable of describing the geometrical structure of image objects quantitatively. It is suitable for various problems in image processing, computer vision, and pattern recognition. While solving problems with morphology, a particular structuring element is defined. Structuring elements have …
Constructions And Analyses Of Efficient Symmetric-Key Primitives For Authentication And Encryption., Sebati Ghosh Dr.
Constructions And Analyses Of Efficient Symmetric-Key Primitives For Authentication And Encryption., Sebati Ghosh Dr.
Doctoral Theses
In symmetric key cryptography there are two fundamental objectives, viz. 1. confidentiality or secrecy of message from unexpected party and 2. authentication of message which includes authenticating the source of the message as well as integrity of the message against any unwanted modification. Let us first concentrate on confidentiality. In classical symmetric key cryptography two parties, say Alice and Bob, first secretly exchange a key-pair (e, d). Later, if Alice wishes to send a secret message m ∈ M to Bob, she computes c = Ee(m) and transmits c to Bob. Upon receiving c, Bob computes Dd(c) = m and …
Computing Well-Structured Subgraphs In Geometric Intersection Graphs., Satyabrata Jana Dr.
Computing Well-Structured Subgraphs In Geometric Intersection Graphs., Satyabrata Jana Dr.
Doctoral Theses
For a set of geometric objects, the associative geometric intersection graph is the graph with a vertex for each object and an edge between two vertices if and only if the corresponding objects intersect. Geometric intersection graphs are very important due to their theoretical properties and applicability. Based on the different geometric objects, several types of geometric intersection graphs are defined. Given a graph G, an induced (either vertex or edge) subgraph H ⊆ G is said to be an well-structured subgraph if H satisfies certain properties among the vertices in H. This thesis studies some well-structured subgraphs finding problems …
Method And System For Region Proposal Based Object Recognition For Estimating Planogram Compliance, Avishek Kumar Shaw, Rajashree Ramakrishnan, Shilpa Yadukumar Rao, Pranoy Hari, Dipti Prasad Mukherjee, Bikash Santra
Method And System For Region Proposal Based Object Recognition For Estimating Planogram Compliance, Avishek Kumar Shaw, Rajashree Ramakrishnan, Shilpa Yadukumar Rao, Pranoy Hari, Dipti Prasad Mukherjee, Bikash Santra
Patents
No abstract provided.
Essays On The Economics Of Conflict., Ranajoy Guha Neogi Dr.
Essays On The Economics Of Conflict., Ranajoy Guha Neogi Dr.
Doctoral Theses
The thesis encompasses three chapters which provide policy-relevant insights into the domain of conflict economics. The research endeavour goes deep into exploring the underlying linkages of varied economic and non-economic factors (e.g., culture, religion and myriads of ethnic factors) leading to the multiple facets of economic outcomes. The analyses in the thesis, which fall in the realm of applied microeconomic theory, are facilitated by different tools of game theory and public economics. Although the focuses of these chapters lie in the domain of economics of conflict (and its policy implications under different situations), each chapter addresses the conflicts engendered in …
Essays In Multidimensional Mechanism Design., Kolagani Paramahamsa Dr.
Essays In Multidimensional Mechanism Design., Kolagani Paramahamsa Dr.
Doctoral Theses
This thesis analyzes three problems where a monopolistic seller is selling to an agent with multidimensional private information. While our understanding of such problems is comprehensive if the agent's private information is one-dimensional, problems with multidimensional private information are known to be ubiquitous but analytically notorious. The three chapters in this thesis make progress in understanding optimal mechanism design in such multidimensional screening problems. In the first problem, the seller is selling an object to an agent who exhibits behavioral preferences, in a departure from the standard rational models. Behavioral preferences arise because the agent is budget constrained and needs …
Efficient Handover Mechanisms For Heterogeneous Networks., Shankar Kumar Ghosh Dr.
Efficient Handover Mechanisms For Heterogeneous Networks., Shankar Kumar Ghosh Dr.
Doctoral Theses
In this thesis, some analytical frameworks have been developed to analyze the effect of different system parameters on handover performances in heterogeneous network (HetNet) and based on such frameworks, some efficient handover algorithms have been proposed. The study starts with an analytical framework to investigate the effect of resource allocation mechanisms, upper layer mobility management protocols (MMPs) and handover decision metrics on user perceived throughput. This analysis reveals that among other factors, handover decision metric plays a crucial role in determining user perceived throughput in HetNet. Subsequently, we develop two handover decision metrics for ultra dense networks (UDN) and unlicensed …
Fine-Grained Classification Of Retail Products, Avishek Kumar Shaw, Shilpa Yadukumar Rao, Pranoy Hari, Bikash Santra, Dipti Prasad Mukherjee
Fine-Grained Classification Of Retail Products, Avishek Kumar Shaw, Shilpa Yadukumar Rao, Pranoy Hari, Bikash Santra, Dipti Prasad Mukherjee
Patents
No abstract provided.
Sentiment Analysis Of Human Being With Effective Word Embedding Methodologies, S. Sagnika Sagnika, B.S.P. Mishra, Saroj Kumar Meher
Sentiment Analysis Of Human Being With Effective Word Embedding Methodologies, S. Sagnika Sagnika, B.S.P. Mishra, Saroj Kumar Meher
Patents
http://pericles.ipaustralia.gov.au/ols/auspat/applicationDetails.do?applicationNo=2021102725
Essays On Social Networks, Workplace Ties And Labor Productivity., Swati Sharma Dr.
Essays On Social Networks, Workplace Ties And Labor Productivity., Swati Sharma Dr.
Doctoral Theses
The role of social contacts in finding jobs, career mobility and other labor market outcomes is well acknowledged both theoretically and empirically in labor economics. The existence of individuals’ social networks at their workplace is a pervasive phenomenon, leading to the widespread use of social ties for information, influence and referrals on both sides of the labor market. The central theme of this thesis is to examine the interplay of ‘off-workplace socio-economic interdependence’ and outcomes at the workplace. Understanding this interdependence has the potential to devise policies which can impact labor productivity, especially in developing countries. This thesis divided into …
Zero-Knowledge Proof, Deniability And Their Applications In Blockchain, E-Voting And Deniable Secret Handshake Protocols., Somnath Panja Dr.
Zero-Knowledge Proof, Deniability And Their Applications In Blockchain, E-Voting And Deniable Secret Handshake Protocols., Somnath Panja Dr.
Doctoral Theses
In this thesis, we propose a cryptographic technique for an authenticated, end-to-end verifiable and secret ballot election. Currently, almost all verifiable e-voting systems require trusted authorities to perform the tallying process except for the DRE-i and DRE-ip systems. We have shown a weaknesses in the DRE-ip system and proposed a solution. We have modified the DRE-ip system so that no adversary can create and post a valid ballot on the public bulletin board without detection. We provide security proofs to prove the security properties of the proposed scheme. We propose two methods to store these ballots using blockchain and cloud …
Mathematical Formulations For Complex Resource Scheduling Problems., T. R. Lalita Dr.
Mathematical Formulations For Complex Resource Scheduling Problems., T. R. Lalita Dr.
Doctoral Theses
This thesis deals with development of effective models for large scale real-world resource scheduling problems. Efficient utilization of resources is crucial for any organization or industry as resources are often scarce. Scheduling them in an optimal way can not only take care of the scarcity but has potential economic benefits. Optimal utilization of resources reduces costs and thereby provides a competitive edge in the business world. Resources can be of different types such as human (personnel-skilled and unskilled), financial(budgets), materials, infrastructures(airports and seaports with designed facilities, windmills, warehouses’ area, hotel rooms etc) and equipment (microprocessors, cranes, machinery, aircraft simulators for …
Interplay Between Education And Identity: Inter Caste Marriages, Gendered Stream Choice And Caste Peer Effects., Komal Sahai Dr.
Interplay Between Education And Identity: Inter Caste Marriages, Gendered Stream Choice And Caste Peer Effects., Komal Sahai Dr.
Doctoral Theses
No abstract provided.
On Class Imbalanced Learning:Design Of Non-Parametricclassifiers, Performance Indices, And Deep Oversampling Strategies., Sankha Mullick Dr.
On Class Imbalanced Learning:Design Of Non-Parametricclassifiers, Performance Indices, And Deep Oversampling Strategies., Sankha Mullick Dr.
Doctoral Theses
The relevance of classification is almost endless in the everyday application of machine learning. However, the performance of a classifier is only limited to the fulfillment of the inherent assumptions it makes about the training examples. For example, to facilitate unbiased learning a classifier is expected to be trained with an equal number of labeled data instances from all of the classes. However, in a large number of practical applications such as anomaly detection, semantic segmentation, disease prediction, etc. it may not be possible to gather an equal number of diverse training points for all the classes. This results in …
Many-Objective Evolutionary Algorithms: Objective Reduction, Decomposition And Multi-Modality., Monalisa Pal Dr.
Many-Objective Evolutionary Algorithms: Objective Reduction, Decomposition And Multi-Modality., Monalisa Pal Dr.
Doctoral Theses
Evolutionary Algorithms (EAs) for Many-Objective Optimization (MaOO) problems are challenging in nature due to the requirement of large population size, difficulty in maintaining the selection pressure towards global optima and inability of accurate visualization of high-dimensional Pareto-optimal Set (in decision space) and Pareto-Front (in objective space). The quality of the estimated set of Pareto-optimal solutions, resulting from the EAs for MaOO problems, is assessed in terms of proximity to the true surface (convergence) and uniformity and coverage of the estimated set over the true surface (diversity). With more number of objectives, the challenges become more profound. Thus, better strategies have …
Optimal Eavesdropping In Quantum Cryptography, Atanu Acharyya Dr.
Optimal Eavesdropping In Quantum Cryptography, Atanu Acharyya Dr.
Doctoral Theses
Quantum key distribution (QKD) has raised some promise for more secured communication than its classical counterpart. It allows the legitimate parties to detect eavesdropping which introduces error in the channel. If disturbed, there are ways to distill a secure key within some threshold error-rate. The amount of information gained by an attacker is generally quantified by (Shannon) mutual information. Knowing the maximum amount of information that an intruder can gain is important for post-processing purposes, and we mainly focus on that side in the thesis. Renyi information is also useful especially when post-processing is considered. The scope of this thesis …
Use And Awareness Of Web 2.0 Tools Among The Lis Professional In Assam: A Case Study, Kishor Chandra Satpathy, Parimita Bezbaruah, Rupsikha Kashyap
Use And Awareness Of Web 2.0 Tools Among The Lis Professional In Assam: A Case Study, Kishor Chandra Satpathy, Parimita Bezbaruah, Rupsikha Kashyap
Book Chapters
Web 2.0 is playing a major role among young library professionals. Web 2.0 tools and social networking sites are becoming increasingly popular day by day as these tools are providing free and quick access to various types of information available over the internet. This paper analyzes the awareness and usage of web 2.0 technologies among LIS professionals of the State Assam. The study mainly focuses to understand the use and awareness of web 2.0 tools like Wikipedia, Social networks, Blogs, Podcasts, LinkedIn, and So cial bookmarking sites. This study shows that the most popular used web 2.0 tools among the …