Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 18 of 18

Full-Text Articles in Physical Sciences and Mathematics

Essays On Economics Of Gender And Labour Market., Kanika Mahajan Dr. Dec 2016

Essays On Economics Of Gender And Labour Market., Kanika Mahajan Dr.

Doctoral Theses

The differences in labor market outcomes between males and females have been of interest to the economists for at least past half a century. Gender inequality in the labor market manifests itself in the form of wage and employment gaps between males and females. However, little is understood about why these inequalities emerge. There are taste based theories of discrimination, occupational exclusion and theories of statistical discrimination. In this thesis, we study gender disparities in the labor market of rural India. The main objective of this thesis is to further our understanding about the existing wage and employment disparities in …


On Rational Subgroups Of Exceptional Groups., Neha Hooda Dr. Nov 2016

On Rational Subgroups Of Exceptional Groups., Neha Hooda Dr.

Doctoral Theses

The main theme of this thesis is the study of exceptional algebraic groups via their subgroups. This theme has been widely explored by various authors (Martin Leibeck, Gary Seitz, Adam Thomas, Donna Testerman to mention a few), mainly for split groups ([26], [27], [28], [60] ). When the field of definition k of the concerned algebraic groups is not algebraically closed, the classification of k-subgroups is largely an open problem. In the thesis, we mainly handle the cases of simple groups of type F4 and G2 defined over an arbitrary field. These may not be split over k. We first …


Essays On The Economics Of Education., Soham Sahoo Dr. Nov 2016

Essays On The Economics Of Education., Soham Sahoo Dr.

Doctoral Theses

This thesis consists of three empirical essays that investigate issues related to the economics of education. The main focus of this thesis is to study schooling outcomes of children in a developing country: India. The first chapter explores the effect of mothers’ labour force participation on children’s educational outcomes in the context of a large employment guarantee program in India. This study finds that workfare schemes enhancing women’s access to economic opportunities have implications for intra-household resource allocation which in turn lead to a positive effect on children’s education. The second essay investigates the effect of better access to secondary …


Some Contemporary Issues In Software Reliability., Vignesh Subrahmaniam Dr. Oct 2016

Some Contemporary Issues In Software Reliability., Vignesh Subrahmaniam Dr.

Doctoral Theses

No abstract provided.


Mechanism Design For Land Acquisition., Soumendu Sarkar Dr. Sep 2016

Mechanism Design For Land Acquisition., Soumendu Sarkar Dr.

Doctoral Theses

Conversion of land use from agriculture to industry is a typical feature of economic development in many densely populated countries. Large scale construction often requires industry or the government to acquire vast areas of land that are inhabited and often cultivated, by hundreds and even thousands of people. For some landowners, possession signifies power and status in society, while for others, it is the only means for earning a livelihood.Adamopoulos and Restuccia (2014) use data from World Census of Agriculture to show that average farm size in the poorest 20% of countries is 1.6 hectares, while that in the richest …


Tree-Based Symmetric Key Broadcast Encryption., Sanjay Bhattacherjee Dr. Jul 2016

Tree-Based Symmetric Key Broadcast Encryption., Sanjay Bhattacherjee Dr.

Doctoral Theses

In symmetric key cryptography, it is assumed that there are two parties Alice and Bob and there is an insecure communication channel between them as shown in Figure 1.1. A cryptographic system can be used to achieve secure communication between these two parties. This cryptographic system assumes that there is a secret K called the key that is known only to Alice and Bob and no one else. The message to be communicated is called the plaintext and is denoted by M. The cryptographic system has an encryption algorithm Enc(M, K) used by the sender that takes as input a …


Essays On Efficiency, Fairness And Strategy-Proofness In Allocation Problems With Exact Capacity Constraints., T. C. A. Madhav Raghavan Dr. Jul 2016

Essays On Efficiency, Fairness And Strategy-Proofness In Allocation Problems With Exact Capacity Constraints., T. C. A. Madhav Raghavan Dr.

Doctoral Theses

In this thesis we consider situations where heterogenous objects are to be distributed among a set of claimants. The objects in question are indivisible, so they cannot be split or shared. There is no money in this economy, so objects cannot be simply bought and sold. Allocations to claimants must be based on their preferences over objects alone. We impose the additional restriction that each object has an exact capacity constraint, such that each object is assigned either to a pre-specified (and fixed) number of agents, or it is not assigned at all. Further, we assume that the capacity constraint …


Essays On Conflict And Organisation Theory., Dushyant Kumar Dr. Jun 2016

Essays On Conflict And Organisation Theory., Dushyant Kumar Dr.

Doctoral Theses

Throughout the human civilization, domestic (intra country) conflicts have been present across societies, cultures and countries. These conflicts are extremely common as well as persistent. For the period 1960-2006, twenty percent of the countries have experienced at-least ten years of conflicts with more than 1000 casualties per year (Blattman and Miguel, 2010). It causes huge loss of human life, quantitatively, as well as qualitatively. It results in huge number of casualties, as well as damage to the existing output, resources and infrastructure. The persistent presence of such conflicts across the world means that a significant number of people as well …


Essays On Inequality, Polarization And Contests., Bhargav Bhattacharya Dr. May 2016

Essays On Inequality, Polarization And Contests., Bhargav Bhattacharya Dr.

Doctoral Theses

No abstract provided.


Infinite Color Urn Models., Debleena Thacker Dr. Apr 2016

Infinite Color Urn Models., Debleena Thacker Dr.

Doctoral Theses

In recent years, there has been a wide variety of work on random reinforcement models of various kinds. Urn models form an important class of random reinforcement models, with numerous applications in engineering and informatics and bioscience. In recent years there have been several works on different kinds of urn models and their generalizations. For occupancy urn models, where one considers recursive addition of balls into finite or infinite number of boxes, there are some works which introduce models with infinitely many colors, typically represented by the boxes.As observed in [51], the earliest mentions of urn models are in the …


Essays On Strategy-Proofness And Implementation., Sonal Yadav Dr. Apr 2016

Essays On Strategy-Proofness And Implementation., Sonal Yadav Dr.

Doctoral Theses

This thesis comprises of three chapters relating to strategy-proofness and implementation. We provide a brief description of each chapter below.1.1 A Hurwicz Type Result in a Model with Public Good Production We consider a two-good model with an arbitrary number of agents. One of the goods is a public good and the other is a private good. Each agent has an endowment of the private good and the private good can be converted into the public good using a well-behaved production function. A Social Choice Function (SCF) associates an allocation with each admissible preference profile. We impose the following requirements …


Inference On Time-To-Event Distribution From Retrospective Data With Imperfect Recall., Sedigheh Salehabadi Dr. Mar 2016

Inference On Time-To-Event Distribution From Retrospective Data With Imperfect Recall., Sedigheh Salehabadi Dr.

Doctoral Theses

Time-to-event data arises from measurements of time till the occurrence of an event of interest. Such data are common in the fields of biology, epidemiology, pub- lic health, medical research, economics and industry. The event of interest can be the death of a human being (Klein and Moeschberger, 2003), failure of a machine (Zhiguo et al., 2007), onset of menarche in adolescent and young adult females (Bergsten-Brucefors, 1976; Chumlea et al., 2003; Mirzaei, Sengupta and Das, 2015), onset (or relapse) of a disease (Klein and Moeschberger, 2003), dental develop- ment (Demirjian, Goldstien and Tanner, 1973; Eveleth and Tanner, 1990), breast …


Essays In Dynamic Macroeconomics And Fiscal Policy., Pawan Gopalakrishnan Dr. Feb 2016

Essays In Dynamic Macroeconomics And Fiscal Policy., Pawan Gopalakrishnan Dr.

Doctoral Theses

In the last two decades, several events in the global economy, like the recession in Japan (1990-2010), the dot com crisis in the US, and the recent global economic and Önancial crisis (which started in 2007-08), to name a few, have brought issues related to Öscal policy back into the limelight. If we look back into the history of policy making, Öscal policy was Örst brought onto the centre-stage in the US during the Great Depression years of the 1930s (see Kopcke et al. (2005) and Feldstein (2009)). It was believed that expansionary Öscal policy would serve as an automatic …


Efficient And Adaptively Secure Constructions Of Identity-Based Cyrptographic Primitives., Somindu Chaya Ramanna Dr. Feb 2016

Efficient And Adaptively Secure Constructions Of Identity-Based Cyrptographic Primitives., Somindu Chaya Ramanna Dr.

Doctoral Theses

Public-key encryption (PKE) is an elegant solution to the fundamental problem of cryptography – secure communication between two parties over a public (insecure) channel. The basic idea is that every user A holds two keys – a public key (PKA) and a secret key (SKA). A user who wants to send a message to A encrypts it with PKA and sends the resulting ciphertext along the public channel. A, at the other end of the channel, decrypts the ciphertext using SKA and obtains the message. SKA is known to user A alone. Any third party intercepting data on the public …


Digital Circles And Balls: Characterization, Properties, And Applications To Image Analysis., Sahadev Bera Dr. Feb 2016

Digital Circles And Balls: Characterization, Properties, And Applications To Image Analysis., Sahadev Bera Dr.

Doctoral Theses

In this thesis, we have reported some new theoretical findings, empirical formulations, useful heuristics, and efficient algorithms related to digital circle, digital disc, and digital sphere, along with their practical applications to the analysis of geometric information embedded in a digital image. Detecting digital circles and circular arcs from a digital image is very important in shape recognition. Several image processing techniques were proposed over the years to extract circles and circular arc from a digital image and to interpret related issues. We have proposed a novel technique for the segmentation of a digital circle, which is based on a …


Some Distribution-Free Two-Sample Tests Applicable To High Dimension, Low Sample Size Data., Munmun Biswas Dr. Feb 2016

Some Distribution-Free Two-Sample Tests Applicable To High Dimension, Low Sample Size Data., Munmun Biswas Dr.

Doctoral Theses

The advancement of data acquisition technologies and computing resources have greatly facilitated the analysis of massive data sets in various fields of sciences. Researchers from different disciplines rigorously investigate these data sets to extract useful information for new scientific discoveries. Many of these data sets contain large number of features but small number of observations. For instance, in the fields of chemometrics (see e.g., Schoonover et al. (2003)), medical image analysis (see e.g., Yushkevich et al. (2001)) and microarray gene expression data analysis (see e.g., Eisen and Brown (1999), Alter et al. (2000)), we often deal with data of dimensions …


Some Results On Analysis And Implementation Of Hc-128 Stream Cipher., Shashwat Raizada Dr. Jan 2016

Some Results On Analysis And Implementation Of Hc-128 Stream Cipher., Shashwat Raizada Dr.

Doctoral Theses

The HC-128 stream cipher is a successful entrant in the eStream candidate list (software profile) and is the lighter variant of HC-256 stream cipher. Apart from the analysis by the designer of the cipher (Hongjun Wu) to conjecture the security of this cipher, there are only a few other observations on this cipher despite being the focus of researchers during the three phases of eStream evaluation and later efforts in the community. Till date none of the security claims in favor of HC-128 by the designer could be broken. One may expect HC-128 stream cipher to be popular in commercial …


Application Of Combinatorial Structures In Wireless Communication., Samiran Bag Dr. Jan 2016

Application Of Combinatorial Structures In Wireless Communication., Samiran Bag Dr.

Doctoral Theses

Wireless communication has a compelling need in today’s world. This need is driven by the sudden surge in the demand of ad-hoc networks like wireless sensor networks. These networks consist of many isolated devices called nodes that use the wireless medium for communication. There are three security notions attached to any wireless communication. These are data confidentiality, data integrity and data availability. Cryptographic protocols are required for achieving the first two notions which in turn require shared secret keys. The last notion viz. data availability mainly deals with protecting the data from ‘denial of service attack’.In this thesis, we apply …