Browsing by Title
Now showing items 6388-6407 of 8871
-
Seasonal cycle of the hydrography and circulation of the Bay of benga
The Bay of Bengal is the smaller of the two semi-enclosed basins of the North Indian Ocean. Due to the impact of monsoons, the Bay exhibits strong seasonal changes in the circulation and in salinity of its surface layer. ... -
The Seasonal ENSO Transition Mode of the Southern Hemisphere: Definition, Characteristics and Impact
Decadal climate variability (DCV) exerts a profound influence on the global climate system by shaping background oceanic and atmospheric conditions. It drives long-term changes in sea surface temperatures (SSTs), monsoon ... -
Seasonal Isotopic Variability and Major Ion Chemistry of the Cauvery River Basin, Peninsular India
Surface water and groundwater interactions are inherently complex because they occur across a range of spatial and temporal scales. This thesis envisages to improve our understanding of surface water and groundwater in ... -
Seasonal variation of the zonally symmetric tropical circulation in a simple climate ,model
A low-order model of the zonally symmetric tropical circulation is developed. The model equations are linearized about a resting basic state and are solved on an equatorial beta-plane. The circulation is forced by the solar ... -
Seat Allocation And Pricing in a Duopoly in The Airline Industry
(2017-10-18)Revenue Management (RM) is the practice of managing perishable assets by control-ling their availability and/or prices with an objective to maximize the total revenue. Seat inventory allocation falls in the purview of ... -
Secondary Atomization of a Droplet in Diverse Interaction Settings
Secondary atomisation refers to the process by which liquid droplets, which are already in a dispersed state, are further atomised down into smaller droplets. This process occurs after primary atomisation, which is the ... -
Secondary flows and heat transfer in non-newtonian fluids
The thesis consists of four chapters. In chapter I we have described the non-Newtonian fluids which we have discussed in the text and have also derived the equations of motion in the systems of coordinates which we have ... -
Secondary Structures in Proteins : Identification and Analyses
(2018-07-12)Proteins are large biomolecules consisting of one or more long chains of amino acid residues. They perform a vast array of functions within living organisms. In this thesis, we present analyses of different secondary ... -
Secret Key Generation in the Multiterminal Source Model : Communication and Other Aspects
(2018-07-04)This dissertation is primarily concerned with the communication required to achieve secret key (SK) capacity in a multiterminal source model. The multiterminal source model introduced by Csiszár and Narayan consists of a ... -
Secure Auctions with Rational Parties
Sealed bid auctions are used to allocate a resource among a set of interested parties. Traditionally, auctions need the presence of a trusted auctioneer to whom the bidders provide their private bid values. Existence of ... -
Secure Computation Protocol Suite for Privacy-Conscious Applications
As an alternative to performing analytics in the clear, there is an increasing demand for developing privacy-preserving solutions that aim to protect sensitive data while still allowing for its efficient analysis. Among ... -
Secure ECom framework for small-communities
Universal reach of the web has made it possible for merchants to reach their customers, and vice versa, through what has now come to be referred as Electronic Commerce, or ecom in short. Despite admitting the new opportunities ... -
Secure Real-time transaction processing
Real-Time Database Systems (RTDBS) are designed to process transactions with strict completion deadlines, often in safety-critical and military applications where security is paramount. However, ensuring both real-time ... -
Secure Routing Schemes In Mobile Ad Hoc Networks
(2011-09-09) -
Secure Vickrey Auctions with Rational Parties
In this work, we construct a second price (Vickrey) auction protocol (SPA), which does not require any auctioneers and ensures total privacy in the presence of rational parties participating in the auction. In particular, ... -
Securing Multiprocessor Systems-on-Chip
(2016)With Multiprocessor Systems-on-Chips (MPSoCs) pervading our lives, security issues are emerging as a serious problem and attacks against these systems are becoming more critical and sophisticated. We have designed and ... -
Security of Post-Quantum Multivariate Blind Signature Scheme: Revisited and Improved
Current cryptosystems face an imminent threat from quantum algorithms like Shor's and Grover's, leading us to post-quantum cryptography. Multivariate signatures are prominent in post-quantum cryptography due to their fast, ... -
Security, Secrecy, and Privacy in Hotplug and Multi-Access Coded Caching Problems
With the rapid growth in data consumption, efficient content delivery has become a key challenge in modern communication networks. Coded caching offers a powerful solution by leveraging storage at the users to reduce peak ... -
Sedimentation Of Heavy Particles In Turbulence
(2010-08-06)Behavior of particles in buoyancy driven turbulent flow at Ra ≈ 10º is investigated experimentally. The volume fraction of the particles is low enough for the inter particle influence to be neglected, the mass loading ... -
Seed Dispersal In The Tropical Dry Forests Of Mudumalai, Southern India
(2011-06-30)Plants depend on a wide variety of vectors, both biotic and abiotic, to move their seeds to locations away from parent plants. The stages between seed production and seedling establishment in the plant life cycle are under ...

