Browsing by Title
Now showing items 6391-6410 of 8871
-
Seasonal variation of the zonally symmetric tropical circulation in a simple climate ,model
A low-order model of the zonally symmetric tropical circulation is developed. The model equations are linearized about a resting basic state and are solved on an equatorial beta-plane. The circulation is forced by the solar ... -
Seat Allocation And Pricing in a Duopoly in The Airline Industry
(2017-10-18)Revenue Management (RM) is the practice of managing perishable assets by control-ling their availability and/or prices with an objective to maximize the total revenue. Seat inventory allocation falls in the purview of ... -
Secondary Atomization of a Droplet in Diverse Interaction Settings
Secondary atomisation refers to the process by which liquid droplets, which are already in a dispersed state, are further atomised down into smaller droplets. This process occurs after primary atomisation, which is the ... -
Secondary flows and heat transfer in non-newtonian fluids
The thesis consists of four chapters. In chapter I we have described the non-Newtonian fluids which we have discussed in the text and have also derived the equations of motion in the systems of coordinates which we have ... -
Secondary Structures in Proteins : Identification and Analyses
(2018-07-12)Proteins are large biomolecules consisting of one or more long chains of amino acid residues. They perform a vast array of functions within living organisms. In this thesis, we present analyses of different secondary ... -
Secret Key Generation in the Multiterminal Source Model : Communication and Other Aspects
(2018-07-04)This dissertation is primarily concerned with the communication required to achieve secret key (SK) capacity in a multiterminal source model. The multiterminal source model introduced by Csiszár and Narayan consists of a ... -
Secure Auctions with Rational Parties
Sealed bid auctions are used to allocate a resource among a set of interested parties. Traditionally, auctions need the presence of a trusted auctioneer to whom the bidders provide their private bid values. Existence of ... -
Secure Computation Protocol Suite for Privacy-Conscious Applications
As an alternative to performing analytics in the clear, there is an increasing demand for developing privacy-preserving solutions that aim to protect sensitive data while still allowing for its efficient analysis. Among ... -
Secure ECom framework for small-communities
Universal reach of the web has made it possible for merchants to reach their customers, and vice versa, through what has now come to be referred as Electronic Commerce, or ecom in short. Despite admitting the new opportunities ... -
Secure Real-time transaction processing
Real-Time Database Systems (RTDBS) are designed to process transactions with strict completion deadlines, often in safety-critical and military applications where security is paramount. However, ensuring both real-time ... -
Secure Routing Schemes In Mobile Ad Hoc Networks
(2011-09-09) -
Secure Vickrey Auctions with Rational Parties
In this work, we construct a second price (Vickrey) auction protocol (SPA), which does not require any auctioneers and ensures total privacy in the presence of rational parties participating in the auction. In particular, ... -
Securing Multiprocessor Systems-on-Chip
(2016)With Multiprocessor Systems-on-Chips (MPSoCs) pervading our lives, security issues are emerging as a serious problem and attacks against these systems are becoming more critical and sophisticated. We have designed and ... -
Security of Post-Quantum Multivariate Blind Signature Scheme: Revisited and Improved
Current cryptosystems face an imminent threat from quantum algorithms like Shor's and Grover's, leading us to post-quantum cryptography. Multivariate signatures are prominent in post-quantum cryptography due to their fast, ... -
Security, Secrecy, and Privacy in Hotplug and Multi-Access Coded Caching Problems
With the rapid growth in data consumption, efficient content delivery has become a key challenge in modern communication networks. Coded caching offers a powerful solution by leveraging storage at the users to reduce peak ... -
Sedimentation Of Heavy Particles In Turbulence
(2010-08-06)Behavior of particles in buoyancy driven turbulent flow at Ra ≈ 10º is investigated experimentally. The volume fraction of the particles is low enough for the inter particle influence to be neglected, the mass loading ... -
Seed Dispersal In The Tropical Dry Forests Of Mudumalai, Southern India
(2011-06-30)Plants depend on a wide variety of vectors, both biotic and abiotic, to move their seeds to locations away from parent plants. The stages between seed production and seedling establishment in the plant life cycle are under ... -
Seepage Effects on Stream Power, Resistance, Incipient Motion and Regime of Sand Bed Channels including Its Design
(2018-07-28)Common behavioral trends and characteristics of alluvial channels including rivers are extensively discussed in the literature. However, little is known about the hydrodynamic effects of seepage on alluvial channels. Factors ...

