• Login
    Browsing by Advisor 
    •   etd@IISc
    • Browsing by Advisor
    •   etd@IISc
    • Browsing by Advisor
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browsing by Advisor "Veni Madhavan, C E"

    • 0-9
    • A
    • B
    • C
    • D
    • E
    • F
    • G
    • H
    • I
    • J
    • K
    • L
    • M
    • N
    • O
    • P
    • Q
    • R
    • S
    • T
    • U
    • V
    • W
    • X
    • Y
    • Z

    Sort by:

    Order:

    Results:

    Now showing items 1-12 of 12

    • title
    • xmlui.ArtifactBrowser.ConfigurableBrowse.sort_by.datesubmitted
    • issue date
    • ascending
    • descending
    • 5
    • 10
    • 20
    • 40
    • 60
    • 80
    • 100
      • Analysis And Design Of Image And Video Encryption Algorithms 

        Yekkala, Anil Kumar (2009-03-19)
        The rapid growth in multimedia based Internet systems and applications like video telephony, video on demand, network based DVD recorders and IP television has created a substantial need for ...
      • Analysis Of A Sieving Heuristic For The Number Field Sieve And Design Of Low-Correlation CDMA Sequences 

        Garg, Gagan (2011-01-25)
        In this thesis, we investigate in detail, certain important problems in cryptography and coding theory. In the first part of this thesis, we discuss the number field sieve and compare the two ways in which the sieving ...
      • Bayes Optimal Feature Selection for Supervised Learning 

        Saneem Ahmed, C G (2018-02-18)
        The problem of feature selection is critical in several areas of machine learning and data analysis such as, for example, cancer classification using gene expression data, text categorization, etc. In this work, we consider ...
      • Cluster Identification : Topic Models, Matrix Factorization And Concept Association Networks 

        Arun, R (2013-09-17)
        The problem of identifying clusters arising in the context of topic models and related approaches is important in the area of machine learning. The problem concerning traversals on Concept Association Networks is of great ...
      • Graph Models For Query Focused Text Summarization And Assessment Of Machine Translation Using Stopwords 

        Rama, B (2014-04-09)
        Text summarization is the task of generating a shortened version of the original text where core ideas of the original text are retained. In this work, we focus on query focused summarization. The task is to generate the ...
      • Image Structures For Steganalysis And Encryption 

        Suresh, V (2013-10-21)
        In this work we study two aspects of image security: improper usage and illegal access of images. In the first part we present our results on steganalysis – protection against improper usage of images. In the second part ...
      • Large Scale Implementation Of The Block Lanczos Algorithm 

        Srikanth, Cherukupally (2010-08-16)
        Large sparse matrices arise in many applications, especially in the major problems of Cryptography of factoring integers and computing discrete logarithms. We focus attention on such matrices called sieve matrices generated ...
      • Large-Scale Integer And Polynomial Computations : Efficient Implementation And Applications 

        Amberker, B B (2012-05-03)
      • Network Centrality Measures And Their Applications 

        Sudarshan, S R (2014-03-03)
        Study of complex networks by researchers from many disciplines has provided penetrating insights on various complex systems. A study of the world wide web from a network theoretic perspective has led to the design of new ...
      • New Approaches And Experimental Studies On - Alegebraic Attacks On Stream Ciphers 

        Pillai, N Rajesh (2015-02-05)
        Algebraic attacks constitute an effective class of cryptanalytic attacks which have come up recently. In algebraic attacks, the relations between the input, output and the key are expressed as a system of equations and ...
      • Number Theoretic, Computational and Cryptographic Aspects of a Certain Sequence of Arithmetic Progressions 

        Srikanth, Cherukupally (2018-06-21)
        This thesis introduces a new mathematical object: collection of arithmetic progressions with elements satisfying the inverse property, \j-th terms of i-th and (i+1)-th progressions are multiplicative inverses of each other ...
      • On A Cubic Sieve Congruence Related To The Discrete Logarithm Problem 

        Vivek, Srinivas V (2013-05-21)
        There has been a rapid increase interest in computational number theory ever since the invention of public-key cryptography. Various attempts to solve the underlying hard problems behind public-key cryptosystems has led ...

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV
         

         

        Browse

        All of etd@IIScCommunities & CollectionsTitlesAuthorsAdvisorsSubjectsBy Thesis Submission Date

        My Account

        LoginRegister

        etd@IISc is a joint service of SERC & J R D Tata Memorial (JRDTML) Library || Powered by DSpace software || DuraSpace
        Contact Us | Send Feedback | Thesis Templates
        Theme by 
        Atmire NV