etd AT Indian Institute of Science: Recent submissions
Now showing items 1-20 of 7098
-
Neural computations underlying attention and expectation
Our senses are inundated with an abundance of information at each instant. Attention and expectation are two cognitive processes that enable filtering this information to better navigate our environment. Importantly, ... -
A Capillary-fed Evaporative Microthruster for Micro/Nano Satellites
Small satellites offer a unique platform for short-term and low-cost communications and surveillance missions. They are essential for, scientific research, and technology demonstration due to their ability to provide rapid ... -
Security, Secrecy, and Privacy in Hotplug and Multi-Access Coded Caching Problems
With the rapid growth in data consumption, efficient content delivery has become a key challenge in modern communication networks. Coded caching offers a powerful solution by leveraging storage at the users to reduce peak ... -
Embeddedness in Indian Tech Startups: An Empirical Study of Antecedents, Configuration, and Impact of Networking
Tech startups are integral to a nation’s economic progress due to their immense potential to foster innovation, job creation, exports, and investments. However, tech startups face considerable hurdles in accumulating the ... -
Design and development of proteasome inhibitors with improved efficacy in breast cancer cells: 3D tissue models and detailed molecular mechanistic studies
The proteasome is an enzyme complex that regulates the degradation of intracellular proteins, maintaining cell cycle regulation, protein quality, and cellular homeostasis. Proteasome inhibition has gained popularity as a ... -
Unravelling the low-frequency radio secrets of Galactic star-forming regions with the uGMRT
Star-forming regions are dynamic environments shaped by the complex interplay of various astrophysical processes and objects. On one hand, massive stars during their evolutionary phases ionise the surrounding interstellar ... -
Virtual Element Methods for Phase Field Fracture: Mesh Transitions, Composite Damage, and Stabilization-Free Formulations
Accurate simulation of crack propagation requires discretization methods that combine geometric flexibility with computational efficiency. Although the finite element method (FEM) and its variants remain the widely used ... -
Characteristics of neutrophils and monocyets in patients with end stage kidney disease and those undergoing hemodialysis
Chronic kidney disease is characterised by irreversible impairment of kidney function due to compromise in glomerular filtration. Clinical presentation progresses from asymptomatic initial stages to end stage kidney ... -
Understanding and tailoring defects in monolayer transition metal dichalcogenides for single photon emission
Full text Embargo up to Oct 15, 2026 Point defects in monolayer (ML) transition metal dichalcogenides (TMDs) can behave as single photon emitters (SPEs). SPEs enable foundational quantum phenomena like entanglement and ... -
Knowledge Management in Research and Development Projects: Mapping intellectual Assets for Innovation in Manufacturing
Innovation is the key driver of competitive advantage in a knowledge economy. In the manufacturing industry, a major portion of innovation emerges from research and development (R&D) projects. These projects require ... -
Studies in learning and representation in connectionist networks
This work deals with questions related to learning and representation in connectionist networks. The main issue taken up in learning is the convergence of local learning rules for feedforward networks. We ask the following ... -
Evolutionary design of plan based pattern recognition systems in complex domains
Many real-life Pattern Recognition (PR) problems do not fit into the classical PR paradigms. Such systems are currently being implemented using knowledge-based approaches. Designing such systems is an involved, evolutionary ... -
Referral reward embedded bi-phase information diffusion technique for social networks
Social networks provide an effective marketing platform to enhance the visibility of a business by reaching out to a wide base of potential customers cutting across gaps of geographic locations, age groups, and socio-economic ... -
Hadwiger number and the cartesian product operation on graphs
The Hadwiger number ?(G) of a graph G is defined as the largest integer n for which the complete graph on n nodes K? is a minor of G. Hadwiger conjectured that for any graph G, ?(G) ? ?(G), where ?(G) is the chromatic ... -
Towards complete automatic code generation
A compiler consists of two phases: source program analysis and object program synthesis. The problem of compilation has been tackled in depth, and many tools and techniques exist for building the analysis phase. Similar ... -
Effective optimization techniques for a parallel file system
Effective Optimization Techniques for a Parallel File System by Raghvendran M Significant work has been done in evolving parallel I/O architectures, I/O interfaces, and other programming techniques. However, only a few ... -
Formal tools for specification-driven protocol design of distributed computing systems
The widespread use of Distributed Computing Systems (DCSs) is due to the advantages of better performance, improved reliability, efficient resource sharing and easy upgradability. In order to realize the advantages of a ... -
LiWA : a lightweight agent framework for distributed systems
In the world of mobile computing, agent-based systems present one of the most promising areas of research in distributed systems. Component-based architecture is a new paradigm that is ideal for developing agent frameworks, ... -
Design and implementation of a multidimensional multilink multicomputer hardware and software
In this thesis, we propose and implement a multidimensional multilink system (MMS) architecture which uses message passing paradigm between computing elements (CEs). The merits of this architecture are its simplicity, regularity ... -
SAFIUS - A secure accountable filesystem over untrusted storage
With storage data requirements growing at around 40% every year, the entities that control the data are different from entities that consume the data. The drastic growth in storage requirements and the ubiquitous accessibility ...