etd AT Indian Institute of Science: Recent submissions
Now showing items 81-100 of 7172
-
Virtual Element Methods for Phase Field Fracture: Mesh Transitions, Composite Damage, and Stabilization-Free Formulations
Accurate simulation of crack propagation requires discretization methods that combine geometric flexibility with computational efficiency. Although the finite element method (FEM) and its variants remain the widely used ... -
Characteristics of neutrophils and monocyets in patients with end stage kidney disease and those undergoing hemodialysis
Chronic kidney disease is characterised by irreversible impairment of kidney function due to compromise in glomerular filtration. Clinical presentation progresses from asymptomatic initial stages to end stage kidney ... -
Understanding and tailoring defects in monolayer transition metal dichalcogenides for single photon emission
Full text Embargo up to Oct 15, 2026 Point defects in monolayer (ML) transition metal dichalcogenides (TMDs) can behave as single photon emitters (SPEs). SPEs enable foundational quantum phenomena like entanglement and ... -
Knowledge Management in Research and Development Projects: Mapping intellectual Assets for Innovation in Manufacturing
Innovation is the key driver of competitive advantage in a knowledge economy. In the manufacturing industry, a major portion of innovation emerges from research and development (R&D) projects. These projects require ... -
Evolutionary design of plan based pattern recognition systems in complex domains
Many real-life Pattern Recognition (PR) problems do not fit into the classical PR paradigms. Such systems are currently being implemented using knowledge-based approaches. Designing such systems is an involved, evolutionary ... -
Studies in learning and representation in connectionist networks
This work deals with questions related to learning and representation in connectionist networks. The main issue taken up in learning is the convergence of local learning rules for feedforward networks. We ask the following ... -
Referral reward embedded bi-phase information diffusion technique for social networks
Social networks provide an effective marketing platform to enhance the visibility of a business by reaching out to a wide base of potential customers cutting across gaps of geographic locations, age groups, and socio-economic ... -
Hadwiger number and the cartesian product operation on graphs
Abstract page scanned and attached as separate attachment -
Towards complete automatic code generation
A compiler consists of two phases: source program analysis and object program synthesis. The problem of compilation has been tackled in depth, and many tools and techniques exist for building the analysis phase. Similar ... -
Effective optimization techniques for a parallel file system
Effective Optimization Techniques for a Parallel File System by Raghvendran M Significant work has been done in evolving parallel I/O architectures, I/O interfaces, and other programming techniques. However, only a few ... -
Formal tools for specification-driven protocol design of distributed computing systems
The widespread use of Distributed Computing Systems (DCSs) is due to the advantages of better performance, improved reliability, efficient resource sharing and easy upgradability. In order to realize the advantages of a ... -
LiWA : a lightweight agent framework for distributed systems
In the world of mobile computing, agent-based systems present one of the most promising areas of research in distributed systems. Component-based architecture is a new paradigm that is ideal for developing agent frameworks, ... -
Design and implementation of a multidimensional multilink multicomputer hardware and software
In this thesis, we propose and implement a multidimensional multilink system (MMS) architecture which uses message passing paradigm between computing elements (CEs). The merits of this architecture are its simplicity, regularity ... -
SAFIUS - A secure accountable filesystem over untrusted storage
With storage data requirements growing at around 40% every year, the entities that control the data are different from entities that consume the data. The drastic growth in storage requirements and the ubiquitous accessibility ... -
Instruction scheduling for RISC processors
Instruction scheduling is the process of reordering instructions (whether assembly code or code in some other form) so as to make fuller use of the resources provided by the processor. In the case of RISC processors, ... -
Bimodal Projections Based Features for High Dimensional Pattern Classification
Classification tasks involving high-dimensional vectors are affected by the curse of dimensionality requiring large amount of training data. This is because a high dimensional space with a modest number of samples is ... -
Wavelets for volume graphics
In recent years, there has been a shift in the paradigm from surface-based graphics to volume graphics. Volume graphics uses a three-dimensional unit cube, known as a voxel, as its primitive, whereas surface-based graphics ... -
Counting number of points on elliptic curves over F2m fields : An implementation study
Hasse’s theorem states that:ifE {W g) Then |i| < 2y/q. This gives the bound on the number of points. In 1985, Schoof presented a polynomial time algorithm for computing The algorithm has running time of 0(log® q) bit ... -
Soundness and completeness results in partially-interpreted logics
Formulas in mathematical logic are syntactic expressions of uninterpreted symbols. The classical computational techniques of logic are oriented toward establishing the truth or falsehood of logic formulas in their uninterpreted ... -
Algorithms and lower bounds for graph connectivity and covering
Graph Connectivity is a well-studied problem, and its time complexity is well understood. However, its space complexity remains a mystery. Closely related to the space complexity of connectivity is the problem of derandomizing ...

