Skip navigation
DSpace logo
  • Home
  • Browse
    • Communities
      & Collections
    • Browse Items by:
    • Issue Date
    • Author
    • Title
    • Subject
  • Sign on to:
    • My DSpace
    • Receive email
      updates
    • Edit Profile
DSpace logo

  1. DSpace at Indian Statistical Institute

Recent Submissions RSS Feed RSS Feed RSS Feed

On Search of Highly Nonlinear Boolean Functions See

Protest, Violence and Investments : See

This thesis attempts to develop a formal literature of the political econ- omy of Less Developed Countries (L.D.C.s) with three different questions- protest, violence and investments with the interlinking theme of coordina- tion failures in collective action and its effects on&#...

Essays in Mechanism Design See

The first chapter investigates the stability of internet platform trading mechanisms using the notion of ex-ante stability. Standard double auction mechanisms in the literature as well as the revenue-maximizing mechanism of the platform may not be single-buyer-single-seller (SBSS) ex-ante stable. ...

Essays on Political Economy and Institutions See

This thesis consists of three empirical essays that explore distinct themes in the realm of political economy and economics of institutions. All, in essence, are investigations into the role of distinct attributes of political institutions and political actors induced by these &#...

Multidimensional Scaling Using Artificial Neural Networks See

Manifold Learning has been widely exploited in the arena of data analysis, machine learning and pattern recognition. The main assumption behind manifold learning is that the input high-dimensional data lies intrinsically on a low-dimensional manifold. This technique is to be used ...

Few-Shot Meta Learners for Domain Adaptation See

Modern developments in Deep Learning and Machine Learning have shown great capacity to learn from labelled training assumption that training data and the data which the learning algorithm might see during testing or deployment have the same distribution. However this might not be t...

Few-Shot Meta Learners for Domain Adaptation See

Physical attacks on CCA-Secure Lattice-based KEM SABER See

Nowadays the security of most used public-key algorithms are based on the hardness of one of the following problems : 1. The integer factorization, 2. The elliptic-curve discrete logarithm problem. But these problems can be solved by Shor's algorithm [38] and Proo...

Bulk Categorization Analyse See

Evaluation of Optical Character Recognition (OCR) accuracy: Supervised and Unsupervised techniques See

This work’s aim is to find an efficient method to measure the Optical Character Recognition (OCR) accuracy in the absence of the ground truth text. To successfully obtain the desired result, initially we have tried some efficient supervised (in the presence of the ...

Investigating Applications of The Target Di erence Algorithm in Keccak & Ascon See

Project on securing personal health information associated with HIPAA compliance See

In this project my aim was to research about how to secure personal health information associated with HIPAA compliance. Firstly, we tried to understand what is HIPAA and how it is connected to health information. Then we tried to find related encryption schemes f...

Efficient and Secure Access Control for Sensitive Healthcare Data See

Healthcare services produce and use a great deal of sensitive personal data. But the fact is that this healthcare data has very high black market value. Now to easily access the healthcare data we can think about an access control server. So if we want to ...

Design and Analysis of Blockchain-based E-voting Protocols See

Voting is the most fundamental cornerstone in the context of representative democracy. With the advent of the internet technologies, various types of e-voting mechanisms have emerged. Building an e-voting system capable of performing as good as a traditional voting system is a&#x...

Verifiable e-auction over a Block-Chain See

Auction has been an integral part of trading throughout ages. Sealed-bid e-auction (both first-price and second-price) is considered to be a classic example of Secure Multi-Party Computation problem. In this project, without assuming any role of auctioneer, we try to formulate&#...

Fault Analysis of the Prince Family of Lightweight Ciphers See

Privacy is one of the most fundamental aspects of the digital age that we live in. With the advent of the Internet and the advances in both nanoscale electronics and communication technologies, data has become the new oil. And wherever there is data there is&...

Study on the Generation of Pseudo-Random Numbers using Recurrent Neural Network See

Generating random numbers is an important task in cryptography as well as computer science. Pseudo-randomness is fundamental to cryptography and it is required for achieving any cryptographic function like encryption, authentication and identification. The quality of a pseudorandom number...

A Catalogue for Provably Secure Symmetric Modes and Primitives See

Modern-day Symmetric-key Cryptology is enriched with numerous contributions including symmetric-key primitives to modes of operation. The approach to design and develop provably secure designs have accelerated the growth of this subject. A lot of encryption, authentication and authenticated&#x...

Prediction of Rate of Penetration in Drilling See

Drilling has become an expensive and necessary operation to explore petroleum and natural gases.The goal is to increase drilling speed with minimum cost and at the same time maintaining safety.Predicting rate of penetration (ROP) in real time is very important to optimise dr...

Rainbow Edge Coloring See

Graph coloring is a well known problem with wide-ranging applications. The vertex and edge coloring problems have been studied in various models of computation. Rainbow coloring is a type of edge coloring that also acts as a connectivity measure for graphs. It was ...

Communities in DSpace

Choose a community to browse its collections.

Logo

Conference Papers

Logo

Convocation Addresses

Logo

Dissertation and Thesis

Logo

Institutional Documents and Records

Logo

J B S Haldane Collection

Logo

Multimedia

Logo

P C Mahalanobis Collection

Logo

Question Papers

Logo

Report

Logo

R L Brahmachary Collection

Logo

Scientific Contributions of ISI

Logo

Trial

Logo

W A Shewhart Collection

Discover

Author
  • 294 Mahalanobis, P C
  • 237 Indian Statistical Institute
  • 210 Pal, Sankar K
  • 101 Ghosh, J K
  • 101 Shewhart, W A
  • 95 Neelameghan, A
  • 93 Bandyopadhyay, Sanghamitra
  • 86 Pal, N R
  • 86 Rao, C Radhakrishna
  • 83 Majumder, Partha P
  • . next >
Subject
  • 477 Statistics
  • 147 Library science
  • 92 Algorithms
  • 87 Annual report
  • 74 Economics
  • 71 India
  • 66 B Stat
  • 62 Sampling
  • 61 Indian Statistical Institute
  • 60 Library classification
  • . next >
Date issued
  • 2851 2000 - 2022
  • 3816 1917 - 1999
Theme by Logo CINECA

DSpace Software Copyright © 2002-2013  Duraspace (DSpace Version- 5.6) - Feedback