Design of Blockchain-Enabled Secure Real Life Applications
See
Blockchain is a distributed, immutable, verifiable append-only ledger maintained
across a peer-to-peer network. Bitcoin, proposed by Satoshi Nakamoto
in 2008, is the first and most popular application based on blockchain technology,
enabling digital transactions using a virtual currency c...
Multi-View Correlation and Discriminant Analysis:
See
Advancements in data acquisition make multiple data sources available to
explain different perspectives of an object. In order to enhance the performance of a
single-task learning such as classification, the multi-view learning (MVL) leverages the
complementary and consistent information&...
Elliptic Harnack Inequality, Conformal Walk Dimension and Martingale Problem for Geometric Stable Processes
See
Recently, Murugan and Kajino introduced the notion of conformal walk dimension as a bridge between parabolic and elliptic Harnack inequalities. They showed that a symmetric diffusion process satisfies the elliptic Harnack inequality if and only if its conformal walk dimension equals 2, ...
Some selected problems in discrete-valued time series analysis
See
This thesis analyzes some discrete-valued time series problems, which are classified into two
types: (i) categorical time series and (ii) count time series. In this thesis, we primarily use two
well-known models in the context of discrete-valued time series research: (i) Pegram’s...
Morel-Voevodsky developed A^1-homotopy theory which is a bridge between algebraic geometry and algebraic topology. In this thesis we study the A^1-connected component of a smooth variety in great detail. We have shown that the A^1-connected component of a smooth variety contains the inf...
Nuclei Segmentation and Color Normalization of Histological Images:
See
Histological image analysis deals with microscopic examination of tissue samples, which
are stained with multiple histochemical reagents to highlight different cellular structures. The most
important characteristic of histological images is the enormous amount of information, which
makes compu...
Mirror Theory and its Applications in Cryptography
See
The indistinguishability security of a cryptographic construction refers to the maximum advantage of an interactive adversary to distinguish between the real and ideal world, where in the real world it interacts with the construction, and in the ideal world it interacts with its id...
A Lightweight Multi-Attention Deep Architecture for Liver Tumor Segmentation with Limited Samples
See
Liver tumor segmentation from CT images is of paramount importance in medical image analysis.
Accurate segmentation of liver tumor is crucial for effective diagnosis and treatment planning in
hepatocellular carcinoma and other liver malignancies. Manual as well as traditional segmentation&...
Harnessing the Power of Deep Neural Networks for Accurate Leaf Disease Identification
See
Many countries around the world depends on agriculture, as it helps reduce poverty,
increase national income, and improve food security. However, plant diseases often
impact food crops, leading to significant annual losses and economic setbacks
in agriculture. The best solution ...
Leveraging software engineering frameworks, methods and tools to automate CRM pre-sales in real estate applications
See
In this thesis, we leverage the learning from Essence, a “language and kernel“ of
Software Engineering, which has resulted from the efforts of the SEMAT initiative
founded to bring together industry, research and education to deal with the problem
of immature practice ...
In this thesis, we use the techniques of Boolean functions in di erent applications.
More speci cally, our focus is on the properties of Boolean functions that hold cryptographic
signi cance. The employed techniques primarily revolve around combinatorial
methods, yielding fresh&...
Investigating Security of a Few Schemes Based on Public Primitives
See
Random oracles are cryptographers’ conceptions of what an ’ideal’ hash function should be.Put succinctly, a random oracle is a perfectly random function that you can evaluate quickly. Random functions are beautiful not just because the output is random-looking (of course) but also becau...
Automated Determination of Glacier Ablation Zones
See
In recent decades, global temperature rises have significantly influenced glacier dynamics
[1][2], underscoring the vital need for accurately delineating glacier boundaries
to comprehend these shifts and document regional patterns. Despite this urgency,
conventional methods struggle to map deb...
Handling Class Imbalance Using Regularized Auto-Encoders with Weighted Calibration
See
DeepSmote uses the SMOTE technique in the latent space of an Autoencoder-
Decoder model to produce high fidelity images for imbalanced data. But it is be
limited by 2 essential artillery: over-fitting the data and a lack of continuity of the
latent space thus ...
Sphere fibrations over highly connected manifolds
See
This thesis analyzes the construction of the sphere fibrations over (n − 1)-connected 2n-manifolds for an even integer n such that the total space is a connected sum of sphere products, in a localized category of spaces. Integral results are obtained for n=2, 4. ...
Effects of symmetry in combinatorial complexity measures of Boolean functions
See
Boolean functions are one of the central objects in the study of
Computer Science. Any decision problem can be expressed as a Boolean
function that takes an $n$-bit string as input and gives a single-bit
output. Its versatility in capturing various problems in a...
Cryptanalysis of Selected SPN and NLFSR-based Symmetric-Key Ciphers
See
The thesis focuses on the cryptanalysis of private-key ciphers, which are widely used
encryption methods due to their fast encryption/decryption computing ability and low memory
requirements. The thesis covers two different aspects of cryptanalysis: traditional attack
techniques and ...
Data Reduction Using EM Algorithm with Deliberately Introduced Missingness
See
Abstract
Essays on Evaluation Aggregation, Strategy-proof Social Choice, and Myopic-Farsighted Stable Matching
See