Department

Sort by: Order: Results:

  • PRASANNA, AVI (2011-05)
    During this project, I studied the basics of Algorithms and ideas in a much more concrete way. By attending a course on "Selected Topics in Algorithm", I got a chance to study the subject in depth, which helped me to ...
  • YADAV, RAJESH KUMAR (2011-05)
    This study is about normality of real numbers. In this study we will mainly look at the expansion of real numbers to any integer base b(b>1) and depending on that we will introduce the concept of normality. We will look ...
  • GUPTA, KAPIL KUMAR (2011-05)
    Currently Quantum computer are expected to be biggest threat in public key cryp- tography. My thesis work is about study and practical implementation of the code based cryptosystem. This thesis is inspired by the research ...
  • ANAND, VIVEK (2011-05)
    Time series analysis gives us a window to look at the past events and make predictions about the future. It has been long since it was discovered that various natural process exhibit a long memory property, characterized ...
  • ADIMOOLAM, ARVIND (2011-06)
    Its the study of sieve inequalities leading to Bombieri-Vinogradov inequality.
  • BASU, RABEYA (World Scientific Publishing, 2011-07)
    When R is a commutative ring with identity, and if k ∈ ℕ, with kR = R, then it was shown in [C. Weibel, Mayer–Vietoris Sequence and Module Structure on NK0, Lecture Notes in Mathematics, Vol. 854 (Springer, 1981), pp. ...
  • Kulshrestha, Amit; SINGH, ANUPAM KUMAR (Indian Mathematical Society, 2011-11)
    In this article we try to explore the relation between real conjugacy classes and real characters of finite groups at more refined level. This refinement is in terms of properties of groups such as strong reality and total ...
  • SPALLONE, STEVEN (Mathematical Sciences Publishers, 2012-01)
    Let G be a reductive algebraic group over ℚ, and suppose that Γ ⊂ G(ℝ) is an arithmetic subgroup defined by congruence conditions. A basic problem in arithmetic is to determine the multiplicities of discrete series ...
  • MAITY, SOUMEN (Institute of Electronics, Information and Communication Engineers, 2012-01)
    In most software development environments, time, computing and human resources needed to perform the testing of a component is strictly limited. In order to deal with such situations, this paper proposes a method of creating ...
  • Bucur, A.; Chantal, D.; Feigon, B.; Matilde Lalín; SINHA, KANEENIKA (International Press, 2012-01)
    We study the distribution of the zeroes of the zeta functions of the family of Artin–Schreier covers of the projective line over Fq when q is fixed and the genus goes to infinity. We consider both the global and the ...
  • VENKAT, GUHAN (2012-01)
    This thesis presents an exposition of the basic theory of Elliptic curves over an arbitrary scheme with emphasis on the group scheme structure, the structure of the N-torsion points on the group scheme, various applications ...
  • KUMAR, RAHUL (2012-04)
    Integer factorization has been interesting problem for mathematicians since centuries. Integer factorisation lies in the heart of Number Theory. There has been many algorithms for factorisation such as Dixon’s factorisation, ...
  • Jenkins, Adrian; SPALLONE, STEVEN (World Scientific Publishing, 2012-04)
    In this note, we consider locally invertible analytic mappings of a two-dimensional space over a non-archimedean field. Such a map is called semi-hyperbolic if its Jacobian has eigenvalues λ1 and λ2 so that λ1 = 1 and |λ2| ...
  • MORE, ANUJ KUMAR (2012-05)
    The aim of the project is to understand Bezout’s Theorem for curves from algebraic and geometric point of view. The Theorem states that in complex projective plane, the number of points in which any two curves (with no ...
  • SAVALE, ANUP (2012-05)
    Positioning and pricing of products are two very crucial decisions that a company needs to make in a competitive market. These decisions are in turn affected by a variety of factors, which include the intensity of competition; ...
  • SHAH, JAY (2012-05)
    In Europe and North America, the most widely used stream cipher to ensure privacy and confidentiality of conversations in GSM mobile phones is the A5/1. In this thesis, we study the A5/1 and some known attacks on it. We ...
  • MULLATH MOHAMMED SHERIEF, MOHAMMED ZUHAIR (2012-05)
    The thesis surveys some interesting equidistribution problems and ergodic methods pertinent to number theory. In chapter 1, the Weyl criterion is introduced and we study the relationship between some equidistribution ...
  • VATWANI, AKSHAA (2012-05)
    In this thesis we give an exposition of John Tate's doctoral dissertation titled `Fourier Analysis in Number Fields and Hecke's Zeta-Functions'. In this dissertation, Tate proved the analytic continuation and functional ...
  • PANTANGI, VENKATA RAGHU TEJ (2012-05)
  • FATIMA, AYESHA (2012-05)
    In this thesis we give detailed solutions of the exercises in the rst chapter of the textbook 'Algebraic Geometry' by Robin Hartshorne. We have followed this with an essay in which we have proved two theorems which bring ...