Ph.D Theses
Permanent URI for this collection
Browse
Browsing Ph.D Theses by Title
Now showing 1 - 20 of 917
Results Per Page
Sort Options
Item A Comparative Study of Mythology in the Novels of Narendra Kohli and Amish Tripathi (With Special Reference to Ram Katha Series)(Avinashilingam, 2024-06) Niraja T K; Dr. G. Shanthiममथक दुननया के सबसे समृद्ध ऩौराणिक कहाननयों का एक खजाना है । इसका अद्भु त एवॊ अनूठा ऩहऱू यह है कक सभी ऱोग अऩने देश या समाज के इन सददयों ऩुरानी कहाननयों से ऩूिण रू ऩ से ऩररचित है । इन कहाननयों को हमे बिऩन में सुनाया जाता है जो कऱ के मऱए एक अच्छे नागररक बनने के मऱए हमारे व् यक्ततत्व को आकार देता है । इसके साथ ममथक ककसी व् यक्तत से सॊबॊचधत ववरासत या सॊस् कृनत का ननमाणि में अहम भूममका ननभाती है। ममथक और ऱोक कथाएॉ ऱोगों की धमों का आधार बन जाती है क् जनका वे सददयों से ऩाऱन करते आए हैं ।ममथकीय कहाननयों में जो बुराई और अच्छाई के बीि ऱडाई उल्ऱेणखत है उससे हमें नैनतक मूल् य सीखने को ममऱता है । ममथक ऩूवणजों के मऱए महत् वऩूिण थी ,आजभी महत् वऩूिणहैऔरहमेशा रहेगी। इसका प्र भाव इतना सशतत है कक कई मानवीय तकों में भी ममथक का प्र नतबबॊब छायाॊककत होता है । ममथक को महत् वऩूिण मानने के ऩीछे का सबसे मुख् य कारि यह है कक यह एक ऐसी कहानी है क् जसमें कुछ वास्तववक तथ्य शाममऱ है । एक ही ममथक में ववश्वास करने वाऱे ऱोगों के बीि कभी -कभीएकताभी होताहै । इनमें मतभेद होने की सॊभावना कम ददखाई देता है । ममथक को अऩने आऩ में यथाथण माना जाता है जो मनुष् य के अॊदर कृतज्ञ एवॊ आशा की भावना को जगाती है । इसी कारि से ममथक का मनुष् य ऩर प्र भाव के सॊबॊध में ताककण क रू ऩ से विणन करना कदठन है । ममथकीय सादहत्य के ऱेखन में ववमभन्न रिनाकारों ने अऩना महत् वऩूिण योगदान ददया है । उनमे नरेंद्र कोहऱी एवॊ अमीश बिऩाठी के ममथकीय उऩन्यासों ऩर मैंने शोध कायण ककया है ।Item A Deep Learning Framework for Detection and Segmentation of Multiple Artefacts in Endoscopic Images(Avinashilingam, 2023-05) Kirthika N; Dr.B.SargunamEndoscopy is a standard procedure for disease surveillance, monitoring inflammations, detect cancer and tumor. During the procedure the organs are visualized. Artefacts, an artificial effect is found to be present in the resultant images. They play a dominant role in increasing procedure time by more than an hour. Hence an efficient algorithm to detect, segment and restore could assist clinician. The artefacts present in an endoscopic image include saturation, specular reflections, blur, bubbles, contrast, blood, instruments and miscellaneous artefacts. The presence of these artefacts acts as a barrier when investigating the underlying tissue for identifying clinical abnormalities. It also affect post processing steps where most of the images captured are discarded due to the presence of artefacts which in turn affects information storage and extracting useful frame for report generation. Endoscopic artefact detection dataset is the only available public dataset holding endoscopic images with annotations for multiple artefacts. Hence, a custom dataset is annotated using the same annotation protocol of endoscopic artefact detection dataset to maintain homogeneity. The algorithms are trained and tested with images from both public and custom dataset for artefact detection. State of the art object detection algorithms such as YOLOv3, YOLOv4 and faster R-CNN are used for detecting artefacts in endoscopic images. The detection algorithm focusses on three important performance parameters namely mean average precision, intersection over union and inference time. The ensemble model outperformed well across all the performance parameters compared with literature. The inference time is reduced by 8.63%, whereas the mAP and IoU are increased by 61.67% and 63.47% respectively. newlineSegmentation algorithms like U-Net with EfficientNetB3 backbone, Link-Net with EfficientNetB3 backbone and U-Net with SE-ResNeXt101 backbone are used to segment the artefacts. The results are assessed with performance parameters like F2 score and Jaccard score.The results proves a phenomenal increase in Jaccard score by 17.36% and F2 score by 17.42% respectively. An image if found to have artefacts after artefact detection,the affected region will be segmented by the proposed segmentation algorithm.To visualize the scope and need of artefact detection and segmentation a simple application is developed to restore the artefacts. The segmented output contains a binary mask using which fast marching algorithm will restore the segmented area. Hence the resulting restored image gives the clinician a better view of the organ. A simple CNN based classifier is proposed to classify polyp. It is found that the classifier's performance is improved by 3.09% when the artefacts in the images are restored. Thus such outcomes when implemented in real time could effectively have a control over the false diagnosis rate, which is the rate at which the disease is misclassified, procedure time and clinician's fatigue as well.Item A Descriptive Study on Second Order Bipolar Fuzzy Structures(Avinashilingam, 2025-03) Muthamizhselvi S; Guide - Vijayalakshmi V MThe present study is focused on second order bipolar fuzzy structures. The concepts such as second order bipolar fuzzy sets and second order bipolar fuzzy topological spaces following both Chang and Lowen sense are introduced. Relations between first and second order bipolar fuzzy topological spaces and relations between crisp topological spaces and second order bipolar fuzzy topological spaces are analysed. Second order bipolar fuzzy continuity is introduced and its properties are discussed. The definitions of first order and second order bipolar fuzzy product topology are introduced. Relations between first and second order bipolar fuzzy product topology and relations between crisp product topology and second order bipolar fuzzy product topology are examined. The concept of first and second order bipolar fuzzy gradation of openness are introduced. A new definition of first order bipolar fuzzy topology induced by first order bipolar fuzzy radation of openness is given. Relations between first order bipolar fuzzy gradation of openness, second order bipolar fuzzy gradation of openness and first order gradation of openness are discussed. Results related to second order bipolar fuzzy topologies induced by second order bipolar fuzzy gradation of openness are obtained. Five types of second order bipolar fuzzy compactness are introduced. Results related to second order bipolar fuzzy compactness are obtained. Second order bipolar fuzzy matrix is introduced. Operations such as addition, multiplication and complement of second order bipolar fuzzy matrices are given and definitions like transpose, trace and identity of second order bipolar fuzzy matrix are presented. Also properties like associative law and distributive law are verified. The working procedure of second order bipolar fuzzy TOPSIS method is given and an optimal solution for a decision making problem on selecting a best project proposal submitted for project funding is obtained.Item A Framework for Developing an Enhanced Convolutional Neural Network Based Ensemble Learning Model for Alzheimers Disease Classification Using MRI Brain Images(Avinashilingam, 2025-03) Chithra S; Guide - Dr. R. VijayabhanuThe integration of machine learning techniques in imaging domain is experiencing a deep transformation. It enables systems to analyze massive amount of data, distinguish patterns, and make forecasts with minimal human intervention. Machine Learning is applied to various domains in healthcare sector like disease diagnostics, treatment planning, drug detection and patient management. The machine learning models impact the complex and data exhaustive fields like oncology, cardiology, and neurology. In medical imaging machine learning models can examine MRIs, X-rays to identify irregularities like lumps, fractures, or organ deformities with high accuracy, regularly beating the capabilities of human clinicians. This present study focuses on the brain neuron images in classifying the Alzheimer’s Disease (AD) stages, which aids neurologists to understand complex changes in the brain. Through brain imaging analysis, the study strives to diagnose AD in its premature stages. AD is a deteriorating brain ailment caused by brain cells degeneration that impairs memory and intellectual damage that disturbs lots of old age individuals across the globe. Its a permanent brain ailment that steadily wear away thinking and memory skills which finally disturbs even the basic tasks. The memory and cognitive functions are affected in AD which is the reason for dementia in older population. These computational techniques use algorithms to analyze the brain images to classify patterns and features related to AD. To evaluate medical pictures and to discover neurological ailments like AD computational techniques like Machine Learning (ML) and Deep Learning (DL) techniques are applied in recent times. The objectives are to develop the classification potential of AD stages using ML and DL methods derived from ensemble classification framework. The contributions of this research work primarily focus on the preprocessing framework to eradicate the noises in the brain neuron MRIs by applying various de-noising filters to enhance the image deviations and to attain upgraded classification performance. The segmentation process is performed to for skull removal from the brain neuron image by applying thresholding methods to obtain a perfect image of the brain structure. To address the imbalance problems, a transfer learning approach is used for feature extraction. The first layer is transmitted, followed by the retrieval of features from Convolutional Neural Network using AlexNet model for feature retrieval. Lastly, classification is achieved from the extracted features using ML algorithms such as Decision Tree (DT), K-Nearest neighbor (KNN), Support Vector Machine (SVM), Neuro Evolution of Augmenting Topologies (NEAT), and BAGGING for AD stage classification. This study proposed two hybrid classification techniques like BAGGING_SVM and BAGGING_NEAT. The first hybrid classification technique combines BAGGING and SVM approaches to classify brain neuron images. The second hybrid classification technique combines the BAGGING and NEAT approaches to classify brain neuron images.Item A Hybrid Machine Learning approach for Detecting Intentional and Unintentional Insider Threats with Mitigation through Behavioral Biometrics and User Profiling Mechanism(Avinashilingam, 2025-07) Asha S; Guide - Dr. D. ShanmugapriyaInsider threat is a potential threat to an organization that results in financial and reputation losses while exposing sensitive information. Past research extensively focused on external threats, and overlooked on both intentional and unintentional insider threats.Several researchers majorly focused on detecting such insider activities but fail to mitigate both intentional and unintentional insider threats. Few challenges such as mishandling imbalanced dataset and fail to incorporate feature engineering techniques, limited mitigation strategies are encountered. This research employs a hybrid machine learning approach to identify insider threats and incorporated behavioural biometrics with user profiling to mitigate both intentional and unintentional insiders effectively. A methodology comprising of three phases is proposed. It consist of Preprocessing and Insider Detection (P&ID) in Phase I, Unintentional Insider Mitigation (UIM) in Phase II, and Intentional Insider Mitigation (IIM) in Phase III. P&ID consist of two layers - Preprocessing, and Insider Detection. In Layer 1, log data is preprocessed using data integration, encoding and tuned the nearmiss-2 sampling technique to obtain a balanced data to diminish the class imbalance problem. In Layer 2, a hybrid B-SVM combining Support Vector Machines (SVM) and Balanced Iterative Reducing and Clustering using Hierarchies (BIRCH) is applied. It classifies users into genuine, intentional insiders, and unintentional insiders. The proposed method achieved a 99.15% detection accuracy, with a low misclassification rate of 0.85% for detecting both intentional and unintentional insider threats. Once unintentional insiders are detected, the unintentional insiders are mitigated in UIM phase. UIM phase consist of two layers – Feature engineering, and Core behavior identification. In Layer 1, Clonal Kernel Principal Component Analysis (CKPCA) is proposed for feature engineering. CKPCA integrates population subset selection, kernel mean embedding, and dimensionality reduction to improve feature representation. These features are further analyzed using Deep Belief Networks (DBN) in Layer 2 that achieved 99.84% authentication accuracy and a 0.15% Equal Error Rate (EER) of 0.15%. This phase significantly minimizes false alarms and ensures a reliable mitigation process for unintentional insiders. In IIM phase, the detected intentional insiders are mitigated using user profiling mechanism based on their authentication outcome. IIM phase consist of three layers – Data pre-processing, Model training and evaluation, and User profiling. In Layer 1, data pre-processing is done using label encoding and train-test split. In layer 2, Decision tree is modeled to categorize users low-risk and high-risk. In Layer 3, Low-risk users with legitimate activities are profiled into the Allowlist, while users displaying malicious intent with high-risk are placed on the Denylist. This adaptive profiling ensures that intentional threats are neutralized without affecting genuine users. The methodology was validated using two datasets namely the CERT Insider Threat Dataset and the CIC Darknet Dataset. P&ID detected 8 intentional and one unintentional insider among 250,078 daily logs using CERT Dataset. P&ID is validated with darknet dataset, detected 4,783 intentional-Darknet users and 68 unintentional- Darknet users where (VPN: 42) (Tor: 21) (NonVPN: 5) among 134,305 daily activities. UIM mitigated one unintentional insider as an intentional insider using CERT log activities. UIM mitigated 68 unintentional-Darknet users as 64 Intentional-Darknet and 4 benign users using darknet dataset. IIM profiled 57 genuine users in Allowlist and 8 intentional insiders in Denylist using CERT dataset. Using CIC Darknet dataset, the IIM profiled 5063 benign users in Allowlist and 4847 Intentional-Darknet users in Denylist. This study offers a practical and highly effective solution for insider threats in environments where user log data is analyzed. By combining hybrid machine learning models with behavioral biometrics and user profiling, the approach ensures accurate detection and mitigation of both intentional and unintentional threats. This approach can be applied in any environment where user log is prevalent.Item A Neo-Marxist Study of the Select Retellings of Mahabharata(Avinashilingam, 2024-03) Kushma Kumari T V; Guide - Dr. A. VijayaraniMyth is a dynamic and man-made belief to maintain the culture of a society. It is revisited and altered according to the necessity of people and acts as a guiding source for people. The retellings of Mahabharata fascinate the researchers to apply literary theories and experiment it from different points of view. The present study is an attempt to explore on the retellings of Mahabharata by Devudtt Pattanaik (Jaya: an Illustrated Retelling of Mahabharata), Anand Neelakantan (Ajaya: Roll of the Dice), Kavita Kane (Karna’s Wife: the Outcast’s Queen) and Ashutosh Nadkar (Shakuni: Master of the Game) by applying a Neo-Marxian concepts ‘Theory of Cultural Hegemony’ and ‘Role of Intellectuals’ by Antonio Gramsci. The researcher has taken both male and female characters from the chosen primary texts to discuss about the cultural domination prevailed during the ancient time and has also highlighted on the functional solution enumerated by Gramsci with the aid of the characters. The study explicates on the retellings of Mahabharata with certain aspects from Gramsci’s ‘Theory of Cultural Hegemony’ and ‘Role of Intellectuals’. Elucidates on the purpose of retelling of Mahabharata by critically analysing the selected texts and elaborates on the cultural aspects from them. The study also draws attention to the culture based dominations, capitalist ideologies and gives a practical solution for domination in accordance with Gramsci. The area of research is relevant in this present scenario to highlight the cultural hegemony which still exists among the Indians in different forms. The work is significant as it can relate the issues depicted by the authors of the selected retellings of Mahabharata with our current society.Item A study on Neuroprotective potential of in vitro and field tissues of Withania somnifera using Caenorhabditis elegans model(Avinashilingam, 2023-03) Krishnapriya C; Dr. Kalaiselvi SenthilWithania somnifera is a prevalent medicinal herb used all over the world as a domestic remedy for addressing several age-related ailments. The plant is also one of 32 medicinal plants that have been ranked as priority medicinal plants by the National Medicinal Plant Board (NMPB). Ayurveda refers the field grown W. somnifera roots as a Rasayana medication (Rejuvenator). It has been used as the major ingredient in a variety of formulations to help slow down the aging process, cope with stress, and be an excellent neuroprotectant. However, the quality and quantity of traditionally cultivated plants present a significant obstacle to their utilization in herbal formulations. This study aims to demonstrate that in vitro shoot tissues of W. somnifera could be used as an alternative and be as bioactive as roots grown in the field. The HPTLC quantification of major withanolides and GC-MS profiling of metabolites revealed that the pharmacological actives of IS (in vitro shoot) showed the overall similar metabolite profile as in FR (field grown roots). As measured by DPPH radical scavenging activity, the antioxidant potential of in vitro shoots (IS) was also higher than that of field grown tissues (FR & FS) and in vitro roots (IR). The animal model study in Caenorhabditis elegans presented numerous lines of evidence regarding the effectiveness of the IS on the health and life expectancy over the FR, IR and FS. Along with this, the study compares the molecular level mechanisms underlying the beneficial effects of FR, IR, FS and IS supplementation by using gene-specific mutants. The efficacy of W. somnifera extracts to prevent α-synuclein aggregation, its associated pathologies, and its capability for neuroprotection were studied in Parkinson’s disease-modeled worms. The finding of this study highlighted that IS is equally bioactive as traditionally used FR. Moreover, the IS extracts efficiently prolongs the lifespan, heath span and stress resistance via insulin/insulin- like growth factor-1 (IGF-1) signaling (IIS) and mitochondrial electron transport chain complexes (mETC). The IS extract is more effectual for suppressing oxidative stress, a remarkable neuroprotectant in Parkinson’s disease modeled worms. As the first study to investigate the bioactivity of W. somnifera shoots cultivated in vitro, these results could contribute to the scaling up of IS culture systems and in vitro shoot tissues for treating neurological and age-related ailments, extending patients' lives, and improving their quality of life.Item Acceptability and Supplementation of Red Palm Oil on Selected Target Groups(2007-01-06) Thirumani Devi, A; Amirthaveni, MItem Acceptability of Soya Based Recipes in Food Service(1995-07) Sarojini, K S; Parvathi Easwaran, PItem Accessibility and Adaptability of Limb Prosthesis - An Ergonomic Concern(2015-07) Sarasvathi, V; Visalakshi Rajeswari, SItem Accumulation and Transformation of Lead in the Urban Ecosystem Due to Automobile Emissions and its Remediation Measures(2003-02) Seema George; Seema GeorgeItem Achievement Motivation and Emotional Competence in Relation to Mental ability of B. Ed Teacher Trainees in Kerala(2020-07) Valsa.T.Chiramel; Vasuki, NItem Acoustic Analysis for Human Voice Disorder Classification Using Optimization and Machine Learning Techniques(2019-03) Sheela Selvakumari, N A; Radha, VItem Acquisition and adoption of Digital Competency among Women Entrepreneurs in the Informal Sector(Avinashilingam, 2025-07) Mary Treasa C P; Guide - Dr. P .ShanthiDigital competency has emerged as a critical requirement for business development, sustained growth, and long-term competitiveness across sectors. The ability to navigate digital tools and platforms enhances operational efficiency, facilitates access to broader markets, strengthens customer engagement, and improves financial and administrative management. In this context, Digital skills serve as a vital indicator of an individual’s capacity to remain competitive, adapt to technological advancements, and leverage innovation for sustainable business outcomes. In the absence of adequate digital proficiency, many face the risk of exclusion from mainstream economic activities. The present study examines the influence of core antecedents, namely digital competency, performance expectancy, effort expectancy, social influence, and facilitating conditions, on behavioural intention, and how these factors contribute to the actual usage of technology in business operations. The study adopts the Unified Theory of Acceptance and Use of Technology (UTAUT) as its theoretical framework, which effectively captures the interplay between these constructs and their impact on technology adoption. The study is both descriptive and analytical. The locale of the study is Palakkad district in Kerala, India, which was purposively selected due to its prominence for largely informal micro-enterprises. Primary data were collected from a sample of 240 informal women entrepreneurs using a structured questionnaire, and the internal consistency of the instrument was confirmed with a Cronbach’s alpha value exceeding 0.70, indicating acceptable reliability. In addition, secondary sources such as government reports, published research articles, and institutional databases were utilized to complement and contextualize the findings. Targeted Digital competency intervention addresses the digital skill gap by systematically enhancing individual abilities in preparing training modules across key dimensions of digital competency and business applications for business operations. Moreover, technology adoption is closely linked to behavioural factors of technology adoption. Rank analysis was employed to identify the most significant challenges to technology adoption. To assess whether a significant mean difference existed in digital competency levels of women in the informal sector before and after the training intervention, the Wilcoxon Signed-Rank Test was applied. Additionally, the Kruskal-Wallis Test and the Mann-Whitney U Test were used to examine significant differences in digital competency across various socio-demographic and business profile variables of the respondents. The Structural Equation Modelling (SEM) was conducted to evaluate the influence of key antecedents of behavioural intention on the actual use of technology The result indicated that digital competency was found to be significantly influenced by performance expectancy, indicating that enhanced digital skills improve perceptions of technology’s usefulness in business operations. This perception of performance expectancy, in turn, had a strong positive impact on behavioural intention to adopt technology. Social influence also emerged as a significant predictor of behavioural intention, emphasising the role of peer support and community validation in shaping technology adoption decisions. Furthermore, both digital competency and behavioural intention significantly contributed to the actual use of technology in business, confirming their pivotal roles in the adoption process. Behavioural intention was also identified as a key mediator between social influence and actual technology usage. On the other hand, Digital competency did not influence effort expectancy, suggesting that users still perceive new technologies as requiring effort despite increased digital proficiency. Effort expectancy and facilitating conditions did not significantly affect behavioural intention, indicating that ease of use and external support were less influential in determining intent to adopt technology. The sustained technology adoption is more closely tied to internal factors such as digital competency and perceived performance benefits than to structural or external enablers alone. Keywords: Women Entrepreneurs, Technology Adoption, Digital Competency, Behavioural Intention, Performance Expectancy, Effort Expectancy, Social Influence, Facilitating Conditions, Actual Usage.Item Acute Lymphocytic Leukemia Classification using Enhanced Machine Learning and Deep Learning Algorithms(2024-01) Saranya Vijayan; Radha, VItem Adhunik Dalit Kahaniyon Mein Stri Chetana (Chunee Huyi Kahaniyon Ke Vishesh Sandarbh Mein)(Avinashilingam, 2024-11) Arunima A M; Dr. Shobhana Kokkadanबायतीम साहहत्म भें प्र ािीन साहहत्म से रेकय हहॊदी साहहत्म तक दशरत िगत का धित्रर् फडे ऩैभाने ऩय देखने को शभरता है। इस सम् ऩ र् त बायतीम साहहत् म भें छुआछत की ऩीडा, दशरत भहहराओॊ की सभस्मा औय उनके शोषर् िैसे अन्मामों के प्र तत आक्रोश औय विद्रोह की अशबव् मजक् त हुई है। हिायों िषों से धभत , शास्त्र , ऩयॊऩया औय यीतत-रयिािों के नाभ ऩय उनका खफ शोषर् ककमा गमा है। अनेक प्र काय की अऺ भताओॊ के कायर् न केिर उनकी ऩहिान नगण्म यही है , फजकक उन्हें हभेशा गयीफी की खाई भें धकेरा गमा है , िो सैकडों ऩीह़िमों से िानियों से बी फदतय िीिन िीने को भिफ य हैं, धाशभतक औय ऩायॊऩरयक रोगों द् िाया दशरतों का हय सॊदबत भें शोषर् ककमा िाता यहा है। िषत १९९० के दशरत साहहत्म ऩय निय डारें तो मे िे फदराि थे िफ साभाजिक , आधथतक, यािनीततक औय साहहजत् मक ऺेत्रों भें प्र गतत हुई। दशरत साहहत्म १९९० से ऩहरे बी शरखा गमा था रेककन दशरत भहहराओॊ की सभस्माओॊ को उस तयह से नहीॊ उठामा गमा जिस तयह से १९९० के फाद उनकी सभस्माओॊ को उठामा गमा। बायतीम साभाजिक व् मिस् था भें दशरत भहहराओॊ की जस् थतत फहुत दमनीम है। दशरत भहहराएॊ दोहये अशबशाऩ से ग्रस् त हैं। ए क तो भहहरा होने का औय दसया दशरत भहहरा होने का। दशरत भहहराओॊ का रेखन औय दशरत भहहराओॊ को केंद्र भें यखकय ककमा गमा रेखन भुख् म रू ऩ से आधुतनक मुग की देन है। दशरत स्त्र ी िेतना सभाि औय साहहत्म भें दशरत भहहराओॊ के फ़िते शोषर् का ऩरयर्ाभ है। बायतीम सभाि भें हभेशा से ही िातत के आधाय ऩय भहहराओॊ के फीि बेदबाि होता यहा है। िातत आधारयत शोषर् के कायर् दशरत भहहराओॊ के अजस् तत् ि को हभेशा से नकाया गमा है। उन् हें ऩ ॊिीिादी सभाि द् िाया उऩबोग की िस् तु की तयह खयीदा औय फेिा िाता यहा है। दशरत भहहराएॊ इॊसान होते हुए बी िानियों की तयह िीने को अशबशप्त हैं। सभाि भें अऻानता के अॊधकाय के कायर् उनका हय रू ऩ भें शोषर् होता था। दशरत सभाि को सभाि भें अऩनी ब शभका स् थावऩत कयने के शरए हय कदभ ऩय सॊघषों का साभना कयना ऩडा। सभकारीन हहॊदी दशरत कथा साहहत्म ऩय िफ हभ निय डारते हैं तो मह फात साप तौय ऩय निय आती है। दशरत साहहत्मकायों ने आठिें दशक भें ही दशरत साहहत् म भें अऩनी उऩजस् थतत दित कयानी शुरू कय दी थी। अऩनी यिनाओॊ के भाध्मभ से मे रेखक उस सभाि की सच्िाई को रगाताय जिक्र कयने रगे िो सहदमों से दफा यहने के शरए अशबशप्त था। िमतनत ‘दशरत’ कहातनमों भें साभाजिक, यािनीततक, साॊस् कृततक, आधथतक, धाशभतक ऩरयप्रेक्ष् म भें फदरते हुए िीिन सॊदबत भें दशरत स्त्र ी ककस प्र काय की िुनौती साभना कय यहा है। इसका विश्रेषर्ात्भक अध्ममन ककमा गमा है। िततभान ऩरयदृश्म भें सॊिैधातनक अधधकायों औय िागरूकता अशबमानों के कायर् बायतीम साभाजिक सॊयिना भें कापी फदराि देखने को शभर यहे हैं। रेककन सभाि भें अबी बी स्त्र ी -ऩुरु ष, दशरत औय गैय-दशरत, अभीय औय गयीफ, ग्र ाभीर् औय शहयी , कारे औय गोये के फीि गहयी खाई है। दशरत भहहराओॊ की हारत फद से फदतय है। हाराॉकक, दशरतों औय भहहराओॊ की जस् थतत भें सुधायात्भक फदराि देखे िा यहे हैं। रेककन िातत , अऩभान, ततयस्काय , शोषर् औय उत् ऩीडन की भिफ त दीिाय को ऩ यी तयह से तोडने भें सभम रगेगा, रेककन अच्छी खफय मह है कक अफ दशरत रेखकों औय भहहरा रेखकों द् िाया दशरत भहहरा िीिन की बमािह त्र ासदी को सभाि के साभने राने औय उससे फिाने के शरए एक सॊमुक् त प्र मास ककमा िा यहा है। रेककन दशरत भहहराएॊ अबी बी ऩ र् त रू ऩ से ऩुरु षों की तयह िागरू क औय भिफ त नहीॊ हो ऩाई हैं। बायत की िततभान साभाजिक सॊयिना भें इन दशरत भहहराओॊ की दमनीम जस् थतत औय उससे भुजक् त के उनके प्र मासों का विश्रेषर् कयने औय रोगों को सभझाने के शरए भैंने 'आधुतनक दशरत कहातनमों भें स्त्र ी िेतना (िुनी हुई कहातनमों के विशेष सन् दबत भें) विषम ऩय शोध कयना उधित सभझा। अध् ममन की सुविधा के शरए शोध-प्र फॊध को कुर ऩाॉि अध्मामों भें विबक्त ककमा गमा है - प्र थभ अध्माम - 'दशरत स्त्र ी िेतना एक अध्ममन ' भें ‘िेतना’ शब्द , अथत, ऩरयबाषा, दशरत का ऩरयिम, दशरत स्त्र ी की अिधायर्ा , दशरत साहहत्म , बायतीम दशरत साहहत्म , कथा - साहहत्म के विशबन्न ऩरयदृश्म - ऩय प्र काश डारा गमा है। द् वितीम अध्माम - 'हहन्दी की प्र भुख दशरत कहातनमाॉ एिॊ स्त्र ी ऩात्र ' शीषतक के अॊतगतत आधुतनक दशरत कहातनमाॉ एिॊ स्त्र ी ऩात्रों का विश्रेषर् तक का अध्ममन ककमा है। दशरत स्त्र ी ऩात्रों ऩय सॊघषत , ऩीडडत दशरत स्त्र ी , प्र ततयोध के आिास फनी दशरत स्त्र ी , तनडय दशरत स्त्र ी का विशबन् न ऩहरुओॊ ऩय अध् ममन ककमा गमा है। तृतीम अध् माम - ‘दशरत स्त्र ी कहातनमों भें अजस्भ ता फोध एिॊ िीिन सॊघषत - िुनी हुई कहातनमों के सन्दबत भें ’ इसभें दशरत स्त्र ी अजस्भता , िीिन सॊघषत की साभाजित, आधथतक, साॊस् कृततक- धाशभतक ऩरयप्रेक्ष् म का विस् तृत अिरोकन ककमा गमा है। साथ ही िेतनाऩयक आन्दोरनों से प्रे रयत दशरत जस्त्रमों द् िाया अऩनी अजस्भता को ििद भें यखने के सॊघषतऩयक प्र मास का स क्ष् भ ऩयक अध्ममन ककमा गमा है। चतुथभ अध् माम का शीषतक है - 'दशरत स्त्र ी िेतना एिॊ प्र ततयोध िुनी हुई कहातनमों के सन्दबत भें । प्रस् तुत अध् माम भें प्र ततयोध का ऐततहाशसक ऩरयदृश्म , दशरत स्त्र ी एिॊ प्र ततयोध का साभाजिक, आधथतक, यािनैततक, धाशभतक, साॊस् कृततक ऩरयप्रेक्ष् म का विश् रेषर् ात् भक अध्ममन ककमा गमा है। इसभें दशरत भहहराओॊ के प्र ततयोध के विशबन्न रू ऩ अॊककत ककमा गमा है। ऩॊचभ अध्माम - 'आधुतनक दशरत कहातनमों का शशकऩ एिॊ बाषा िैशशष्ट् म' भें िुनी हुई दशरत कहातनमों को शशकऩगत िैशशष्ट्म एिॊ बाषा िैशशष्ट्म के आधाय ऩय विबाजित ककमा गमा है। शशकऩ, शशकऩ का अथत, ऩरयबाषा, स् िरूऩ , शशकऩगत िैशशष्ट् म के अॊतय विषमिस् तु, कथानक, िरयत्र धित्रर् , देशकार तथा िाताियर् , शीषतक का प्र मोिन , बाषा शैरी को अनुच् छेदों भें वििेधित ककमा गमा है। बाषा शैरी भें िर्तनात्भक शैरी , आत्भकथा शैरी , स् िप्न शैरी , सॊिाद शैरी, धित्रात्भक शैरी , नाटकीम शैरी, पैटैसी आदी शैरी का वििेिनात् भक अध् ममन प्रस् तुत ककमा गमा है। आधुतनक दशरत कहातनमों की बाषा िैशशष्ट्म भें शब्द िमन के अॊतय तत्सभ तत्बि , देशि शब्द , अॊग्रेजी , अयफी पायसी को सजम्भशरत ककमा गमा है। अध्मामों के फाद ‘उऩसॊहाय’ शीषतक के अन्तगतत अध्ममन -विश्रेषर् के साय सॊऺेऩ के साथ-साथ अध् ममन का तनष् कषत प्रस् तुत ककमा गमा है। उसके फाद ‘सॊदबत ग्र ॊ थ स िी’ भें अध् ममन के शरए प्र मुक् त आधाय ग्र ॊ थों एि सहामक ग्र ॊ थों का ऩरयिम हदमा गमा है। अध् ममन के शरए उऩमोगी ऩत्रत्र काओॊ औय िेफसाइट की स िी बी तदनन् तय सभाहहत की गमी है। अॊत भें ऩरयशशश्ट के अॊतगतत अऩने प्र काशशत शोध आरेख औय ‘प्रािारयसभ रयऩोटत ’ सॊक्न है। इस शोध प्र फॊद को अऩनी ऺ भता के अनुसाय त्रु हटहीन फनाने का बयसक प्र मास भैंने ककमा है। कपय बी महद कोई त्रु हट मा कभी शेष यही है तो उसके शरए भैं ऺ भाऩाथी हॉ।Item Adolescents of Arunthathiyar Population -An Exploratory Study(2018-08) Jahnavi Devi, S; Arockia Maraichelvi, KItem Adoption and Usage of Innovative Techniques: A Study on Mobile Banking in Coimbatore City(2015-04) Mirsathbegum, M; Ambiga Devi, PItem Adsorption Behaviour and Corrosion Inhibitive Potential of Imidazoline Derivatives on Mild Steel/Acid Interface(2011-10-07) Nalini, D; Rajalakshmi, R