- Cloud Data Security Solutions
- Cryptography and Data Security
- Liquid Crystal Research Advancements
- Privacy-Preserving Technologies in Data
- Molecular spectroscopy and chirality
- Blockchain Technology Applications and Security
- graph theory and CDMA systems
- Plant Reproductive Biology
- Control and Dynamics of Mobile Robots
- Silkworms and Sericulture Research
- Caching and Content Delivery
- Surfactants and Colloidal Systems
- Multi-Criteria Decision Making
- Multi-Agent Systems and Negotiation
- Robotics and Sensor-Based Localization
- IoT-based Smart Home Systems
- Robotic Path Planning Algorithms
- Rough Sets and Fuzzy Logic
- Genetic diversity and population structure
- Fuzzy and Soft Set Theory
- Security and Verification in Computing
- User Authentication and Security Systems
- Bluetooth and Wireless Communication Technologies
- Sentiment Analysis and Opinion Mining
- Sensor Technology and Measurement Systems
Mizoram University
2012-2024
Tripura University
2018-2024
Assam University
2013-2021
Pennsylvania State University
2005
University of Tulsa
2000-2005
Abstract Cloud computing provides outsourcing of services at a lower cost, making it popular choice for many businesses. In recent years, cloud data storage has gained significant success, thanks to its advantages in maintenance, performance, support, and reliability compared traditional methods. However, despite the benefits disaster recovery, scalability, resource backup, some organizations still prefer over due concerns about correctness security. Data integrity is critical issue...
Web pages - especially dynamically generated ones contain several items that cannot be classified as the "primary content," e.g., navigation sidebars, advertisements, copyright notices, etc. Most clients and end-users search for primary content, largely do not seek noninformative content. A tool assists an end-user or application to process information from automatically, must separate content sections" other sections. We call these sections "Web page blocks" just "blocks." First, a segment...
Liquid crystal (LC) materials are currently the dominant electronic in display technology because of ease control molecular orientation using an electric field. However, this requires fabrication two polarizers to create operational displays, reducing light transmission efficiency below 10%. It is therefore desirable develop new technologies enhance while maintaining or improving other properties such as modulation speed orientation. Here we report a uniaxial-oriented B7 smectic liquid...
Achiral unsymmetrical 2-methyl 3-amino-benzoic acid (2,6-substituted toluene)-derived four-ring bent-core liquid crystals with a polar fluoro or chloro substituent at one end and an alkyloxy group (butyl to dodecyl) the other have been synthesised by simple straightforward synthetic method. The molecular structure characterisation is consistent elemental spectroscopic analysis data. materials' thermal behaviour phase investigated differential scanning calorimetry polarising optical...
Under the assumption that agents remain in system for significant time periods, or agent composition changes only slowly Sen (1996) has previously presented a prescriptive strategy promoting and sustaining cooperation among self-interested agents. The adaptive, probabilistic policy prescribed promotes reciprocative improves both individual group performance long run. In short run, however, selfish could still exploit this paper we evaluate hypothesis exploitative tendencies of can be...
We report the effect of dispersion barium titanate (BaTiO3) nanoparticles (BNPs) in a four ring bent core nematic (BCN) liquid crystal. Polarizing optical microscopy reveals presence single phase pure and doped states. Polar switching has been observed system value spontaneous polarization (P s) increases with increase doping concentration BNPs BCN. Dielectric study shows lower frequency mode, which can be ascribed to formation cybotactic clusters. These clusters are also responsible for...
This paper presents a technique of path planning mobile robot using artificial neural network, fuzzy logic and genetic algorithm. The network (ANN) is trained to choose from set n paths for the move
Here, we report the first examples of achiral unsymmetrical three-ring bent-shaped liquid crystals comprising amide and imine linkages with transverse substituents methyl chloro moieties on central phenyl ring in core, exhibiting polar banana phases. The extensive intra inter molecular H-bonding induced novel mesomorphic One-dimensional stacking phase as well ferroelectric order promoted by intermolecular linkage is demonstrated. compounds exhibit multifunctional properties viz.,...
Online cloud data storage is a rapidly growing pillar of the IT industry that offers owners an array attractive developments in highly sought-after online scalable services. Cloud users can easily access these services and have flexibility to manage their process effectively without worrying about deployment or maintenance personal devices. As result, number has increased purchase convenient cost-effective services, while Service Providers (CSP) are also rising meet this demand for appealing...
The communication between different regional languages is always inevitable fact which requires a lot of effort to make meaningful in terms technology. machine translation methods have been endeavoured fill this impediment. Neural Machine Translation one the efforts recently gained remarkable enhancement matter human judgement over conventional approaches like phrase-based and statistical translation. Thus, advances neural approach influence challenge mind people. types online mobile...
Breast cancer normally occurs in women and most of it begin the ducts that carry milk to nipple.It is second leading cause death women.It causes abnormal cell growth breast spread other parts body.These cells form a tumor called malignant (cancerous).There are many risk factors which can increase chance developing cancer.Being woman, getting older genetic changes major for cancer.But not yet known exactly how some these cancerous.Imaging tests such as mammograms, ultrasound, MRI etc used...
This paper presents a technique of path planning mobile robot using artificial neural network and fuzzy logic. The (ANN) is trained to choose from set n paths for the move ahead towards destination. Fuzzy logic (FL) used avoid collisions when all are blocked by obstacles. Results show that combination these features computational efficient helping each other eliminate their individual limitations.
Cloud data access control is a very important issue especially when are outsourced into third-party cloud server. Recently, some researchers working to enhance the trust level of users by developing secured store CP-ABE (Cip hertext-Policy Attribute-Based Encryption) fruitful technology for such situation providing capability encrypted control. The existing mechanisms mostly centralized, where single key distribution center works as attribute authority and generates attributes along with...
Suicide has always been a global issue and the detection of suicidal ideation in masses that are not under clinical care proves to be challenge. Fortunately, with explosion internet, studies have going on field for analysis posts social media. The identification pattern change identify user implies all users post regular basis, which includes only excludes irregular users. Keeping mind users, yet can express thoughts, aim paper is design general framework used analyze classify media centric...
Online cloud data storage, a pillar of the IT industry, offers owners plethora attractive developments in highly sought-after online scalable storage services for them to willing new inventive and investment business profit. Today, most security research focuses on improving accuracy outsourced audits rather than paying attention internal external enemies who could hack server. Even though owner enviously envies auditing job stored trusted Third Party Auditor (TPA) save communication as well...
Data outsourcing into the third party cloud server has been radically increasing with expanding popularity of computing. Recently, researchers are more attentive on privacy preserved secure outsourced data access control due to sensibility, gradually growth in size, dynamic n ature user, accessing lightweight device etc. Dynamic and efficient revocable using attribute based encryption (ABE) is most prominent technology for such situation. In this article, we concentrating summarize several...
LawBot is a system of Internet based agents that help to collect and organize the statutes case histories relevant legal search. The includes an ontology maps colloquial terms corresponding terminology, thus simplifying system's use by people outside profession.