- Wireless Body Area Networks
- Context-Aware Activity Recognition Systems
- Hand Gesture Recognition Systems
- EEG and Brain-Computer Interfaces
- Formal Methods in Verification
- Hearing Impairment and Communication
- Cloud Computing and Resource Management
- User Authentication and Security Systems
- Software Reliability and Analysis Research
- Functional Brain Connectivity Studies
- Parallel Computing and Optimization Techniques
- IoT and Edge/Fog Computing
- Advanced Optical Network Technologies
- Fault Detection and Control Systems
- ECG Monitoring and Analysis
- Healthcare Technology and Patient Monitoring
- Distributed and Parallel Computing Systems
- Neural dynamics and brain function
- Real-Time Systems Scheduling
- Green IT and Sustainability
- Advanced MRI Techniques and Applications
- Tactile and Sensory Interactions
- Software-Defined Networks and 5G
- Embedded Systems Design Techniques
- Smart Grid Security and Resilience
All India Institute of Medical Sciences
2022-2025
Arizona State University
2015-2024
Baba Raghav Das Medical College
2023-2024
Institute of Medical Sciences
2023-2024
Universitat Autònoma de Barcelona
2023
Academy of Scientific and Innovative Research
2020-2022
Indian Institute of Petroleum
2020-2022
National Institute of Technology Durgapur
2019-2020
Mississippi State University
2020
The University of Texas at Dallas
2020
Generalized multiprotocol label switching, also referred to as lambda supports not only devices that perform packet but those switching in the time, wavelength, and space domains. The development of GMPLS requires modifications current signaling routing protocols. It has triggered new protocols such Link Management protocol. We present traffic engineering enhancements Open Shortest Path First Internet protocol ISIS Intradomain Routing Protocol, two popular protocols, support GMPLS. concepts...
A body area network (BAN) is a wireless of health monitoring sensors designed to deliver personalized healthcare. Securing intersensor communications within BANs essential for preserving not only the privacy data, but also ensuring safety healthcare delivery. This paper presents physiological-signal-based key agreement (PSKA), scheme enabling secure communication BAN in usable (plug-n-play, transparent) manner. PSKA allows neighboring nodes agree symmetric (shared) cryptographic key, an...
Cyber-physical systems (CPSs) couple their cyber and physical parts to provide mission-critical services, including automated pervasive health care, smart electricity grid, green cloud computing, surveillance with unmanned aerial vehicles (UAVs). CPSs can use the information available from environment such ubiquitous, energy-efficient low-cost functionalities. Their operation needs ensure three key properties, collectively referred as S3: 1) safety: avoidance of hazards; 2) security:...
Generalized multiprotocol label switching (GMPLS), also referred to as lambda switching, is a multipurpose control plane paradigm that supports not only devices perform packet but in the time, wavelength, and space domains. The development of GMPLS necessitates enhancements existing IP signaling routing protocols. We present two commonly used protocols, RSVP LDP, support GMPLS. illustrate concept hierarchical switched path setup with an example, discuss mechanisms for bidirectional LSP...
Preserving a person's privacy in an efficient manner is very important for critical, life-saving infrastructures like body sensor networks (BSN). This paper presents novel key agreement scheme which allows two sensors BSN to agree common generated using electrocardiogram (EKG) signals. EKG-based (EKA) aims bring the "plug-n-play" paradigm security whereby simply deploying on subject can enable secure communication, without requiring any form of initialization such as pre-deployment. Analysis...
Body area networks (BAN) can play a major role in monitoring the health of soldiers battlefield. Securing BANs is essential to ensure safety soldiers. This paper presents novel key agreement protocol called Photoplethysmogram PPGbased based (PKA) which allows sensors BAN agree common using PPG values obtained from subject (soldier) they are deployed on. Using stimuli designed monitor directly for cryptographic purposes, enables administrators provide security with minimal initial setup. The...
Machine Learning (ML) algorithms, specifically supervised learning, are widely used in modern real-world applications, which utilize Computational Intelligence (CI) as their core technology, such autonomous vehicles, assistive robots, and biometric systems. Attacks that cause misclassifications or mispredictions can lead to erroneous decisions resulting unreliable operations. Designing robust ML with the ability provide reliable results presence of attacks has become a top priority field...
High Performance Computing (HPC) data centers are becoming increasingly dense; the associated power-density and energy consumption of their operation is increasing. Up to half total attributed cooling center; greening center operations reduce both computing imperative. To this effect: i) Energy Inefficiency Ratio SPatial job scheduling (a.k.a. placement) algorithms, also referred as SP-EIR, analyzed by comparing (computing + cooling) incurred algorithms with minimum possible consumption,...
Energy consumption in data centers can be reduced by efficient design of the and management computing resources cooling units. A major obstacle analysis is lack a holistic simulator, where impact new resource (or cooling) techniques tested with diffierent designs (i.e., layouts configurations) centers. To fill this gap, paper proposes Green Data Center Simulator (GDCSim) for studying energy efficiency under various center geometries, workload characteristics, platform power schemes,...
Communication and collaboration between deaf people hearing is hindered by lack of a common language. Although there has been lot research in this domain, room for work towards system that ubiquitous, non-invasive, works real-time can be trained interactively the user. Such will powerful enough to translate gestures performed real-time, while also being flexible fully personalized used as platform gesture based HCI. We propose SCEPTRE which utilizes two non-invasive wrist-worn devices...
Mesoscopic active systems exhibit various unique behaviours - absent in passive due to the forces generated by corresponding constituents converting their available free energies. However, finding out these which are also stochastic and remain intertwined with thermal noise is especially non-trivial. Here, we introduce a technique extract such fluctuating forces, statistical accuracy, acting on particle immersed an bath filtering related noise. First, test efficacy of our method under...
Rare events, due to their infrequent occurrences, do not have much data, and hence deep learning techniques fail in estimating the distribution for such data. Open-vocabulary models represent an innovative approach image classification. Unlike traditional models, these classify images into any set of categories specified with natural language prompts during inference. These usually comprise manually crafted templates (e.g., 'a photo a {}') that are filled names each category. This paper...
Background: Glycemic control has been studied in hospitalized patients with type 1 diabetes (T1D) or 2 (T2D) and more recently 3C who had total pancreatectomy (TP) islet autotransplantation (IAT). To our knowledge, we report the first study using continuous glucose monitoring (CGM) to assess TP without IAT during hospitalization. Methods: We completed blinded CGM (Dexcom G6 PRO) studies 27 subjects a nonintensive care unit setting at Mayo Clinic, Rochester, compared two cohorts (CGM data <...
Smart mobile medical computing systems (SMDCSes), e.g., applications use context information from the environment to provide useful and often critical healthcare services such as continuous monitoring control of blood glucose levels by infusion insulin. Given unsupervised nature operation SMDCSes, changes that are unaccounted for can cause unprecedented faults leading violation requirements safety, energy sustainability reliability. Analysis SMDCSes testing violations necessitates...
Security systems using brain signals or Electroencephalography (EEG), is an emerging field of research. Brain signal characteristics such as chaotic nature and uniqueness, make it appropriate information source to be used in security systems. In this paper, E-BIAS, a pervasive EEG-based system with both identification authentication functionalities developed. The main challenges are: 1) accuracy, 2) timeliness, 3) energy efficiency, 4) usability, 5) robustness. Therefore, we apply machine...
Body area networks (BANs) are of medical devices implanted within or worn on the human body. Analysis and verification BAN designs require (i) early feedback design (ii) high-confidence evaluation BANs without requiring any hazardous, intrusive, costly deployment. Any further has to ensure safety body, that is, limiting undesirable side-effects (e.g., heat dissipation) operations (involving sensing, computation, communication among devices) sustainability operations, continuation under...
Recent research has shown that reliable recognition of sign language words and phrases using user-friendly noninvasive armbands is feasible desirable. This work provides an analysis implementation including fingerspelling (FR) in such systems, which a much harder problem due to lack distinctive hand movements. A novel algorithm called DyFAV (Dynamic Feature Selection Voting) proposed for this purpose exploits the fact finite corpus (26 alphabets American Sign Language (ASL)). Detailed used...
Accurate localization of a seizure onset zone (SOZ) from independent components (IC) resting-state functional magnetic resonance imaging (rs-fMRI) improves surgical outcomes in children with drug-resistant epilepsy (DRE). Automated IC sorting has limited success identifying SOZ localizing ICs adult normal rs-fMRI or uncategorized epilepsy. Children face unique challenges due to the developing brain and its associated risks. This study proposes novel algorithm (EPIK) for DRE.EPIK is developed...