- Alzheimer's disease research and treatments
- Digital Media Forensic Detection
- Advanced Steganography and Watermarking Techniques
- Enhanced Oil Recovery Techniques
- Neuroinflammation and Neurodegeneration Mechanisms
- Advanced biosensing and bioanalysis techniques
- Advanced Image and Video Retrieval Techniques
- Chaos-based Image/Signal Encryption
- Pregnancy and preeclampsia studies
- Network Security and Intrusion Detection
- Ectopic Pregnancy Diagnosis and Management
- Natural Antidiabetic Agents Studies
- Tryptophan and brain disorders
- Advanced Malware Detection Techniques
- Maternal and fetal healthcare
- Nanocluster Synthesis and Applications
- Smart Grid Security and Resilience
- Phytochemistry and Biological Activities
- Phase Change Materials Research
- Phytochemicals and Antioxidant Activities
- Gout, Hyperuricemia, Uric Acid
- Click Chemistry and Applications
- Petroleum Processing and Analysis
- Virtual Reality Applications and Impacts
- Hydrocarbon exploration and reservoir analysis
Texas Children's Hospital
2012-2025
Sam Higginbottom Institute of Agriculture
2024
Baylor College of Medicine
2012-2024
GLA University
2011-2024
Indian Institute of Science Bangalore
2024
Chevron (United States)
2019-2022
National Institute of Technology Jamshedpur
2017-2021
Purdue University West Lafayette
2019-2020
Center for Cancer Research
2019-2020
Uttarakhand Ayurved University
2020
Abstract Advances in computed tomography (CT) hardware have propelled the development of novel CT contrast agents. In particular, spectral capabilities x-ray can facilitate simultaneous imaging multiple This approach is particularly useful for functional solid tumors by visualization targets or architectural features that govern cancer and progression. Nanoparticles are a promising platform agent development. While several moieties based on high atomic number elements being explored, iodine...
Abstract The outbreak of Zika virus (ZIKV) in 2016 created worldwide health emergency which demand urgent research efforts on understanding the biology and developing therapeutic strategies. Here, we present a time-resolved chemical proteomic strategy to track early-stage entry ZIKV into host cells. was labeled its surface with probe, carries photocrosslinker covalently link virus-interacting proteins living cells UV exposure at different time points, biotin tag for subsequent enrichment...
Extracellular amyloid-β (Aβ) plaques and intracellular neurofibrillary tangles constitute the major neuropathological hallmarks of Alzheimer’s disease (AD). It is now apparent that parenchymal Aβ plaque deposition precedes behavioral signs by several years. The development agents can target these may be useful as diagnostic or therapeutic tools. In this study, we synthesized an Aβ-targeted lipid conjugate, incorporated it in stealth liposomal nanoparticles tested their ability to bind...
Abstract Alkaline-Surfactant-Polymer (ASP) flooding is an attractive enhanced oil recovery method. However, some reservoir conditions are not favorable for the use of polymers or their would be economically due to low permeability other unfavorable conditions. Foam can alternative polymer improving displacement efficiency in chemical-EOR process. The foam as a mobility control agent by co-injection alternate injection gas and chemical slug termed, here, Alkaline-Surfactant-Gas (ASG) Process....
This paper discusses the Ohio University Virtual Haptic Back (VHB) project, including objectives, implementation, and initial evaluations. Haptics is science of human tactile sensation a haptic interface provides force touch feedback to user from virtual reality. Our multimodal VHB simulation combines high-fidelity computer graphics with aural augment training in palpatory diagnosis osteopathic medicine, plus related applications physical therapy, massage chiropractic other fields. We use...
Authentication plays a very important role in computer based communication for having system control. Face recognition has become crucial part of biometric verification and finds uses many applications, e.g. video monitor system, human-computer interaction, network security. This paper is about integrating face technology with open source vision (OpenCV) algorithm develop Attendance System. software will facilitate the attendance automaton process enable faculties to enquire student's data...
Abstract The use of gas for mobility control in chemical enhanced oil recovery is an attractive option to substitute polymer conditions where its application not feasible. Especially carbonate reservoirs, which generally have low permeability and contains vugs fractures, the may result loss benefits conformance control. In such conditions, a good alternative. direct dependence dispersed on rock reduces likelihood plugging oil-rich permeable matrix reservoirs. both liquid phases fractures can...
Abstract Non-invasive methods for estimating placental fractional blood volume (FBV) are of great interest characterization vascular perfusion in placentae during pregnancy to identify insufficiency that may be indicative local ischemia or fetal growth restriction (FGR). Nanoparticle contrast-enhanced magnetic resonance imaging (CE-MRI) enable direct FBV estimation and provide a reliable, 3D alternative assess maternal-side perfusion. In this pre-clinical study, we investigated if at 14, 16,...
Abstract In these preclinical studies, we describe ADx-001 , an Aβ-targeted liposomal macrocyclic gadolinium (Gd) imaging agent, for MRI of amyloid plaques. The targeting moiety is a novel lipid-PEG conjugated styryl-pyrimidine. An MRI-based contrast agent such as attractive because the lack radioactivity, ease distribution, long shelf life, and prevalence scanners. Dose-ranging efficacy studies were performed on 1 T scanner using transgenic APP/PSEN1 mouse model Alzheimer’s disease. was...
Keystroke logging, also known as keystroke or keyboard scanning, is a way to record the keys that are being typed on keyboard, by user's computer so user does not know their details tracked. Data can be gained someone using login system. Some programs themselves legal, and created track use of employer's computer. Key logging used learn power human-computer interconnection. Many methods for key chain available, which software hardware based acoustic crypt-analysis. In this paper, we have...
Image Steganography is the artwork of concealing mystery data within image such that hacker will now no longer be capable discover records inside stego images. This a useful approach to secure our sensitive information. Security has continually been main difficulty from last many years existing days. The topic interest researchers long development technologies for sending anyone other than recipient without revealing it. Therefore, nowadays, have evolved strategies meet steady transfer...
Boronic acids, known to bind diols, were screened identify non-inflammatory cross-linkers for the preparation of glucose sensitive and insulin releasing agglomerates liposomes (Agglomerated Vesicle Technology-AVT). This was done in order select a suitable replacement previously used cross-linker, ConcanavalinA (ConA), lectin have both toxic inflammatory effects vivo. Lead-compounds selected from screens that involved testing potential, cytotoxicity glucose-binding. These then conjugated...
There has been always a need to search new mediums as well techniques send the data secretly. Recent research establishes Deoxyribonucleic Acid (DNA) an interesting medium for Steganography. DNA have various artificial components that can be used hiding and sending secret information from any source destination. Genetic obtained is encoded sequence of nucleotides i.e. Guanine, Adenine, Thymine Cytosine denoted by letters G, A, T C respectively. A huge amount hidden using these four...
Patients with advanced head and neck squamous cell carcinoma receiving chemotherapy have a poor prognosis partly due to normal tissue toxicity; therefore, development of tumor-targeted drug delivery platform minimize collateral toxicity is goal cancer nanomedicine. Aptamers can achieve this purpose. While conventional Systematic Evolution Ligands by Exponential Enrichment (SELEX) screens aptamer-only libraries conjugates them vehicles after selection, we hypothesized that specific requires...
The xanthine oxidoreductase system is one of the major sources free radicals in many pathophysiological conditions. Since ionizing radiations cause cell damage and death, may contribute to detrimental effects irradiated systems. Therefore, modulation by radiation has been examined present study. Female Swiss albino mice (7-8 weeks old) were with gamma rays (1-9 Gy) at a dose rate 0.023 Gy s(-1) specific activities oxidase (XO) dehydrogenase (XDH) determined liver animals. mode magnitude...
Abstract In a surfactant-alternating-gas (SAG) injection, stable foams form viscous barriers and divert fluids, thereby providing conformance for enhanced oil recovery (EOR). Once foam decays, injected gas resumes preferential flow through thief zones, demonstrating the need higher stability. Thus, longer half-lives or stability is one of key factors determining success any foam-field application. The ability surfactants to stabilize depends on type. Many that with nitrogen (N2) hydrocarbon...
Srivastava, M., Chandra, D. and Kale, R. K. Modulation of Radiation-Induced Changes in the Xanthine Oxidoreductase System Livers Mice by its Inhibitors. Radiat. Res. 157, 290 – 297 (2002).The xanthine oxidoreductase (XOD) system, which consists dehydrogenase (XDH) oxidase (XO), is one major sources free radicals biological systems. The XOD system present predominantly normal tissues as XDH. In damaged tissues, XDH converted into XO, form that generates radicals. Therefore, XO expected to be...
Oxidative stress is one of the major causative factors many chronic and degenerative diseases. Plants have been used in traditional medicine different parts world for thousands years continue to provide new remedies human kind. The present study was investigate preliminary phytochemical analysis various extracts roots leaves Trewia nudiflora (Euphorbiaceae) antioxidant activity by 1,1,diphenyl-2-picryl hydrazyl (DPPH) radical scavenging method. screening showed presence several...
Image hashing is one of the emergent novel approaches used extensively in field image forensics apart from finding its place many latest techniques area indexing, retrieval etc. basically to identify duplicate copies original images. Most algorithms has their limitations getting desirable performance against a particular processing attack i.e. rotation. In this paper, we have proposed technique dominantly based on statistical features which robust almost all kind attacks including our...