Sakshi Patel

ORCID: 0000-0002-1606-3722
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Advanced Image Fusion Techniques
  • Image Enhancement Techniques
  • Cellular Automata and Applications
  • Brain Tumor Detection and Classification
  • Digital Media Forensic Detection
  • IoT and GPS-based Vehicle Safety Systems
  • HIV/AIDS oral health manifestations
  • Mycobacterium research and diagnosis
  • Tuberculosis Research and Epidemiology
  • Oral microbiology and periodontitis research
  • Vehicle License Plate Recognition
  • Teaching and Learning Programming
  • Smart Systems and Machine Learning
  • Advanced Image Processing Techniques
  • Bayesian Methods and Mixture Models
  • Digital Imaging for Blood Diseases
  • Face recognition and analysis
  • Cholinesterase and Neurodegenerative Diseases
  • Insect and Pesticide Research
  • Autoimmune Bullous Skin Diseases
  • Software Engineering Research
  • Listeria monocytogenes in Food Safety
  • Agricultural Systems and Practices

Western Kentucky University
2025

Inspiration Innovation Synergy University
2024

Vellore Institute of Technology University
2019-2024

All India Institute of Medical Sciences Bhopal
2023

Indian Institute of Science Education and Research, Bhopal
2023

Datta Meghe Institute of Medical Sciences
2020

The NorthCap University
2015-2016

Sardar Vallabhbhai National Institute of Technology Surat
2016

Bacteriophages Xandras and BigBubba were isolated on Mycobacterium smegmatis mc 2 155 from enriched soil samples. Xandras' genome length is 75,179 bp with 144 predicted protein-coding genes two tRNAs. BigBubba's 75,006 147 Each contains a cyclic oligonucleotide sequestering protein (CBASS antagonist).

10.17912/micropub.biology.001460 article EN PubMed 2025-01-01

International Journal of Computer Sciences and Engineering (A UGC Approved indexed with DOI, ICI Approved, DPI Digital Library) is one the leading growing open access, peer-reviewed, monthly, scientific research journal for scientists, engineers, scholars, academicians, which gains a foothold in Asia opens to world, aims publish original, theoretical practical advances Science,Information Technology, (Software, Mechanical, Civil, Electronics & Electrical), all interdisciplinary streams...

10.26438/ijcse/v6i5.871877 article EN International Journal of Computer Sciences and Engineering 2018-05-31

With the advancement of technology worldwide, security is essential for online information and data. This research work proposes a novel image encryption method based on combined chaotic maps, Halton sequence, five-dimension (5D) Hyper-Chaotic System Deoxyribonucleic Acid (DNA) encoding. sequence known low-discrepancy having uniform distribution in space application numerical methods. In proposed work, we derived new map (HaLT map) by combining maps to scramble images cryptography...

10.3390/e24060803 article EN cc-by Entropy 2022-06-08

Tuberculous meningitis (TBM) is a manifestation of extrapulmonary tuberculosis (EPTB) caused by Mycobacterium (MTB). The central nervous system involved in about 1%-2% all current (TB) cases and 7%-8% EPTB. if not treated early, TBM leads to high rate neurological sequelae mortality.This study aimed assess the diagnostic performance GeneXpert MTB/rifampicin (RIF) assay patients with TBM.A total 100 suspected were enrolled from various departments at tertiary care hospital, Bhopal, Madhya...

10.7759/cureus.37761 article EN Cureus 2023-04-18

Introduction Mycobacterium tuberculosis complex (MTBC), the primary cause of (TB), must be accurately identified to implement effective patient management and control strategies. Non-tuberculous mycobacteria (NTM) in suspected TB cases can result erroneous diagnoses needless treatment. Objective The study aimed identify NTM patients at a tertiary care hospital central India using molecular methods. Methods This prospective enrolled 400 pulmonary extra-pulmonary patients. Patients between age...

10.7759/cureus.39992 article EN Cureus 2023-06-05

Due to increase in digitalization recent years, there is huge amount of images are available with different parameters like pose, scale, lighting, and occlusion. Predicting their age, gender, as well race a resilient task. In past year CNN based model plays virtuous role prediction age gender. this research we proposed threefold classifier using shift invariant Deep Neural Network for gender classification same model. It will contain multiple layers maxpooling, covlutional block. For...

10.1109/icaccs57279.2023.10113056 article EN 2022 8th International Conference on Advanced Computing and Communication Systems (ICACCS) 2023-03-17

In today's world, road and transport has become an integral part of every human being. The present system minimized the distance, but on other hand it increased life peril. main idea is to develop a safety measure. This paper proposes novel where able automatically control speed vehicle by detecting signs labels from sign boards, which are laid side take necessary steps knowledge driver sending caution notification. When does not down even after caution, details notified authorities (traffic...

10.1109/i-pact44901.2019.8960008 article EN 2019 Innovations in Power and Advanced Computing Technologies (i-PACT) 2019-03-01

MRI (Magnetic Resonance Imaging) is a technique used to analyze and diagnose the problem defined by images like cancer or tumor in brain. Physicians require good contrast for better treatment purpose as it contains maximum information of disease. are low which make diagnoses difficult; hence localization image pixels required. Histogram Equalization techniques help enhance so that gives an improved visual quality well problem. The brightness enhanced such way does not lose its original...

10.48550/arxiv.2003.06615 preprint EN public-domain arXiv (Cornell University) 2020-01-01

The term metrics is basically a quantitative measure of extent to which given attributes influenced by system, component or process. Metrics are required software quality, improve quality and predict quality. There various approaches available develop like object oriented approach, based distributed approach. Component engineering latest approach in developing software. main function provide reusability decrease cost development time. These used for evaluating managing risk. aim this paper...

10.1109/ccaa.2016.7813853 article EN 2016-04-01

In this paper we have proposed a method that uses chaotic logistic mapping and DNA encoding to encrypt the image. A 32 bit ASCII private key is used diffuse The results demonstrated clearly show encryption algorithm based on gives better result than encrypting only with mapping. also takes into account possible parametric like Peak Signal Noise Ratio Structure Similarity.

10.48550/arxiv.2003.06616 preprint EN public-domain arXiv (Cornell University) 2020-01-01

Information privacy and security has become a necessity in the rapid growth of computer technology. A new algorithm for image encryption is proposed this paper; using hash functions, chaotic map two levels diffusion process. The initialization key chaos generated with help functions. initial seed these functions sum rows, columns pixels across diagonal plain image. Firstly, scrambled quantization unit. In first level process, pixel values are XOR normalized map. Odd value an even bit odd To...

10.1109/icces54183.2022.9835957 article EN 2022 7th International Conference on Communication and Electronics Systems (ICCES) 2022-06-22

Image steganalysis finds its application in the field of digital investigation. Performance any image algorithm depends on sensitivity features and amount data hidden an image. The goal this paper is to evaluate performance DWT feature based algorithms against various state-of-art steganography methods variable message embedding rates. Feature selection classification are two main steps algorithm. This also presents comparative individual different methods. images used for quantitative...

10.1109/icaecct.2016.7942602 article EN 2016-12-01

In present era of fast multimedia communication, there are many loop holes where the security is compromised. We have developed a new two-dimensional chaotic map for secure communication in this research. The generated two dimensional triangle function combined discrete (2D-TFCDM) rigorously studied and tested. various randomness test applied on novel are: National Institute Standards Technology (NIST) suite, attractor plot, sensitivity test, bifurcation diagram Lyapunov exponent. Generated...

10.1109/vitecon58111.2023.10157411 article EN 2023-05-05

Herbal products are often used as an alternative to pharmacological therapy. Menopausal symptoms and gynecological disorders (such premenstrual syndrome dysmenorrhea) the indications where therapy may have serious adverse events; hence many women prefer use herbal help with these symptoms. Here, we reviewed plants derived products, which commonly for abovementioned indications, focusing on clinical data, safely profile whether or not their is justified. We noted that limited data available...

10.22270/ajdhs.v2i2.15 article EN cc-by-nc Asian Journal of Dental and Health Sciences 2022-06-15

BACKGROUNDOral health is the most important but often neglected entity of life.Studies have revealed that literacy skills and knowledge are strong predictors individual's status than age, income, employment status, education level, racial group or ethnic group.The objective this study was to investigate how oral relates knowledge, attitude practices among street hawkers fruit vendors. METHODSA cross-sectional conducted using a Marathi pretested, close ended, structured validated...

10.14260/jemds/2020/156 article EN Journal of Evolution of Medical and Dental Sciences 2020-03-09
Coming Soon ...