- Energy Efficient Wireless Sensor Networks
- Energy Harvesting in Wireless Networks
- IoT-based Smart Home Systems
- IoT and Edge/Fog Computing
- Full-Duplex Wireless Communications
- Anomaly Detection Techniques and Applications
- Cellular and Composite Structures
- Digital Media Forensic Detection
- Data Stream Mining Techniques
- Orthopaedic implants and arthroplasty
- Mobile Ad Hoc Networks
- Advanced Wireless Communication Technologies
- IoT Networks and Protocols
- Transportation Safety and Impact Analysis
- Water Quality Monitoring Technologies
- Hip and Femur Fractures
- Advanced Steganography and Watermarking Techniques
- ECG Monitoring and Analysis
- Traffic Prediction and Management Techniques
- Image Retrieval and Classification Techniques
- Orthopedic Infections and Treatments
- Guidance and Control Systems
- Cloud Computing and Resource Management
- Cardiac, Anesthesia and Surgical Outcomes
- Automotive and Human Injury Biomechanics
Indian Institute of Technology Mandi
2025
Indian Institute of Information Technology, Nagpur
2020-2024
GLA University
2024
UConn Health
2024
Indian Institute of Technology Delhi
2021
Gandhi Medical College
2018-2020
Hamidia Hospital
2020
Brihanmumbai Municipal Corporation
2020
Cooper Hospital
2020
Fortis Hospital
2018
The efficacy of potential anticancer drugs during preclinical development is generally tested in vitro using cancer cells grown monolayer; however, a significant discrepancy their observed when these are evaluated vivo. This discrepancy, part, could be due to the three-dimensional (3-D) nature tumors as compared two-dimensional (2-D) monolayer cultures. Therefore, there need for an model that would mimic 3-D tumors. With this objective, we have developed surface-engineered, large and porous...
The wireless sensor network consists of small limited energy sensors which are connected to one or more sinks. maximum consumption takes place in communicating the data from nodes sink. Multiple sink WSN has an edge over single where very less is utilized sending sink, as number hops reduced. If consumed by a node balanced between other nodes, lifetime considerably increased. optimization achieved restructuring modifying neighbor Only those makes total than threshold. This balancing through...
The atrial fibrillation (AF) is one of the most common arrhythmia.The AF can be a reason strokes and damage heart activities. Electrocardiogram (ECG) commonly used for detection. It should noted that burst does not show any symptoms difficult to detect using ECG. As an alternative ECG, photoplethysmography (PPG) diagnosis, which easy record suitable long-term monitoring. This letter proposes new classification framework automated detection based on variational mode decomposition (VMD)....
Photocatalysis emerges as an efficient and versatile tool for the preparation of organic compounds via development new methodologies photosensitizers. Mostly UV blue light irradiation are used such reactions. Red is low energy light, it less harmful has more penetration depth. Hence red driven photocatalysis would be suitable preparing value added products. absorbing photosensitizers mostly based on rare expensive metals. In this review, we describe recent developments Earth‐abundant...
Hereditary spherocytosis (HS) is one of the most common hereditary haemolytic anaemia (HA) with variable clinical expression anaemia, splenomegaly and presence spherical cells called spherocytes due to mutations in rbcs membrane protein genes e.g. ANK1 (ankyrin), EPB42 (protein 4.2), SPTA1(α-spectrin), SPTB (β-spectrin) SLC4A1 (Band 3). There autosomal dominant inheritance 75% cases recessive 25% cases. We report a pair case mother male child; their samples for hemogram were simultaneously...
In the field of electronic warfare (EW), one crucial roles intelligence is identification radar signals. an operational environment, it very essential to identify emitters whether friend or foe so that appropriate countermeasures can be taken against them. With electromagnetic environment becoming increasingly complex and diversity signal features, emitter with high recognition accuracy has become a significantly challenging task. Traditional methods have shown some limitations in this...
Background— A significant fraction of vascular smooth muscle cells (VSMCs) undergo rapid apoptosis after balloon angioplasty. In this study, we tested the hypothesis that protecting VSMCs from undergoing prevents cascade events lead to intimal hyperplasia. Methods and Results— Rapamycin-loaded gel-like nanoparticles (mean diameter, 54�5 nm) were infused locally in a rat carotid artery model injury. The drug has both antiapoptotic antiproliferative effects on hence was selected for current...
The research work proposes a cluster head selection algorithm for wireless sensor network. A node can be if it is connected to at least one unique neighbor where the that not any other node. If there no then CH selected on basis of residual energy and number nodes. With increase in clusters, processing network increases; hence, this minimum clusters which further leads increased lifetime. major novel contribution proposed an ensures completely with isolated An will remain only within...
Abstract The inhibitive action of the acid extracts seeds' leaves and bark from Ficus virens plant towards hydrochloric sulfuric corrosion aluminium is tested using mass loss thermometric techniques. It was found that extract acts as a good inhibitor for in all concentration solution. ellagic has been used representative tannin species. tannins are anodic inhibitors. inhibition efficiency (IE) increases increased. effect temperature on IE studied. presence activation energy reaction....
Hadoop architecture provides one level of fault tolerance, in a way rescheduling the job on faulty nodes to other network. But, this approach is inefficient when occurs after most executed. Thus, it's necessary predict at node quite an early stage so that not costly terms time and efficiency. Prediction these faults gives us shift task load onto another node(s) thus prevent data or computation loss. An implementation done MATLAB SVM kernel Ganglia with Java as interfacing language. used for...
Watermarking is the technique to solve issue of copyright degradation, but this has be resolved by keeping a steady check on imperceptibility and robustness which incur its main objectives. In order accomplish these objectives usage hybrid transform adopted in paper, idea behind using that cover image modified singular values rather than DWT subbands, therefore watermark makes itself vulnerable vivid attacks. Experimental results are available support study.
Sustainable agriculture revolves around soil organic carbon (SOC), which is essential for numerous functions and ecological attributes. Farmers are interested in conserving adding additional to certain fields order improve health productivity. The relationship between environment that has been discovered standardized throughout time enhanced the progress of digital soil-mapping techniques; therefore, a variety machine learning techniques used predict properties. Studies thriving at how...
Wireless sensor networks have created new opportunities across the spectrum of human endeavors including engineering design and manufacturing, monitoring control systems. Involvement restrained resources in deployment WSNs makes it a subject concern. So its usage needs to be very efficient order maximize operational life network. In this paper detailed analysis is made between single-hop multi-hop approaches which are used process transfer data queries from source sink. Different dimensions...
Clustering is a useful mechanism in wireless sensor networks which helps to cope with scalability and data transmission problems. The motivation of our research provide efficient clustering using Hierarchical agglomerative (HAC). If the distance between sensing nodes calculated their location then it's quantitative HAC. This paper compares various techniques applied network data. simulations are done MATLAB comparisons made different protocols dendrograms.
Generally a wireless sensor network is realized using many-to-one concept of having many sensors transferring the data to common single sink. The proposed work demonstrates importance multiple sink in network. routing protocol routes efficiently from sources (sensing nodes) sinks. A comparison between and also made appreciate work.
An Inertial Navigation System (INS) independently measures the Position, Velocity, and Attitude (PVA) of thevehicle to navigate it towards target. Since INS is a dead-reckoning system, requires accurate initialization toprovide navigation solution. In case an air-launched tactical missile, aircraft system(Master INS) information used initialize accurately missile (Slave INS). Rapid transfer alignment isneeded in today’s combat operation converge slave shortest possible time using...
Failure of a task running on Hadoop cluster is highly expensive in terms computational time. A failure occurring even at the end phase may cause need to redo entire task. Thus really important deploy fault tolerant techniques. deploys technique checkpointing prevent data loss. However, time-loss still pose grim threat critical applications. Hence solution proposed that uses SVM models trained with normal resource usage statistics predict and detect faults cluster. The prediction engine can...
Steganography techniques have been used since ancient time. Today when all the confidential data are being sent digitally then need for steganography to be applied digital media has increased more. This paper aims achieve a thorough understanding of existing spatial domain techniques. It focuses on advantages and limitations algorithms so that more effective technique combing best features one or can proposed. Then an algorithm is proposed which steganalysis images classifying them as stego...