Ankita Kumari

ORCID: 0009-0002-1868-5397
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Electrocatalysts for Energy Conversion
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Security in Wireless Sensor Networks
  • Mobile Ad Hoc Networks
  • Cancer Diagnosis and Treatment
  • Electrodeposition and Electroless Coatings
  • Anomaly Detection Techniques and Applications
  • Advanced Photocatalysis Techniques
  • Cybercrime and Law Enforcement Studies
  • FinTech, Crowdfunding, Digital Finance
  • Internet of Things and AI
  • Neuroscience of respiration and sleep
  • ECG Monitoring and Analysis
  • Opportunistic and Delay-Tolerant Networks
  • 2D Materials and Applications
  • Machine Learning in Materials Science
  • Cardiac Imaging and Diagnostics
  • Salivary Gland Tumors Diagnosis and Treatment
  • Cryptographic Implementations and Security
  • Spam and Phishing Detection
  • Heart Rate Variability and Autonomic Control
  • Metal-Organic Frameworks: Synthesis and Applications
  • CO2 Reduction Techniques and Catalysts
  • Oral and Maxillofacial Pathology

Indian Institute of Technology Delhi
2023-2025

Chitkara University
2024

Birla Institute of Technology, Mesra
2023-2024

Technical University of Munich
2022

All India Institute of Medical Sciences Bhopal
2022

We report composition tuning of Nb(S x Se (1− ) 2 alloy nanosheets (NSs) via colloidal synthesis demonstrating the role modulating d-electron density and defect engineering in structures for application hydrogen evolution reaction (HER).

10.1039/d3ta07414e article EN Journal of Materials Chemistry A 2024-01-01

Developing catalysts that achieve a higher turnover frequency (TOF) with lower effective overpotential (ηeff) in electrocatalytic reactions is an emerging focus of research. A promising approach to this end modifying the secondary coordination sphere (SCS) can facilitate hydrogen bonding interactions or electrostatic effects, thereby lowering activation energy barrier rate-determining step (rds). Herein, we designed and synthesized series CoIII complexes (1–8) featuring bis-pyridine-dioxime...

10.1021/jacs.4c14877 article EN Journal of the American Chemical Society 2025-02-13

MnMoO4 is a barely explored material for electrocatalytic oxygen evolution reaction (OER) and in-situ tracking of the reactive intermediates final active species during OER in an alkaline pH lacks...

10.1039/d4ta05985a article EN Journal of Materials Chemistry A 2024-01-01

Unleashing the power of light, current study demonstrates complete harvesting a biomass-derived lignin model substrate into simultaneous generation value-added chemicals and carbon-free solar fuel in more sustainable way. Here, C–C bond cleavage selectivity 91% with 67% conversion rate was achieved for first time along hydrogen peroxide (H2O2) using oxygen-linked polymeric heptazine (CNO) as catalyst compared to melamine-derived carbon nitride (CNM). The porous CNO exhibits low emission...

10.1021/acssuschemeng.4c02712 article EN ACS Sustainable Chemistry & Engineering 2024-08-22

Abstract MANET, a wireless, infrastructure-less, ad-hoc network, uses dynamic topology rendering for the establishment of connections much easier in any given conditions. The black hole attack is malicious activity that performed MANET which causes depletion network. It poses threat to by incorporating nodes into network gives fake routing information source node. As acquires data from node, it drops packet resulting In this paper, tackle attack, we have proposed node credibility-based...

10.21203/rs.3.rs-1528078/v1 preprint EN cc-by Research Square (Research Square) 2023-02-02

Packed beds are widely used to perform solid-catalyzed gas–liquid reactions and gas cleanup processes. In the present work, we simulated flow through realistic 3D particle-resolved domains consisting of cylindrical particles varying aspect ratio (h = 1–5) different particle shapes (Raschig ring, trilobe, daisy, sphere) using volume-of-fluid method. With an increase in h, found that number fraction laterally oriented decreases length elongated void-throats increases. Further, liquid...

10.1021/acs.iecr.3c00572 article EN Industrial & Engineering Chemistry Research 2023-07-03

BACKGROUND: The ancient Indian science of Yoga makes use voluntary regulation breathing to make respiration rhythmic and calm the mind. This practice is called pranayama. Nadisuddhi pranayama means “purification subtle energy paths,” inhalation exhalation are through alternative nostrils for successive respiratory cycles. Surya Anuloma-Viloma “heat generating particle” when cycle completed right nostril exclusively. When left alone, “Chandra pranayama,” which a heat-dissipating or cooling...

10.4103/jehp.jehp_343_22 article EN Journal of Education and Health Promotion 2022-01-01

In computer science, data plays a vital role in accessing the core architecture of any product. Nowadays, cloud computing has emerged as new paradigm to store and services. It provides computational where users can send their performs operation on it. with growing demands cloud, it become major area concern contains sensitive data. Data protection maintaining integrity are key issues due its capability information at different geo-locations. The security model needs special attention threats...

10.1109/icees57979.2023.10110211 article EN 2023-03-23

Introduction: Cutaneous Metastasis (CM) is the spread of malignant cells from a primary site malignancy to skin. The incidence CM ranges 0.5% 9% all patients with cancer. may be first sign clinically silent visceral cancer or can even clue tumour recurrence and heralds poor prognosis requiring intense chemoradiotherapy. Aim: To study spectrum internal malignancies, including haematolymphoid neoplasms. Materials Methods: This cross-sectional was conducted at Department Pathology, Command...

10.7860/jcdr/2024/66974.19330 article EN cc-by-nc-nd JOURNAL OF CLINICAL AND DIAGNOSTIC RESEARCH 2024-01-01

Summary In the rapidly evolving domain of Mobile Ad‐hoc Networks (MANETs), where their deployment spans critical military operations to essential organizational communication infrastructures, pervasive threat security breaches casts a long shadow on networks' operational integrity and reliability. Central among these threats are sleep deprivation attacks, particularly insidious form cyber aggression that exploits inherent decentralized self‐organizing characteristics MANETs exhaust energy...

10.1002/cpe.8118 article EN Concurrency and Computation Practice and Experience 2024-04-16
Coming Soon ...