- Electrocatalysts for Energy Conversion
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Security in Wireless Sensor Networks
- Mobile Ad Hoc Networks
- Cancer Diagnosis and Treatment
- Electrodeposition and Electroless Coatings
- Anomaly Detection Techniques and Applications
- Advanced Photocatalysis Techniques
- Cybercrime and Law Enforcement Studies
- FinTech, Crowdfunding, Digital Finance
- Internet of Things and AI
- Neuroscience of respiration and sleep
- ECG Monitoring and Analysis
- Opportunistic and Delay-Tolerant Networks
- 2D Materials and Applications
- Machine Learning in Materials Science
- Cardiac Imaging and Diagnostics
- Salivary Gland Tumors Diagnosis and Treatment
- Cryptographic Implementations and Security
- Spam and Phishing Detection
- Heart Rate Variability and Autonomic Control
- Metal-Organic Frameworks: Synthesis and Applications
- CO2 Reduction Techniques and Catalysts
- Oral and Maxillofacial Pathology
Indian Institute of Technology Delhi
2023-2025
Chitkara University
2024
Birla Institute of Technology, Mesra
2023-2024
Technical University of Munich
2022
All India Institute of Medical Sciences Bhopal
2022
We report composition tuning of Nb(S x Se (1− ) 2 alloy nanosheets (NSs) via colloidal synthesis demonstrating the role modulating d-electron density and defect engineering in structures for application hydrogen evolution reaction (HER).
Developing catalysts that achieve a higher turnover frequency (TOF) with lower effective overpotential (ηeff) in electrocatalytic reactions is an emerging focus of research. A promising approach to this end modifying the secondary coordination sphere (SCS) can facilitate hydrogen bonding interactions or electrostatic effects, thereby lowering activation energy barrier rate-determining step (rds). Herein, we designed and synthesized series CoIII complexes (1–8) featuring bis-pyridine-dioxime...
MnMoO4 is a barely explored material for electrocatalytic oxygen evolution reaction (OER) and in-situ tracking of the reactive intermediates final active species during OER in an alkaline pH lacks...
The crystal structure of the metal-organic framework (MOF), {Mn
Unleashing the power of light, current study demonstrates complete harvesting a biomass-derived lignin model substrate into simultaneous generation value-added chemicals and carbon-free solar fuel in more sustainable way. Here, C–C bond cleavage selectivity 91% with 67% conversion rate was achieved for first time along hydrogen peroxide (H2O2) using oxygen-linked polymeric heptazine (CNO) as catalyst compared to melamine-derived carbon nitride (CNM). The porous CNO exhibits low emission...
Abstract MANET, a wireless, infrastructure-less, ad-hoc network, uses dynamic topology rendering for the establishment of connections much easier in any given conditions. The black hole attack is malicious activity that performed MANET which causes depletion network. It poses threat to by incorporating nodes into network gives fake routing information source node. As acquires data from node, it drops packet resulting In this paper, tackle attack, we have proposed node credibility-based...
Packed beds are widely used to perform solid-catalyzed gas–liquid reactions and gas cleanup processes. In the present work, we simulated flow through realistic 3D particle-resolved domains consisting of cylindrical particles varying aspect ratio (h = 1–5) different particle shapes (Raschig ring, trilobe, daisy, sphere) using volume-of-fluid method. With an increase in h, found that number fraction laterally oriented decreases length elongated void-throats increases. Further, liquid...
BACKGROUND: The ancient Indian science of Yoga makes use voluntary regulation breathing to make respiration rhythmic and calm the mind. This practice is called pranayama. Nadisuddhi pranayama means “purification subtle energy paths,” inhalation exhalation are through alternative nostrils for successive respiratory cycles. Surya Anuloma-Viloma “heat generating particle” when cycle completed right nostril exclusively. When left alone, “Chandra pranayama,” which a heat-dissipating or cooling...
In computer science, data plays a vital role in accessing the core architecture of any product. Nowadays, cloud computing has emerged as new paradigm to store and services. It provides computational where users can send their performs operation on it. with growing demands cloud, it become major area concern contains sensitive data. Data protection maintaining integrity are key issues due its capability information at different geo-locations. The security model needs special attention threats...
Introduction: Cutaneous Metastasis (CM) is the spread of malignant cells from a primary site malignancy to skin. The incidence CM ranges 0.5% 9% all patients with cancer. may be first sign clinically silent visceral cancer or can even clue tumour recurrence and heralds poor prognosis requiring intense chemoradiotherapy. Aim: To study spectrum internal malignancies, including haematolymphoid neoplasms. Materials Methods: This cross-sectional was conducted at Department Pathology, Command...
Summary In the rapidly evolving domain of Mobile Ad‐hoc Networks (MANETs), where their deployment spans critical military operations to essential organizational communication infrastructures, pervasive threat security breaches casts a long shadow on networks' operational integrity and reliability. Central among these threats are sleep deprivation attacks, particularly insidious form cyber aggression that exploits inherent decentralized self‐organizing characteristics MANETs exhaust energy...