- Low-power high-performance VLSI design
- COVID-19 diagnosis using AI
- Analog and Mixed-Signal Circuit Design
- IoT and Edge/Fog Computing
- Physical Unclonable Functions (PUFs) and Hardware Security
- Brain Tumor Detection and Classification
- Software-Defined Networks and 5G
- CCD and CMOS Imaging Sensors
- Chaos-based Image/Signal Encryption
- Network Security and Intrusion Detection
- AI in cancer detection
- Cloud Data Security Solutions
- Advanced Malware Detection Techniques
- Cryptographic Implementations and Security
- Advanced Memory and Neural Computing
- Analytical Chemistry and Sensors
- Advancements in Semiconductor Devices and Circuit Design
- Image Processing and 3D Reconstruction
- User Authentication and Security Systems
- Image and Signal Denoising Methods
- Modular Robots and Swarm Intelligence
- IoT Networks and Protocols
- Digital Imaging for Blood Diseases
- Recommender Systems and Techniques
- Cellular Automata and Applications
Centurion University of Technology and Management
2022-2024
Indian Institute of Technology Guwahati
2011
The healthcare industry is always changing because of technological breakthroughs that spur new methods diagnosing and treating illnesses. This study investigates the development Ion Sensitive Field Effect Transistor (ISFET) sensors for DNAbased blood cancer diagnosis. work presents design a two-dimensional ion-sensitive field-effect transistor. Concentration fluctuations transfer characteristics with different oxides are studied using from two electrolyte solutions. It possible to evaluate...
DDoS attacks pose a serious risk to cloud networks because of the money they might cost if succeed. For this reason, Security Research Group has been hard at work creating various detection methods lessen blow any future cyberattacks. Cloud computing, often known as internet is model delivering computing service, in which shared, elastically scalable and virtually hosted servers are made available users anywhere there an connection. Numerous companies provide services online meet needs...
Present day's data security plays a vital role in digital human life. Data is valuable asset to any organization and hence its from external attacks very important. Information not only an important aspect but essential, secure unapproved access. encryption, decryption key management are the factors protection. It have right solution meet challenging threats. Cryptosystem implementation random number generators crucial for applications such as applications, space military smart cards et al....
The basic operation involved in any analog, digital, control system, DSP’s is addition. Performance and reliability of almost every digital system depends on performance adder. Over the decade, many adder architectures are proposed still research work going to obtain best results power, delay power product (PDP). In this paper we one fastest architecture called Carry Select (CSA) optimization done for parameters like using GDI (Gate Diffused Input) MTCMOS techniques. Implementation has been...
As technology advances towards lower nodes, chip industry facing severe challenges from its counterpart node with the narrow interconnects. Density of current becomes more affected these higher device currents and increasing on-chip temperature. The interconnect reliability their possible degradation electro migration is a concern. Perhaps problem carrier requires attention fabrication at specifically concern 28nm below. Beside power dissipation, speed IC area on chip, also nodes In this...
Operational amplifiers used in voltage follower, switched-capacitor, digital to analog converter is the basic blocks of systems. An operational amplifier design depends on supply and gain. The circuits greatly benefits from reduction size while depend parameters like offset, noise, gain, power consumption bandwidth for greater benefits. Current mode have high slew rate wider bandwidth. Therefore, current are more preferable than as it has a dynamic range low limited by small currents. One...
Steganography is a means of secretly concealing information in which the act steganography itself hidden plain sight. also known as "stealth writing." not suitable replacement for cryptography; nevertheless, it can be used conjunction with cryptography to further strengthen hiding mechanism. good cryptography. The cover media steganographic method anything that represented digitally, such text file, image, audio video Transmission Control Protocol/Internet Protocol packet, or any other...
Purpose For the first time in a decade, new form of pneumonia virus, coronavirus, COVID-19, appeared Wuhan, China. To date, it has affected millions people, killed thousands and resulted deaths around world. stop spread this isolate infected people. Computed tomography (CT) imaging is very accurate revealing details lungs allows oncologists to detect COVID. However, analysis CT scans, which can include hundreds images, may cause delays hospitals. The use artificial intelligence (AI)...
Current and future trends in broadband communication, particularly for 5G mobile applications, will include Orthogonal Frequency Division Multiplexing (OFDM) into Radio over Fiber (RoF) technology. Its resistance to multipath fading spectrum efficiency have made a well-known technique. Network has been achieved using the modulation format optical wireless communication systems. After that, system was proposed which four 18Gbps QAM (Quadrature Amplitude Modulation) signals were generated each...
Commercial off-the-shelf semiconductor devices cannot supply system solutions provided by ASIC products. Only a few of the most obvious benefits include lower costs, smaller volumes and weights, improved performance. An design solution can sometimes be used in conjunction with analogue or mixed-signal designs, but doing so requires weighing various factors, such as level available market technology quality vs. investment required to set up mixed-mode environment hire sufficient staff. Two...
Purpose The unexpected epidemic of the latest coronavirus in 2019, known as COVID-19 by Globe, a number governments worldwide have been put vulnerable situation World Health Organization. effect outbreak, previously experienced China’s citizens alone, has now become more pronounced. For practically every nation world, this is matter grave concern. lack assets to withstand infection COVID-19, mixed with perception overwhelmed medical mechanisms, pressured places state partial or absolute...
A reconfigurable computing system (RCS) is one that can be modified to meet certain functional needs. Reconfigurable electronics, such as field programmable gate arrays (FPGAs), make it simple build a computer system. Today's systems use devices so they evolve and adapt changing application environments while still completing their assigned tasks. First, robot developed, which aimed at achieving modularity compactness of the modules through yet effective power efficiency estimation-based...
The first widely used communication infrastructure was the telephone network, often known as a connection-oriented or circuit-switched network. While making phone call, these networks will set up connection, and then tear it down after call has ended. connection made during would not be again. Thus, connectionless packet-switched have been introduced, with an aim to send voice signals data packets. When compared conventional network architecture, SDN's separation of plane control networking...
Oil consumption is rising faster in India than any other major economy. There appears to be a need for 9.8 million barrels of oil per day by the year 2040. In light pollution levels, many countries are advocating Gridable Electric Vehicles (GEVs). This study focuses on role that GEVs can play aiding MGCS controlling an Intelligent Energy Management System (IEMS) while transit. Additionally, energy rate (ECR) battery and stress vehicle greater significance analysis Hybrid (HEVs) with goal...
For mobile machinery to be operated remotely, a dependable wireless communication system is required. With five generations of networks, remote operations, real-time control, and data collection will ultra-reliable low latency. Using 5G radio, digital twins, hardware-in-the-loop development, our own experiences with the system, we show how control works. According findings, future networks have significant reduction in latency jitter compared existing LTE infrastructure when using proper...