Departments View all

TCS Innovation Labs
5
Total Impact Points
110
Members
Engineering and Industrial Services (EIS)
2
Total Impact Points
83
Members

Publication History View all

  • [Show abstract] [Hide abstract]
    ABSTRACT: Point-of-use (POU) gravity-driven household water purifiers have been proven to be a simple, low-cost and effective intervention for reducing the impact of waterborne diseases in developing countries. The goal of this study was to compare commonly used water disinfectants for their feasibility of adoption in low-cost POU water purifiers. The potency of each candidate disinfectant was evaluated by conducting a batch disinfection study for estimating the concentration of disinfectant needed to inactivate a given concentration of the bacterial strain Escherichia coli ATCC 11229. Based on the concentration of disinfectant required, the size, weight and cost of a model purifier employing that disinfectant were estimated. Model purifiers based on different disinfectants were compared and disinfectants which resulted in the most safe, compact and inexpensive purifiers were identified. Purifiers based on bromine, tincture iodine, calcium hypochlorite and sodium dichloroisocyanurate were found to be most efficient, cost effective and compact with replacement parts costing US$3.60-6.00 for every 3,000 L of water purified and are thus expected to present the most attractive value proposition to end users.
    Journal of Water and Health 09/2013; 11(3):443-56.
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: Recent advances in high throughput sequencing technologies and concurrent refinements in 16S rDNA isolation techniques have facilitated the rapid extraction and sequencing of 16S rDNA content of microbial communities. The taxonomic affiliation of these 16S rDNA fragments is subsequently obtained using either BLAST-based or word frequency based approaches. However, the classification accuracy of such methods is observed to be limited in typical metagenomic scenarios, wherein a majority of organisms are hitherto unknown. In this study, we present a 16S rDNA classification algorithm, called C16S, that uses genus-specific Hidden Markov Models for taxonomic classification of 16S rDNA sequences. Results obtained using C16S have been compared with the widely used RDP classifier. The performance of C16S algorithm was observed to be consistently higher than the RDP classifier. In some scenarios, this increase in accuracy is as high as 34%. A web-server for the C16S algorithm is available at http://metagenomics.atc.tcs.com/C16S/.
    Genomics 02/2012; 99(4):195-201.
  • Source
    [Show abstract] [Hide abstract]
    ABSTRACT: A mobile ad hoc network (MANET) is a collection of autonomous nodes that communicate with each other by forming a multi-hop radio network and maintaining connections in a decentralized manner. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms,absence of centralized monitoring points, and lack of clear lines of defense. Most of the routing protocols for MANETs are thus vulnerable to various types of attacks. Ad hoc on-demand distance vector routing (AODV) is a very popular routing algorithm. However, it is vulnerable to the well-known black hole attack, where a malicious node falsely advertises good paths to a destination node during the route discovery process. This attack becomes more sever when a group of malicious nodes cooperate each other. In this paper, a defense mechanism is presented against a coordinated attack by multiple black hole nodes in a MANET. The simulation carried out on the proposed scheme has produced results that demonstrate the effectiveness of the mechanism in detection of the attack while maintaining a reasonable level of throughput in the network.
    11/2011;

Information

  • Address
    Mumbai, India
Information provided on this web page is aggregated encyclopedic and bibliographical information relating to the named institution. Information provided is not approved by the institution itself. The institution’s logo (and/or other graphical identification, such as a coat of arms) is used only to identify the institution in a nominal way. Under certain jurisdictions it may be property of the institution.

575 Members View all

View all

Top publications last week by downloads

 
2009 International Conference on Future Computer and Communication; 04/2009
137 Downloads
 
Pattern Recognition and Machine Intelligence, Third International Conference, PReMI 2009, New Delhi, India, December 16-20, 2009 Proceedings; 01/2009
80 Downloads

Top Collaborating Institutions

Collaborations

This map visualizes which other institutions researchers from Tata Consultancy Services Limited have collaborated with.

Rg score distribution

See how the RG Scores of researchers from Tata Consultancy Services Limited are distributed.