About
25
Publications
11,690
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
249
Citations
Introduction
Additional affiliations
January 2014 - December 2018
CSIR-CSIO
Position
- Principal Investigator
Publications
Publications (25)
Wireless Sensor Network (WSN) is an important element of Internet of Things arena. Energy efficiency is the prime factor for attaining the long life of WSN systems, which are resource constrained especially in energy. During the WSN operations, the communication activities consume maximum energy share of the WSN nodes. As routing algorithms are ass...
A high capacity data hiding method using lossless compression, Advanced Encryption Standard (AES), modified pixel value differencing (MPVD) and least significant bit (LSB) substitution is presented. Arithmetic coding was applied on secret message for lossless compression, which provided ~22% higher embedding capacity. The compressed secret message...
Steganography is the science of invisible communication with its widespread applications in the area of secret exchange of information. Steganography research has seen tremendous growth in the recent past with its focus on image based steganography. Image based steganography research can be classified as spatial and transform domain. Methods develo...
The global food demand is increasing with the increase in world population. The agriculture land and fresh water resources are limited and the water crisis is further enhanced due to the global warming and the shortfall of better water management systems. The precision agriculture can play a very important role in curtailing this crisis by improvin...
With more and more people attending public gatherings, and with a continuous rise in crowd density in urban areas, the management of crowd has become more challenging than ever before. Every year, many people lose their lives due to inefficient crowd planning and management. Crowd management is an interdisciplinary area, and it requires understandi...
World has seen many casualties in bomb explosions from enemies and the terrorists; and defense services across the globe are working on more effective explosives. To develop techniques for analyzing the effectiveness and impact of explosives for attack as well as for defense strategies have become a necessity. Velocity measurement of bomb fragments...
Agriculture is the most important aspect of human civilization. The usages of information and communication technologies (ICT) have significantly contributed in the area in last two decades. Internet of things (IOT) is a technology, where real life physical objects (e.g. sensor nodes) can work collaboratively to create an information based and tech...
Energy efficient routing algorithms for wireless sensor networks (WSN) have been explored extensively by the researchers during last decade. In majority of cases homogeneous sensor nodes have been considered, and heterogeneity considerations have been limited to energy and link heterogeneity. With emergence of new areas like Internet of Things (IOT...
Feasibility study plays a vital role in the development of a technology and the life expectancy of innovative solution. A researcher needs to propose a solution to a problem and thus needs to develop a product or a process. Preliminary investigation requires search report from research papers, patents etc. Patents and research paper provides a gamu...
Steganography is the science and art of embedding secret messages in innocuous looking carriers in such a way that it does not draw the attention of anyone other than the sender and the targeted recipient, thus a method for secret and invisible communication which provides security through obscurity. Its main purpose is to hide the occurrence of co...
Data, the lowest level of Knowledge Pyramid which acts as a foundation for Knowledge abstraction and inferences, can be defined as a collection of information that represents variables having qualitative and quantitative properties. Data Mining refers to the extraction of hidden predictive information from data warehouse or from multiple distribute...
Today laser microdissection system or laser scissor is frequently used for isolation of single chromosome, nucleus, cell, tissue etc. Here we fabricated the gold microelectrodes having a gap spacing of less than 3 μm using this system. A 500 Å thickness of gold was coated on standard glass slide. A UV-laser (λ 337 nm) of 4 ns pulse duration having...
A DNA based number system with wide application in the area of DNA or other molecular computation devices and processors, and basic arithmetic operations i.e. addition and subtraction for this have been developed wherein the method comprises assignment of arbitrary integer values to all DNA bases (A=O, T=1, C=2, G=3), arbitrary assignment of comple...
Effective dispersion and selective positioning of carbon nanotubes is necessary for future integration with
conventional microelectronics as well as the development of novel functional devices. Limited progress has been reported in the dispersion and controlled placement of carbon nanotubes. In the present study, we dispersed carbon nanotubes using...
DNA is a natural molecular level storage device. Molecular storage devices use each molecule or part of it for storing a character. Thus it is possible to store information million of times than presently used storage devices. For example a JPEG image (i.e. flag of India) having file size of 1981 Bytes can be encrypted using 7924 DNA bases which oc...
1-Ethyl-3-(3-dimethylaminopropyl) carbodiimide (EDC) was tested for interference with the Lowry method of protein determination. The EDC interference was nearly additive at both 660 and 750 nm. Blue-colored complex developed in the case of EDC and showed maximum absorbance at 750 nm, similar to the bovine serum albumin (BSA) estimation. In time res...
In this paper we will overview the data hiding techniques in digital images. We will describe how one can use steganography to hide information in a digital image. Steganography is the basis for many of the digital watermarking techniques currently being developed, and is related to cryptography. Recent developments in digital copyright protection...
Transmission properties of molecular bridges between conducting leads, especially DNA trapped between electrodes,
as DNA can be synthesized in any sequence, orientation and length, has drawn many researchers interest to understand
the physics of charge transfer along the stacks of base pairs in DNA. Considering a Donor-Bridge-Acceptor system,
condu...
During the last half century the electronic components and computers have grown more and more powerful with the
shrinking dimensions of transistors which is approaching 100nm with about a billion tiny devices working together
on a single processor. The laws of quantum mechanics and limitations of materials and fabrication techniques
restrict furthe...
During the last half century the electronic components and computers have grown more and more powerful with the shrinking dimensions of transistors which is approaching 100nm with about a billion tiny devices working together on a single processor. The laws of quantum mechanics and limitations of materials and fabrication techniques restrict furthe...