International Journal of Technology and Human Interaction
The study aims to evaluate perceived impediments and anticipated solutions to HR while implementi... more The study aims to evaluate perceived impediments and anticipated solutions to HR while implementing Industry 4.0 initiatives in SMEs. A group of 10 decision-makers from these SMEs was tasked with assigning ratings to a variety of parameters. To create the model for 10 perceived impediments and five anticipated solutions and subsequently rank them, the TOPSIS technique is employed. According to the data analysis, job reductions, unemployment, and job uncertainty have emerged as the top three significant hurdles, while challenges to trainers, replacement of humans, and training costs have been recognized as the bottom three. Smart HR 4.0 and AI & Data Analytics are the top and lowest-ranked solutions respectively. HR in I4.0 in SMEs parameters have been graded based on their contributing attributes. However, it is also true that there are several impediments associated with the implementation of Industry 4.0. These impediments become more challenging in the context of SMEs.
Encryption-type ransomware has risen in prominence lately as the go-to malware for threat actors ... more Encryption-type ransomware has risen in prominence lately as the go-to malware for threat actors aiming to compromise Android devices. In this paper, we present a ransomware detection technique based on behaviours observed in the system calls performed by the malware. We identify and present some common high-level system call behavioural patterns targeted at encryption-type ransomware and evaluate these patterns. We further present our repeatable and extensible methodology for extracting the system call log and patterns.
In recent years, food wastage becomes the major problem of the world and researchers indicate tha... more In recent years, food wastage becomes the major problem of the world and researchers indicate that 20-60% of the total production is lost in the food supply chain.[1] Due to perishable nature and the cost of the products fresh food companies face more challenges throughout the supply chains. An order proposal is generated for all the products for a time period of a week by the integration of Machine Learning and loud and also taking into supply chain with some barriers such as supplier delivery times and also the maximum and minimum number of orders. The whole process of prediction is done using Random Forest Regression algorithm. This paper focuses particularly on perishable goods and analyzed based on the accuracy of the training and testing data.
This paper presents a pick and place robot which can be monitored and controlled remotely through... more This paper presents a pick and place robot which can be monitored and controlled remotely through MATLAB within a range of 10 m. Our system is to retrieve predefined displaced items from a known area. The robot can be remotely controlled by an android phone to move through the area of interest. The robot while moving through its path uses an IP camera to stream images of its current surroundings through Wi-Fi to a deep neural network (DNN) created in MATLAB. The DNN determines if an item of interest is present and triggers appropriate control action to retrieve the item. The three main parts of the machine are, pick and place arm, base with 4 wheels attached to individual DC motors, control and communication system using Arduino, L298N motor drivers and HC05 module. The system works using two Arduino Uno-based controllers and four servo motors that move the arm.
Background: COVID-19 is an infectious disease caused by severe acute respiratory syndrome Coronav... more Background: COVID-19 is an infectious disease caused by severe acute respiratory syndrome Coronavirus 2 (SARS-CoV-2) It has been recognized as a pandemic by the World Health Organization (WHO) on 11th March, 2020 Objective: To identify various factors that can increase coronavirus spread in India and predict COVID-19 cases up to 27th December, 2020, minimum and maximum number of deaths due to COVID-19 in India Methods: This work predicts COVID-19 cases, the minimum and the maximum number of deaths due to COVID-19 in India based on the infection rate and suspected cases Results: Our result shows that the number of COVID-19 cases will increase exponentially in India to approximately 859421415 cases by 27th December 2020 Conclusion: The spread of COVID-19 in India depends on a lot of factors such as religious congregation, social contact structure, low testing rates, identification of COVID-19 suspects, measures such as lockdown and sealing of hot stop, etc taken by the Indian governme...
The thyroid is one of the most important parts of our body. As part of the endocrine system, this... more The thyroid is one of the most important parts of our body. As part of the endocrine system, this tiny gland in our neck releases thyroid hormone, which is responsible for directing all your metabolic functions which means controlling everything from digestion to conversion to energy. When thyroid dysfunction, it can affect all aspects of our health. Both researchers and doctors face challenges in fighting thyroid disease. In that thyroid disease is a major cause of the emergence of medical diagnostics and prognosis, the beginning of which is a difficult confirmation in medical research. Thyroid hormones are suspected to regulate metabolism. Hyperthyroidism and hypothyroidism are one of the two most common thyroid diseases that release thyroid hormones to regulate the rate of digestion. Early detection of thyroid disease is a major factor in saving many lives. Frequently, visual tests and hand techniques are used for these types of diagnostic thyroid diseases. This manual interpreta...
One of the deadly diseases among humans is Cancer, which occurs almost anywhere in the human body... more One of the deadly diseases among humans is Cancer, which occurs almost anywhere in the human body. Cancer is caused by the cells that spread into the surrounding tissues by dividing itself uncontrollably. Breast Cancer is the most common cancer among women. Early detection and diagnosis of breast cancer are treatable and curable. Many women have no symptoms for this cancer at an early stage. The abnormal cells in the breast will risk for the development of breast cancer. So, it is important for women to regularly examine their breast. Technologies can be utilized in a smarter way with Artificial Intelligence techniques to assist the women during their examination of the breast at their living place to avoid the risk of breast cancer. The main aim is to develop a lowcost self-examining device for the detection of breast cancer and abnormality in the breast using an efficient optical method, Deep-learning algorithm and Internet of Things.
Real-time systems play an important role in our modern society. They are used in critical control... more Real-time systems play an important role in our modern society. They are used in critical control systems that rely on timely response and computed results to function properly. This paper summarizes to an extent the state of real-time systems in the area of scheduling. A vast amount of work that has been done in the area of real-time scheduling by both the operations research and the computer science communities. While concerning ourselves with the scheduling requirements and methodologies of a real-time application, we observe that it is fundamentally different from a non time-constrained time-sharing application. The difference arises in the methods used for scheduling the tasks and the system support that is necessary for such an implementation. In this paper, we will consider the various issues that typify real-time scheduling. We discuss two major algorithms that forms a baseline for all scheduling approaches and we present a real-time implementation of such a system. Real-tim...
2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), 2019
End to end secure data aggregation scheme for wireless sensor networks that are based on public k... more End to end secure data aggregation scheme for wireless sensor networks that are based on public key cryptography generally use elliptic curves. However elliptic curve based protocols require messages to be mapped to elliptic curves before performing any operations and finally reverse mapped to retrieve the message back. No mapping function, however, which is both homomorphic and has an efficient reverse mapping function is currently known. The mapping functions used in many previous protocols require brute forcing to reverse map the message from a point on the elliptic curve. This solution may be feasible on a base station with unlimited energy and processing power but it means that decrypting becomes very inefficient on ordinary sensors. We propose a secure data aggregation algorithm based on bilinear pairing that avoids this problem and makes decrypting data feasible on ordinary sensors.
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2018
INTRODUCTION: The novel corona disease disrupted education all around the world. This shifted peo... more INTRODUCTION: The novel corona disease disrupted education all around the world. This shifted people to mobile learning in real time wireless classroom from the physical face-to-face classroom. OBJECTIVE: Mobile learning has been present for years but the use of mobile learning is more in the current scenario due to COVID-19. However, people's acceptance of mobile learning education at institutions is still low. Thus, this research seeks to understand the student's perspective by analysing constructs hypothesized in the proposed hybrid model. METHOD: Data is collected using a survey from an Indian institute of the Meerut region with a total of 1022 students. RESULT: Data analysis and research findings showed that Random Forest and K-Nearest Neighbour Algorithms outperforms than other classifiers in predicting the dependent variables with better accuracy rate, precision, and recall value in this study. CONCLUSION: The research findings will help the designers and software development to design learning applications considering the perspective of students with respect to 5G technology.
ICST Transactions on Scalable Information Systems, 2018
Blockchain is gaining attention since its development due to its features like immutability, tran... more Blockchain is gaining attention since its development due to its features like immutability, transparency, decentralization. It can also be used as decentralized storage. Blockchain offers a wide range of digital services both in financial and nonfinancial sectors. In this paper, we discuss the basic concepts and terminologies associated with blockchain and discuss the application areas both in financial and non-financial sectors such as Digital voting, Digital identity, Education, etc. and discuss the existing framework in these areas, also the progress and challenges of global acquisition. The main highlight of this paper is COVID-19 and we discussed existing solutions to fight the COVID-19 pandemic by using such technology. This survey paper will be helpful for a data scientist as well as researchers to explore in the area COVID-19.
International Journal of Engineering and Advanced Technology, 2020
Biomass residues have potential to be used as an alternative solid fuel for various processes, al... more Biomass residues have potential to be used as an alternative solid fuel for various processes, also will be responsible for the optimization of the pyrolysis reaction processes, giving insight into the pyrolysis mechanisms and aiding in engineering efforts. There are different methods for production of bio-fuel from biomass residues; however before the production of bio-fuels from biomass it is important to understand their thermal degradation and kinetics. In the present work the Kinetics studies of four different walnut shells, namely, paper (PSW), thin (TSW), medium (MSW) and hard (HSW) shelled walnuts have been studied. Thermal degradation behaviour of walnut shells is investigated using thermogravimetric analysis (TGA) under three different heating rates (30, 60 and 100 0Cmin−1 ) in an oxidizing atmosphere to understand the kinetic behavior. Kissinger–Akahira–Sunose (KAS) and Ozawa–Flynn–Wall (OFW) methods were used to estimate the kinetic parameters such as Pre-exponential fac...
Ransomware is an ever-increasing threat in the world of cyber security targeting vulnerable users... more Ransomware is an ever-increasing threat in the world of cyber security targeting vulnerable users and companies, but what is lacking is an easier way to group, and devise practical and easy solutions which every day users can utilise.In this paper we look at the different characteristics of ransomware, and present preventative techniques to tackle these ransomware attacks. More specifically our techniques are based on ransomware behaviour as opposed to the signature based detection used by most anti-malware software. We further discuss the implementation of these techniques and their effectiveness. We have tested the techniques on four prominent ransomware strains, WannaCry, TeslaCrypt, Cerber and Petya. In this paper we discuss how our techniques dealt with these ransomware strains and the performance impact of these techniques.
Indien + Kleine und mittlere Unternehmen + Fahrzeugindustrie + Technologie + Technisches Produkti... more Indien + Kleine und mittlere Unternehmen + Fahrzeugindustrie + Technologie + Technisches Produktionsverfahren + Mechanisierung + Wettbewerbsfähigkeit + Produktionsstruktur 1 Bei der folgenden Kurzbibliografie handelt es sich um einen Auszug aus der Datenbank des "Fachinformationsverbundes Internationale Beziehungen und Länderkunde" (FIV). Das Institut für Asienkunde und das Asienreferat der Übersee-Dokumentation sind Mitglied im FIV und kooperieren mit dem Nordic Institute for Asian Studies (NIAS) in Kopenhagen. Diese Bibliografie ist unter www.duei.de/dok mit ausführlicheren Titelangaben zum Download angeboten: ggf. Internethinweise, zusätzliche Schlagwörter, Abstract sowie Bibliotheksstandort (Sigel), Sigelverzeichnis. Das Referat Asien und Südpazifik erstellt-gegen Gebühr-auch Literaturlisten, die auf individuell formulierte Themenstellungen zugeschnitten sind [Deutsches Übersee
Carcinoma arising primarily from the jaw is a locally aggressive lesion with poor prognosis. Prim... more Carcinoma arising primarily from the jaw is a locally aggressive lesion with poor prognosis. Primary intraosseous carcinoma (PIOC) lesion develops either de novo remnants of odontogenic epithelium, odontogenic cyst/tumor, epithelium remnants, or/and salivary gland residues. We describe very interesting case of primary intraosseous carcinoma of mandible. This extensive lesion was sent for oncological opinion and further management. Due to the uncertainty of diagnostic criteria of PIOC, only few cases of this lesion with a typical presentation have been reported. This article presents a case of primary intraosseous carcinoma with a unique appearance and detailed review stating its clinicopathological correlation.
The UGent Institutional Repository is the electronic archiving and dissemination platform for all... more The UGent Institutional Repository is the electronic archiving and dissemination platform for all UGent research publications. Ghent University has implemented a mandate stipulating that all academic publications of UGent researchers should be deposited and archived in this repository. Except for items where current copyright restrictions apply, these papers are available in Open Access. This item is the archived peer-reviewed author-version of: pH-degradable mannosylated nanogels for dendritic cell targeting
Security is an essential component for mobile ad hoc network (MANET). In order to provide securit... more Security is an essential component for mobile ad hoc network (MANET). In order to provide security against attacker, researchers are working specifically on the security challenges in MANETs, and many techniques are proposed for secure routing protocols within the networks. Our proposed work presents a more efficient solution for detecting a black hole attack with less communication cost in the MANET, which is particularly vulnerable compared to infrastructure-based networks due to its mobility and shared broadcast nature. As an adversary can successfully deploy black hole attack in the network. It can be seen that proposed work is more secure than the existing solutions. We also compared its performance to standard AODV routing protocol. The experimental results show that the proposed approach is better than standard AODV.
International Journal of Computer Applications, 2012
Wireless and mobile networks are evolving very rapidly. The mobile nodes in the wireless networks... more Wireless and mobile networks are evolving very rapidly. The mobile nodes in the wireless networks are having multiple interfaces with different radio access technologies (RATs) which are having different capabilities, cost and performance ratio. The use of non-PC based portable devices is increasing due to their flexible usage. The wireless and mobile network which is formed by these non-PC and PC based devices is heterogeneous in nature and these networks are co-located. Multiple interfaces can be included in the mobile device by using separate hardware and software modules. A mobile user wants to be Always Best Connected (ABC) as per its various requirements and availability in a particular environment. When a mobile node leaves the current network and joins the other network, a handover operation is needed and performed. The Handover operation is used to achieve seamless mobility and is of two types, first is in between same RATs and second is in between different RATs. For seamless and smooth handover operations across heterogeneous networks, IEEE has published a standard, named as IEEE 802.21. This paper presents a comprehensive description on the issues and challenges for achieving the seamless mobility in a heterogeneous environment. Apart from this, we also present the description of services provided by IEEE 802.21 standard and related vertical handover schemes to realize seamless mobility in heterogeneous network.
The NERC and CEH trademarks and logos ('the Trademarks') are registered trademarks of NERC in the... more The NERC and CEH trademarks and logos ('the Trademarks') are registered trademarks of NERC in the UK and other countries, and may not be used without the prior written consent of the Trademark owner.
International Journal of Technology and Human Interaction
The study aims to evaluate perceived impediments and anticipated solutions to HR while implementi... more The study aims to evaluate perceived impediments and anticipated solutions to HR while implementing Industry 4.0 initiatives in SMEs. A group of 10 decision-makers from these SMEs was tasked with assigning ratings to a variety of parameters. To create the model for 10 perceived impediments and five anticipated solutions and subsequently rank them, the TOPSIS technique is employed. According to the data analysis, job reductions, unemployment, and job uncertainty have emerged as the top three significant hurdles, while challenges to trainers, replacement of humans, and training costs have been recognized as the bottom three. Smart HR 4.0 and AI & Data Analytics are the top and lowest-ranked solutions respectively. HR in I4.0 in SMEs parameters have been graded based on their contributing attributes. However, it is also true that there are several impediments associated with the implementation of Industry 4.0. These impediments become more challenging in the context of SMEs.
Encryption-type ransomware has risen in prominence lately as the go-to malware for threat actors ... more Encryption-type ransomware has risen in prominence lately as the go-to malware for threat actors aiming to compromise Android devices. In this paper, we present a ransomware detection technique based on behaviours observed in the system calls performed by the malware. We identify and present some common high-level system call behavioural patterns targeted at encryption-type ransomware and evaluate these patterns. We further present our repeatable and extensible methodology for extracting the system call log and patterns.
In recent years, food wastage becomes the major problem of the world and researchers indicate tha... more In recent years, food wastage becomes the major problem of the world and researchers indicate that 20-60% of the total production is lost in the food supply chain.[1] Due to perishable nature and the cost of the products fresh food companies face more challenges throughout the supply chains. An order proposal is generated for all the products for a time period of a week by the integration of Machine Learning and loud and also taking into supply chain with some barriers such as supplier delivery times and also the maximum and minimum number of orders. The whole process of prediction is done using Random Forest Regression algorithm. This paper focuses particularly on perishable goods and analyzed based on the accuracy of the training and testing data.
This paper presents a pick and place robot which can be monitored and controlled remotely through... more This paper presents a pick and place robot which can be monitored and controlled remotely through MATLAB within a range of 10 m. Our system is to retrieve predefined displaced items from a known area. The robot can be remotely controlled by an android phone to move through the area of interest. The robot while moving through its path uses an IP camera to stream images of its current surroundings through Wi-Fi to a deep neural network (DNN) created in MATLAB. The DNN determines if an item of interest is present and triggers appropriate control action to retrieve the item. The three main parts of the machine are, pick and place arm, base with 4 wheels attached to individual DC motors, control and communication system using Arduino, L298N motor drivers and HC05 module. The system works using two Arduino Uno-based controllers and four servo motors that move the arm.
Background: COVID-19 is an infectious disease caused by severe acute respiratory syndrome Coronav... more Background: COVID-19 is an infectious disease caused by severe acute respiratory syndrome Coronavirus 2 (SARS-CoV-2) It has been recognized as a pandemic by the World Health Organization (WHO) on 11th March, 2020 Objective: To identify various factors that can increase coronavirus spread in India and predict COVID-19 cases up to 27th December, 2020, minimum and maximum number of deaths due to COVID-19 in India Methods: This work predicts COVID-19 cases, the minimum and the maximum number of deaths due to COVID-19 in India based on the infection rate and suspected cases Results: Our result shows that the number of COVID-19 cases will increase exponentially in India to approximately 859421415 cases by 27th December 2020 Conclusion: The spread of COVID-19 in India depends on a lot of factors such as religious congregation, social contact structure, low testing rates, identification of COVID-19 suspects, measures such as lockdown and sealing of hot stop, etc taken by the Indian governme...
The thyroid is one of the most important parts of our body. As part of the endocrine system, this... more The thyroid is one of the most important parts of our body. As part of the endocrine system, this tiny gland in our neck releases thyroid hormone, which is responsible for directing all your metabolic functions which means controlling everything from digestion to conversion to energy. When thyroid dysfunction, it can affect all aspects of our health. Both researchers and doctors face challenges in fighting thyroid disease. In that thyroid disease is a major cause of the emergence of medical diagnostics and prognosis, the beginning of which is a difficult confirmation in medical research. Thyroid hormones are suspected to regulate metabolism. Hyperthyroidism and hypothyroidism are one of the two most common thyroid diseases that release thyroid hormones to regulate the rate of digestion. Early detection of thyroid disease is a major factor in saving many lives. Frequently, visual tests and hand techniques are used for these types of diagnostic thyroid diseases. This manual interpreta...
One of the deadly diseases among humans is Cancer, which occurs almost anywhere in the human body... more One of the deadly diseases among humans is Cancer, which occurs almost anywhere in the human body. Cancer is caused by the cells that spread into the surrounding tissues by dividing itself uncontrollably. Breast Cancer is the most common cancer among women. Early detection and diagnosis of breast cancer are treatable and curable. Many women have no symptoms for this cancer at an early stage. The abnormal cells in the breast will risk for the development of breast cancer. So, it is important for women to regularly examine their breast. Technologies can be utilized in a smarter way with Artificial Intelligence techniques to assist the women during their examination of the breast at their living place to avoid the risk of breast cancer. The main aim is to develop a lowcost self-examining device for the detection of breast cancer and abnormality in the breast using an efficient optical method, Deep-learning algorithm and Internet of Things.
Real-time systems play an important role in our modern society. They are used in critical control... more Real-time systems play an important role in our modern society. They are used in critical control systems that rely on timely response and computed results to function properly. This paper summarizes to an extent the state of real-time systems in the area of scheduling. A vast amount of work that has been done in the area of real-time scheduling by both the operations research and the computer science communities. While concerning ourselves with the scheduling requirements and methodologies of a real-time application, we observe that it is fundamentally different from a non time-constrained time-sharing application. The difference arises in the methods used for scheduling the tasks and the system support that is necessary for such an implementation. In this paper, we will consider the various issues that typify real-time scheduling. We discuss two major algorithms that forms a baseline for all scheduling approaches and we present a real-time implementation of such a system. Real-tim...
2019 15th International Wireless Communications & Mobile Computing Conference (IWCMC), 2019
End to end secure data aggregation scheme for wireless sensor networks that are based on public k... more End to end secure data aggregation scheme for wireless sensor networks that are based on public key cryptography generally use elliptic curves. However elliptic curve based protocols require messages to be mapped to elliptic curves before performing any operations and finally reverse mapped to retrieve the message back. No mapping function, however, which is both homomorphic and has an efficient reverse mapping function is currently known. The mapping functions used in many previous protocols require brute forcing to reverse map the message from a point on the elliptic curve. This solution may be feasible on a base station with unlimited energy and processing power but it means that decrypting becomes very inefficient on ordinary sensors. We propose a secure data aggregation algorithm based on bilinear pairing that avoids this problem and makes decrypting data feasible on ordinary sensors.
EAI Endorsed Transactions on Industrial Networks and Intelligent Systems, 2018
INTRODUCTION: The novel corona disease disrupted education all around the world. This shifted peo... more INTRODUCTION: The novel corona disease disrupted education all around the world. This shifted people to mobile learning in real time wireless classroom from the physical face-to-face classroom. OBJECTIVE: Mobile learning has been present for years but the use of mobile learning is more in the current scenario due to COVID-19. However, people's acceptance of mobile learning education at institutions is still low. Thus, this research seeks to understand the student's perspective by analysing constructs hypothesized in the proposed hybrid model. METHOD: Data is collected using a survey from an Indian institute of the Meerut region with a total of 1022 students. RESULT: Data analysis and research findings showed that Random Forest and K-Nearest Neighbour Algorithms outperforms than other classifiers in predicting the dependent variables with better accuracy rate, precision, and recall value in this study. CONCLUSION: The research findings will help the designers and software development to design learning applications considering the perspective of students with respect to 5G technology.
ICST Transactions on Scalable Information Systems, 2018
Blockchain is gaining attention since its development due to its features like immutability, tran... more Blockchain is gaining attention since its development due to its features like immutability, transparency, decentralization. It can also be used as decentralized storage. Blockchain offers a wide range of digital services both in financial and nonfinancial sectors. In this paper, we discuss the basic concepts and terminologies associated with blockchain and discuss the application areas both in financial and non-financial sectors such as Digital voting, Digital identity, Education, etc. and discuss the existing framework in these areas, also the progress and challenges of global acquisition. The main highlight of this paper is COVID-19 and we discussed existing solutions to fight the COVID-19 pandemic by using such technology. This survey paper will be helpful for a data scientist as well as researchers to explore in the area COVID-19.
International Journal of Engineering and Advanced Technology, 2020
Biomass residues have potential to be used as an alternative solid fuel for various processes, al... more Biomass residues have potential to be used as an alternative solid fuel for various processes, also will be responsible for the optimization of the pyrolysis reaction processes, giving insight into the pyrolysis mechanisms and aiding in engineering efforts. There are different methods for production of bio-fuel from biomass residues; however before the production of bio-fuels from biomass it is important to understand their thermal degradation and kinetics. In the present work the Kinetics studies of four different walnut shells, namely, paper (PSW), thin (TSW), medium (MSW) and hard (HSW) shelled walnuts have been studied. Thermal degradation behaviour of walnut shells is investigated using thermogravimetric analysis (TGA) under three different heating rates (30, 60 and 100 0Cmin−1 ) in an oxidizing atmosphere to understand the kinetic behavior. Kissinger–Akahira–Sunose (KAS) and Ozawa–Flynn–Wall (OFW) methods were used to estimate the kinetic parameters such as Pre-exponential fac...
Ransomware is an ever-increasing threat in the world of cyber security targeting vulnerable users... more Ransomware is an ever-increasing threat in the world of cyber security targeting vulnerable users and companies, but what is lacking is an easier way to group, and devise practical and easy solutions which every day users can utilise.In this paper we look at the different characteristics of ransomware, and present preventative techniques to tackle these ransomware attacks. More specifically our techniques are based on ransomware behaviour as opposed to the signature based detection used by most anti-malware software. We further discuss the implementation of these techniques and their effectiveness. We have tested the techniques on four prominent ransomware strains, WannaCry, TeslaCrypt, Cerber and Petya. In this paper we discuss how our techniques dealt with these ransomware strains and the performance impact of these techniques.
Indien + Kleine und mittlere Unternehmen + Fahrzeugindustrie + Technologie + Technisches Produkti... more Indien + Kleine und mittlere Unternehmen + Fahrzeugindustrie + Technologie + Technisches Produktionsverfahren + Mechanisierung + Wettbewerbsfähigkeit + Produktionsstruktur 1 Bei der folgenden Kurzbibliografie handelt es sich um einen Auszug aus der Datenbank des "Fachinformationsverbundes Internationale Beziehungen und Länderkunde" (FIV). Das Institut für Asienkunde und das Asienreferat der Übersee-Dokumentation sind Mitglied im FIV und kooperieren mit dem Nordic Institute for Asian Studies (NIAS) in Kopenhagen. Diese Bibliografie ist unter www.duei.de/dok mit ausführlicheren Titelangaben zum Download angeboten: ggf. Internethinweise, zusätzliche Schlagwörter, Abstract sowie Bibliotheksstandort (Sigel), Sigelverzeichnis. Das Referat Asien und Südpazifik erstellt-gegen Gebühr-auch Literaturlisten, die auf individuell formulierte Themenstellungen zugeschnitten sind [Deutsches Übersee
Carcinoma arising primarily from the jaw is a locally aggressive lesion with poor prognosis. Prim... more Carcinoma arising primarily from the jaw is a locally aggressive lesion with poor prognosis. Primary intraosseous carcinoma (PIOC) lesion develops either de novo remnants of odontogenic epithelium, odontogenic cyst/tumor, epithelium remnants, or/and salivary gland residues. We describe very interesting case of primary intraosseous carcinoma of mandible. This extensive lesion was sent for oncological opinion and further management. Due to the uncertainty of diagnostic criteria of PIOC, only few cases of this lesion with a typical presentation have been reported. This article presents a case of primary intraosseous carcinoma with a unique appearance and detailed review stating its clinicopathological correlation.
The UGent Institutional Repository is the electronic archiving and dissemination platform for all... more The UGent Institutional Repository is the electronic archiving and dissemination platform for all UGent research publications. Ghent University has implemented a mandate stipulating that all academic publications of UGent researchers should be deposited and archived in this repository. Except for items where current copyright restrictions apply, these papers are available in Open Access. This item is the archived peer-reviewed author-version of: pH-degradable mannosylated nanogels for dendritic cell targeting
Security is an essential component for mobile ad hoc network (MANET). In order to provide securit... more Security is an essential component for mobile ad hoc network (MANET). In order to provide security against attacker, researchers are working specifically on the security challenges in MANETs, and many techniques are proposed for secure routing protocols within the networks. Our proposed work presents a more efficient solution for detecting a black hole attack with less communication cost in the MANET, which is particularly vulnerable compared to infrastructure-based networks due to its mobility and shared broadcast nature. As an adversary can successfully deploy black hole attack in the network. It can be seen that proposed work is more secure than the existing solutions. We also compared its performance to standard AODV routing protocol. The experimental results show that the proposed approach is better than standard AODV.
International Journal of Computer Applications, 2012
Wireless and mobile networks are evolving very rapidly. The mobile nodes in the wireless networks... more Wireless and mobile networks are evolving very rapidly. The mobile nodes in the wireless networks are having multiple interfaces with different radio access technologies (RATs) which are having different capabilities, cost and performance ratio. The use of non-PC based portable devices is increasing due to their flexible usage. The wireless and mobile network which is formed by these non-PC and PC based devices is heterogeneous in nature and these networks are co-located. Multiple interfaces can be included in the mobile device by using separate hardware and software modules. A mobile user wants to be Always Best Connected (ABC) as per its various requirements and availability in a particular environment. When a mobile node leaves the current network and joins the other network, a handover operation is needed and performed. The Handover operation is used to achieve seamless mobility and is of two types, first is in between same RATs and second is in between different RATs. For seamless and smooth handover operations across heterogeneous networks, IEEE has published a standard, named as IEEE 802.21. This paper presents a comprehensive description on the issues and challenges for achieving the seamless mobility in a heterogeneous environment. Apart from this, we also present the description of services provided by IEEE 802.21 standard and related vertical handover schemes to realize seamless mobility in heterogeneous network.
The NERC and CEH trademarks and logos ('the Trademarks') are registered trademarks of NERC in the... more The NERC and CEH trademarks and logos ('the Trademarks') are registered trademarks of NERC in the UK and other countries, and may not be used without the prior written consent of the Trademark owner.
Uploads
Papers by Vimal Kumar