Manik Gupta - Academia.edu (original) (raw)
Papers by Manik Gupta
Proceedings of the 14th International Conference on Availability, Reliability and Security
2013 IEEE International Conference on Sensing, Communications and Networking (SECON), 2013
Journal of Alloys and Compounds, 2015
ABSTRACT The nanofabrication, characterization, microstructural and magnetic properties of pure a... more ABSTRACT The nanofabrication, characterization, microstructural and magnetic properties of pure and Mg2+ doped cadmium ferrite (CdFe2−xMg1.5xO4; x = 0.0-0.7) have been carried out. Morphology and the microstructure of the nanostructured oxide materials obtained through sol-gel process using hydrated metal-citrate precursor were studied by powder X-ray diffraction (XRD), electron microscopy (SEM, TEM) and N2-physisorption (BET) showing an ordered cubic arrangement of 11-23 nm diameter pores with single-phase spinel grains averaging 13-38 nm in diameter. Room temperature magnetic measurements using magnetometer (VSM) demonstrate that the nature and concentration of dopant both control the site preference in the crystal lattices, suggesting the partial inverted spinel structure of soft Cd ferrites, which differs from bulk CdFe2O4 showing practically no inversion in structure. An increase in Mg2+ substitution leads to a decrease in the lattice parameter, an increase in saturation magnetization as well as BET surface area of the as-synthesized ferrites.
Solid State Sciences, 2012
ABSTRACT Nanosized zinc substituted ferrites with composition Cs0.5-x/2ZnxMn0.05Fe2.45-x/2O4 (x =... more ABSTRACT Nanosized zinc substituted ferrites with composition Cs0.5-x/2ZnxMn0.05Fe2.45-x/2O4 (x = 0–0.5) were prepared by solution combustion route. The ferrites obtained have been characterized by powder XRD, Mössbauer spectroscopy and Transmission Electron Microscope (TEM). Magnetic and electrical properties have also been studied. Powder X-ray diffraction analysis shows the formation of single phase cubic spinel structure. The saturation magnetization (Ms) initially exhibits an upward trend followed by a regular decrease with increasing diamagnetic Zn content. Curie temperature shows a downward trend with Zn content. The Mössbauer spectra display transition from ferrimagnetic to super-paramagnetic phase with increasing ‘x’ value. The temperature dependence resistivity shows regular decrease with temperature reflecting semiconductor behaviour of the ferrite samples. The permittivity (ɛ′) and tangent loss (tan δ) measured at room temperature as a function of frequency shows the expected ferrite behaviour. TEM studies indicate the formation of nanosized ferrite particles. These results demonstrate promising features of Cs–Zn ferrites in microwave applications.
Materials Chemistry and Physics, 2011
Single phase nanosized spinel ferrites with general formula Rb 0.5−x/2 Zn x Mn 0.05 Fe 2.45−x/2 O... more Single phase nanosized spinel ferrites with general formula Rb 0.5−x/2 Zn x Mn 0.05 Fe 2.45−x/2 O 4 (x = 0 → 0.5) were prepared by solution combustion route using ethylene glycol as a capping agent. The ferrites obtained have been characterized by powder XRD and Mössbauer spectroscopy. Their magnetic and electric properties have been studied by employing Vibrating Sample Magnetometer (VSM), Curie temperature assembly and LCR meter. Mössbauer spectra display transition from ferrimagnetic to superparamagnetic phase. The saturation magnetization (M S) initially exhibits an upward trend followed by regular decrease with increasing diamagnetic Zn content. Curie temperature also shows a downward trend with increasing Zn content. The resistivity of the doped samples decreases with temperature suggesting semiconductor behaviour of the ferrites. The dielectric constant (ε) and tangent loss (tan ␦) measured at room temperature as a function of frequency show the expected ferrite behaviour.
Journal of Analytical and Applied Pyrolysis, 2012
Abstract Nanosized pure rubidium ferrites have been successfully prepared by thermal decompositio... more Abstract Nanosized pure rubidium ferrites have been successfully prepared by thermal decomposition of rubidium hexa (carboxylato) ferrate (III) precursors, Rb 3 [Fe (L) 6]· xH 2 O (L= formate, acetate, propionate, butyrate), in flowing air atmosphere from ambient ...
Journal of Analytical and Applied Pyrolysis, 2013
ABSTRACT Thermal decomposition studies of rubidium bis(citrato)ferrate(III) trihydrate precursor ... more ABSTRACT Thermal decomposition studies of rubidium bis(citrato)ferrate(III) trihydrate precursor has been carried out in flowing air atmosphere from ambient temperature to 900 °C. The precursor material was prepared by using solution based precursor method and different physico-chemical techniques i.e. simultaneous thermogravimetry – differential thermogravimetry – differential thermal analysis (TG–DTG–DTA), X-ray diffraction (powder), transmission electron microscopy (TEM), infra-red (IR) and Mössbauer spectroscopy have been employed to characterize the intermediates and end product. After dehydration, anhydrous precursor undergoes exothermic decomposition to yield various intermediates like metal carbonate, metal oxide and α-Fe2O3, followed by a solid-state reaction to form final ferrite product above 800 °C. XRD study reveals the formation of pure and nanosized rubidium ferrites with α-LiFeO2 type geometry. TEM micrograph confirms the nanosized particles with average size of 65 nm. For the sake of comparison, similar ferrite has also been prepared by the combustion method at a comparatively lower temperature (600 °C) and in less time.
thesai.org
Wireless Sensor Networks (WSNs) are one of the most exciting and challenging research areas. It i... more Wireless Sensor Networks (WSNs) are one of the most exciting and challenging research areas. It is an emerging technology that shows various applications both for public and military purpose. In order to operate these applications successfully, it is necessary to maintain privacy and secrecy of the transmitted data. In this paper, we have presented a Reliable Security Model (RSM) for WSNs. To incorporate the security, we are using four keys out of which two are static and remaining two are dynamic. One of the static key is obtained by composition of Q number of keys, and other is real-time MAC ID (RTMAC). Dynamic keys are computed on fly and keep on changing each time when the network is synchronized. In RSM, the synchronization time is less than the time required to compromise any node by an adversary, so that even if some nodes get compromised, the keying materials of the node have already been changed.
IECON 2021 – 47th Annual Conference of the IEEE Industrial Electronics Society
Adaptive bitrate (ABR) algorithms are used to adapt the video bitrate based on the network condit... more Adaptive bitrate (ABR) algorithms are used to adapt the video bitrate based on the network conditions to improve the overall video quality of experience (QoE). Further, with the rise of multi-access edge computing (MEC), a higher QoE can be guaranteed for video services by performing computations over the edge servers rather than the cloud servers. Recently, reinforcement learning (RL) and asynchronous advantage actor-critic (A3C) methods have been used to improve adaptive bit rate algorithms and they have been shown to enhance the overall QoE as compared to fixed-rule ABR algorithms. However, a common issue in the A3C methods is the lag between behavior policy and target policy. As a result, the behavior and the target policies are no longer synchronized with one another which results in suboptimal updates. In this work, we present the deep reinforcement learning with an importance sampling based approach focused on edge-driven video delivery services to achieve an overall better u...
Geo-intelligence for Sustainable Development
IOP Conference Series: Materials Science and Engineering
Sensors
Distributed sensor networks are at the heart of smart buildings, providing greater detail and val... more Distributed sensor networks are at the heart of smart buildings, providing greater detail and valuable insights into their energy consumption patterns. The problem is particularly complex for older buildings retrofitted with Building Energy Management Systems (BEMS) where extracting useful knowledge from large sensor data streams without full understanding of the underlying system variables is challenging. This paper presents an application of Q-Analysis, a computationally simple topological approach for summarizing large sensor data sets and revealing useful relationships between different variables. Q-Analysis can be used to extract novel structural features called Q-vectors. The Q-vector magnitude visualizations are shown to be very effective in providing insights on macro behaviors, i.e., building floor behaviors in the present case, which are not evident from the use of unsupervised learning algorithms applied on individual terminal units. It has been shown that the building fl...
Translational andrology and urology, 2017
Penile cancer is a rare malignancy with a high propensity for regional dissemination. Current gui... more Penile cancer is a rare malignancy with a high propensity for regional dissemination. Current guidelines recommend inguinal lymphadenectomy in patients with penile cancer for palpable inguinal lymph nodes or in certain cases of nonpalpable inguinal lymph nodes. For many years, this procedure was performed with a traditional open approach and carried significant morbidity due to severe lymphedema, flap necrosis, wound infections, and seroma formation. The evolution of inguinal lymphadenectomy surgery for patients with penile cancer to a more minimally invasive approach has greatly reduced the morbidity of the procedure. Complications of inguinal lymphadenectomy can be minimized with modifications in surgical approach with the use of endoscopic, robotic, and various reconstructive methods. This review focuses on various intraoperative techniques to reduce morbidity in inguinal lymphadenectomies for penile cancer.
International Journal of Computer Applications, 2016
Wireless sensor network is an emerging technology. WSN's are deployed in an open and unattended e... more Wireless sensor network is an emerging technology. WSN's are deployed in an open and unattended environment. Therefore they are prone to security threats. The traditional approach of cryptography alone was not sufficient for security. Cryptography was not able to prevent internal adversaries from inserting the forged data. As a result Trust factor scheme was introduced in wireless sensor networks to prevent internal security threats in a network. In a distributed deployment of wireless sensor network, nodes communicate with each other on the basis of their trustworthiness. But in a huge network it becomes challenge for sensor nodes to recognize all the sensor nodes present in a network and retain their trust values with it, as the changes are very frequent in wireless sensor networks. So nodes are more vulnerable to attacks. In a proposed work, the main base station keeps the trust value of all the sensor nodes. The trust values are defined by belief of an individual node in a network. Belief is the subjective trust which can be justified by the past judgments in a network. If the value of belief is more, the sensor node will be more trustworthy. Different algorithms have been applied to authenticate the new sensor node and to provide secured file sharing in a wireless sensor network.
Proceedings of the 14th International Conference on Availability, Reliability and Security
2013 IEEE International Conference on Sensing, Communications and Networking (SECON), 2013
Journal of Alloys and Compounds, 2015
ABSTRACT The nanofabrication, characterization, microstructural and magnetic properties of pure a... more ABSTRACT The nanofabrication, characterization, microstructural and magnetic properties of pure and Mg2+ doped cadmium ferrite (CdFe2−xMg1.5xO4; x = 0.0-0.7) have been carried out. Morphology and the microstructure of the nanostructured oxide materials obtained through sol-gel process using hydrated metal-citrate precursor were studied by powder X-ray diffraction (XRD), electron microscopy (SEM, TEM) and N2-physisorption (BET) showing an ordered cubic arrangement of 11-23 nm diameter pores with single-phase spinel grains averaging 13-38 nm in diameter. Room temperature magnetic measurements using magnetometer (VSM) demonstrate that the nature and concentration of dopant both control the site preference in the crystal lattices, suggesting the partial inverted spinel structure of soft Cd ferrites, which differs from bulk CdFe2O4 showing practically no inversion in structure. An increase in Mg2+ substitution leads to a decrease in the lattice parameter, an increase in saturation magnetization as well as BET surface area of the as-synthesized ferrites.
Solid State Sciences, 2012
ABSTRACT Nanosized zinc substituted ferrites with composition Cs0.5-x/2ZnxMn0.05Fe2.45-x/2O4 (x =... more ABSTRACT Nanosized zinc substituted ferrites with composition Cs0.5-x/2ZnxMn0.05Fe2.45-x/2O4 (x = 0–0.5) were prepared by solution combustion route. The ferrites obtained have been characterized by powder XRD, Mössbauer spectroscopy and Transmission Electron Microscope (TEM). Magnetic and electrical properties have also been studied. Powder X-ray diffraction analysis shows the formation of single phase cubic spinel structure. The saturation magnetization (Ms) initially exhibits an upward trend followed by a regular decrease with increasing diamagnetic Zn content. Curie temperature shows a downward trend with Zn content. The Mössbauer spectra display transition from ferrimagnetic to super-paramagnetic phase with increasing ‘x’ value. The temperature dependence resistivity shows regular decrease with temperature reflecting semiconductor behaviour of the ferrite samples. The permittivity (ɛ′) and tangent loss (tan δ) measured at room temperature as a function of frequency shows the expected ferrite behaviour. TEM studies indicate the formation of nanosized ferrite particles. These results demonstrate promising features of Cs–Zn ferrites in microwave applications.
Materials Chemistry and Physics, 2011
Single phase nanosized spinel ferrites with general formula Rb 0.5−x/2 Zn x Mn 0.05 Fe 2.45−x/2 O... more Single phase nanosized spinel ferrites with general formula Rb 0.5−x/2 Zn x Mn 0.05 Fe 2.45−x/2 O 4 (x = 0 → 0.5) were prepared by solution combustion route using ethylene glycol as a capping agent. The ferrites obtained have been characterized by powder XRD and Mössbauer spectroscopy. Their magnetic and electric properties have been studied by employing Vibrating Sample Magnetometer (VSM), Curie temperature assembly and LCR meter. Mössbauer spectra display transition from ferrimagnetic to superparamagnetic phase. The saturation magnetization (M S) initially exhibits an upward trend followed by regular decrease with increasing diamagnetic Zn content. Curie temperature also shows a downward trend with increasing Zn content. The resistivity of the doped samples decreases with temperature suggesting semiconductor behaviour of the ferrites. The dielectric constant (ε) and tangent loss (tan ␦) measured at room temperature as a function of frequency show the expected ferrite behaviour.
Journal of Analytical and Applied Pyrolysis, 2012
Abstract Nanosized pure rubidium ferrites have been successfully prepared by thermal decompositio... more Abstract Nanosized pure rubidium ferrites have been successfully prepared by thermal decomposition of rubidium hexa (carboxylato) ferrate (III) precursors, Rb 3 [Fe (L) 6]· xH 2 O (L= formate, acetate, propionate, butyrate), in flowing air atmosphere from ambient ...
Journal of Analytical and Applied Pyrolysis, 2013
ABSTRACT Thermal decomposition studies of rubidium bis(citrato)ferrate(III) trihydrate precursor ... more ABSTRACT Thermal decomposition studies of rubidium bis(citrato)ferrate(III) trihydrate precursor has been carried out in flowing air atmosphere from ambient temperature to 900 °C. The precursor material was prepared by using solution based precursor method and different physico-chemical techniques i.e. simultaneous thermogravimetry – differential thermogravimetry – differential thermal analysis (TG–DTG–DTA), X-ray diffraction (powder), transmission electron microscopy (TEM), infra-red (IR) and Mössbauer spectroscopy have been employed to characterize the intermediates and end product. After dehydration, anhydrous precursor undergoes exothermic decomposition to yield various intermediates like metal carbonate, metal oxide and α-Fe2O3, followed by a solid-state reaction to form final ferrite product above 800 °C. XRD study reveals the formation of pure and nanosized rubidium ferrites with α-LiFeO2 type geometry. TEM micrograph confirms the nanosized particles with average size of 65 nm. For the sake of comparison, similar ferrite has also been prepared by the combustion method at a comparatively lower temperature (600 °C) and in less time.
thesai.org
Wireless Sensor Networks (WSNs) are one of the most exciting and challenging research areas. It i... more Wireless Sensor Networks (WSNs) are one of the most exciting and challenging research areas. It is an emerging technology that shows various applications both for public and military purpose. In order to operate these applications successfully, it is necessary to maintain privacy and secrecy of the transmitted data. In this paper, we have presented a Reliable Security Model (RSM) for WSNs. To incorporate the security, we are using four keys out of which two are static and remaining two are dynamic. One of the static key is obtained by composition of Q number of keys, and other is real-time MAC ID (RTMAC). Dynamic keys are computed on fly and keep on changing each time when the network is synchronized. In RSM, the synchronization time is less than the time required to compromise any node by an adversary, so that even if some nodes get compromised, the keying materials of the node have already been changed.
IECON 2021 – 47th Annual Conference of the IEEE Industrial Electronics Society
Adaptive bitrate (ABR) algorithms are used to adapt the video bitrate based on the network condit... more Adaptive bitrate (ABR) algorithms are used to adapt the video bitrate based on the network conditions to improve the overall video quality of experience (QoE). Further, with the rise of multi-access edge computing (MEC), a higher QoE can be guaranteed for video services by performing computations over the edge servers rather than the cloud servers. Recently, reinforcement learning (RL) and asynchronous advantage actor-critic (A3C) methods have been used to improve adaptive bit rate algorithms and they have been shown to enhance the overall QoE as compared to fixed-rule ABR algorithms. However, a common issue in the A3C methods is the lag between behavior policy and target policy. As a result, the behavior and the target policies are no longer synchronized with one another which results in suboptimal updates. In this work, we present the deep reinforcement learning with an importance sampling based approach focused on edge-driven video delivery services to achieve an overall better u...
Geo-intelligence for Sustainable Development
IOP Conference Series: Materials Science and Engineering
Sensors
Distributed sensor networks are at the heart of smart buildings, providing greater detail and val... more Distributed sensor networks are at the heart of smart buildings, providing greater detail and valuable insights into their energy consumption patterns. The problem is particularly complex for older buildings retrofitted with Building Energy Management Systems (BEMS) where extracting useful knowledge from large sensor data streams without full understanding of the underlying system variables is challenging. This paper presents an application of Q-Analysis, a computationally simple topological approach for summarizing large sensor data sets and revealing useful relationships between different variables. Q-Analysis can be used to extract novel structural features called Q-vectors. The Q-vector magnitude visualizations are shown to be very effective in providing insights on macro behaviors, i.e., building floor behaviors in the present case, which are not evident from the use of unsupervised learning algorithms applied on individual terminal units. It has been shown that the building fl...
Translational andrology and urology, 2017
Penile cancer is a rare malignancy with a high propensity for regional dissemination. Current gui... more Penile cancer is a rare malignancy with a high propensity for regional dissemination. Current guidelines recommend inguinal lymphadenectomy in patients with penile cancer for palpable inguinal lymph nodes or in certain cases of nonpalpable inguinal lymph nodes. For many years, this procedure was performed with a traditional open approach and carried significant morbidity due to severe lymphedema, flap necrosis, wound infections, and seroma formation. The evolution of inguinal lymphadenectomy surgery for patients with penile cancer to a more minimally invasive approach has greatly reduced the morbidity of the procedure. Complications of inguinal lymphadenectomy can be minimized with modifications in surgical approach with the use of endoscopic, robotic, and various reconstructive methods. This review focuses on various intraoperative techniques to reduce morbidity in inguinal lymphadenectomies for penile cancer.
International Journal of Computer Applications, 2016
Wireless sensor network is an emerging technology. WSN's are deployed in an open and unattended e... more Wireless sensor network is an emerging technology. WSN's are deployed in an open and unattended environment. Therefore they are prone to security threats. The traditional approach of cryptography alone was not sufficient for security. Cryptography was not able to prevent internal adversaries from inserting the forged data. As a result Trust factor scheme was introduced in wireless sensor networks to prevent internal security threats in a network. In a distributed deployment of wireless sensor network, nodes communicate with each other on the basis of their trustworthiness. But in a huge network it becomes challenge for sensor nodes to recognize all the sensor nodes present in a network and retain their trust values with it, as the changes are very frequent in wireless sensor networks. So nodes are more vulnerable to attacks. In a proposed work, the main base station keeps the trust value of all the sensor nodes. The trust values are defined by belief of an individual node in a network. Belief is the subjective trust which can be justified by the past judgments in a network. If the value of belief is more, the sensor node will be more trustworthy. Different algorithms have been applied to authenticate the new sensor node and to provide secured file sharing in a wireless sensor network.