SOURADEEP SARKAR - Academia.edu (original) (raw)

Uploads

Papers by SOURADEEP SARKAR

Research paper thumbnail of Mitochondrial state determines functionally divergent stem cell population in planaria

Stem Cell Reports, 2021

Summary Mitochondrial state changes were shown to be critical for stem cell function. However, va... more Summary Mitochondrial state changes were shown to be critical for stem cell function. However, variation in the mitochondrial content in stem cells and the implication, if any, on differentiation is poorly understood. Here, using cellular and molecular studies, we show that the planarian pluripotent stem cells (PSCs) have low mitochondrial mass compared with their progenitors. Transplantation experiments provided functional validation that neoblasts with low mitochondrial mass are the true PSCs. Further, the mitochondrial mass correlated with OxPhos and inhibiting the transition to OxPhos dependent metabolism in cultured cells resulted in higher PSCs. In summary, we show that low mitochondrial mass is a hallmark of PSCs in planaria and provide a mechanism to isolate live, functionally active, PSCs from different cell cycle stages (G0/G1 and S, G2/M). Our study demonstrates that the change in mitochondrial metabolism, a feature of PSCs is conserved in planaria and highlights its role in organismal regeneration.

Research paper thumbnail of A Comparative Study of Routing Protocols

This paper is focus on the different routing protocols used for routing in computer network. A ro... more This paper is focus on the different routing protocols used for routing in computer network. A routing protocol is a protocol that specifies how routers communicate with each other, disseminating information that enables them to select routes between any two nodes on a computer network, the choice of the route being done by routing algorithms. Each router has a priori knowledge only of networks attached to it directly. A routing protocol shares this information first among immediate neighbours, and then throughout the network. This way, routers gain knowledge of the topology of the network. There are many routing protocols used for routing purpose like RIP, IGRP, EIGRP and OSPF etc

Research paper thumbnail of A Comparative Study of Routing Protocols

This paper is focus on the different routing protocols used for routing in computer network. A ro... more This paper is focus on the different routing protocols used for routing in computer network. A routing protocol is a protocol that specifies how routers communicate with each other, disseminating information that enables them to select routes between any two nodes on a computer network, the choice of the route being done by routing algorithms. Each router has a priori knowledge only of networks attached to it directly. A routing protocol shares this information first among immediate neighbours, and then throughout the network. This way, routers gain knowledge of the topology of the network. There are many routing protocols used for routing purpose like RIP, IGRP, EIGRP and OSPF etc

Research paper thumbnail of Quantum Cryptography: A new Approach for Information Security

Quantum cryptography is the art and science of exploiting quantum mechanical propertie s to perfo... more Quantum cryptography is the art and science of exploiting quantum mechanical propertie s to perform cryptographic tasks. It is a technology that ensures ultimate security. Compared to current cryptography that could be defeated by the development of an ultra high-speed computer, quantum cryptography ensures secure communication because it is based on the fundamental physical laws. It is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. Quantum cryptography is a new method for sec ret communications offering the ultimate security assurance of the inviolability of a Law of Nature. The quantum cryptography relies on two important elements of quantum mechanics -the Heisenberg Uncertainty principle and the principle of photon polarization.

Research paper thumbnail of Application of Color Segregation in Visual Cryptography using Halftone Technique and RGB Color Model Mr

Visual Cryptography is a special encryption technique to hide information in images in such a way... more Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. This experiment describes a secret visual cryptography scheme for color images based on halftone technique. Firstly, a chromatic image is decomposed into three monochromatic images in tones of Red, Green and Blue. Secondly, these three images are transformed into binary images by halftone technique. Finally, the traditional binary secret sharing scheme is used to get the sharing images. This scheme provides a more efficient way to hide natural images in different shares. Furthermore, the size of the shares does not vary when the number of colors appearing in the secret image differs.

Research paper thumbnail of Garbage Monitoring and Disposal System for Smart City Using Iot

2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT), 2018

India’s garbage generation stands at 0.2 to 0.6 kilograms of garbage per head per day. Also, it i... more India’s garbage generation stands at 0.2 to 0.6 kilograms of garbage per head per day. Also, it is a well-known fact that land in India is scarce. The garbage collector who comes to our house every morning to empty our dustbins inside his truck, takes all the garbage from our neighbourhood and dumps it on an abandoned piece of land. Garbage collectors from all parts of the city meet there to do the same. Such a land is called a landfill. India’s per capita waste generation is so high, that it creates a crisis if the garbage collector doesn’t visit a neighbourhood for a couple of days. As the procedure is purely manual, we need to implement a smart way of garbage monitoring and disposal. This paper proposes anIoT (Internet of Things) based approach for garbage monitoring and its disposal using ultrasonic and MQ4 sensors. Ultrasonic sensor checks the level of garbage filled in the biodegradable and non-biodegradable "smart bins".MQ4 sensors check the level of odour in the biodegradable garbage bin.After the threshold level is crossed in the non-biodegradable smart bin, theinformation is sent to the municipal corporation (with the help of an application) for the disposal of the garbage. If the threshold level is crossed in the biodegradable bin, a lid slides and the wastes are dumped in the underlying chamber. This method is more convenient than the manual one and is an initiative towards ‘smart city’. It ensures proper disposal of garbage and a restoration of a green and healthy environment.

Research paper thumbnail of Modeling Enterprise Resource Planning of TISCO:A Petri Net Approach

Indian Science Cruiser, 2016

Research paper thumbnail of Mitochondrial state determines functionally divergent stem cell population in planaria

Stem Cell Reports, 2021

Summary Mitochondrial state changes were shown to be critical for stem cell function. However, va... more Summary Mitochondrial state changes were shown to be critical for stem cell function. However, variation in the mitochondrial content in stem cells and the implication, if any, on differentiation is poorly understood. Here, using cellular and molecular studies, we show that the planarian pluripotent stem cells (PSCs) have low mitochondrial mass compared with their progenitors. Transplantation experiments provided functional validation that neoblasts with low mitochondrial mass are the true PSCs. Further, the mitochondrial mass correlated with OxPhos and inhibiting the transition to OxPhos dependent metabolism in cultured cells resulted in higher PSCs. In summary, we show that low mitochondrial mass is a hallmark of PSCs in planaria and provide a mechanism to isolate live, functionally active, PSCs from different cell cycle stages (G0/G1 and S, G2/M). Our study demonstrates that the change in mitochondrial metabolism, a feature of PSCs is conserved in planaria and highlights its role in organismal regeneration.

Research paper thumbnail of A Comparative Study of Routing Protocols

This paper is focus on the different routing protocols used for routing in computer network. A ro... more This paper is focus on the different routing protocols used for routing in computer network. A routing protocol is a protocol that specifies how routers communicate with each other, disseminating information that enables them to select routes between any two nodes on a computer network, the choice of the route being done by routing algorithms. Each router has a priori knowledge only of networks attached to it directly. A routing protocol shares this information first among immediate neighbours, and then throughout the network. This way, routers gain knowledge of the topology of the network. There are many routing protocols used for routing purpose like RIP, IGRP, EIGRP and OSPF etc

Research paper thumbnail of A Comparative Study of Routing Protocols

This paper is focus on the different routing protocols used for routing in computer network. A ro... more This paper is focus on the different routing protocols used for routing in computer network. A routing protocol is a protocol that specifies how routers communicate with each other, disseminating information that enables them to select routes between any two nodes on a computer network, the choice of the route being done by routing algorithms. Each router has a priori knowledge only of networks attached to it directly. A routing protocol shares this information first among immediate neighbours, and then throughout the network. This way, routers gain knowledge of the topology of the network. There are many routing protocols used for routing purpose like RIP, IGRP, EIGRP and OSPF etc

Research paper thumbnail of Quantum Cryptography: A new Approach for Information Security

Quantum cryptography is the art and science of exploiting quantum mechanical propertie s to perfo... more Quantum cryptography is the art and science of exploiting quantum mechanical propertie s to perform cryptographic tasks. It is a technology that ensures ultimate security. Compared to current cryptography that could be defeated by the development of an ultra high-speed computer, quantum cryptography ensures secure communication because it is based on the fundamental physical laws. It is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. Quantum cryptography is a new method for sec ret communications offering the ultimate security assurance of the inviolability of a Law of Nature. The quantum cryptography relies on two important elements of quantum mechanics -the Heisenberg Uncertainty principle and the principle of photon polarization.

Research paper thumbnail of Application of Color Segregation in Visual Cryptography using Halftone Technique and RGB Color Model Mr

Visual Cryptography is a special encryption technique to hide information in images in such a way... more Visual Cryptography is a special encryption technique to hide information in images in such a way that it can be decrypted by the human vision if the correct key image is used. This experiment describes a secret visual cryptography scheme for color images based on halftone technique. Firstly, a chromatic image is decomposed into three monochromatic images in tones of Red, Green and Blue. Secondly, these three images are transformed into binary images by halftone technique. Finally, the traditional binary secret sharing scheme is used to get the sharing images. This scheme provides a more efficient way to hide natural images in different shares. Furthermore, the size of the shares does not vary when the number of colors appearing in the secret image differs.

Research paper thumbnail of Garbage Monitoring and Disposal System for Smart City Using Iot

2018 Second International Conference on Green Computing and Internet of Things (ICGCIoT), 2018

India’s garbage generation stands at 0.2 to 0.6 kilograms of garbage per head per day. Also, it i... more India’s garbage generation stands at 0.2 to 0.6 kilograms of garbage per head per day. Also, it is a well-known fact that land in India is scarce. The garbage collector who comes to our house every morning to empty our dustbins inside his truck, takes all the garbage from our neighbourhood and dumps it on an abandoned piece of land. Garbage collectors from all parts of the city meet there to do the same. Such a land is called a landfill. India’s per capita waste generation is so high, that it creates a crisis if the garbage collector doesn’t visit a neighbourhood for a couple of days. As the procedure is purely manual, we need to implement a smart way of garbage monitoring and disposal. This paper proposes anIoT (Internet of Things) based approach for garbage monitoring and its disposal using ultrasonic and MQ4 sensors. Ultrasonic sensor checks the level of garbage filled in the biodegradable and non-biodegradable "smart bins".MQ4 sensors check the level of odour in the biodegradable garbage bin.After the threshold level is crossed in the non-biodegradable smart bin, theinformation is sent to the municipal corporation (with the help of an application) for the disposal of the garbage. If the threshold level is crossed in the biodegradable bin, a lid slides and the wastes are dumped in the underlying chamber. This method is more convenient than the manual one and is an initiative towards ‘smart city’. It ensures proper disposal of garbage and a restoration of a green and healthy environment.

Research paper thumbnail of Modeling Enterprise Resource Planning of TISCO:A Petri Net Approach

Indian Science Cruiser, 2016