Skip to main content

and
  1. Article

    Open Access

    Single-cell analysis reveals altered tumor microenvironments of relapse- and remission-associated pediatric acute myeloid leukemia

    Acute myeloid leukemia (AML) microenvironment exhibits cellular and molecular differences among various subtypes. Here, we utilize single-cell RNA sequencing (scRNA-seq) to analyze pediatric AML bone marrow (B...

    Hope Mumme, Beena E. Thomas, Swati S. Bhasin, Upaasana Krishnan in Nature Communications (2023)

  2. Article

    Open Access

    Pediatric T-cell acute lymphoblastic leukemia blast signature and MRD associated immune environment changes defined by single cell transcriptomics analysis

    Different driver mutations and/or chromosomal aberrations and dysregulated signaling interactions between leukemia cells and the immune microenvironment have been implicated in the development of T-cell acute ...

    Swati S. Bhasin, Beena E. Thomas, Ryan J. Summers, Debasree Sarkar in Scientific Reports (2023)

  3. No Access

    Chapter and Conference Paper

    Comparison Based Analysis and Prediction for Earlier Detection of Breast Cancer Using Different Supervised ML Approach

    Breast cancer is one of the most leading diseases in women which leads to an increase in the mortality rate unexpectedly. The tremendous growth of breast cells forms tumors that sense as lumps. Generally, two ...

    Soumen Das, Siddhartha Chatterjee in Emerging Technologies in Data Mining and I… (2023)

  4. Article

    Open Access

    Single cell transcriptomic landscape of diabetic foot ulcers

    Diabetic foot ulceration (DFU) is a devastating complication of diabetes whose pathogenesis remains incompletely understood. Here, we profile 174,962 single cells from the foot, forearm, and peripheral blood m...

    Georgios Theocharidis, Beena E. Thomas, Debasree Sarkar in Nature Communications (2022)

  5. No Access

    Chapter and Conference Paper

    Randomised Key Selection and Encryption of Plaintext Using Large Primes

    Study of ciphertext plays a major role in Cryptanalysis. Functionally correct realization of a cryptosystem does not ensure the confidentiality of message always. Most classical cryptosystem are not quantum se...

    Soumen Das, Souvik Bhattacharyya in Internet of Things and Connected Technolog… (2022)

  6. No Access

    Article

    Machine-learning techniques for the prediction of protein–protein interactions

    Protein–protein interactions (PPIs) are important for the study of protein functions and pathways involved in different biological processes, as well as for understanding the cause and progression of diseases....

    Debasree Sarkar, Sudipto Saha in Journal of Biosciences (2019)

  7. No Access

    Chapter and Conference Paper

    Automated Glaucoma Detection of Medical Image Using Biogeography Based Optimization

    Gradual vision loss is an important challenging issue in medical imaging system. When optic nerve is damaged, vision loss and blindness introduced as a result known as glaucoma. So, eye pressure measurement is...

    Debasree Sarkar, Soumen Das in Advances in Optical Science and Engineering (2017)

  8. No Access

    Chapter and Conference Paper

    Audio File Digitization and Encryption Using ASCII Conversion

    Audio File encryption is an advance encryption technique in real world. It is basically a technique of hybridization, combination of transformation and cryptography. To send message securely inside noisy chann...

    Soumen Das, Debasree Sarkar in Advances in Optical Science and Engineering (2017)

  9. No Access

    Chapter

    Computational Proteomics

    Mass Spectrometry (MS) based high throughput proteomics generates huge amount of data, which necessitates the use of computational tools and statistical software for interpreting their biological significance....

    Debasree Sarkar, Sudipto Saha in Systems Biology Application in Synthetic Biology (2016)

  10. No Access

    Chapter and Conference Paper

    Compact, Multi-band Microstrip Antenna with High Gain

    In this paper, theoretical investigations of a printed microstrip antenna, using coaxial probe feed method is presented. The proposed antenna provides promising enhancement of gain. It also gives triple freque...

    Srija De, Poulami Samaddar, Sushanta Sarkar in Information Systems Design and Intelligent… (2015)

  11. No Access

    Chapter and Conference Paper

    A Huffman Code Based Image Steganography Technique

    We present here a novel steganographic method based on Huffman coding and the least significant bit substitution in order to provide high embedding capacity, a strong security and imperceptible visual quality ...

    Amitava Nag, Jyoti Prakash Singh, Sushanta Biswas, Debasree Sarkar in Applied Algorithms (2014)

  12. No Access

    Protocol

    Allergen Databases

    In this chapter, five popular allergen databases have been described: (1) Allergome is based on basic and clinical information on allergens causing an IgE-mediated disease; (2) AllergenOnline allows online sea...

    Gaurab Sircar, Debasree Sarkar, Swati Gupta Bhattacharya, Sudipto Saha in Immunoinformatics (2014)

  13. No Access

    Chapter and Conference Paper

    Image Secret Sharing in Stego-Images with Authentication

    Recently, a polynomial-based (t,n) image sharing and hiding schemes with authentication was proposed to hid n shares of a secret image into n ordinary cover images and form n stego-images that can be transmitt...

    Amitava Nag, Sushanta Biswas in Quality, Reliability, Security and Robustn… (2013)

  14. No Access

    Chapter and Conference Paper

    An Image Authentication Technique in Frequency Domain Using Secure Hash Algorithm (FDSHA)

    The demand of security is getting higher in these days due to the development of computers and Internet. In this paper, we proposed a novel image authentication scheme in frequency domain using SHA-1 that allo...

    Amitava Nag, Debasish Biswas, Soumadip Ghosh in Advances in Computing, Communication and C… (2011)