Skip to main content

and
  1. No Access

    Article

    Noninvasive assessment of organ-specific and shared pathways in multi-organ fibrosis using T1 map**

    Fibrotic diseases affect multiple organs and are associated with morbidity and mortality. To examine organ-specific and shared biologic mechanisms that underlie fibrosis in different organs, we developed machi...

    Victor Nauffal, Marcus D. R. Klarqvist, Matthew C. Hill in Nature Medicine (2024)

  2. No Access

    Chapter and Conference Paper

    Comparative Performance Analysis of Present Lightweight Cipher for Security Applications in Extremely Constrained Environment

    A lightweight cipher architecture is a cryptographic system designed to be efficient in terms of computational complexity, memory usage, and power consumption. It is often used in applications where resources ...

    Shipra Upadhyay, Pulkit Singh in Emergent Converging Technologies and Biome… (2024)

  3. No Access

    Chapter and Conference Paper

    Investigation of Normally-Off β-Ga2O3 Power MOSFET Using Ferroelectric Gate

    In this paper, we present a normally-off beta-gallium oxide (β-Ga2O3) metal–oxide–semiconductor field-effect transistor (MOSFET) with ferroelectric gate (Fe-G). The enhancement-mode (E-Mode) operations are achiev...

    Rajan Singh, G. Purnachandra Rao in Micro and Nanoelectronics Devices, Circuit… (2024)

  4. No Access

    Chapter and Conference Paper

    Fraudulent IP Address Detection Using Machine Learning Techniques

    The popularity of network technology and the threats involved make it imperative to develop various techniques to effectively detect fraudulent activities. The focus of this paper is to discover actionable irr...

    Pulkit Singh, Abdul Razak in Information Systems for Intelligent Systems (2024)

  5. No Access

    Chapter and Conference Paper

    Area-optimized Serial Architecture of PRINT Cipher for Resource-constrained Devices

    The study of lightweight symmetric cipher has gained attention because of the rising interest for security administrations in constrained computing environments, like in the and other resource-constrained de...

    Manisha Kumari, Pulkit Singh in Intelligent Control, Robotics, and Industr… (2023)

  6. No Access

    Article

    Hardware-software co-design framework of lightweight CLEFIA cipher for IoT image encryption

    Internet of things (IoT) connects a huge number of small devices across a network. End-to-end security is becoming highly crucial as IoT deploys these devices. In this paper, two hardware architectures for CLE...

    Pulkit Singh, K Abhimanyu Kumar Patro, Rahul Kumar Chaurasiya in Sādhanā (2022)

  7. Article

    Open Access

    Cohort design and natural language processing to reduce bias in electronic health records research

    Electronic health record (EHR) datasets are statistically powerful but are subject to ascertainment bias and missingness. Using the Mass General Brigham multi-institutional EHR, we approximated a community-bas...

    Shaan Khurshid, Christopher Reeder, Lia X. Harrington, Pulkit Singh in npj Digital Medicine (2022)

  8. Article

    Open Access

    Correction to: Alternative Treatment Strategies for Secondary Bacterial and Fungal Infections Associated with COVID-19

    Ritam Das, Komal Kotra, Pulkit Singh, Belinda Loh in Infectious Diseases and Therapy (2022)

  9. Article

    Open Access

    Alternative Treatment Strategies for Secondary Bacterial and Fungal Infections Associated with COVID-19

    Antimicrobials are essential for combating infectious diseases. However, an increase in resistance to them is a major cause of concern. The empirical use of drugs in managing COVID-19 and the associated second...

    Ritam Das, Komal Kotra, Pulkit Singh, Belinda Loh in Infectious Diseases and Therapy (2022)

  10. No Access

    Chapter and Conference Paper

    High Throughput Pipelined Architecture for AES Cipher

    There has been a significant rise in internet and wireless device users, raising the need for security to protect consumer data shared over open networks. Field Programmable Gate Arrays (FPGAs) are particularl...

    Piyush Modi, Pulkit Singh in Proceeding of Fifth International Conferen… (2021)

  11. No Access

    Chapter and Conference Paper

    Multiplexer-based High-speed S-box Architecture for PRESENT Cipher in FPGA

    The Internet of Things (IoT) is the technology that will revolutionize our world. It is a system of interrelated devices linked to the Internet. It comprises large number of resource-constrained devices, machi...

    Piyush Modi, Pulkit Singh in Nanoelectronics, Circuits and Communicatio… (2021)

  12. No Access

    Chapter and Conference Paper

    A Novel Hardware Architecture for Rectangle Block Cipher

    This era of constrained computing devices require proper security in the limited available area. Lightweight cipher RECTANGLE is appropriate for numerous platforms and resource-limited environment. In this cha...

    Nivedita Shrivastava, Pulkit Singh in Nanoelectronics, Circuits and Communicatio… (2020)

  13. No Access

    Chapter and Conference Paper

    An Area-Optimized Architecture for LiCi Cipher

    With the rise in ubiquitous computing in resource-constrained devices, there is the huge emphasis being laid on minimal area consumption, power utilization, and optimum cost without compromising on the securit...

    Nigar Ayesha, Pulkit Singh in Nanoelectronics, Circuits and Communicatio… (2020)