-
Article
Noninvasive assessment of organ-specific and shared pathways in multi-organ fibrosis using T1 map**
Fibrotic diseases affect multiple organs and are associated with morbidity and mortality. To examine organ-specific and shared biologic mechanisms that underlie fibrosis in different organs, we developed machi...
-
Chapter and Conference Paper
Comparative Performance Analysis of Present Lightweight Cipher for Security Applications in Extremely Constrained Environment
A lightweight cipher architecture is a cryptographic system designed to be efficient in terms of computational complexity, memory usage, and power consumption. It is often used in applications where resources ...
-
Chapter and Conference Paper
Investigation of Normally-Off β-Ga2O3 Power MOSFET Using Ferroelectric Gate
In this paper, we present a normally-off beta-gallium oxide (β-Ga2O3) metal–oxide–semiconductor field-effect transistor (MOSFET) with ferroelectric gate (Fe-G). The enhancement-mode (E-Mode) operations are achiev...
-
Chapter and Conference Paper
Fraudulent IP Address Detection Using Machine Learning Techniques
The popularity of network technology and the threats involved make it imperative to develop various techniques to effectively detect fraudulent activities. The focus of this paper is to discover actionable irr...
-
Chapter and Conference Paper
Area-optimized Serial Architecture of PRINT Cipher for Resource-constrained Devices
The study of lightweight symmetric cipher has gained attention because of the rising interest for security administrations in constrained computing environments, like in the and other resource-constrained de...
-
Article
Hardware-software co-design framework of lightweight CLEFIA cipher for IoT image encryption
Internet of things (IoT) connects a huge number of small devices across a network. End-to-end security is becoming highly crucial as IoT deploys these devices. In this paper, two hardware architectures for CLE...
-
Article
Open AccessCohort design and natural language processing to reduce bias in electronic health records research
Electronic health record (EHR) datasets are statistically powerful but are subject to ascertainment bias and missingness. Using the Mass General Brigham multi-institutional EHR, we approximated a community-bas...
-
Article
Open AccessCorrection to: Alternative Treatment Strategies for Secondary Bacterial and Fungal Infections Associated with COVID-19
-
Article
Open AccessAlternative Treatment Strategies for Secondary Bacterial and Fungal Infections Associated with COVID-19
Antimicrobials are essential for combating infectious diseases. However, an increase in resistance to them is a major cause of concern. The empirical use of drugs in managing COVID-19 and the associated second...
-
Chapter and Conference Paper
High Throughput Pipelined Architecture for AES Cipher
There has been a significant rise in internet and wireless device users, raising the need for security to protect consumer data shared over open networks. Field Programmable Gate Arrays (FPGAs) are particularl...
-
Chapter and Conference Paper
Multiplexer-based High-speed S-box Architecture for PRESENT Cipher in FPGA
The Internet of Things (IoT) is the technology that will revolutionize our world. It is a system of interrelated devices linked to the Internet. It comprises large number of resource-constrained devices, machi...
-
Chapter and Conference Paper
A Novel Hardware Architecture for Rectangle Block Cipher
This era of constrained computing devices require proper security in the limited available area. Lightweight cipher RECTANGLE is appropriate for numerous platforms and resource-limited environment. In this cha...
-
Chapter and Conference Paper
An Area-Optimized Architecture for LiCi Cipher
With the rise in ubiquitous computing in resource-constrained devices, there is the huge emphasis being laid on minimal area consumption, power utilization, and optimum cost without compromising on the securit...