![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Coverless Steganography: A Comprehensive Study on Concealing Data Without a Cover Medium
This study examines the concept of coverless steganography, a method employed for the purpose of concealing information without relying on a traditional cover medium. This statement underscores the importance ...
-
Article
Energetic, environmental and economic assessment of multi-evaporator CO2–NH3 cascade refrigeration system for seafood application
Refrigeration plays a vital role in ensuring quality and safety of seafood. In a tropical country like India, the seafood industry has a relatively larger cooling load throughout the supply chain due to higher...
-
Chapter and Conference Paper
Natural Refrigerant Based Cascade System for Seafood Application
Refrigeration plays a vital role to ensure quality and safety of seafood. In a tropical country like India, the seafood industry has relatively larger cooling load throughout the supply chain due to higher tem...
-
Chapter and Conference Paper
A Pioneer Image Steganography Method Using the SOD Algorithm
Steganography is a technology that has gained popularity in recent years as people’s fears and susceptibilities have increased in today’s digital environment. As a result of this work, we have shed light on th...
-
Article
Comparative investigation of low GWP pure fluids as potential refrigerant options for a cascade system in seafood application
The world is conscious about contribution to global warming from refrigeration and air-conditioning sector. A search is ongoing for energy-efficient refrigeration systems and environment-friendly refrigerants....
-
Chapter and Conference Paper
Randomised Key Selection and Encryption of Plaintext Using Large Primes
Study of ciphertext plays a major role in Cryptanalysis. Functionally correct realization of a cryptosystem does not ensure the confidentiality of message always. Most classical cryptosystem are not quantum se...
-
Chapter and Conference Paper
Hiding IoT Communication Using DCT Difference Modulation (DCTDM)
In the past few decades, the involvement of the Internet and technologies has become an integral part of our life. From morning till evening, we come across many automated devices which are connected via the I...
-
Chapter and Conference Paper
Real-Time Watermarking of Medical Images and Secure Transmission Through Steganography
Medical images and reports are highly confidential information and should not be leaked, or modified in any circumstances. Healthcare organizations constantly face cyber-attacks with the motive of stealing med...
-
Chapter and Conference Paper
Studies on Performance Improvement of an R744 Transcritical Refrigeration System Using Dedicated Mechanical Subcooling
Due to low critical temperature, the performance of a conventional, single-stage R744-based transcritical refrigeration cycle drops drastically when the heat sink temperature is high. However, the performance ...
-
Article
Open AccessDead cells release a ‘necrosignal’ that activates antibiotic survival pathways in bacterial swarms
Swarming is a form of collective bacterial motion enabled by flagella on the surface of semi-solid media. Swarming populations exhibit non-genetic or adaptive resistance to antibiotics, despite sustaining cons...
-
Chapter
Early Work Vis-à-Vis Current Trends in Internet of Things Security
IoT has contributed heavily in the growth of Internet with its versatile applications. The IoT devices act as a bridge between the digital world and the real world. Therefore, the previous embankment of securi...
-
Article
Transient analysis of subcritical/supercritical carbon dioxide based natural circulation loop with end heat exchangers: experimental study
Carbon dioxide (CO2) based natural circulation loops (NCLs) has gained attention due to its compactness with higher heat transfer rate. In the present study, experimental investigations have been carried out to c...
-
Article
Computational fluid dynamic analysis of a supercritical CO2 based natural circulation loop with end heat exchangers
Steady state simulation of a 3D model of supercritical CO2 based natural circulation loop with end heat exchangers has been carried out employing the commercial CFD (computational fluid dynamics) code, FLUENT. Th...
-
Article
Do bacteria age?
Aging, a progressive deterioration of the physical functions necessary for survival and fertility, resulting from deleterious changes, is one of the most fundamental features of Eukaryotes. Bacteria are though...
-
Chapter and Conference Paper
Text Steganography through Quantum Approach
Steganography maintain the security of the secret data through a communication channel, which causing attempts to break and reveal the original messages. In this paper, a text steganography technique has been ...
-
Chapter and Conference Paper
A Novel Approach of Video Steganography Using PMM
Steganography is an emerging area, used for secured data transmission trough any public media. Different researcher’s developed newer steganographic techniques. This paper proposes a novel video steganography ...
-
Article
Rewetting analysis of hot surfaces with internal heat source by the heat balance integral method
A two region conduction-controlled rewetting model of hot vertical surfaces with internal heat generation and boundary heat flux subjected to constant but different heat transfer coefficient in both wet and dr...