Divya Sharma
YOU?
Author Swipe
View article: CMOS operational amplifier design for industrial and biopotential applications: Comprehensive review and circuit implementation
CMOS operational amplifier design for industrial and biopotential applications: Comprehensive review and circuit implementation Open
This paper provides a detailed exploration of CMOS operational amplifiers (Op-Amps) aimed at enhancing understanding of their development, design, and application. To achieve this, a comprehensive examination of the common characteristics,…
View article: Comprehensive Analysis to Detect Mobile Malware Using Multiple Techniques
Comprehensive Analysis to Detect Mobile Malware Using Multiple Techniques Open
Mobile devices have end up integral elements of our each day lives, storing great quantities of private and sensitive data. However, this convenience comes with inherent dangers, as cybercriminals increasingly more goal cellular devices fo…
View article: Securing Social Media Imagery: GAN-Driven Encryption and CNN Analysis with DEA Protection
Securing Social Media Imagery: GAN-Driven Encryption and CNN Analysis with DEA Protection Open
Generative adversarial networks (GANs) transform low-dimensional random noise into a photorealistic picture. The use of such misleading pictures laden with irrelevant information on social media platforms might lead to serious and challeng…
View article: Analysis of Programmable Gain Instrumentation Amplifier
Analysis of Programmable Gain Instrumentation Amplifier Open
This paper presents an analysis of the design of a programmable gain amplifier (PGA) based on an instrumentation amplifier. The instrumentation amplifier can be implemented in different ways, including the Single Op amp IA, 2 Op-amp INA, 3…
View article: Smart Lock Using IoT
Smart Lock Using IoT Open
Door lock security is classified based on the technology used, such as 1) password-based, 2) biometric-based, 3) GSM-based, 4) smart card-based, 5) RFID-based, 6) door phone-based, 7) Bluetooth-based, 8) social networking sites-based, 9) O…
View article: Firebase as BaaS for College Android Application
Firebase as BaaS for College Android Application Open
In the present times, words like 'mobile application' and 'cloud' are making a significant mix.Every day there is some new application in the market with the point of conveying the best execution to their clients.Picking the correct BaaS (…
View article: I Know Where You Live: Analyzing Privacy Protection in Public Databases (CMU-CyLab-11-015)
I Know Where You Live: Analyzing Privacy Protection in Public Databases (CMU-CyLab-11-015) Open
Policymakers struggle to determine the proper tradeoffs between data accessibility and data-subject privacy as public records move online. For example, Allegheny County, Pennsylvania recently eliminated the ability to search the county pro…
View article: Interaction-Aware Actual Causation: A Building Block for Accountability in Security Protocols
Interaction-Aware Actual Causation: A Building Block for Accountability in Security Protocols Open
Protocols involving multiple agents and their interactions are ubiquitous. Protocols for tasks such as authentication, electronic voting, and secure multi-party computation ensure desirable security properties if participating agents follo…
View article: Design of Low Power and Secure Implementation of SBox and Inverse-SBox for AES
Design of Low Power and Secure Implementation of SBox and Inverse-SBox for AES Open
In the cutting edge world, data security has turned into an essential issue furthermore the innovation is going to increment quickly.In this paper, the symmetric key standard for encryption and decoding is propelled Encryption standard (AE…
View article: A Secure and Efficient Client-Side Encryption Scheme in Cloud Computing
A Secure and Efficient Client-Side Encryption Scheme in Cloud Computing Open
Computation process has changed itself from desktop computing to cluster computing and to grid computing and now a days it goes towards cloud computing.In today's trend, Cloud computing is being preferred by majority of the organization be…
View article: Tracing Actual Causes (CMU-CyLab-16-004)
Tracing Actual Causes (CMU-CyLab-16-004) Open
We study the problem of tracing actual causes, i.e. given an event e, we seek to fully explain why that event happened. This problem was articulated by David Lewis in his work on causal explanations [Lewis, 1986a]. We address the problem b…
View article: Program Actions as Actual Causes: A Building Block for Accountability
Program Actions as Actual Causes: A Building Block for Accountability Open
Protocols for tasks such as authentication, electronic voting, and secure multiparty computation ensure desirable security properties if agents follow their prescribed programs. However, if some agents deviate from their prescribed program…
View article: Program Actions as Actual Causes: A Building Block for Accountability
Program Actions as Actual Causes: A Building Block for Accountability Open
Protocols for tasks such as authentication, electronic voting, and secure multiparty computation ensure desirable security properties if agents follow their prescribed programs. However, if some agents deviate from their prescribed program…
View article: Programs as Actual Causes: A Building Block for Accountability
Programs as Actual Causes: A Building Block for Accountability Open
An updated version of this paper is available at http://arxiv.org/abs/1505.01131
View article: Interaction-aware Actual Causation: A Building Block for Accountability in Security Protocols (CMU-CyLab-16-002)
Interaction-aware Actual Causation: A Building Block for Accountability in Security Protocols (CMU-CyLab-16-002) Open
Protocols involving multiple agents and their interactions are ubiquitous. Protocols for tasks such as authentication, electronic voting, and secure multi-party computation ensure desirable security properties if participating agents follo…