Aarti Gupta
YOU?
Author Swipe
View article: Sustainable Mn-doped ZnO Nanoparticles as an Efficient Cathode Catalyst for Enhanced ORR and Photocatalytic Dye Degradation in Microbial Fuel Cells
Sustainable Mn-doped ZnO Nanoparticles as an Efficient Cathode Catalyst for Enhanced ORR and Photocatalytic Dye Degradation in Microbial Fuel Cells Open
In this study, Crocus sativus plant extract was employed in the synthesis of manganese-doped ZnO (Mn-doped ZnO) nanoparticles, which served as cathode catalysts in a Microbial Fuel Cell (MFC) for enhanced oxygen reduction reaction (ORR) an…
View article: Mapping Blockchain Technology and CSR in the Banking Sector using VOSviewer Software: A Bibliometric Analysis
Mapping Blockchain Technology and CSR in the Banking Sector using VOSviewer Software: A Bibliometric Analysis Open
Technology has revolutionized almost all walks of life for individuals, corporations, governments and societies at large. New technologies like blockchain are changing the financial industry by offering better transparency, security, and e…
View article: FLAG: Formal and LLM-assisted SVA Generation for Formal Specifications of On-Chip Communication Protocols
FLAG: Formal and LLM-assisted SVA Generation for Formal Specifications of On-Chip Communication Protocols Open
Formal specifications of on-chip communication protocols are crucial for system-on-chip (SoC) design and verification. However, manually constructing these formal specifications from informal documents remains a tedious and error-prone tas…
View article: Mapping Emergency Medicine Data to the Observational Medical Outcomes Partnership Common Data Model: A Gap Analysis of the American College of Emergency Physicians Clinical Emergency Data Registry
Mapping Emergency Medicine Data to the Observational Medical Outcomes Partnership Common Data Model: A Gap Analysis of the American College of Emergency Physicians Clinical Emergency Data Registry Open
The OMOP-CDM presents a promising framework for standardizing emergency medicine data, thereby enhancing future query automation, analytics, and cross-institutional collaboration. Despite the potential challenges in capturing unique CEDR f…
View article: Super-resolution on network telemetry time series
Super-resolution on network telemetry time series Open
Fine-grained monitoring is crucial for multiple data-driven tasks such as debugging, provisioning, and securing networks. Yet, practical constraints in collecting, extracting, and storing data often force operators to use coarse-grained sa…
View article: Combined Scheduling, Memory Allocation and Tensor Replacement for Minimizing Off-Chip Data Accesses of DNN Accelerators
Combined Scheduling, Memory Allocation and Tensor Replacement for Minimizing Off-Chip Data Accesses of DNN Accelerators Open
Specialized hardware accelerators have been extensively used for Deep Neural Networks (DNNs) to provide power/performance benefits. These accelerators contain specialized hardware that supports DNN operators, and scratchpad memory for stor…
View article: Towards Integrating Formal Methods into ML-Based Systems for Networking
Towards Integrating Formal Methods into ML-Based Systems for Networking Open
Owing to its adaptability and scalability, Machine Learning (ML) has gained significant momentum in the networking community. Yet, ML models can still produce outputs that contradict knowledge, i.e., established networking rules and princi…
View article: Postural assessment of children with spastic cerebral palsy: a cross-sectional study
Postural assessment of children with spastic cerebral palsy: a cross-sectional study Open
Background: Children with cerebral palsy (CP) exhibit gait difficulties, posture alignment issues when standing, and issues with body orientation in space as a result of both primary and secondary CP deficits. The purpose of this study was…
View article: SoC Protocol Implementation Verification Using Instruction-Level Abstraction Specifications
SoC Protocol Implementation Verification Using Instruction-Level Abstraction Specifications Open
In modern systems-on-chips, several hardware protocols are used for communication and interaction among different modules. These protocols are complex and need to be implemented correctly for correct operation of the system-on-chip. Theref…
View article: Modular Control Plane Verification via Temporal Invariants
Modular Control Plane Verification via Temporal Invariants Open
Monolithic control plane verification cannot scale to hyperscale network architectures with tens of thousands of nodes, heterogeneous network policies and thousands of network changes a day. Instead, modular verification offers improved sc…
View article: Synthesizing MILP Constraints for Efficient and Robust Optimization
Synthesizing MILP Constraints for Efficient and Robust Optimization Open
While mixed integer linear programming (MILP) solvers are routinely used to solve a wide range of important science and engineering problems, it remains a challenging task for end users to write correct and efficient MILP constraints, espe…
View article: Psym: Efficient Symbolic Exploration of Distributed Systems
Psym: Efficient Symbolic Exploration of Distributed Systems Open
Verification of distributed systems using systematic exploration is daunting because of the many possible interleavings of messages and failures. When faced with this scalability challenge, existing approaches have traditionally mitigated …
View article: Pattern of Inpatient Consultation-liaison Psychiatry Utility in a Tertiary Care Hospital
Pattern of Inpatient Consultation-liaison Psychiatry Utility in a Tertiary Care Hospital Open
Background: Consultation-liaison psychiatry (C-LP) is an interface between physical and psychological health where the psychiatrists become a part of the medical team for a holistic approach in the treatment of the patient. Aims: Our study…
View article: High-Level Synthesis for Packet-Processing Pipelines
High-Level Synthesis for Packet-Processing Pipelines Open
Compiling high-level programs to target high-speed packet-processing pipelines is a challenging combinatorial optimization problem. The compiler must configure the pipeline's resources to match the high-level semantics of the program, whil…
View article: Compositional Verification Using a Formal Component and Interface Specification
Compositional Verification Using a Formal Component and Interface Specification Open
Property-based specification s uch a s SystemVerilog Assertions (SVA) uses mathematical logic to specify the temporal behavior of RTL designs which can then be formally verified using model checking algorithms. These properties are specifi…
View article: Usage-Based RTL Subsetting for Hardware Accelerators
Usage-Based RTL Subsetting for Hardware Accelerators Open
Recent years have witnessed increasing use of domain-specific accelerators in computing platforms to provide power-performance efficiency for emerging applications. To increase their applicability within the domain, these accelerators tend…
View article: Effect of Vibratory Inhibition and Pelvic Stabilization Exercise on Tone, Balance and Gross Motor Function in Spastic Cerebral Palsy- A Comparative Study
Effect of Vibratory Inhibition and Pelvic Stabilization Exercise on Tone, Balance and Gross Motor Function in Spastic Cerebral Palsy- A Comparative Study Open
Objectives: Cerebral palsy is one of the leading causes of movement and posture disorders. Recently, Vibration therapy as a treatment method in clinical practice has been used as a complementary approach. This study compared the effects of…
View article: ACORN: Network Control Plane Abstraction using Route Nondeterminism
ACORN: Network Control Plane Abstraction using Route Nondeterminism Open
Networks are hard to configure correctly, and misconfigurations occur frequently, leading to outages or security breaches. Formal verification techniques have been applied to guarantee the correctness of network configurations, thereby imp…
View article: Modular Control Plane Verification via Temporal Invariants
Modular Control Plane Verification via Temporal Invariants Open
Monolithic control plane verification cannot scale to hyperscale network architectures with tens of thousands of nodes, heterogeneous network policies and thousands of network changes a day. Instead, modular verification offers improved sc…
View article: Application-Level Validation of Accelerator Designs Using a Formal Software/Hardware Interface
Application-Level Validation of Accelerator Designs Using a Formal Software/Hardware Interface Open
Ideally, accelerator development should be as easy as software development. Several recent design languages/tools are working toward this goal, but actually testing early designs on real applications end-to-end remains prohibitively diffic…
View article: Kirigami, the Verifiable Art of Network Cutting
Kirigami, the Verifiable Art of Network Cutting Open
We introduce a modular verification approach to network control plane verification, where we cut a network into smaller fragments to improve the scalability of SMT solving. Users provide an annotated cut which describes how to generate the…
View article: Comparison of Kinesio Taping and Nerve Flossing Technique on Balance, Gait and Ankle Flexibility in Diabetic Neuropathy
Comparison of Kinesio Taping and Nerve Flossing Technique on Balance, Gait and Ankle Flexibility in Diabetic Neuropathy Open
Introduction: Diabetic Neuropathy (DN) is the most frequent neuropathy in developed countries, with a wide spectrum of clinical symptoms. Kinesiology Tape (KT) is a thin, stretchy, elastic cotton strip with an acrylic adhesive almost ident…
View article: Recognition of Automated Hand-written Digits on Document Images Making Use of Machine Learning Techniques
Recognition of Automated Hand-written Digits on Document Images Making Use of Machine Learning Techniques Open
The purpose of this study is to create an automated framework that can recognize similar handwritten digit strings. For starting the experiment, the digits were separated into different numbers. The process of defining handwritten digit st…
View article: Recognition of Automated Hand-written Digits on Document Images Making Use of Machine Learning Techniques
Recognition of Automated Hand-written Digits on Document Images Making Use of Machine Learning Techniques Open
The purpose of this study is to create an automated framework that can recognize similar handwritten digit strings. For starting the experiment, the digits were separated into different numbers. The process of defining handwritten digit st…
View article: Pono: A Flexible and Extensible SMT-Based Model Checker
Pono: A Flexible and Extensible SMT-Based Model Checker Open
Symbolic model checking is an important tool for finding bugs (or proving the absence of bugs) in modern system designs. Because of this, improving the ease of use, scalability, and performance of model checking tools and algorithms contin…