R. B. Patel
YOU?
Author Swipe
View article: Screen Reader AI: A Conversational Web-Accessibility Assistant for Blind and Low-Vision Users
Screen Reader AI: A Conversational Web-Accessibility Assistant for Blind and Low-Vision Users Open
Blind and low-vision users continue to face significant challenges when interacting with modern dynamic and visually complex web applications. Traditional screen readers often fall short due to the rapid changes in content, single-page app…
View article: Gut sulfide metabolism modulates behavior and brain bioenergetics
Gut sulfide metabolism modulates behavior and brain bioenergetics Open
The host–microbiome interface is rich in metabolite exchanges and exquisitely sensitive to diet. Hydrogen sulfide (H 2 S) is present at high concentrations at this interface and is a product of both microbial and host metabolism. The mitoc…
View article: AI-Driven Adaptive UI in Insurance Applications: A Personalized Experience Across Age Groups
AI-Driven Adaptive UI in Insurance Applications: A Personalized Experience Across Age Groups Open
Development of an intuitive and inclusive user interface that serves the different age groups of the audience is vital in the digital transformation of the Insurance sector. However, the common user experience fails to meet the distinct ne…
View article: Integrating Field of View in Human-Aware Collaborative Planning
Integrating Field of View in Human-Aware Collaborative Planning Open
In human-robot collaboration (HRC), it is crucial for robot agents to consider humans' knowledge of their surroundings. In reality, humans possess a narrow field of view (FOV), limiting their perception. However, research on HRC often over…
View article: Gut sulfide metabolism modulates behavior and brain bioenergetics
Gut sulfide metabolism modulates behavior and brain bioenergetics Open
The host-microbiome interface is rich in metabolite exchanges and exquisitely sensitive to diet. Hydrogen sulfide (H 2 S) is present at high concentrations at this interface, and is a product of both microbial and host metabolism. The mito…
View article: Morphological characterization and quantitative genetic analysis of sugarcane (Saccharum spp) germplasm
Morphological characterization and quantitative genetic analysis of sugarcane (Saccharum spp) germplasm Open
View article: Sustainability and Energy Management: Trends and Technologies for a Greener Industrial Future
Sustainability and Energy Management: Trends and Technologies for a Greener Industrial Future Open
The industrial sector has recently been at the forefront of discussions over sustainable energy management and the increasing demand for power on a worldwide scale. This paper analyzes a wide class of sustainable energy technologies and in…
View article: Approaches for Capturing Soil Carbon for Sustained Food and Nutritional Security
Approaches for Capturing Soil Carbon for Sustained Food and Nutritional Security Open
View article: Advancements in Renewable Energy Utilization for Sustainable Cloud Data Centers: A Survey of Emerging Approaches
Advancements in Renewable Energy Utilization for Sustainable Cloud Data Centers: A Survey of Emerging Approaches Open
Cloud computing has given birth to a new era of IT landscape, with scalable, flexible, and cost-effective IT computing resources. Yet the rapid expansion of cloud services has increased energy consumption to such an extent that environment…
View article: Improved Identity Based Encryption System (IIBES): A Mechanism for Eliminating the Key-Escrow Problem
Improved Identity Based Encryption System (IIBES): A Mechanism for Eliminating the Key-Escrow Problem Open
A revolutionary change to public-key cryptography can be considered as an Identity Based Cryptography (IBC) in which identity of the receiver is being used as a public key for encrypting a message and Key Generation Centre (KGC). IBC will …
View article: Data Delivery in Internet of Things using Hot-Data and Cold-Data
Data Delivery in Internet of Things using Hot-Data and Cold-Data Open
IoT (Internet of Things) have shaped the world in such a way that many objects can recognize, connect and share all information organized in exact way with one other on public and private Internet protocol networks. The data is collected o…
View article: Identity Based Encryption and Identity Based Signature Scheme on Security Schemes
Identity Based Encryption and Identity Based Signature Scheme on Security Schemes Open
In computer based system, key for the problem of identification, authentication and secrecy can be found in the field of cryptography. Dependence on public key infrastructure and to receive certificates signed by Certificate Authority (CA)…
View article: Identity Based Encryption and Identity Based Signature Scheme: A Research on Security Schemes
Identity Based Encryption and Identity Based Signature Scheme: A Research on Security Schemes Open
In computer based system, key for the problem of identification, authentication and secrecy can be found in the field of cryptography. Dependence on public key infrastructure and to receive certificates signed by Certificate Authority (CA)…
View article: An Efficient Virtual Machine Management to Achieve Energy Efficiency in Cloud Computing
An Efficient Virtual Machine Management to Achieve Energy Efficiency in Cloud Computing Open
International Journal of Computer Sciences and Engineering (A UGC Approved and indexed with DOI, ICI and Approved, DPI Digital Library) is one of the leading and growing open access, peer-reviewed, monthly, and scientific research journal …
View article: A Survey on Contemporary MANET Security: Approaches for Securing the MANET
A Survey on Contemporary MANET Security: Approaches for Securing the MANET Open
The wireless mobile nodes are capable to build spontaneously temporary wireless network in absence of infrastructure like AP, Router etc. and they act as a wireless router.Due to this, wireless mobile nodes are capable for forwarding messa…
View article: Packet Drop Attack Detection and Prevention Using Rank Base Data Routing in MANET
Packet Drop Attack Detection and Prevention Using Rank Base Data Routing in MANET Open
Packet drop (grayhole/blackhole) attack is occurs at a network layer to discard the packets in MANET. It is essential to detent and prevent this attack for improving performance of network. This article provides the packet drop attack dete…
View article: Efficient Routing using Bubble Rap in Delay Tolerant Network
Efficient Routing using Bubble Rap in Delay Tolerant Network Open
Intermittently connected mobile ad-hoc networks are kind of wireless networks where end to end connectivity unlikely exists.Routing in such environment is carried out through the store-carry-forward mechanism.Thus, message delivery relies …
View article: Integrated ECC and Blowfish for Smartphone Security
Integrated ECC and Blowfish for Smartphone Security Open
Mobile Cloud Computing is the hottest research area in the IT world. Security and privacy are key issues in MCC. Hence, framework required to provide the security with minimum computational overhead. We develop the scheme to secure the mob…
View article: Security Enhancement of Blowfish Block Cipher
Security Enhancement of Blowfish Block Cipher Open
Cryptography is the first line of defense to protect the data from intruder. Symmetric cryptography and asymmetric cryptography are two cryptographic based algorithms that serve the security goals: confidentiality, availability, authentica…
View article: Movement Assisted Component Based Scalable Framework For Distributed Wireless Networks
Movement Assisted Component Based Scalable Framework For Distributed Wireless Networks Open
Intelligent networks are becoming more enveloping and dwelling a new generation of applications are deployed over the peer-to-peer networks. Intelligent networks are very attractive because of their role in improving the scalability and en…
View article: Deployment schemes in wireless sensor network to achieve blanket coverage in large-scale open area: A review
Deployment schemes in wireless sensor network to achieve blanket coverage in large-scale open area: A review Open
Wireless Sensor Network (WSN) has attracted researchers in recent years due to its wide scope of utility in a future era of automation and remote monitoring. Effective deployment of Sensor Nodes (SNs) is a major point of concern as perform…