Exploring foci of
2025-09-23
DCRU-Net: Dynamic Contextual Residual U-Net for Medical Image Segmentation
2025-09-23 • Manoj Kumar Singh, Satish Chand, Devender Kumar
Accurate medical image segmentation (MIS) is crucial for computer-assisted diagnosis and treatment planning. This research proposes a deep learning (DL) architecture for accurate and efficient MIS, named Dynamic Contextual Residual U-Net (DCRU-Net). This design is a variation of the conventional U-Net that combines dynamic contextual residual block (DCRB) with a squeeze-and-excitation (SE) block. DCRU-Net combines the strengths of the DCRB and SE block. The SE block improves the feature-capture performance of the …
Dynamic Web Page
Dynamic Positioning
Dynamic Time Warping
Dynamic Random-Access Memory
Dynamic Programming
Dynamic Html
Dynamic Systems Development Method
Dynamic Currency Conversion
Synchronous Dynamic Random-Access Memory
Exploring foci of
2025-05-24
Indigenously Developed Robotic Devices for Inspection of Critical Components in Power Plants
2025-05-24 • Avijit Mondal, Arindam Das, Dip Narayan Ray, U. S. Patkar, Satish Chand, Santosh Kumar, C. B. Keshari, Sandeep Kumar Patel
The growing global population, combined with rapid industrialization and rising living standards, has resulted in a substantial increase in energy demand. This trend necessitates the development of innovative energy technologies that align with environmental protection policies. As a result, many newly constructed power plants are increasingly utilizing renewable energy sources or cogeneration methods. This dynamic energy landscape has introduced new challenges, as numerous coal plants have transitioned to flexibl…
The Dancers At The End Of Time
Hope Ii
The Ninth Wave
The Bureaucrats (1936 Film)
Main Page
The False Mirror
The Massacre At Chios
Weapons (2025 Film)
Squid Game Season 3
Exploring foci of
2024-01-01
A secure three-factor authentication protocol for mobile networks
2024-01-01 • Devender Kumar, Satish Chand, Bijendra Kumar
User authentication is a necessary mechanism to communicate securely for mobile networks. Recently, Xie et al. have discussed a three-factor authentication (3FA) scheme using elliptic curve cryptography (ECC) for mobile networks and claimed that it is secure even if the user's two factors are known to the attacker. However, in this paper, we cryptanalyse their scheme and find the offline password guessing and user impersonation attacks in it. We also propose a secure 3FA scheme for mobile networks using ECC by rem…
Secure Shell
Secure Fence Act Of 2006
Rampton Secure Hospital
Avast Secure Browser
Authentication
Multi-Factor Authentication
Digest Access Authentication
Challenge–Response Authentication
Extensible Authentication Protocol
Exploring foci of
2024-03-14
From Pro, Anti to Informative and Hesitant: An Infoveillance study of COVID-19 vaccines and vaccination discourse on Twitter
2024-03-14 • Pardeep Singh, Rabindra Lamsal, Monika Singh, Satish Chand, Bhawna Shishodia
COVID-19 pandemic has brought unprecedented challenges to the world, and vaccination has been a key strategy to combat the disease. Since Twitter is one of the most widely used public microblogging platforms, researchers have analysed COVID-19 vaccines and vaccination Twitter discourse to explore the conversational dynamics around the topic. While contributing to the crisis informatics literature, we curate a large-scale geotagged Twitter dataset, GeoCovaxTweets Extended, and explore the discourse through multiple…
Hello Muddah, Hello Fadduh (A Letter From Camp)
So Far From God
Tales From Planet Earth
Plan 9 From Outer Space
Away From Her
Long Range – Anti Ship Missile (India)
The Girl From Everywhere
The View From Saturday
Suicide Notes From Beautiful Girls
Exploring foci of
2023-09-06
An efficient and secure identity-based integrity auditing scheme for sensitive data with anti-replacement attack on multi-cloud storage
2023-09-06 • Mahender Kumar, Carsten Maple, Satish Chand
The rapid growth of cloud storage brings forth significant difficulties in ensuring the integrity of data owners' sensitive data. Multi-cloud storage systems, which motive to enhance trustworthiness, are vulnerable to rigorous replacement attacks. These insidious attacks involve malicious actors substituting legitimate data with counterfeit versions, leading to compromised integrity and fraudulent audit outcomes. We propose a novel identity-based data integrity auditing protocol tailored for multi-cloud storage en…
Secure Fence Act Of 2006
Efficient Frontier
Efficient-Market Hypothesis
Rampton Secure Hospital
Secure Shell
Avast Secure Browser
F-Secure
Secure Cookie
Secure Socket Tunneling Protocol