Industry Academic Expert Lecture Week by Cyber Security Research Centre

DAY 1: 04/9/2018

Session 1: Scenario based problems for Security Plan, Security Analysis and Security Design         

Speaker: Cmdr. L.R. Parkash

Commander L.R. Parkash, director CDAC - Chennai, began the session with a brief introduction of various activities being conducted at CDAC-Chennai which includes developing open source software; security related products and conducting various training programmes. The lecture started with the definition of the word 'security' and he quoted that security is fully dependent on context. He further emphasized on Enterprise View which can be referred as combination of Business Continuity Management, Information Security and IT Disaster Recovery. Security Plan can be mentioned as a formal plan of action to secure a computer or information system. He gave the example of a College Network System to briefly explain about the implementation of security planning. The speaker also focussed on Risk Assessment and Analysis which included Threat, Asset and Vulnerability and supplemented it with the example of JAVA Exploit. Different phases of Security System Development Life Cycle were discussed. The session summed up listing various international security standards like MOF, COBIT, SABSA, NIST, ISO/IEC-27000 for generating security plans and highlighting the importance of Security Education, Training and Awareness Programme.

Session 2: Security Review through Security Audit

Speaker: Cmdr. L.R. Parkash

Cmdr. L.R. Parkash started the session by highlighting how to write an information security plan for a particular system. Security plan document mainly specifies purpose and scope, mission and vision, organizational structure, output and information assets etc. An information asset need not be limited to IT systems. Information assets summary plays crucial role to find out scope of system. Workflows and other processes that are important to the administration of the organization need to be secured. While writing information security plan, one must be specific but being too specific may lead to backdoors or vulnerabilities into the system. So a balance must be attained. He interacted with the audience and discussed what personal data is and why critical sensitive data should be kept private. All students were grouped to make a sample information security plan document for PEC. Risk assessment, listing all acceptable risks, privacy controls and security initiatives are other factors which need to be considered while planning information security plan. Session ended up with list of 20 CSC (Critical Security Controls) which are decisive to any information security plan. CSC is kept in appendix part of plan document. 

DAY 2: 05/9/2018

Session 1: Cryptography

Speaker: Cmdr. L. R. Parkash

Commander L. R. Parkash began the session on cryptography protocols by interacting with the students and sharing various real-life examples of encryption and decryption. He talked about Symmetric vs. Asymmetric key encryption and their various issues. There is an exponential increase in the number of keys to be shared in case symmetric key encryption. It also becomes matter of concern how to share the key securely. On the other hand, Asymmetric key encryption needs to address physical key distribution and key revocation issues. Although Asymmetric key encryption provides confidentiality, authentication, integrity and non-repudiation, however in practice it is not scalable and it is must costlier. So, in practice, hybrid encryption approach utilising symmetric as well as asymmetric encryption is used.  He interacted with students to generate a keypair and send an encrypted message to each other. Speaker also discusses about the Public Key Infrastructure and how the certificates are signed and shared. A certificate authority issues a certificate, provides the public key, and checks the key revocation. At the end, the students were grouped and asked to set up a Certificate Authority Server, generate certificates and GPG system. This added a dimension of practical implementation to his session and intrigued everyone in attendance.

Session 2: Blockchain Technology

Speaker: Mr. Arshdeep Bagha

Mr. Arshdeep Bagha, Director, Cloudemy Technology Labs LLP, Chandigarh started the session discussing the four industrial revolutions, the fourth one being the Cyber Physical Systems. He explained the concept of blockchain technology along with its evolution. Further he discussed about web 1.0, web 2.0 and web 3.0 in which blockchain came under the ambit of web 3.0. The speaker further explained the basic concepts related to blockchains like its definition, structure, Merkel tree etc. He explained the difference between blockchain and Bitcoin and talked about Santoshi Nakamoto and his paper "Bitcoin: A Peer to Peer electronic cash system". Some of the characteristics of blockchain were discussed e.g. immutable, secure and transparent, no central authority, privacy, scalable and many more. He explained various types of smart contracts like crowd funding contracts, escrow smart contracts, voting smart contract etc. Further, he elaborated upon the Blockchain stack and some of the differences between web app and decentralised app. He also outlined some of the applications of blockchain like Banks, insurance, solar charging stations, shipment tracking and many more. A demonstration of a solar charge app was given. He discussed the double spending problem which refers to the spending of same money more than once and wrapped up the session with some of the challenges and future prospects in blockchain technology.

Session 3: Cryptography Public Key Infrastructure (PKI) and Digital Signatures

Speaker: Cmdr. L.R. Parkash

Cmdr. L.R Parkash began by talking about Cryptography Public Key Infrastructure (PKI) and Digital Signatures. The speaker explained how different types of websites are certified by Certifying Authorities (CAs). Financial websites require a lot more checks as compared to other websites therefore extended validations are applied by them to get certificates from CA. He also spoke about secure communication using symmetric and asymmetric encryption techniques and explicated the concept of domain by defining it as a boundary of control. A brief explanation of the root CA was given and where this root CA is present. Taking an example of DigiCert, he mentioned that the root CA also has many intermediate CAs which share its workload. There are different types of certificates such as personal certificates, commercial certificates, other people certificates etc. The contents of a certificate were discussed in detail. CDAC has developed a digital signing system known as e-Hastakshar- CDAC's eSign service that facilitates instant signing of documents online by citizens in a legally acceptable form. He ended the talk with the discussion of eSign architecture and motivated the students to work in the area of digital signatures and other relevant spheres of technological advancement needed in our modern society.

Session 4: Hands-on Workshop on Competitive Programming

Speaker: Mr. Sandeep Jain, Mr. Ayushman Bansal

The founders of the extremely popular learning database- Geeks for Geeks- started the session with the story of their website's inception and how their aim was to motivate students to prepare for placement interviews. They mentioned their humble beginnings and how they used to contact students from IITs to know about interview questions and patterns and then they prepared for the same questions in order to crack placement interview. While learning through this process, the team came up with idea of building their own group to share interview experience and questions, hence came up with a big platform for the same. Data Structures and Design of Algorithms are two key subjects to be mastered for a computer science student, according to the speakers. These core subjects play a vital role in every job profile and must be mastered. They spoke about fair pay and disclosed that they give remuneration to students for their contribution to geeks for geeks. Various key categories of geeks for geeks website were also discussed to help students to start their preparation. Internship programs are also offered by geeks for geeks to students to excel their skillset. The talk ended up with an interactive questions and answer session with the enthusiastic students.

DAY 3: 06/9/2018

Session 1: Key-length Management

Speaker: Cmdr. L. R. Parkash

Commander L. R. Parkash began the session by discussing symmetric and asymmetric key length management. Brute force attack on the key involves large computation and a parallel processing is often involved for effective brute force. He gave an example of Chinese Lottery to understand the concept of parallel processing involved for brute-force. Key length management has practical and mandatory safeguards which need to be followed. The concept behind the Dictionary attack, Length Extension attack and Rainbow Table attack was discussed in detail. A rainbow table is a precomputed table for reversing cryptographic hash functions, usually for cracking password hashes. Tables are usually used in recovering a password (or credit card numbers, etc.) up to a certain length consisting of a limited set of characters. However, a Rainbow Table does not work for Linux passwords. Salting is a means of preventing a Rainbow Table attack. A commonly used cryptosystem for GSM communications is the A5 ciphering algorithm. He advised to have an up to date knowledge on the legal advisor regarding the length of the keys. A case study on recently held cyber-attack called 'ATM Jackpotting Attack' on Pune based Cosmos Bank was discussed. The ATM jackpotting technique is basically an exploitation of both physical and software vulnerabilities in banking kiosks or dispensing machines such as ATMs. At the end of the session, speaker motivated the students to read these real-life case studies, analyse various security lapses and relate them with theoretical knowledge.

Session 2: Virtual Private Networks

Speaker: Cmdr. L. R. Parkash

Commander L. R. Parkash introduced the concept of port addresses and NAT. NAT maps private IP address to public IP address. The main use of NAT is to limit the number of public IP addresses an organization or company must use, for both economy and security purposes. Port addresses are used to send packets to particular application on a system. Some services or processes have conventionally assigned permanent port numbers. These are known as well-known port numbers. In other cases, a port number is assigned temporarily (for the duration of the request and its completion) from a range of assigned port numbers. Various security features and attacks in this model are elaborated with suitable examples. For example, there may be DoS or DDoS attack on the web server by sending multiple bogus requests to web server to occupy all ports on server. Natting makes provisions such that no outside packet can reach to private network. Net neutrality concept and implications were discussed with students. ISP may peep into personalized traffic to route traffic differently to different users. Further, the speaker talked about Virtual Private Networks. VPN technology was developed as a way to allow remote users and branch offices to securely access corporate applications and other resources. To ensure safety, data travels through secure tunnels and VPN users must use authentication methods -- including passwords, tokens and other unique identification methods -- to gain access to the VPN. Session ended with Cmdr. Parkash motivating the students to thoroughly study basic and advanced communication infrastructure over the internet and create solutions to our day-to-day problems.

DAY 4: 07/9/2018

Session 1: Applied Cryptographic Applications

Speaker: Cmdr. L. R. Parkash

Cmdr. L. R. Parkash started the session discussing about Virtual Private Network (VPN) Tunneling. VPN Tunneling has three components Carrier, Passenger and Encapsulation of data. A thorough explanation of how the data is transmitted and encapsulated over VPN was given. Tunneling can be done site-to-site or through remote access in VPNs. The various advantages of VPN include greater scalability, mobility, security, cost effectiveness, etc. The major disadvantages of VPN are unpredictable internet traffic and understanding of different security issues. A brief presentation was given on the topic of Address Resolution Protocol (ARP) which is used to obtain MAC address from a given IP address. ARP is a stateless protocol which does two jobs that are, responding to a query and ownership announcement. ARP cache tables are maintained to map MAC addresses from IP addresses. The major drawback of ARP is ARP spoofing. ARP announcements are not authenticated, the requests are not tracked and ARP tables can be easily poisoned by man-in-the-middle attack. Various solutions to ARP spoofing involve software-detection solutions such as Xarp, ArpWatch, Anti-arpspoof and MAC binding. The speaker ended the lecture with a amall talk on TCP Session Hijacking, Droppers and BotNets.

Session 2: Digital Business Transformations 

Speaker: Mr. Prashant Mehta, Sapient

Mr Prashant Mehta, VP of Sapient, started session mentioning growth of marketing technology landscape over 7 years. We are moving from a mobile first to an AI- first world. It is hard to overstate how big if an impact AI is going to have on society in next 20 years. He mentioned quote by Andrew NG AI is the new electricity. Robots will have an IQ of 10000 in 30 years. The average life span of an S and P company was about 65 years in the 1960s. Now, it's closer to15 years and it's projected to get even shorter in the coming years. Four out of ten companies are top ranked companies in their industry won't survive in the next five years. The pace of change we see today will be a pale shadow of the unfolding future. Future happens very slowly and then all at once. We are at the beginning of the most transformative revolution ever. Whilst many of the technique and algorithm of machine learning and AI have been around since 1950s, only recently we have three factors coincided to provide access to scalable and replicable solutions: cost of compute and storage has fallen; a huge abundance of data and smarter algorithms. He also threw light on five pillars of transformations namely Data and AI, cloud, sensor, ways of working and culture. Talk ended up motivating students to learn and improve their self with time.    

Session 3: Information Security Threats

Time: 02.00 PM - 04.00 PM

Date: 07/09/2018

Cdr L.R Prakash .Head CDAC, Chennai in the session discussed about security auditing , social engineering and proxy servers. He defined security auditing as a systematic evaluation of the security of a company's information system by measuring how well it conforms to a set of established criteria. Further he explained the concept of proxy with the help of a simple example. A proxy server he stated is a dedicated computer or a software system running on a computer that acts as an intermediary between endpoint device . He further stated that proxy helps to speed up the operations. Proxy he explained is used mainly for control, security and convenience .Speaker also briefly stated about squid proxy .Moving the discussion further he explained the concept of social engineering with some real life examples. Social engineering he referred to as psychological manipulation of people into performing actions or divulging confidential information. He gave example of Royal Bank of Scotland to further explain the concept. Giving the example of Jharkhand gang he explained how using Social engineering ,this gang used aadhar verification calls to target pension accounts .Awareness among the users he suggested as the only way forward  to tackle this problem of Social engineering .He further outlined some of famous attacks like petya and  wannacry attack . Speaker further presented the concept of Dark Net and its characteristics like it is not searchable, not resolvable and not routable. He listed some of the security firms like Vupen Security, Hacking Team, Cellebrite etc. Talk ended up with encouraging students to go hand in hand with growing technology.

Recent Research Activities

Visualization and Assessment of Energy Efficiency Drivers and Solution Practices for Temperature-controlled Supply Chain Operations.
Mohit Tyagi
Electrochemical Behavior of Aluminum-Molybdenum Surface Composites Developed by Friction Stir Processing
Dr. Mahesh V. P.
Modulation of polar dynamics with oxygen vacancies in Zn doped BaZr0.1Ti0.9O3
Sanjeev Kumar
Flash Spark Plasma Sintering of SiC: Impact of Additives
Dr. Sandan Kumar Sharma, Dr. Pavol Hvizdoš, Dr. Michael J. Reece, Dr. Salvatore Grasso E-mail addresses
SIFTBCS: scale invariant feature transform based fuzzy vault scheme in biometric cryptosystem
Nitin Kumar
Novel Vanillin-based hybrids inhibit quorum sensing and silences phenotypical expressions in Pseudomonas aeruginosa
Vasundhara Singh
Mathematical depiction of costing perspectives allied with the dynamics of processed food supply chain
Mohit Tyagi
Comparative analysis of radiation tolerant analog circuit layout in 180 nm CMOS technology for space application
Prof. Neelam Rup Prakash
Progress in bioactive surface coatings on biodegradable Mg alloys: A critical review towards clinical translation
Dr. Uma Batra
Long-Short Term Memory Auto-Encoder based Position Prediction Model for Fixed-wing UAV during Communication Failure
Poonam Saini
Electrochemical detection of herbicide atrazine using porous MnO2-NiO nanocatalyst
Dr. Anu Prathap M. U.
Audio-video emotional response mapping based upon Electrodermal Activity
Prof. Parveen Kalra, Prof. Neelam Rup Prakash
A comparative analysis of solvent cast 3D printed carbonyl iron powder reinforced polycaprolactone polymeric stents for intravascular applications
Jasvinder Singh
RF MEMS SWITCH FOR HIGH FREQUENCY APPLICATION
Arun Kumar Singh , Neena Gupta, Sanjeev Kumar
Bilayer Graphene/HgCdTe Heterojunction Based Novel GBn Infrared Detectors
Arun Kumar Singh , Neena Gupta, Sanjeev Kumar
Self-biased characteristics of NZCF/BCZT layered magnetoelectric composites: A novel coupling paradigm in magnetoelectricity
Sanjeev Kumar
Finite element analysis of dental implant surgical guides
Prof. Parveen Kalra
GaN HEMTs FOR HIGH FREQUENCY APPLICATIONS
Arun Kumar Singh, Sanjeev Kumar
An auto-tuned droop coefficient-based controller for microgrid system to enhance grid resilience during blackouts
Ajay Kumar
Sn coated Fe3O4 nanoparticles for selective and efficient oxidation of anthracene to anthraquinone
Harminder Kaur
Audio-video emotional response mapping based upon Electrodermal Activity
Prof. Parveen Kalra, Prof. Neelam Rup Prakash
Improved Pd/Ru metal supported graphene oxide nano-catalysts for hydrodeoxygenation (HDO) of vanillyl alcohol, vanillin and lignin
Vasundhara Singh
Electromagnetic Pulse Sensor
Prof. Neelam Rup Prakash
Synthesis, structural elucidation, and catalytic activity of bimetallic rhenium-tin complexes containing Schiff base ligand
Harminder Kaur
A comparative analysis of solvent cast 3D printed carbonyl iron powder reinforced polycaprolactone polymeric stents for intravascular applications
Jasvinder Singh
Correlation between the Mechanical and Tribological Properties of Rutile Reinforced LM27 Alloy Composite
Dr. Jagmohan Datt Sharma
Metamaterial Absorbers for Microwave/THz applications
Arun Kumar Singh , Neena Gupta, Sanjeev Kumar
Long-Short Term Memory Auto-Encoder based Position Prediction Model for Fixed-wing UAV during Communication Failure
Poonam Saini
Comparative analysis of radiation tolerant analog circuit layout in 180 nm CMOS technology for space application
Prof. Neelam Rup Prakash
Chemical engineering at morphotropic phase boundary: Interplay with thermally stabilized ultra-high energy storage and electrocaloric response
Sanjeev Kumar
Visualization and analysis of key performance indicators for agricultural cold supply chain in Indian context using fuzzy DEMATEL approach.
Mohit Tyagi
Electromagnetic Pulse Sensor
Prof. Neelam Rup Prakash
Recognition of Bovine Hemoglobin Protein on Molecularly Imprinted Polymer Surfaces using Nonlinear Vibrational Spectroscopy
Shilpi Chaudhary
Electric Field Sensor for Electromagnetic Pulse Measurement
Prof. Neelam Rup Prakash
Finite element analysis of dental implant surgical guides
Prof. Parveen Kalra
Technology and Education Inputs for Productivity Enhancement in Garment Manufacturing in the Developing World
Prof. Parveen Kalra
Analyzing the thermal, economic, and environmental dynamics of phase change materials used in cold chain applications.
Mohit Tyagi
Long-Short Term Memory Auto-Encoder based Position Prediction Model for Fixed-wing UAV during Communication Failure
Poonam Saini
L Style n-MOSFET Layout for Mitigating TID Effects
Prof. Neelam Rup Prakash
Time-dependent mechanistic insight into photo-degradation of mixed hydrophobic disperse dyes by magnetically separable nitrogen iron codoped titania under visible light using process variable optimization
Vasundhara Singh
Electromagnetic Pulse Sensor
Prof. Neelam Rup Prakash
Innovations in Electro Chemical Discharge Machining Process through Electrolyte Stirring and Tool Rotations
Dr. Chandrashekhar Jawalkar
IoT Based Accident Prevention, Detection and Alert System using GPS & Heat Mapping of Accident Prone Areas of Chandigarh
Dr. Sanjay Batish
Evaluation of corrosion resistance, mechanical integrity loss and biocompatibility of PCL/HA/TiO2 hybrid coated biodegradable ZM21 Mg alloy
Dr. Uma Batra
Assessing the Role of Virtual Surgical Planning in Mandibular Reconstruction With Free Fibula Osteocutaneous Graft
Prof. Parveen Kalra
BRIEFBCS: binary robust independent elementary features based fuzzy vault scheme in BCS
Nitin Kumar
Mathematical depiction of costing perspectives allied with the dynamics of processed food supply chain
Mohit Tyagi
Modelling of barriers encumbering the advancement of processing technologies towards lean manufacturing principles.
Mohit Tyagi
Technology and Education Inputs for Productivity Enhancement in Garment Manufacturing in the Developing World
Prof. Parveen Kalra
Stubble burn area estimation and its impact on ambient air quality of Patiala & Ludhiana district, Punjab, India
Dr. Har Amrit Singh Sandhu
Electric Field Sensor for Electromagnetic Pulse Measurement
Prof. Neelam Rup Prakash
Synthesis and Characterization of CoCrFeNi1.75-xTi0.25+x High Entropy Alloy
Suresh Chand
Tribological behaviour of transparent ceramics: A review
Dr. Sandan Kumar Sharma
Changes in condylar position after orthognathic surgery and its correlation with temporomandibular symptoms (TMD)- a prospective study
Prof. Parveen Kalra
Dynamic, Hydraulic properties of spatially varied pond ash within an ash pond for Reclamation of abandoned/closed ash pond.
Dr S.K Singh
Effect of polar nano region dynamics on pyroelectric energy conversion efficiency of doped BaTiO3
Sanjeev Kumar
Finite element analysis of dental implant surgical guides
Prof. Parveen Kalra
Critical Behavior of Relaxor〖 Pb〗_0.91 La_0.09 (Zr_0.65 Ti_0.35 ) O_3: Interplay between Polar Nano Regions, Electrocaloric and Energy Storage Response
Sanjeev Kumar
Exotic role of poling protocol on augmentation of magnetoelectricity in BCZT/CNZF layered composites
Sanjeev Kumar
Transparent glass-nanocomposites possessing piezoelectric ZnO/Zn2SiO4 nanocrystallites for piezocatalytic dye degradation
Moolchand Sharma
Sustainable magnetically recoverable Iridium coated Fe3O4 nanoparticles for enhanced catalytic reduction of organic pollutants in water
Harminder Kaur
High-Temperature Corrosion Performance of FeAl-Based Alloys Containing Carbon in Molten Salt
Suresh Chand
Evaluation of school backpack prototype-based on gait parameters, energy expenditure and posture of students
Prof. Parveen Kalra
Fluorine-containing 2,3-diaryl quinolines as potent inhibitors of methicillin and vancomycin-resistant Staphylococcus aureus: Synthesis, antibacterial activity and molecular docking studies
Harminder Kaur
L Style n-MOSFET Layout for Mitigating TID Effects
Prof. Neelam Rup Prakash
Multispectral transmission through phoxonic crystal slot-waveguide at midwave infrared frequencies
Jyoti Kedia, Neena Gupta
Analyzing the thermal, economic, and environmental dynamics of phase change materials used in cold chain applications.
Mohit Tyagi
Innovations in Electro Chemical Discharge Machining Process through Electrolyte Stirring and Tool Rotations
Dr. Chandrashekhar Jawalkar
Investigations of effect of hydroxyl-terminated polybutadiene-based polyurethane binders containing various curatives on thermal decomposition behaviour and kinetics of energetic composites
Vasundhara Singh
Visualization and analysis of key performance indicators for agricultural cold supply chain in Indian context using fuzzy DEMATEL approach.
Mohit Tyagi
Health Risk Assessment of Gurdaspur, Punjab, India Using Field Experiments and GIS: A Groundwater Perspective
Dr. Har Amrit Singh Sandhu
Flash Spark Plasma Sintering of SiC: Impact of Additives
Dr. Sandan Kumar Sharma, Dr. Pavol Hvizdoš, Dr. Michael J. Reece, Dr. Salvatore Grasso E-mail addresses
Modelling of barriers encumbering the advancement of processing technologies towards lean manufacturing principles.
Mohit Tyagi
3D Printable, injectable Amyloid-based composite Hydrogel of Bovine Serum Albumin-Aloe Vera for Rapid Diabetic Wound Healing
Shilpi Chaudhary
Acidic ionic liquids: an alternative to HF for {001} reactive facet-controlled synthesis of anatase titania
Vasundhara Singh
To Study Impact of Array Tilt Angle, Orientation, and Inverter arrangement on Power Output of Rooftop Solar PV Panels for Chandigarh.
Prof. Tarlochan Kaur (PI) , Dr. Poonam Saini (CO-PI)
Characterization and Quasi-Static Compressive Response Of Closed Cell Al2024-B4Cp Composite Foams and Their Energy Absorption Characteristics
Dr. Jagmohan Datt Sharma
Audio-video emotional response mapping based upon Electrodermal Activity
Prof. Parveen Kalra, Prof. Neelam Rup Prakash
Electrochemical detection of herbicide atrazine using porous MnO2-NiO nanocatalyst
Dr. Anu Prathap M. U.
Transparent glass-nanocomposites possessing piezoelectric ZnO/Zn2SiO4 nanocrystallites for piezocatalytic dye degradation
Moolchand Sharma
Multispectral transmission through phoxonic crystal slot-waveguide at midwave infrared frequencies
Jyoti Kedia, Neena Gupta
Depression status identification using autoencoder neural network
Prof. Parveen Kalra, Prof. Neelam Rup Prakash
Changes in condylar position after orthognathic surgery and its correlation with temporomandibular symptoms (TMD)- a prospective study
Prof. Parveen Kalra
Influence of Flat Friction Stir Spot Welding Process Parameters on Quality Characteristics of AA6082Weld
Dr. Rajat Upadhyaya
Flexible Ag@LiNbO3/PVDF Composite Film for Piezocatalytic Dye/Pharmaceutical Degradation and Bacterial Disinfection
Dr. Gurpreet Singh
Computational investigation of bioactive 2,3-diaryl quinolines using DFT method: FT- IR, NMR spectra, NBO, NLO, HOMO-LUMO transitions, and quantum-chemical properties
Harminder Kaur
Technology and Education Inputs for Productivity Enhancement in Garment Manufacturing in the Developing World
Prof. Parveen Kalra
Flattening of free energy profile and enhancement of energy storage efficiency near morphotropic phase boundary in lead-free BZT-xBCT
Sanjeev Kumar
Thiophenol amine-based Schiff base for colorimetric detection of Cu2+ and Hg2+ ions
Harminder Kaur
Electric Field Sensor for Electromagnetic Pulse Measurement
Prof. Neelam Rup Prakash
Structural, morphological, and opto-electrical properties of Y2-xYbxO3 nanoparticles synthesized using co-precipitation method
Dr. Jagmohan Datt Sharma
Comparative analysis of radiation tolerant analog circuit layout in 180 nm CMOS technology for space application
Prof. Neelam Rup Prakash
A comprehensive review of grid-connected solar photovoltaic system: Architecture, control, and ancillary services
Ajay Kumar
Single sample face recognition using deep learning: a survey
Nitin Kumar
Electrochemical detection of herbicide atrazine using porous MnO2-NiO nanocatalyst
Dr. Anu Prathap M. U.
Depression status identification using autoencoder neural network
Prof. Parveen Kalra, Prof. Neelam Rup Prakash
Assessing the Role of Virtual Surgical Planning in Mandibular Reconstruction With Free Fibula Osteocutaneous Graft
Prof. Parveen Kalra
Self-Switching Device (SSD) as Terahertz/Microwave detector
Arun Kumar Singh , Neena Gupta, Sanjeev Kumar
Simulation of efficient Sn/Pb-based formamidinium perovskite solar cells with variation of electron transport layers
Shilpi Chaudhary
A comparative analysis of solvent cast 3D printed carbonyl iron powder reinforced polycaprolactone polymeric stents for intravascular applications
Jasvinder Singh
Ballistic Rectifier for Thermoelectric and Terahertz Applications
Arun Kumar Singh , Neena Gupta, Sanjeev Kumar
Dynamic, Hydraulic properties of spatially varied pond ash within an ash pond for Reclamation of abandoned/closed ash pond.
Dr S.K Singh
4-Hydroxy Enigmol, a 1-Deoxyphytosphingolipid that Exhibit Good Activity against Prostate and Colon Cancer
Vasundhara Singh
Adaptive qXE-LMF Filter for Improving Power Quality Using Grid Supporting Photovoltaic System
Dr. Ajay Kumar
L Style n-MOSFET Layout for Mitigating TID Effects
Prof. Neelam Rup Prakash
Surface Displacement Analysis of Road-Cut Slopes in the Vicinity of Koteshwar Area, Uttarakhand, India
Dr. Har Amrit Singh Sandhu
Geospatial survey of sand mines pilot project in Haryana
Dr. Har Amrit Singh Sandhu
Progress in bioactive surface coatings on biodegradable Mg alloys: A critical review towards clinical translation
Dr. Uma Batra
IoT Based Accident Prevention, Detection and Alert System using GPS & Heat Mapping of Accident Prone Areas of Chandigarh
Dr. Sanjay Batish
Flexible Ag@LiNbO3/PVDF Composite Film for Piezocatalytic Dye/Pharmaceutical Degradation and Bacterial Disinfection
Dr. Gurpreet Singh