scispace - formally typeset
Search or ask a question
Author

Vijay Nath

Bio: Vijay Nath is an academic researcher from Birla Institute of Technology, Mesra. The author has contributed to research in topics: CMOS & Operational amplifier. The author has an hindex of 14, co-authored 175 publications receiving 925 citations. Previous affiliations of Vijay Nath include Central University, India & Birla Institute of Technology and Science.


Papers
More filters
Journal ArticleDOI
TL;DR: This paper empirically analyze Monte-Carlo algorithm to determine how the algorithm works on real-world examples and critically review the results and give some possible areas of future research as well.
Abstract: 1. Andreaea nitida Hook.f. & WilsonContributors: H. Bednarek-Ochyra, R. Ochyra and M. LebouvierIles Kerguelen: Grande Terre, Peninsule Courbet, southern side of Val Studer: plateau at the south-eas...

58 citations

Journal ArticleDOI
TL;DR: An image encryption scheme using the combination of chaos, hyper-chaos, and DNA sequence operation that generates more complexities in the confusion process which increases the strength of encryptions and decryptions.
Abstract: This paper proposes an image encryption scheme using the combination of chaos, hyper-chaos, and DNA sequence operation. The proposed scheme performs three stages of encryption operations. Those are...

53 citations

Journal ArticleDOI
TL;DR: Ditrichum gracile was recorded in the locality Samarske stijene in the Velika Kapela Mt for the first time in Croatia as discussed by the authors, where the plants were of typical appearance, medium to robust, in reddish green to purplish black, rarely green patches.
Abstract: Ditrichum gracile was recorded in the locality Samarske stijene in the Velika Kapela Mt for first time in Croatia. Ditrichum gracile occured within forests of common spruce belonging to the community Hyperico grisebachii - Piceetum on the forest floor, forming distinct patches of several square decimetres. The plants were of typical appearance, medium to robust, in reddish green to purplish black, rarely green patches.

53 citations

Journal ArticleDOI
TL;DR: New national and regional bryophyte records, 34 L T Ellis, A K Asthana, R Gupta, V Nath, V Sahu, H Bednarek-Ochyra, R Ochyra as mentioned in this paper, B Cykowska, S Calvo Aranda, E Fischer, R Gabriel, P Górski, N Gremmen, H Hespanhol, L E Kurbatova, R I Lewis Smith, D G Long, D Bell, F Mogro, C Sérgio, C A Garcia, S Stow
Abstract: New national and regional bryophyte records, 34 L T Ellis, A K Asthana, R Gupta, V Nath, V Sahu, H Bednarek-Ochyra, R Ochyra, B Cykowska, S Calvo Aranda, E Fischer, R Gabriel, P Górski, N Gremmen, H Hespanhol, L E Kurbatova, R I Lewis Smith, D G Long, D Bell, F Mogro, C Sérgio, C A Garcia, S Stow, A Martins, V R Smith, J Váňa, A Vanderpoorten Department of Life Sciences, The Natural History Museum, London, UK, National Botanical Research Institute, India, Laboratory of Bryology, Institute of Botany, Polish Academy of Sciences, Poland, Departamento Biodiversidad y Biologı́a Evolutiva, Museo Nacional de Ciencias Naturales, Madrid, Spain, Universität Koblenzlandau, Koblenz, Germany, Departamento de Ciências Agrárias Universidade dos Açores, Portugal, Department of Botany, Poznań University of Life Sciences, Poland, Diever, The Netherlands, Universidade do Porto, Portugal, Komarov Botanical Institute, Russian Academy of Sciences, Russia, Moffat, Dumfriesshire, UK, Royal Botanic Garden, Edinburgh, UK, La Paz, Bolivia, Universidade de Lisboa, Portugal, Department of Botany, University of Stellenbosch, South Africa, Department of Botany, Charles University, Czech Republic, University of Liège, Institute of Botany, Belgium

49 citations

Journal ArticleDOI
TL;DR: An approach for efficient cluster head selection namely Energy Dependent Cluster Formation in Heterogeneous Wireless Sensor Network (EDCF) to enhance the lifespan of network is proposed.
Abstract: The applications of Wireless Sensor Network is increasing rapidly in almost every domain. So, the limited node’s battery life in the network should be utilized efficiently. Various approaches have been proposed earlier to lessen the usage of energy in the network and to enhance the network lifespan. In this paper we are proposing an approach for efficient cluster head selection namely Energy Dependent Cluster Formation in Heterogeneous Wireless Sensor Network (EDCF) to enhance the lifespan of network. The simulation of the proposed EDCF technique is performed in MATLAB simulator and to measure its performance the comparison is performed with various existing protocols. The proposed EDCF protocol has shown the enhancement in the lifespan of the network as compared to the previous clustering approaches.

47 citations


Cited by
More filters
Book ChapterDOI
01 Jan 1982
TL;DR: In this article, the authors discuss leading problems linked to energy that the world is now confronting and propose some ideas concerning possible solutions, and conclude that it is necessary to pursue actively the development of coal, natural gas, and nuclear power.
Abstract: This chapter discusses leading problems linked to energy that the world is now confronting and to propose some ideas concerning possible solutions. Oil deserves special attention among all energy sources. Since the beginning of 1981, it has merely been continuing and enhancing the downward movement in consumption and prices caused by excessive rises, especially for light crudes such as those from Africa, and the slowing down of worldwide economic growth. Densely-populated oil-producing countries need to produce to live, to pay for their food and their equipment. If the economic growth of the industrialized countries were to be 4%, even if investment in the rational use of energy were pushed to the limit and the development of nonpetroleum energy sources were also pursued actively, it would be extremely difficult to prevent a sharp rise in prices. It is evident that it is absolutely necessary to pursue actively the development of coal, natural gas, and nuclear power if a physical shortage of energy is not to block economic growth.

2,283 citations

01 Jan 2016
TL;DR: The design of analog cmos integrated circuits is universally compatible with any devices to read and is available in the book collection an online access to it is set as public so you can download it instantly.
Abstract: Thank you for downloading design of analog cmos integrated circuits. Maybe you have knowledge that, people have look hundreds times for their chosen books like this design of analog cmos integrated circuits, but end up in malicious downloads. Rather than enjoying a good book with a cup of coffee in the afternoon, instead they juggled with some harmful virus inside their computer. design of analog cmos integrated circuits is available in our book collection an online access to it is set as public so you can download it instantly. Our digital library spans in multiple countries, allowing you to get the most less latency time to download any of our books like this one. Kindly say, the design of analog cmos integrated circuits is universally compatible with any devices to read.

1,038 citations

Journal ArticleDOI

1,008 citations

Journal Article
TL;DR: Der DES basiert auf einer von Horst Feistel bei IBM entwickelten Blockchiffre („Lucipher“) with einer Schlüssellänge von 128 bit zum Sicherheitsrisiko, und zuletzt konnte 1998 mit einem von der „Electronic Frontier Foundation“ (EFF) entwickkelten Spezialmaschine mit 1.800 parallel arbeit
Abstract: Im Jahre 1977 wurde der „Data Encryption Algorithm“ (DEA) vom „National Bureau of Standards“ (NBS, später „National Institute of Standards and Technology“ – NIST) zum amerikanischen Verschlüsselungsstandard für Bundesbehörden erklärt [NBS_77]. 1981 folgte die Verabschiedung der DEA-Spezifikation als ANSI-Standard „DES“ [ANSI_81]. Die Empfehlung des DES als StandardVerschlüsselungsverfahren wurde auf fünf Jahre befristet und 1983, 1988 und 1993 um jeweils weitere fünf Jahre verlängert. Derzeit liegt eine Neufassung des NISTStandards vor [NIST_99], in dem der DES für weitere fünf Jahre übergangsweise zugelassen sein soll, aber die Verwendung von Triple-DES empfohlen wird: eine dreifache Anwendung des DES mit drei verschiedenen Schlüsseln (effektive Schlüssellänge: 168 bit) [NIST_99]. Der DES basiert auf einer von Horst Feistel bei IBM entwickelten Blockchiffre („Lucipher“) mit einer Schlüssellänge von 128 bit. Da die amerikanische „National Security Agency“ (NSA) dafür gesorgt hatte, daß der DES eine Schlüssellänge von lediglich 64 bit besitzt, von denen nur 56 bit relevant sind, und spezielle Substitutionsboxen (den „kryptographischen Kern“ des Verfahrens) erhielt, deren Konstruktionskriterien von der NSA nicht veröffentlicht wurden, war das Verfahren von Beginn an umstritten. Kritiker nahmen an, daß es eine geheime „Trapdoor“ in dem Verfahren gäbe, die der NSA eine OnlineEntschlüsselung auch ohne Kenntnis des Schlüssels erlauben würde. Zwar ließ sich dieser Verdacht nicht erhärten, aber sowohl die Zunahme von Rechenleistung als auch die Parallelisierung von Suchalgorithmen machen heute eine Schlüssellänge von 56 bit zum Sicherheitsrisiko. Zuletzt konnte 1998 mit einer von der „Electronic Frontier Foundation“ (EFF) entwickelten Spezialmaschine mit 1.800 parallel arbeitenden, eigens entwickelten Krypto-Prozessoren ein DES-Schlüssel in einer Rekordzeit von 2,5 Tagen gefunden werden. Um einen Nachfolger für den DES zu finden, kündigte das NIST am 2. Januar 1997 die Suche nach einem „Advanced Encryption Standard“ (AES) an. Ziel dieser Initiative ist, in enger Kooperation mit Forschung und Industrie ein symmetrisches Verschlüsselungsverfahren zu finden, das geeignet ist, bis weit ins 21. Jahrhundert hinein amerikanische Behördendaten wirkungsvoll zu verschlüsseln. Dazu wurde am 12. September 1997 ein offizieller „Call for Algorithm“ ausgeschrieben. An die vorzuschlagenden symmetrischen Verschlüsselungsalgorithmen wurden die folgenden Anforderungen gestellt: nicht-klassifiziert und veröffentlicht, weltweit lizenzfrei verfügbar, effizient implementierbar in Hardund Software, Blockchiffren mit einer Blocklänge von 128 bit sowie Schlüssellängen von 128, 192 und 256 bit unterstützt. Auf der ersten „AES Candidate Conference“ (AES1) veröffentlichte das NIST am 20. August 1998 eine Liste von 15 vorgeschlagenen Algorithmen und forderte die Fachöffentlichkeit zu deren Analyse auf. Die Ergebnisse wurden auf der zweiten „AES Candidate Conference“ (22.-23. März 1999 in Rom, AES2) vorgestellt und unter internationalen Kryptologen diskutiert. Die Kommentierungsphase endete am 15. April 1999. Auf der Basis der eingegangenen Kommentare und Analysen wählte das NIST fünf Kandidaten aus, die es am 9. August 1999 öffentlich bekanntmachte: MARS (IBM) RC6 (RSA Lab.) Rijndael (Daemen, Rijmen) Serpent (Anderson, Biham, Knudsen) Twofish (Schneier, Kelsey, Whiting, Wagner, Hall, Ferguson).

624 citations

Journal ArticleDOI
TL;DR: The names of all mosses published up to the end of August 2011 in the countries of the Mediterranean basin, the Macaronesian Islands and Bulgaria are compiled in an annotated checklist that comprises accepted names and synonyms, and provides explanatory annotations for ambiguous and disputed names.

320 citations