Author
Vijay Nath
Other affiliations: Central University, India, Birla Institute of Technology and Science, National Botanical Research Institute ...read more
Bio: Vijay Nath is an academic researcher from Birla Institute of Technology, Mesra. The author has contributed to research in topics: CMOS & Operational amplifier. The author has an hindex of 14, co-authored 175 publications receiving 925 citations. Previous affiliations of Vijay Nath include Central University, India & Birla Institute of Technology and Science.
Papers published on a yearly basis
Papers
More filters
••
Natural History Museum1, University of Zagreb2, Polish Academy of Sciences3, University of Cagliari4, University of Porto5, Russian Academy of Sciences6, University of Rennes7, National Botanical Research Institute8, Bulgarian Academy of Sciences9, Karadeniz Technical University10, University of Ostrava11, University of Warmia and Mazury in Olsztyn12, University of Lisbon13, Stellenbosch University14, Romanian Academy15, University of Primorska16, Zonguldak Karaelmas University17, American Museum of Natural History18
TL;DR: This paper empirically analyze Monte-Carlo algorithm to determine how the algorithm works on real-world examples and critically review the results and give some possible areas of future research as well.
Abstract: 1. Andreaea nitida Hook.f. & WilsonContributors: H. Bednarek-Ochyra, R. Ochyra and M. LebouvierIles Kerguelen: Grande Terre, Peninsule Courbet, southern side of Val Studer: plateau at the south-eas...
58 citations
••
TL;DR: An image encryption scheme using the combination of chaos, hyper-chaos, and DNA sequence operation that generates more complexities in the confusion process which increases the strength of encryptions and decryptions.
Abstract: This paper proposes an image encryption scheme using the combination of chaos, hyper-chaos, and DNA sequence operation. The proposed scheme performs three stages of encryption operations. Those are...
53 citations
••
Natural History Museum1, University of Zagreb2, National Botanical Research Institute3, Polish Academy of Sciences4, University of Lisbon5, University of Cape Town6, Sewanee: The University of the South7, Autonomous University of Madrid8, University of Rennes9, University of Latvia10, Islamic Azad University11, University of Ostrava12, University of Belgrade13, Duke University14, University of Silesia in Katowice15, Charles University in Prague16
TL;DR: Ditrichum gracile was recorded in the locality Samarske stijene in the Velika Kapela Mt for the first time in Croatia as discussed by the authors, where the plants were of typical appearance, medium to robust, in reddish green to purplish black, rarely green patches.
Abstract: Ditrichum gracile was recorded in the locality Samarske stijene in the Velika Kapela Mt for first time in Croatia. Ditrichum gracile occured within forests of common spruce belonging to the community Hyperico grisebachii - Piceetum on the forest floor, forming distinct patches of several square decimetres. The plants were of typical appearance, medium to robust, in reddish green to purplish black, rarely green patches.
53 citations
••
Natural History Museum1, National Botanical Research Institute2, Polish Academy of Sciences3, Spanish National Research Council4, University of the Azores5, University of Porto6, Russian Academy of Sciences7, Royal Botanic Garden Edinburgh8, University of Lisbon9, Stellenbosch University10, Charles University in Prague11, University of Liège12
TL;DR: New national and regional bryophyte records, 34 L T Ellis, A K Asthana, R Gupta, V Nath, V Sahu, H Bednarek-Ochyra, R Ochyra as mentioned in this paper, B Cykowska, S Calvo Aranda, E Fischer, R Gabriel, P Górski, N Gremmen, H Hespanhol, L E Kurbatova, R I Lewis Smith, D G Long, D Bell, F Mogro, C Sérgio, C A Garcia, S Stow
Abstract: New national and regional bryophyte records, 34 L T Ellis, A K Asthana, R Gupta, V Nath, V Sahu, H Bednarek-Ochyra, R Ochyra, B Cykowska, S Calvo Aranda, E Fischer, R Gabriel, P Górski, N Gremmen, H Hespanhol, L E Kurbatova, R I Lewis Smith, D G Long, D Bell, F Mogro, C Sérgio, C A Garcia, S Stow, A Martins, V R Smith, J Váňa, A Vanderpoorten Department of Life Sciences, The Natural History Museum, London, UK, National Botanical Research Institute, India, Laboratory of Bryology, Institute of Botany, Polish Academy of Sciences, Poland, Departamento Biodiversidad y Biologı́a Evolutiva, Museo Nacional de Ciencias Naturales, Madrid, Spain, Universität Koblenzlandau, Koblenz, Germany, Departamento de Ciências Agrárias Universidade dos Açores, Portugal, Department of Botany, Poznań University of Life Sciences, Poland, Diever, The Netherlands, Universidade do Porto, Portugal, Komarov Botanical Institute, Russian Academy of Sciences, Russia, Moffat, Dumfriesshire, UK, Royal Botanic Garden, Edinburgh, UK, La Paz, Bolivia, Universidade de Lisboa, Portugal, Department of Botany, University of Stellenbosch, South Africa, Department of Botany, Charles University, Czech Republic, University of Liège, Institute of Botany, Belgium
49 citations
••
01 Jun 2019-Microsystem Technologies-micro-and Nanosystems-information Storage and Processing Systems
TL;DR: An approach for efficient cluster head selection namely Energy Dependent Cluster Formation in Heterogeneous Wireless Sensor Network (EDCF) to enhance the lifespan of network is proposed.
Abstract: The applications of Wireless Sensor Network is increasing rapidly in almost every domain. So, the limited node’s battery life in the network should be utilized efficiently. Various approaches have been proposed earlier to lessen the usage of energy in the network and to enhance the network lifespan. In this paper we are proposing an approach for efficient cluster head selection namely Energy Dependent Cluster Formation in Heterogeneous Wireless Sensor Network (EDCF) to enhance the lifespan of network. The simulation of the proposed EDCF technique is performed in MATLAB simulator and to measure its performance the comparison is performed with various existing protocols. The proposed EDCF protocol has shown the enhancement in the lifespan of the network as compared to the previous clustering approaches.
47 citations
Cited by
More filters
••
[...]
01 Jan 1982
TL;DR: In this article, the authors discuss leading problems linked to energy that the world is now confronting and propose some ideas concerning possible solutions, and conclude that it is necessary to pursue actively the development of coal, natural gas, and nuclear power.
Abstract: This chapter discusses leading problems linked to energy that the world is now confronting and to propose some ideas concerning possible solutions. Oil deserves special attention among all energy sources. Since the beginning of 1981, it has merely been continuing and enhancing the downward movement in consumption and prices caused by excessive rises, especially for light crudes such as those from Africa, and the slowing down of worldwide economic growth. Densely-populated oil-producing countries need to produce to live, to pay for their food and their equipment. If the economic growth of the industrialized countries were to be 4%, even if investment in the rational use of energy were pushed to the limit and the development of nonpetroleum energy sources were also pursued actively, it would be extremely difficult to prevent a sharp rise in prices. It is evident that it is absolutely necessary to pursue actively the development of coal, natural gas, and nuclear power if a physical shortage of energy is not to block economic growth.
2,283 citations
01 Jan 2016
TL;DR: The design of analog cmos integrated circuits is universally compatible with any devices to read and is available in the book collection an online access to it is set as public so you can download it instantly.
Abstract: Thank you for downloading design of analog cmos integrated circuits. Maybe you have knowledge that, people have look hundreds times for their chosen books like this design of analog cmos integrated circuits, but end up in malicious downloads. Rather than enjoying a good book with a cup of coffee in the afternoon, instead they juggled with some harmful virus inside their computer. design of analog cmos integrated circuits is available in our book collection an online access to it is set as public so you can download it instantly. Our digital library spans in multiple countries, allowing you to get the most less latency time to download any of our books like this one. Kindly say, the design of analog cmos integrated circuits is universally compatible with any devices to read.
1,038 citations
•
TL;DR: Der DES basiert auf einer von Horst Feistel bei IBM entwickelten Blockchiffre („Lucipher“) with einer Schlüssellänge von 128 bit zum Sicherheitsrisiko, und zuletzt konnte 1998 mit einem von der „Electronic Frontier Foundation“ (EFF) entwickkelten Spezialmaschine mit 1.800 parallel arbeit
Abstract: Im Jahre 1977 wurde der „Data Encryption Algorithm“ (DEA) vom „National Bureau of Standards“ (NBS, später „National Institute of Standards and Technology“ – NIST) zum amerikanischen Verschlüsselungsstandard für Bundesbehörden erklärt [NBS_77]. 1981 folgte die Verabschiedung der DEA-Spezifikation als ANSI-Standard „DES“ [ANSI_81]. Die Empfehlung des DES als StandardVerschlüsselungsverfahren wurde auf fünf Jahre befristet und 1983, 1988 und 1993 um jeweils weitere fünf Jahre verlängert. Derzeit liegt eine Neufassung des NISTStandards vor [NIST_99], in dem der DES für weitere fünf Jahre übergangsweise zugelassen sein soll, aber die Verwendung von Triple-DES empfohlen wird: eine dreifache Anwendung des DES mit drei verschiedenen Schlüsseln (effektive Schlüssellänge: 168 bit) [NIST_99]. Der DES basiert auf einer von Horst Feistel bei IBM entwickelten Blockchiffre („Lucipher“) mit einer Schlüssellänge von 128 bit. Da die amerikanische „National Security Agency“ (NSA) dafür gesorgt hatte, daß der DES eine Schlüssellänge von lediglich 64 bit besitzt, von denen nur 56 bit relevant sind, und spezielle Substitutionsboxen (den „kryptographischen Kern“ des Verfahrens) erhielt, deren Konstruktionskriterien von der NSA nicht veröffentlicht wurden, war das Verfahren von Beginn an umstritten. Kritiker nahmen an, daß es eine geheime „Trapdoor“ in dem Verfahren gäbe, die der NSA eine OnlineEntschlüsselung auch ohne Kenntnis des Schlüssels erlauben würde. Zwar ließ sich dieser Verdacht nicht erhärten, aber sowohl die Zunahme von Rechenleistung als auch die Parallelisierung von Suchalgorithmen machen heute eine Schlüssellänge von 56 bit zum Sicherheitsrisiko. Zuletzt konnte 1998 mit einer von der „Electronic Frontier Foundation“ (EFF) entwickelten Spezialmaschine mit 1.800 parallel arbeitenden, eigens entwickelten Krypto-Prozessoren ein DES-Schlüssel in einer Rekordzeit von 2,5 Tagen gefunden werden. Um einen Nachfolger für den DES zu finden, kündigte das NIST am 2. Januar 1997 die Suche nach einem „Advanced Encryption Standard“ (AES) an. Ziel dieser Initiative ist, in enger Kooperation mit Forschung und Industrie ein symmetrisches Verschlüsselungsverfahren zu finden, das geeignet ist, bis weit ins 21. Jahrhundert hinein amerikanische Behördendaten wirkungsvoll zu verschlüsseln. Dazu wurde am 12. September 1997 ein offizieller „Call for Algorithm“ ausgeschrieben. An die vorzuschlagenden symmetrischen Verschlüsselungsalgorithmen wurden die folgenden Anforderungen gestellt: nicht-klassifiziert und veröffentlicht, weltweit lizenzfrei verfügbar, effizient implementierbar in Hardund Software, Blockchiffren mit einer Blocklänge von 128 bit sowie Schlüssellängen von 128, 192 und 256 bit unterstützt. Auf der ersten „AES Candidate Conference“ (AES1) veröffentlichte das NIST am 20. August 1998 eine Liste von 15 vorgeschlagenen Algorithmen und forderte die Fachöffentlichkeit zu deren Analyse auf. Die Ergebnisse wurden auf der zweiten „AES Candidate Conference“ (22.-23. März 1999 in Rom, AES2) vorgestellt und unter internationalen Kryptologen diskutiert. Die Kommentierungsphase endete am 15. April 1999. Auf der Basis der eingegangenen Kommentare und Analysen wählte das NIST fünf Kandidaten aus, die es am 9. August 1999 öffentlich bekanntmachte: MARS (IBM) RC6 (RSA Lab.) Rijndael (Daemen, Rijmen) Serpent (Anderson, Biham, Knudsen) Twofish (Schneier, Kelsey, Whiting, Wagner, Hall, Ferguson).
624 citations
••
University of Murcia1, Autonomous University of Madrid2, Ain Shams University3, University of Camerino4, Autonomous University of Barcelona5, University of the Azores6, University of La Laguna7, Hebrew University of Jerusalem8, University of Aleppo9, Free University of Berlin10, University of Lisbon11, University of Catania12, University of Belgrade13, University of Liège14
TL;DR: The names of all mosses published up to the end of August 2011 in the countries of the Mediterranean basin, the Macaronesian Islands and Bulgaria are compiled in an annotated checklist that comprises accepted names and synonyms, and provides explanatory annotations for ambiguous and disputed names.
320 citations