Repository logo
Institutional Repository
Communities & Collections
Browse
Quick Links
  • Central Library
  • Digital Library
  • BHU Website
  • BHU Theses @ Shodhganga
  • BHU IRINS
  • Login
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
New user? Click here to register.Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Manoj Kumar Mishra"

Filter results by typing the first few letters
Now showing 1 - 18 of 18
  • Results Per Page
  • Sort Options
  • Loading...
    Thumbnail Image
    PublicationArticle
    Changes in body weight, ovarian growth, and circulating plasma estradiol level in response to programmed photoperiods in blackheaded bunting, Emberiza melanocephala
    (Wiley-Liss Inc., 1999) Manoj Kumar Mishra; P.D. Tewary
    Photosensitive female blackheaded buntings (Emberiza melanocephala) were observed at different photoperiodic schedules of increasing duration to study their effect on body weight, ovarian growth, and circulating plasma estradiol level. Continuous-light (24L:0D) and long-day (15L:9D) photoperiodic regimes showed a significant increase, followed by decrease, in body weight, ovarian growth, and circulating plasma estradiol level. The short photoperiod (8L:16D) showed no effect on body weight, ovarian growth, or circulating plasma estradiol level. During 24L:0D and 15L:9D birds became photorefractory and thus unable to maintain an elevated state of body weight, ovarian growth, or plasma estradiol level. On the other hand, the birds exposed to short photoperiod maintained their photosensitive state throughout the period. The peak attained during 24L:0D and 15L:9D treated groups showed little variation. The present findings indicate that long-day and continuous-light, when given for longer durations, causes photorefractoriness (a state in which birds are unable to respond to light) and thus suggest the involvement of endogenous circadian components in regulating reproduction and associated events during photoperiodic manipulation of light/dark cycles in female blackheaded buntings.
  • Loading...
    Thumbnail Image
    PublicationArticle
    Changes in ovarian growth and plasma estradiol concentration in response to photoperiodic transfers in Blackheaded bunting
    (1997) Manoj Kumar Mishra; P.D. Tewary
    Photosensitive female Blackheaded buntings when exposed to long day (15L/9D) and continuous light (24L/OD) for longer duration showed an increase followed by decrease in ovarian weight and plasma estradiol concentration and thus they become photorefractory. While the birds transferred on continuous dark phase (scoto phase) for 30 days shown to have effective to terminate the photorefractoriness and thus maintained their photosensitivity. The present study reveals that it is the time of exposure of light which plays an important role in maintenance of photosensitivity and photorefractoriness in buntings and thus suggests the presence of an endogenous circadian component which may operate their in.
  • Loading...
    Thumbnail Image
    PublicationArticle
    DFFnet: delay feature fusion network for efficient content-based image retrieval
    (Springer Science and Business Media Deutschland GmbH, 2025) Suneel Kumar; Ruchilekha; Manoj Kumar Singh; Manoj Kumar Mishra
    Due to advancement of affordable imaging devices, a huge number of images are generated for different applications. An efficient method for retrieving the appropriate images corresponding to the query image from a huge repository is still awaited. Thus, content-based image retrieval (CBIR) systems have been developed. One of the issues that directly threatens the effectiveness of CBIR system is a semantic gap. In this paper, we introduce a Delay Feature Fusion Network (DFFnet) in the framework of SqueezeNet architecture. Our proposed model fuses the past layer’s features with the current layer’s features by utilizing a transpose convolution operation followed by depth-concatenation. This integration preserves the crucial information that may be lost during the forward pass. After extracting image features, we apply the t-SNE (t-Distributed Stochastic Neighbor Embedding) method. This technique allows us to project the high-dimensional image features into a lower-dimensional space, enabling compact image indexing and potentially improving the overall performance of CBIR system. Notably, we observed that as the number of retrieval rates increases, our proposed method experiences minimal impact. By leveraging the DFFnet and employing t-SNE, our approach aims to enhance image indexing and achieve improved performance for image retrieval tasks. The performance of DFFnet with t-SNE and without t-SNE are evaluated on benchmark datasets—Corel, Kadid, and ImageNet. Our proposed DFFnet with t-SNE gives a significant improvement in terms of performance metrics: precision, recall, and F1-score, in comparison to other state-of-the-arts. © The Author(s), under exclusive licence to Springer-Verlag London Ltd., part of Springer Nature 2025.
  • Loading...
    Thumbnail Image
    PublicationBook Chapter
    Edge, Fog, and Cloud Computing in Industry 5.0
    (Springer Science+Business Media, 2025) Asit Kumar Pradhan; Dilip Kumar; Manoj Kumar Mishra; Manoj Kumar Singh
    The fourth industrial revolution focused more on increasing automation and real-time oriented control systems in factories by integrating leading-edge technologies lessening human interference. Whereas fifth industry revolution, commonly known as Industry 5.0 is the succeeding stage of industrial revolution, emphasizing human technology along with cutting-edge technologies generate highly customized and environmentally friendly production processes. Industry 5.0 indicates that human working along with robots and smart devices by leveraging cutting-edge technologies like the robotics, Internet of Things (IoT), big data, and AI. Computing paradigms like edge, fog, and cloud computing are essential to Industry 5.0’s success and implementation. Industrial automation requires the ability of data exchange, data processing, data analytics, and decision-making. Edge, fog, and cloud computing along with IoT and Artificial Intelligence (AI) technologies provide high-performance computing power to achieve this goal. Edge computing allows Industry 5.0 to access and share information about their industries through standard hardware and software resources at network’s edge. The intermediary computing paradigm like fog computing brings networking, stowing, and processing more rapidly to the data source by providing a decentralized computing infrastructure which enlarges the possibilities of cloud computing to the network’s edge. The combination of these above computing paradigms is made possible by cloud computing, resulting in a full ecosystem that improves productivity, creativity, and human-centered operations. This chapter provides a brief idea on the architecture, characteristics, use cases, current state of the art and challenges of edge, fog, and cloud computing in Industry 5.0. © 2025 The Editor(s) (if applicable) and The Author(s), under exclusive license to Springer Nature Switzerland AG.
  • Loading...
    Thumbnail Image
    PublicationArticle
    Impact of hardware connectivity on Grover’s algorithm in NISQ era
    (Springer, 2025) Mohit Joshi; Manoj Kumar Mishra; S. Karthikeyan
    The quantum search operation as dictated in Grover’s landmark paper had been a crucial area in the study of quantum algorithms. It has become a critical component in many quantum cryptography and computation algorithms and threatens today’s AES security infrastructure. The quadratic speedup provided by Grover’s algorithm is hampered severely due to the presence of a realistic environment. Many studies have analyzed the effect of different noises on Grover’s search algorithm. However, the efficiency of the algorithm also depends on the connectivity of qubits on realistic quantum hardware. This study evaluated the performance of Grover’s algorithm with varying qubit connectivity under the presence of two-qubit depolarizing noise and single-qubit amplitude damping and dephasing noise. Unidirectional and bidirectional variants of nine coupling maps for qubit connectivity were chosen. The analysis has shown that the transpilation efficiency for Grover’s algorithm is deeply sensitive to the connectivity and degree of the hardware, which influences the depth of the circuit. This, in turn, has a measurable effect on the performance of the algorithm on a particular hardware. This study also ranks the favorable coupling maps using the decision-making technique of AHP-TOPSIS. The analysis has shown that grid, hex, and modified star are the most favorable hardware connectivity. The unidirectional linear, ring, star, and full-connected are the worst choices. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2025.
  • Loading...
    Thumbnail Image
    PublicationConference Paper
    Improve Content-based Image Retrieval using Deep learning model
    (Institute of Physics, 2022) Suneel Kumar; Manoj Kumar Singh; Manoj Kumar Mishra
    The complexity of multimedia has expanded dramatically as a result of recent technology breakthroughs, and retrieval of similar multimedia material remains an ongoing research topic. Content-based image retrieval (CBIR) systems search huge databases for pictures that are related to the query image (QI). Existing CBIR algorithms extract just a subset of feature sets, limiting retrieval efficacy. The sorting of photos with a high degree of visual similarity is a necessary step in any image retrieval technique. Because a single feature is not resilient to image datasets modifications, feature combining, also known as feature fusion, is employed in CBIR to increase performance. This work describes a CBIR system in which combining DarkNet-19 and DarkNet-53 information to retrieve images. Experiments on the Wang (Corel 1K) database reveal a considerable improvement in precision over state-of-the-art classic techniques as well as Deep Convolutional Neural Network(DCNN). © Published under licence by IOP Publishing Ltd.
  • Loading...
    Thumbnail Image
    PublicationArticle
    Involvement of circadian rhythm in response to ultrashort photoperiods in blackheaded bunting, emberiza melanocephala
    (1997) Manoj Kumar Mishra; P.D. Tewary
    Groups of photosensitive adult female blackheaded buntings were exposed to various ultrashort days photoperiodic regimes for 60 days in which a fixed 3 h photophase was coupled with dark phases in cycles of 22 to 32 hours duration. One group of buntings was kept in long days (15L:9D) as control. Significant increase in ovarian weight and circulating plasma estradiol concentration was marked in the cycles of 30 h (3L:27D), and 32 h (3L:29D) photoperiodic schedules as well as in control group (15L:9D), whereas there was no response in the cycles of 22 h (3L:19D) and 24 h (3L:21D). It seems that the response to ultrashort day cycles is due to a phase advance or delay in photosensitivity of the response system repeatedly shows coincidence of the external photophase (3 h) with the photoinducible phase of an endogenous circadian rhythm. Therefore, the present result appears to be consistent with Bünning hypothesis suggesting the involvement of an endogenous circadian component in the female blackheaded bunting. © 1997 Akadémiai Kiadó, Budapest.
  • Loading...
    Thumbnail Image
    PublicationArticle
    Involvement of threshold photoperiod in control of reproductive rhythmicity in migratory blackheaded bunting, emberiza melanocephala
    (Marcel Dekker Inc., 1999) Manoj Kumar Mishra; P.D. Tewary
    To explore the need for minimum threshold photoperiodicity in regulation of metabolic and reproductive activities of a migratory finch, various programmed light-dark (LD) schedules, such as P1(3L/21D), P2 (6L/18D), P3 (9L/15D), P4 (12L/12D), P5 (15L/9D), P6 (18L/6D), P7 (21L/3D), and P8 (24L/0D), have been used on photosensitive female blackheaded buntings for 42 days. Results indicate that the photoperiodic thresholds of 3h, 6h, and 9h completely failed to have any response on buntings, while threshold photo- periodicities of 12h, 15h, 18h, 21h, and 24h had significant effect (P < .001) on body weight, ovarian weight, and circulating plasma estradiol concentration, suggesting the role of the photoperiod as a primary environmental source to regulate various metabolic and reproductive functions. Further, it has been suggested that the threshold photoperiod in this species appears to be of 12h duration.
  • Loading...
    Thumbnail Image
    PublicationArticle
    Leveraging Grover’s Algorithm for Quantum Searchable Encryption in Cloud Infrastructure and its application in AES Resource Estimation
    (Springer, 2024) Mohit Joshi; Manoj Kumar Mishra; S. Karthikeyan
    Designing efficient techniques to search over encrypted data space has always been an intriguing security challenge, although many solutions based on classical searching methods have been proposed. Grover’s algorithm, a quantum counterpart of searching algorithms, has proven to provide quadratic speedup over any classical search technique on an unsorted database. However, this algorithm is unable to search over encrypted data space. This study proposed an extension of Grover’s algorithm to enable search over encrypted dataspace, allowing clients with limited-capability quantum resources to delegate complex search operations to an untrusted server. The blindness of data in this protocol is achieved by encrypting qubits using Pauli’s rotation gates that maximally mix the outgoing states. The empirical estimation of the overhead of the computation due to the introduction of this technique has been analyzed. This estimate has been used for comparative analysis, showing the efficiency of the proposed protocol. A practical application of the proposed searchable encryption technique has been utilized to estimate the increase in resources needed to carry out a brute-force attack on AES encryption using secure Grover’s algorithm. Furthermore, an extensive experimental analysis of the effect of noise has been studied using four different noise models: amplitude damping, phase damping, depolarizing noise, and bit-flip noise. The investigation provided useful insight into the behavior of the proposed algorithm under noisy conditions and also estimated the tolerance thresholds of the proposed algorithm under different noise models. © The Author(s), under exclusive licence to Springer Science+Business Media, LLC, part of Springer Nature 2024.
  • Loading...
    Thumbnail Image
    PublicationArticle
    Performance evaluation of MODIS and VIIRS satellite AOD products over the Indian subcontinent
    (Frontiers Media S.A., 2023) Swagata Payra; Ajay Sharma; Manoj Kumar Mishra; Sunita Verma
    In the present study, the first systematic performance evaluation of aerosol optical depth (AOD) products retrieved using two satellite sensors i.e., Visible Infrared Imaging Radiometer Suite (VIIRS) and Aqua-Moderate-Resolution Imaging Spectroradiometer (MODIS) is carried out over India. We have used ground-based AOD from AERONET at 550 nm wavelength for inter-comparison with MODIS Aqua version C6.1 (C061) Deep Blue (DB) aerosol product and VIIRS/SNPP collection version 1.1 (V1.1) DB aerosol product over the time span of 7-year (2014–2020) observation periods. For validation, the average value of satellite pixels falling within the box of 50 Km x 50 Km keeping the AERONET station at the center is retrieved. The average daily data from the AERONET sun photometer (2014–2019) were obtained within ±15 min of satellite overpass time. Statistical parameters like correlation coefficient (R), RMSE, MAE, and RMB were calculated. The uncertainty of satellite AOD is evaluated using an envelope of Expected Error (EE = ±0.05 + 0.15 AOD for land). Statistical analysis shows that the MODIS AOD product outperforms VIIRS-retrieved AOD. The AOD retrieved from both sensors yields a high correlation (0.86—Jaipur, 0.79—Kanpur, 0.84—Gandhi College, and 0.74—Pune for MODIS and 0.75—Jaipur, 0.77—Kanpur, 0.49—Gandhi College, and 0.86—Pune for VIIRS) and low MAE (0.12—Jaipur, 0.20—Kanpur, 0.15—Gandhi College, and 0.09—Pune for MODIS and 0.13—Jaipur, 0.13—Kanpur, 0.26—Gandhi College, and 0.10—Pune for VIIRS). Other statistical measures such as RMSE, RMB, and P also suggest similar performance. More than 66% of the total data fall within the range of EE for both the satellite products at each station. Spatial comparison exhibits the same AOD pattern seasonally as well as annually having a minimum bias from −0.3 to +0.3 between MODIS and VIIRS. Slight underestimation and overestimation are observed in all the stations by MODIS, whereas VIIRS continuously underestimates AOD with increase in optical depth, suggesting improvements in the aerosol model and surface reflection in retrieval. Overall, the comparison of ground AERONET AOD reveals better accuracy of MODIS AOD with that of VIIRS satellite datasets over India. Copyright © 2023 Payra, Sharma, Mishra and Verma.
  • Loading...
    Thumbnail Image
    PublicationArticle
    Phishfort - Anti-phishing framework
    (Science Publishing Corporation Inc, 2018) Eric Abraham Kalloor; Manoj Kumar Mishra; Joy Paulose
    Phishing attack is one of the most common form of attack used to get unauthorized access to users' credentials or any other sensitive information. It is classified under social engineering attack, which means it is not a technical vulnerability. The attacker exploits the human nature to make mistake by fooling the user to think that a given web page is genuine and submitting confidential data into an embedded form, which is harvested by the attacker. A phishing page is often an exact replica of the legitimate page, the only noticeable difference is the URL. Normal users do not pay close attention to the URL every time, hence they are exploited by the attacker. This paper suggests a login framework which can be used independently or along with a browser extension which will act as a line of defense against such phishing attacks. The semi-automated login mechanism suggested in this paper eliminates the need for the user to be alert at all time, and it also provides a personalized login screen so that the user can to distinguish between a genuine and fake login page quite easily. © 2018 Authors.
  • Loading...
    Thumbnail Image
    PublicationArticle
    Photoperiodic induction of ovarian growth and plasma estradiol secretion in a migratory finch, Emberiza melanocephala: Involvement of circadian rhythm
    (Akademiai Kiado Rt., 2000) Manoj Kumar Mishra; P.D. Tewary
    To demonstrate the involvement of circadian rhythm in photoperiodic time measurement, photosensitive female blackheaded buntings were kept under different photoperiodic schedules consisting of 6 h of main photophase coupled with scotophases of various durations. Ovarian mass and circulating plasma estradiol concentration were found to be elevated in cycles of 6L:6D, 6L:36D, 6L:54D and in control 15L:9D groups. But cycles of 6L: 18D, 6L:42D and 6L:66D did not stimulate ovarian growth or elevate circulating plasma estradiol concentration. These results are consistent with the Bunning hypothesis according to which a photoperiodic response is elicited as a result of the coincidence of light with the photoinducible phase of an endogenous circadian rhythm. The results thus indicate the involvement of a circadian rhythm of photoinducibility in ovarian growth and estradiol secretion.
  • Loading...
    Thumbnail Image
    PublicationArticle
    Photoperiodic regulation of reproduction in migratory bunting, Emberiza melanocephala: An evidence for external coincidence model
    (1998) Manoj Kumar Mishra; P.D. Tewary
    Photosensitive female blackheaded buntings (Emberiza melanocephala) were exposed to various night-interruption cycles for 42 days. These light-dark cycles consisted of a basic photophase of 6 h and 1 h photointerruption of the 18 h dark phase in 24 h cycle at different points. A control group was also placed under short photoperiod (8L : 16D). Ovarian growth and increased plasma estradiol level were evident in night interruption cycle in which photo-interruption of dark photophase was made 13 h and 15 h after the onset of basic photophase, i.e. 6L : 7D : 1L : 10D and 6L : 9D : 1L : 8D cycles. The present results are consistent with external coincidence model (Bünning hypothesis), suggesting the involvement of an endogenous circadian rhythm in photo-periodic time measurement in bunting.
  • Loading...
    Thumbnail Image
    PublicationBook
    Plants for Immunity and Conservation Strategies
    (Springer Nature, 2023) Manoj Kumar Mishra; Nishi Kumari
    This edited book deals with medicinal plants(herbs and trees) used in critical diseases which contain a rich resource of bioactive compounds that can be used as immuno-boosters or recommended for therapeutic values. Each chapter provides the basic information such as taxonomic description, occurrence and importance of medicinal plants. The detail description of major bioactive compounds in medicinal plants, their chemical nature and clear flow chart of biosynthesis are important steps in this book. This book also includes conservation strategy both in-situ and ex-situ, which assist the research and academic purpose. This book is of interest to national and international researchers, teacher’s, pharma scientists, and policymakers. Also, the book serves as additional reading material for both undergraduate and graduate students of pharma and agriculture in the world. © The Editor(s)(if applicable) and The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2023.
  • Loading...
    Thumbnail Image
    PublicationBook Chapter
    Quantum computing and new dimensions in network security
    (CRC Press, 2024) Mohit Joshi; Alka; Manoj Kumar Mishra
    Quantum computing is an emerging field of interest for many branches of practical computation ranging from cryptography to machine learning, from molecule design to drug discovery, and from physical simulations to financial optimization. Recent years have seen tremendous growth in the hardware and software applicability of quantum technology. It has started showing both disruptive and constructive implications for modern cryptography. New techniques of network security are now emerging that have no counterparts in classical cryptography. This chapter explores the horizons of network security using quantum computation. The chapter first introduces the general audience to quantum computation from the perspective of a computer scientist. It elaborates on the basic principles of quantum computing and helps to set up an intuitive understanding of this new paradigm of computation. The chapter also gives a brief introduction to the circuit model of quantum programming, which is the most prevalent model of quantum programming. It establishes the need for and importance of quantum cryptography and discusses various protocols of quantum security. © 2025 selection and editorial matter, Suhel Ahmad Khan, Mohammad Faisal, Nawaf Alharbe, Rajeev Kumar and Raees Ahmad Khan. All rights reserved.
  • Loading...
    Thumbnail Image
    PublicationConference Paper
    Recent Trends and Open Challenges in Blind Quantum Computation
    (Springer Science and Business Media Deutschland GmbH, 2023) Mohit Joshi; S. Karthikeyan; Manoj Kumar Mishra
    Quantum mechanics with radically novel properties: such as superposition, entanglement, and the no-cloning theorem, has begun to open up Quantum Computation beyond the scope of Classical Computation. In recent years, quantum technology has seen tremendous leaps both in academic research and commercial exploration. Quantum computation has started to find applications in many more new domains every day, from disrupting modern cryptography to enabling unconventional security techniques, from quantum chemistry to physical simulations, and from quantum machine learning to financial optimization. This paper first provides the conceptual groundings of quantum computation and explores blind quantum computation, a one-of-its-kind sub-categorization of quantum computing active research. The use of Blind Quantum Computation in Quantum Cryptography is elaborated in detail. Finally concludes with highlights of the applicability of the subject. The paper is an easy-to-follow guide introducing the research trends and open challenges for the new researcher in follow-up on the field. © 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.
  • Loading...
    Thumbnail Image
    PublicationReview
    Role of lysophosphatidic acid in the regulation of immune cells and hematological malignancies
    (Elsevier Inc., 2025) Vishal Kumar Gupta; Kriti Gupta; Pratishtha Sonker; Manoj Kumar Mishra; Ajay Kumar
    Lysophosphatidic acid (LPA), a small bioactive glycerophospholipid, has been reported to play an indispensable role in the regulation of a wide range of cellular processes, including cell proliferation, morphology, differentiation, invasion, migration, and apoptosis. Besides, it has a diverse role in the development, differentiation, migration, and trafficking of immune cells. The role of LPA in the functioning of immune cells, such as macrophages, natural killer cells, T cells, and B cells has been poorly understood and is still a major thrust area for immunological research. Further, accumulating experimental evidence indicates the pro-tumoral action of LPA in various cancers, including hematological malignancies. Hematological malignancies or blood cancers are a group of neoplastic conditions derived from the cells of hematopoietic tissues. LPA is reported to promote the development and progression of cancers of hematological origin through altering apoptosis, invasion and migration, metabolism, and anti-tumor immune response. But still, the mechanistic pathways by which LPA supports the development and progression of hematological malignancies are not well explored. The present review aims to provide an elaborate survey on the role of LPA in the functioning of immune cells and its implication in hematological malignancies. © 2025 Elsevier Inc.
  • Loading...
    Thumbnail Image
    PublicationArticle
    Tracing the legacy of peace leadership from an Asian perspective: Mahatma Gandhi, Dalai Lama, and Thich Nhat Hanh
    (Routledge, 2024) Manoj Kumar Mishra; Priyankar Upadhyaya; Thomas Paul Davis
    This paper narrates the concept of Sustainable Peace Leadership and examines how three prominent Peace Activists from South and Southeast Asia measure up to the concept. The article will consider the works and ideas of Mohandas K. Gandhi (Mahatma Gandhi), Lhamo Thondup (The 14th Dalai Lama), and Nguyen Xuan Bao (Thich Nhat Hanh). Mahatma Gandhi was instrumental in achieving Indian independence from the British Empire. The Dalai Lama is the spiritual leader of the Tibetan people and has managed a difficult relationship with the Chinese government following the occupation of Tibet. Thich Nhat Hanh was a Vietnamese Buddhist monk, peace activist and is known as the ‘father of mindfulness’. The paper identified several characteristics of Peace Leaders. These include being a charismatic leader who motivates their followers to achieve their goals in a non-violent and inclusive manner. Peace leaders meditate and spend time developing inner peace which then leads to outer peace. The paper also asserts that peace leaders are capable of recognizing the humanity in their opponents and seek a mutually beneficial solution. The three chosen individuals are all recognised as being charismatic leaders who were prominent peace leaders. All were deeply spiritual and practiced meditation and other inner work on a regular basis. They stressed the humanity in their opponents, based on their religious beliefs and the concepts of non-duality and interdependence. © 2023 Informa UK Limited, trading as Taylor & Francis Group.
An Initiative by BHU – Central Library
Powered by Dspace