Manika Sharma

Learn More
Cauliflower (Brassica oleracea L. var. botrytis) and mustard [Brassica juncea (L.) Czern] are important cruciferous crops facing serious yield and quality loss in India from dark leaf spot disease caused by Alternaria brassicae (Berk.) Sacc. Genetic variation among 32 pathogenic A. brassicae isolates from both crops was analyzed with random amplified(More)
N-Myc is a global transcription factor that regulates the expression of genes involved in a number of essential cellular processes including: ribosome biogenesis, cell cycle and apoptosis. Upon deregulation, N-Myc can drive pathologic expression of many of these genes, which ultimately defines its oncogenic potential. Overexpression of N-Myc has been(More)
183 Abstract— Visual Cryptography is a special technique which is used to send the images securely over the network. Visual cryptography is a cryptographic technique which allows visual information to be encrypted in such a way that decryption becomes a mechanical operation that does not require a computer. Simple Visual Cryptographic technique is insecure.(More)
Sarcoidosis is a systemic disorder of unknown etiology, characterized by non-caseating epitheloid granulomas. It has been suggested that sarcoidosis results from exposure to antigens like aerosols and infectious agents in genetically predisposed individuals [2]. Virtually any organ system may be involved. Although the involvement of the abdominal viscera is(More)
BACKGROUND Congenital epulis is a rare benign jaw tumor. It is a reactive or degenerative lesion having a mesenchymal origin; presenting as an obvious mass arising from the gingival mucosa of the maxilla or mandible, presenting in neonates. Its etiology, histopathogenesis and natural history are still not well established. It is seen usually in the female(More)
A visual cryptography scheme (VCS) is a secret sharing of secret image shares which involves dividing the secret image into number of shares and a certain number of shares are sent over the network. The decryption process involves stacking of the shares to get the secret image. The main advantage of visual cryptography scheme is that a number of qualified(More)
  • 1