Rupali R. Deshmukh

Learn More
With the enormous growth of computer networks and the huge increase in the number of applications that rely on it, network security is gaining increasing importance. Moreover, almost all computer systems suffer from security vulnerabilities which are both technically difficult and economically costly to be solved by the manufacturers. Therefore, the role of(More)
With the growing popularity of digital Medias through the WWW, intellectual property needs copyright protection, prevention of illegal copying and verification of content integrity. The new data hiding techniques need to be developed that satisfy the requirements of imperceptibility, robustness, capacity, or data hiding rate and security of the hidden data(More)
Video surveillance has long been in use to monitor security sensitive areas such as banks, department stores, highways, crowded public places and borders. The purpose of this application is to detect a human intruder. This application will detect the occurrence of motion within the area under surveillance. Further, it will also detect if the motion is(More)
Non-destructive testing (NDT) is used in the industry to check for the properties of the material, internal flaws, etc. without cutting open the samples. Digital Radiography (DR), an NDT, is a form of x-ray imaging, where digital x-ray sensors are used. Advantages of DR include time efficiency, ability to digitally enhance and transfer images. In the(More)
Copper oxide nanoparticles within hollow mesoporous silica spheres were prepared by binding/adsorbing Cu 2+ or [Cu(NH 3) 4 (H 2 O) 2 ] 2+ ions on the surface of carbon spheres, followed by formation of a mesoporous silica shell by sol–gel processing and calcination in air. The CuO nanoparticles can subsequently be converted into Cu 3 N nanoparticles by(More)
  • 1