Sachi N. Shah

Learn More
The molecular underpinnings of synaptic vesicle fusion for fast neurotransmitter release are still unclear. Here, we used a single vesicle-vesicle system with reconstituted SNARE and synaptotagmin-1 proteoliposomes to decipher the temporal sequence of membrane states upon Ca(2+)-injection at 250-500 μM on a 100-ms timescale. Furthermore, detailed membrane(More)
In synaptic terminals, complexin is thought to have inhibitory and activating roles for spontaneous "mini" release and evoked synchronized neurotransmitter release, respectively. We used single vesicle-vesicle microscopy imaging to study the effect of complexin-1 on the on-rate of docking between vesicles that mimic synaptic vesicles and the plasma(More)
Wireless Body Area Network (WBAN) is a kind of wireless sensor network (WSN) which can be wearable or implantable in the human body. WBAN is an emerging technology in the field of healthcare system. WBAN has received great attention due to its applications in the field of health, medical, entertainment services and many more. The main idea behind WBAN(More)
H.264 video compression standard has already been introduced in new electronic gadgets such as mobile phones and digital video players, and has gained fast acceptance by end users. Service providers such as online video storage and telecommunications companies are also beginning to adopt H.264 standard. The key element to high performance of video(More)
Ad hoc is a Latin word which describes solutions for this or specific purpose. In the world of computer network, an ad hoc network refers to a network connection which established for a single session and does not require wireless base station; they are on-the-fly networks. Energy, security and selfishness have been amongst the most popular issues for(More)
Mobile Ad-hoc Network (MANET) is a dynamic network topology in which nodes move without restraint anytime and anywhere; it does not require centralized authorization. Previous researches used traditional cryptographic or authentication function for security. Recently many trust-based routing protocols have been introduced but each has its own limitations.(More)
In a network, the process of selecting the best path is called routing. Routing is necessary to establish a communication between mobile nodes. In an ad-hoc network, routing becomes more challenging due to the assumption of the traditional routing protocols about friendliness between nodes in the network. Various network layer attacks can be launched which(More)
  • 1