@nus.edu.sg
PhD, Biomedical Engineering
National University of Singapore
Bioengineering, Computer Engineering, Biomedical Engineering, Biophysics
Scopus Publications
Scholar Citations
Scholar h-index
Nipun Sharma and Swati Sharma
Springer Nature Singapore
Swati Sharma, Abhijit Majumdar, and Bhupendra Singh Butola
Elsevier BV
N. K. Sharma, Swati Sharma, Apoorv Rathi, Abhinav Kumar, Karan Vir Saini, M. D. Sarker, Saman Naghieh, Liqun Ning, and Xiongbiao Chen
ASME International
Abstract Bone being a hierarchical composite material has a structure varying from macro- to nanoscale. The arrangement of the components of bone material and the bonding between fibers and matrix gives rise to its unique material properties. In this study, the micromechanisms of cortical bone failure were examined under different loading conditions using scanning electron microscopy. The experimental tests were conducted in longitudinal and transverse directions of bone diaphysis under tensile as well as compressive loading. The results show that bone material has maximum stiffness under longitudinal tensile loading, while the strength is higher under transverse compressive loading. A reverse trend of compressive mechanical properties of bone is observed for longitudinal and transverse loading as compared to trends reported in the previous studies. Therefore, micromechanisms of cortical bone failure were analyzed for different loading conditions to reveal such type of behavior of cortical bone and to correlate bone microstructure with mechanical response of bone.
Anshu Anjali Singh, Swati Sharma, Mayuri Srivastava, and Abhijit Majumdar
Elsevier BV
Swati Sharma, Anshu Anjali Singh, Abhijit Majumdar, and Bhupendra Singh Butola
Elsevier BV
Swati Sharma, Anshu Anjali Singh, Abhijit Majumdar, and Bhupendra Singh Butola
Springer Science and Business Media LLC
Swati Sharma, Indu Chauhan, Indu Chauhan, and Bhupendra Singh Butola
John Wiley & Sons, Inc.
Swati Sharma, Alefiya Hussain, and Huzur Saran
Elsevier BV
Shelly Khanna, Swati Sharma, and J. N. Chakraborty
Springer Science and Business Media LLC
AbstractInfusion of textiles with aromatic essential oils makes them immense value enriched for the aesthetic dominated fashion consumers to attain cosmeto-therapeutic and medicinal benefits. However, longevity of aroma on the textile with the time passage and subsequent launderings is a major concern for researchers and consumers too. In this work, essential oils of Eucalyptus, Peppermint, Lavender, Jasmine, Clove and Cedarwood were applied directly on cotton as well as with anchoring hosts as cyclodextrin in native and modified form viz. monochlorotriazine-β-cyclodextrin (MCT-βCD) to assess their stability of retention on the fabric surface. The release rate of oils, in isolation, had revealed the disappearance of fragrances rapidly with time as a result of weak physical forces between essential oils and textile surfaces in the absence of any anchoring hosts. MCT-β-CD showed enhanced fragrance stability with added advantage of exhibiting no major change in tensile strength, stiffness and air permeability of cotton.
Nitin Kumar Sharma, Swati Sharma, Daya K. Sehgal, and Rama Kant Pandey
Springer Netherlands
Swati Sharma, Alefiya Hussain, and Huzur Saran
ACM
The goal of this research is to validate clock skew based device fingerprinting introduced in 2005 and explore the feasibility of its usage and/or modification to facilitate unique device identification across heterogenous target devices with improved accuracy and reduced errors. Our network consists of 212 devices that include desktops, laptops and handhelds. We conduct a systematic evaluation of the clock-skew fingerprint stability across 3 primary dimensions namely, change in target host environment, configuration and measurement methodology. We also investigate parameters that affect clock skew of a device. Our results indicate that a minimum of 70 packets are required to achieve a stable skew estimate. We also observe a significant difference between desktop and handheld clock-skew behavior with the factors affecting skew estimates being handheld power state and NTP updates. Thus, for a moderate-size network, clock skew based fingerprints provide a stable and conclusive means of identification for desktops and laptops but show jumps for the handhelds.
Swati Sharma and Alefiya Hussain
IEEE
Network and cyber-security experiments are stochastic in nature, that is, experiment output is not deterministic due to dynamic network state. Comparing two correct experiment runs in these conditions is a domain that has not been completely explored yet. We propose a method to construct a first-order Markov model to capture and subsequently compare two runs of an experiment. Our model is based on transitions between different network events, and to create this first-order Markov model, we find all states from observed data and compute transition probabilities amongst them. Consequently, the model is saved in a repository. To compare two runs, we find the Euclidean Distance between this saved model and the observed model. We illustrate this concept on the DETER testbed by comparing different variations of the Kaminsky DNS cache poisoning attack experiment. Our observations show that comparison between similar experiments have negligible euclidean distances as compared to those between different experiment variations. Thus, we demonstrate that this methodology is promising and provides a principled approach for comparing two experiment runs.
S Sharma, H Saran, and S Bansal
IEEE
Host identification, today, can be done at many layers of the network protocol stack depending on the identifiable parameter used for classification. But, these generally include fields from TCP/IP/MAC packets; that can be spoofed or manipulated very easily to misguide the identification process or include intolerable error into. Identification on wireless networks can be done with better precision by using physical layer, machine-dependent characteristics. We provide an empirical study of another such parameter, the host's clock information, that may lead to accurate identification of a host, among other applications. It is resistant to the earlier mentioned methods of spoofing, as clock information is very specific to the oscillator that generates it. We provide a simplification into the measurement technique of an already investigated approach of remote identification, to achieve lower error rates. We also provide a detailed study of clock skew behavior on a LAN, consisting of wired, wireless nodes and modern mobile and hand-held devices. To our knowledge, this work is the first in the mobile and hand-held device domain to identify such devices definitively. Clock skew based host identification can be put to many applications, that may be specific to each Enterprise network. For instance, aiding the network administrator in monitoring the network, malicious activity flagging mechanism for IDS's/IPS's, isolating unknown or new machines, keeping count of the number of active machines at any time for the purpose of say IP address allocation, associating virtual machines to their corresponding physical machines and so on.