![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
196 Result(s)
-
Chapter
A New Distributed Reservation Multiple Access Scheme for the AVPAC Channel
Aeronautical Radio, Inc. has proposed DRM A (Distributed Reservation Multiple Access) for the integration of voice and data on the AVPAC (Aviation VHF Packet Communication) channel, also known internationally ...
-
Article
Bipolar Disorder in Children and Adolescents
The assessment and treatment of juvenile bipolar disorder presents a number of unique challenges and risks. Despite some advances, there is still much to learn about this illness and appropriate interventions.
-
Article
Implications of dose rounding of chemotherapy to the nearest vial size
There are practical implications of preparing cytotoxic doses calculated to the exact milligram. The objective here was to explore the magnitude of the effect of dose rounding to the nearest whole vial strengt...
-
Chapter and Conference Paper
Earthquake Engineering Problems in Parallel Neuro Environment
The aim of the paper is to explore the application of Parallel Neuro Simulator for the generation of artificial earthquake. Parallel Neuro Simulator is a neural network code developed on PARAM 10000 using ‘C’ ...
-
Article
Stockplant Management for Optimized Rhizogenesis in Tectona grandis Stem Cuttings
A 5-year stand of teak (Tectona grandis L. f.) was coppiced in 1999 and converted into a vegetative multiplication garden. Subsequently, three harvesting regimes for the collection of single node stem cuttings we...
-
Article
Genetic difference in adventitious rhizogenesis in Albizia procera Benth. with IBA treatment
Variable adventitious rhizogenesis of juvenile shoot cuttings was observed in seven half-sib families (TP-1, BAN-1, AN-3, JR-3, SL-16, UM-3, and UM-5) of Albizia procera Benth. Treatment with IBA invariably promo...
-
Article
Floating Osmotic Drug Delivery System of Ranitidine Hydrochloride: Development and Evaluation—A Technical Note
-
Article
Effect of Cultural Conditions and Media Constituents on Production of Penicillin V Acylase and CTAB Treatment to Enhance Whole-Cell Enzyme Activity of Rhodotorula aurantiaca (NCIM 3425)
Penicillin V acylase (PVA) is a pharmaceutically important enzyme as it plays a vital role in the manufacture of semi-synthetic β-lactam antibiotics. Rhodotorula aurantiaca (NCIM 3425) produced high levels of int...
-
Chapter and Conference Paper
Moving Object Tracking Using Object Segmentation
Research in motion analysis has evolved over the years as a challenging field, such as traffic monitoring, military, automated surveillance system and biological sciences etc. Tracking of moving objects in vid...
-
Article
Origin and Genetic Diversity of Aromatic Rice Varieties, Molecular Breeding and Chemical and Genetic Basis of Rice Aroma
Aroma is an important quality attribute of rice and is a key determinant of its market value. Among the different groups of aromatic rice varieties ‘Basmati’ from the Indian subcontinent and ‘Jasmine’ from Tha...
-
Article
Effect of zero energy cool chamber and post-harvest treatments on shelf-life of fruits under semi-arid environment of Western India. Part 2. Indian gooseberry fruits
Effect of zero energy cool chamber (ZECC) along with post-harvest treatments including CaCl2, mustard oil and K2SO4 separately on shelf-life and fruit quality attributes of Indian gooseberry or aonla (Emblica off...
-
Article
Comparison of Ligasure Hemorrhoidectomy with Conventional Ferguson’s Hemorrhoidectomy
Conventional hemorrhoidectomy for grade III and IV hemorrhoids is a tedious procedure associated with significant morbidity and a prolonged convalescence. We compared Ligasure™ hemorrhoidectomy with convention...
-
Article
Effect of zero energy cool chamber and post-harvest treatments on shelf-life of fruits under semi-arid environment of Western India. Part 1. Ber fruits
Effect of zero energy cool chamber (ZECC) along with post-harvest treatments (including CaCl2, mustard oil and K2SO4 separately) on shelf-life and fruit quality attributes of ber (Zizyphus mauritiana Lamk.) cv ‘G...
-
Article
Adenoid Cystic Carcinoma of Buccal Mucosa
Adenoid cystic carcinoma is a malignant neoplasm most commonly originating in salivary glands of head and neck region. Here we present a case report of a 50 year old male who was diagnosed with adenoid cystic ...
-
Chapter and Conference Paper
Modeling and Verification of Inter Realm Authentication in Kerberos Using Symbolic Model Verifier
In open distributed environment several users accesses the network resources on server, server will allow only authenticated users to access these resources. So it has become of prime importance for nodes comm...
-
Chapter and Conference Paper
Modeling and Verification of Chess Game Using NuSMV
Gaming industry has always relied on testing their product by playing it extensively. However, testers have their own limitations. When such a product is deployed, extreme gamers find those bugs that were over...
-
Chapter and Conference Paper
Cloud Based Application Development for Mobile Devices for Accessing LBS
A mobile device like a smart phone is becoming one of main information processing devices for users these days. Using it, a user not only receives and makes calls, but also performs information processing task...
-
Chapter and Conference Paper
Logical Modeling and Verification of a Strength Based Multi-agent Argumentation Scheme Using NuSMV
Software systems have evolved to the age of Artificial Intelligence (AI), consisting of independent autonomous agents interacting with each other in dynamic and unpredictable environments. In this kind of envi...
-
Chapter and Conference Paper
Physical Layer Authentication in Wired and Wireless Communication Systems
Authentication is the process by which it is verified that someone is who they claim they are. Authentication is a security service that checks the identity of the party at the other end of the line. Most of t...
-
Chapter and Conference Paper
Modeling and Verification of Server Aided Verification Protocol Using NuSMV
Cryptographic algorithms are useful for signing and verifying the authenticity of sender of the message. The verifier may not have the required computational ability and relies on a powerful server to aid the ...