Skip to main content

previous disabled Page of 10
and
  1. No Access

    Chapter

    A New Distributed Reservation Multiple Access Scheme for the AVPAC Channel

    Aeronautical Radio, Inc. has proposed DRM A (Distributed Reservation Multiple Access) for the integration of voice and data on the AVPAC (Aviation VHF Packet Communication) channel, also known internationally ...

    Sanjay Singh, Mario Gerla, Steve Friedman in Wireless Information Networks (1996)

  2. No Access

    Article

    Bipolar Disorder in Children and Adolescents

    The assessment and treatment of juvenile bipolar disorder presents a number of unique challenges and risks. Despite some advances, there is still much to learn about this illness and appropriate interventions.

    Dr Raul R. Silva, Fredrick Matzner, Jose Diaz, Sanjay Singh in CNS Drugs (1999)

  3. No Access

    Article

    Implications of dose rounding of chemotherapy to the nearest vial size

    There are practical implications of preparing cytotoxic doses calculated to the exact milligram. The objective here was to explore the magnitude of the effect of dose rounding to the nearest whole vial strengt...

    Michael Joseph Dooley, Sanjay Singh, Michael Michael in Supportive Care in Cancer (2004)

  4. No Access

    Chapter and Conference Paper

    Earthquake Engineering Problems in Parallel Neuro Environment

    The aim of the paper is to explore the application of Parallel Neuro Simulator for the generation of artificial earthquake. Parallel Neuro Simulator is a neural network code developed on PARAM 10000 using ‘C’ ...

    Sanjay Singh, S V Barai in High Performance Computing - HiPC 2004 (2005)

  5. No Access

    Article

    Stockplant Management for Optimized Rhizogenesis in Tectona grandis Stem Cuttings

    A 5-year stand of teak (Tectona grandis L. f.) was coppiced in 1999 and converted into a vegetative multiplication garden. Subsequently, three harvesting regimes for the collection of single node stem cuttings we...

    Sanjay Singh, A. S. Bhandari, S. A. Ansari in New Forests (2006)

  6. No Access

    Article

    Genetic difference in adventitious rhizogenesis in Albizia procera Benth. with IBA treatment

    Variable adventitious rhizogenesis of juvenile shoot cuttings was observed in seven half-sib families (TP-1, BAN-1, AN-3, JR-3, SL-16, UM-3, and UM-5) of Albizia procera Benth. Treatment with IBA invariably promo...

    Shamim Akhtar Ansari, Sanjay Singh in Journal of Forest Research (2008)

  7. No Access

    Article

    Floating Osmotic Drug Delivery System of Ranitidine Hydrochloride: Development and Evaluation—A Technical Note

    Pramod Kumar, Sanjay Singh, Brahmeshwar Mishra in AAPS PharmSciTech (2008)

  8. No Access

    Article

    Effect of Cultural Conditions and Media Constituents on Production of Penicillin V Acylase and CTAB Treatment to Enhance Whole-Cell Enzyme Activity of Rhodotorula aurantiaca (NCIM 3425)

    Penicillin V acylase (PVA) is a pharmaceutically important enzyme as it plays a vital role in the manufacture of semi-synthetic β-lactam antibiotics. Rhodotorula aurantiaca (NCIM 3425) produced high levels of int...

    Atul Kumar, Sanjay Singh, Pankaj Poddar in Applied Biochemistry and Biotechnology (2009)

  9. No Access

    Chapter and Conference Paper

    Moving Object Tracking Using Object Segmentation

    Research in motion analysis has evolved over the years as a challenging field, such as traffic monitoring, military, automated surveillance system and biological sciences etc. Tracking of moving objects in vid...

    Sanjay Singh, Srinivasa Murali Dunga in Information and Communication Technologies (2010)

  10. No Access

    Article

    Origin and Genetic Diversity of Aromatic Rice Varieties, Molecular Breeding and Chemical and Genetic Basis of Rice Aroma

    Aroma is an important quality attribute of rice and is a key determinant of its market value. Among the different groups of aromatic rice varieties ‘Basmati’ from the Indian subcontinent and ‘Jasmine’ from Tha...

    Vinita Pachauri, Manish K. Singh in Journal of Plant Biochemistry and Biotechn… (2010)

  11. No Access

    Article

    Effect of zero energy cool chamber and post-harvest treatments on shelf-life of fruits under semi-arid environment of Western India. Part 2. Indian gooseberry fruits

    Effect of zero energy cool chamber (ZECC) along with post-harvest treatments including CaCl2, mustard oil and K2SO4 separately on shelf-life and fruit quality attributes of Indian gooseberry or aonla (Emblica off...

    Sanjay Singh, A. K. Singh, H. K. Joshi in Journal of Food Science and Technology (2010)

  12. No Access

    Article

    Comparison of Ligasure Hemorrhoidectomy with Conventional Ferguson’s Hemorrhoidectomy

    Conventional hemorrhoidectomy for grade III and IV hemorrhoids is a tedious procedure associated with significant morbidity and a prolonged convalescence. We compared Ligasure™ hemorrhoidectomy with convention...

    Rahul Khanna, Seema Khanna, Shilpi Bhadani, Sanjay Singh in Indian Journal of Surgery (2010)

  13. No Access

    Article

    Effect of zero energy cool chamber and post-harvest treatments on shelf-life of fruits under semi-arid environment of Western India. Part 1. Ber fruits

    Effect of zero energy cool chamber (ZECC) along with post-harvest treatments (including CaCl2, mustard oil and K2SO4 separately) on shelf-life and fruit quality attributes of ber (Zizyphus mauritiana Lamk.) cv ‘G...

    Sanjay Singh, A. K. Singh, H. K. Joshi, K. Lata in Journal of Food Science and Technology (2010)

  14. No Access

    Article

    Adenoid Cystic Carcinoma of Buccal Mucosa

    Adenoid cystic carcinoma is a malignant neoplasm most commonly originating in salivary glands of head and neck region. Here we present a case report of a 50 year old male who was diagnosed with adenoid cystic ...

    Sanjay Singh, Gokkulakrishnan, **endra Jain in Journal of Maxillofacial and Oral Surgery (2010)

  15. No Access

    Chapter and Conference Paper

    Modeling and Verification of Inter Realm Authentication in Kerberos Using Symbolic Model Verifier

    In open distributed environment several users accesses the network resources on server, server will allow only authenticated users to access these resources. So it has become of prime importance for nodes comm...

    Punit Mundra, Madhavi Sharma, Shobhit Shukla in Trends in Computer Science, Engineering an… (2011)

  16. No Access

    Chapter and Conference Paper

    Modeling and Verification of Chess Game Using NuSMV

    Gaming industry has always relied on testing their product by playing it extensively. However, testers have their own limitations. When such a product is deployed, extreme gamers find those bugs that were over...

    Vikram Saralaya, J. K. Kishore, Sateesh Reddy in Advances in Computing and Communications (2011)

  17. No Access

    Chapter and Conference Paper

    Cloud Based Application Development for Mobile Devices for Accessing LBS

    A mobile device like a smart phone is becoming one of main information processing devices for users these days. Using it, a user not only receives and makes calls, but also performs information processing task...

    Keerthi S. Shetty, Sanjay Singh in Advances in Parallel Distributed Computing (2011)

  18. No Access

    Chapter and Conference Paper

    Logical Modeling and Verification of a Strength Based Multi-agent Argumentation Scheme Using NuSMV

    Software systems have evolved to the age of Artificial Intelligence (AI), consisting of independent autonomous agents interacting with each other in dynamic and unpredictable environments. In this kind of envi...

    Shravan Shetty, H. S. Shashi Kiran in Advances in Computer Science and Informati… (2011)

  19. No Access

    Chapter and Conference Paper

    Physical Layer Authentication in Wired and Wireless Communication Systems

    Authentication is the process by which it is verified that someone is who they claim they are. Authentication is a security service that checks the identity of the party at the other end of the line. Most of t...

    Chandra Mouli, Sanjay Singh in Advances in Digital Image Processing and I… (2011)

  20. No Access

    Chapter and Conference Paper

    Modeling and Verification of Server Aided Verification Protocol Using NuSMV

    Cryptographic algorithms are useful for signing and verifying the authenticity of sender of the message. The verifier may not have the required computational ability and relies on a powerful server to aid the ...

    Vikram Saralaya, Kishore J.K., Sateesh Reddy in Trends in Computer Science, Engineering an… (2011)

previous disabled Page of 10