Browsing by Title

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 3573 to 3592 of 4328 < previous   next >
Issue DateTitleAuthor(s)
Dec-2022Screening and identification of cell death and mitophagy-inducing phytochemicals from Bacopa monnieri extract against oral cancer cellsMishra, Soumya Ranjan; Bhutia, Sujit kumar
Jan-2020Screening of Abdominal Aortic Aneurysms based on Machine Learning ApproachBajhaiya, Deepak; Babu, Anju R
Aug-2013Screening of biogenic amine production by lactobacillus SPP. And development of functional food, tea curdSahoo, M; Sahoo, B; Dash, I; Ajay, D; Jayabalan, R
2002Scrubbing of Fly-Ash Laden SO2 in Modified Multistage Bubble Column ScrubberMeikap, B C; Kundu, G; Biswas, M N
Feb-2016SDN Architecture on Fog Devices for Realtime Traffic Management: A Case StudySahoo, K S; Sahoo, B
Aug-2017Sea Level Anomalies Variability During Contrasting Summer Monsoon Seasons Over Bay of BengalVissa, Naresh Krishna; Gulakaram, Venkata Sai; Bhaskaran, Prasad Kumar
Feb-2015Sea Water Ageing of GFRP Composites and the Dissolved SaltsChakraverty, A P; Mohanty, U K; Mishra, S C; Satapathy, A
Jun-2017Sea Water as A Tool to Reduce Biofuel’s Thirst for WaterJayabalan, R
Mar-2017Sea water corrosion behavior of plasma sprayed abradable coatingsParida, M; Nanda, S P; Mishra, S C
1983A second law analysis of the concentric tube heat exchanger: optimisation of wall conductivityChowdhury, K; Sarangi, S K
Oct-2009Second Law based Optimisation of Crossflow Plate -fin Heat Exhcnager Design using Genetic AlgorithmMishra, M; Das, P K; Sarangi, S K
2009Second order difference based detection and directional weighted median filter for removal of random valued impulsive noiseSa, Pankaj K; Dash, R; Majhi, B
Jan-2023A second order optimal hybrid scheme for singularly perturbed semilinear parabolic problems with interior layersPriyadarshana, S.; Mohapatra, J.
Dec-2011A Secure and EfficientMessage Authentication Protocol for VANETs with Privacy PreservationMishra, B; Panigrahy, S K; Tripathy, T C; Jena, D; Jena, S K
2009A Secure AODV Routing Scheme with Reduced Data Packet Delay in MANETMishra, Alekha Kumar; Sahoo, Bibhudatta
2002Secure Database Design, A comparison of Object database vs. Relational Database Security at SQL levelSahoo, Bibhudatta; Balaram Prasad, M
Mar-2010A Secure e-Shopping Using Voice OrderingPanigrahy, S K; Jena, D; Jena, S K
Mar-2019A Secure Key Management and Authentication Protocol for Virtualized-BBU in C-RAN ArchitectureYadav, Awaneesh Kumar; Mahapatra, Byomakesh; Turuk, Ashok Kumar
May-2017Secure Key-distribution in IoT Cloud NetworksMoharana, Soumya Ranjan; Addya, Sourav Kanti; Satpathy, Anurag; Turuk, Ashok Kumar; Majhi, Banshidhar; Jha, V K
Feb-2018A Secure Lightweight Mutually Authenticated Radio Frequency Identification (RFID) ProtocolKumar, Varinder; Mohanty, Sujata