Search

Results: 165
Tannin containing Unani drugs- A Review
Traditional systems of medicine like Unani medicines are known to be in service to mankind since time immemorial. The knowledge acquired over thousands of years has resulted in many effective means of ensuring health-care. These...
Published by: IJHS Medical Association
Tannin containing Unani drugs- A Review
Traditional systems of medicine like Unani medicines are known to be in service to mankind since time immemorial. The knowledge acquired over thousands of years has resulted in many effective means of ensuring health-care. These...
Published by: IJHS Medical Association
Hybrid Agile Approach: Efficiently Blending Traditional and Agile Methodologies
Rashmi Wankhede
Jan 01, 0001
Agile development, in its simplest form, offers a lightweight framework for helping teams, given a constantly evolving functional and technical landscape, maintain a focus on the rapid delivery of business value. Traditional...
Human Fall Detection Using Efficient Kernel and Eccentric Approach
Unintentional human falls are a very crucial problem in elderly people. If the fall goes unnoticed or undetected, it can lead to severe injuries and can even lead to death. Detecting falls as early as possible is very important...
Forest Optimization-Based Test Case Generation for Multiple Paths With Metamorphic Relations
In general multiple paths are covered by multiple runs which is a time consuming task. Now a days, metaheuristic techniques are widely used for path coverage. In order to reduce the time, an efficient method is proposed based on...
Ultrasonographic visualisation of anatomical variation of the medial cutaneous nerve of forearm and its depiction by the novel use of a custom computer program to generate 2D diagrams.
Cutaneous nerves display significant anatomical variation, and are therefore vulnerable to iatrogenic injury during various surgical procedures. High-resolution ultrasonography (USG) was used in this study to investigate this...
The static bike relocation problem with multiple vehicles and visits

This paper introduces the static bike relocation problem with multiple vehicles and visits, the objective of which is to rebalance at minimum cost the stations of a bike sharing system using a fleet of vehicles. The vehicles...

Study and Analysis of Various Cloud Security, Authentication, and Data Storage Models
In recent days, widespread acceptance of cloud data storage applications increases various privacy problems and security problems. Outsourced data security is considered the main confrontation for cloud clients because of data...
Exact solution of the single-machine scheduling problem with periodic maintenances and sequence-dependent setup times
The single-machine scheduling problem with periodic maintenances and sequence-dependent setup times aims at scheduling jobs on a single machine in which periodic maintenances and setups are required. The objective is the...
The static bike relocation problem with multiple vehicles and visits

This paper introduces the static bike relocation problem with multiple vehicles and visits, the objective of which is to rebalance at minimum cost the stations of a bike sharing system using a fleet of vehicles. The vehicles...

Comparison Between Offline and Online Distribution Practices for the Insurance Industry in India
Insurance has been the back bone of Indian society and economy. For India, a developing country, insurance does serve the need to a limited extent as social security practices are absent in India compared to foreign nations....
Process Optimization and NVA Reduction by Network Analysis and Resequencing
Anand Sunder
Jan 01, 2019
The article discusses a methodology to reduce cycle times through an algorithmic, analytical framework for sequential process flows. Studying process flow flexibility for reducing bottlenecks has always continued to open new...
Advances Image-Based Automated Security System
As security is a serious concern nowadays, it becomes important to develop a product that deals with security issues without any human intervention. Hence, an automatic security system is a proposed device that ensures the...
A Visual Saliency-Based Approach for Content-Based Image Retrieval
During the past two decades an enormous amount of visual information has been generated; as a result, content-based image retrieval (CBIR) has received considerable attention. In CBIR the image is used as a query to find the...
Advanced glycation end products modulate amyloidogenic APP processing and Tau phosphorylation

Advanced glycation end products (AGEs) are implicated in the pathology of Alzheimer's disease (AD), as they induce neurodegeneration following interaction with the receptor for AGE (RAGE). This study aimed to establish a...

Advanced glycation end products modulate amyloidogenic APP processing and Tau phosphorylation

Advanced glycation end products (AGEs) are implicated in the pathology of Alzheimer's disease (AD), as they induce neurodegeneration following interaction with the receptor for AGE (RAGE). This study aimed to establish a...

Exact solution of the single-machine scheduling problem with periodic maintenances and sequence-dependent setup times
The single-machine scheduling problem with periodic maintenances and sequence-dependent setup times aims at scheduling jobs on a single machine in which periodic maintenances and setups are required. The objective is the...
Forecasting of Electricity Demand by Hybrid ANN-PSO Models
Developing economies need to invest in energy projects. Because the gestation period of the electric projects is high, it is of paramount importance to accurately forecast the energy requirements. In the present paper, the...

|<

<

1

2

3

4

5

>

>|