oalib

Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99

Submit

Any time

2019 ( 142 )

2018 ( 288 )

2017 ( 313 )

2016 ( 388 )

Custom range...

Search Results: 1 - 10 of 138709 matches for " Bhoomi K. Thakore "
All listed articles are free for downloading (OA Articles)
Page 1 /138709
Display every page Item
Racial Exclusion in the Online World
Rebecca J. West,Bhoomi K. Thakore
Future Internet , 2013, DOI: 10.3390/fi5020251
Abstract: As the internet has become an integral part of everyday life, it is understood that patterns of racial stereotyping and discrimination found in the offline world are often reproduced online. In our paper, we examine two exclusionary practices in an online environment for adult toy collectors: First, the exclusion of non-white individuals who are expected to form immediate friendships with other non-white members; and second, the essentializing of racial issues when concerns over the lack of racial diversity in the toys are discussed. This dismissal is often directly connected to non-white members’ decisions to no longer participate, resulting in a new form of segregation within virtual space.
Yield Enhancement Strategies for Enhancement of Indole Alkaloids in Hairy Root Cultures of Catharanthus Roseus
D. Thakore,A. K. Srivastava,A. K. Sinha
International Journal of Chemical Engineering and Applications , 2013, DOI: 10.7763/ijcea.2013.v4.283
Abstract: Late exponential phase of hairy root cultures of Catharanthus roseus cultivated in a statistically optimized medium were treated with permeabilizing agents (DMSO, Triton X-100, n-hexadecane and Tween 80) to establish the effect of their concentrations and exposure time on the biomass and major alkaloid(ajmalicine) yield & productivity. The permeabilizing agents TritonX-100(0.1% v/v) and nhexadecane( 2%v/v) led to 98% increase in the specific yield of ajmalicine in the roots. Statistical techniques were used to determine the significance of various treatments and their response on the yield of the secondary metabolite. Both DMSO and Triton X-100 were found to be useful in effluxing ajmalicine into the medium resulting in a 12 fold and 16 fold increase respectively. The viability assay revealed the tolerance of the roots to all permeabilizing agents but tween 80.It can be concluded from the studies that permeabilizing factors were highly instrumental in enhancing the biomass and alkaloid concentrations and rates during the propagation of hairy root cultivation of Catharanthus roseus. Such a protocol of application of non lethal permeabilizing agents to leach out the key plant secondary metabolites can be extended to mass scale hairy root cultivation.
IMPLEMENTATION OF NORMLIZED CUT ALGORITHAM FOR IMAGE SEGMENTATION
Hardik K Patel,Darshak G Thakore,Mahasweta Joshi?
International Journal of Computer Science and Mobile Computing , 2013,
Abstract: Image Segmentation is an important image processing technique which is used to analyse colour,texture etc. Image Segmentation is used to separate an image into several “meaningful” parts. Normalizedcut (Ncut) is based on graph cut technique to solve the image Segmentation problems. Rather than justfocusing on local features and their consistencies, Ncut consider the global impression of an image. We haveapplied Ncut algorithm, on many images and successfully segmented the images into meaningful parts.
STABILITY INDICATING HPLC METHOD DEVELOPMENT: A REVIEW
Bhoomi P. Shah*, Suresh Jain, Krishna K. Prajapati and Nasimabanu Y. Mansuri
International Journal of Pharmaceutical Sciences and Research , 2012,
Abstract: High performance liquid chromatography is one of the most accurate methods widely used for the quantitative as well as qualitative analysis of drug product and is used for determining drug product stability. Stability indicating HPLC methods are used to separate various drug related impurities that are formed during the synthesis or manufacture of drug product. This article discusses the strategies and issues regarding the development of stability indicating HPLC system for drug substance. A number of key chromatographic factors were evaluated in order to optimize the detection of all potentially relevant degradants. The method should be carefully examined for its ability to distinguish the primary drug components from the impurities. New chemical entities and drug products must undergo forced degradation studies which would be helpful in developing and demonstrating the specificity of such stability indicating methods. At every stage of drug development practical recommendations are provided which will help to avoid failures.
Collective Modes and Elastic Constants of Liquid Al83Cu17 Binary Alloy

B Y Thakore,S G Khambholja,P H Suthar,N K Bhatt,A R Jani,

中国物理快报 , 2010,
Abstract:
Thermodynamic Properties of ZnO With in Mie-Grüneisen Hypothesis
A.D. Patel,S.G. Khambholja,N.K. Bhatt,B.Y. Thakore
Journal of Nano- and Electronic Physics , 2011,
Abstract: Zink oxide (mineral name: Zincite) is an attractive wide band gap semiconductor due to its large number of industrial applications such as in the production of solar cells, liquid-crystal displays, electrochromic devices, LED, as well as adhesive taps, automobile tires, ceramics, glass, varistors, etc. It is due to versatile nature of ZnO, in we have studied its thermal properties at high temperatures. Theoretically, complete ab initio investigations at elevated temperatures are restricted due largely to computational complexity of many-body nature. We have therefore used an consistent iterative scheme to include thermal effect by combining the universal equation of state (UEOS) to the Mie-Gruneisen hypothesis. It is demonstrated that from the knowledge of cohesive properties at ambient condition various thermodynamic properties can be predicted at finite temperatures and pressures. For example, presently calculated relative volume-thermal expansions, static EOS are in good accordance with experimental results.
A Simulations Study of the Muon Response of the Iron Calorimeter Detector at the India-based Neutrino Observatory
Animesh Chatterjee,Meghna K. K.,Kanishka Rawat,Tarak Thakore,Vipin Bhatnagar,R. Gandhi,D. Indumathi,N. K. Mondal,Nita Sinha
Physics , 2014, DOI: 10.1088/1748-0221/9/07/P07001
Abstract: The magnetised Iron CALorimeter detector (ICAL), proposed to be built at the India-based Neutrino Observatory (INO), is designed to study atmospheric neutrino oscillations. The ICAL detector is optimized to measure the muon momentum, its direction and charge. A GEANT4-based package has been developed by the INO collaboration to simulate the ICAL geometry and propagation of particles through the detector. The simulated muon tracks are reconstructed using the Kalman Filter algorithm. Here we present the first study of the response of the ICAL detector to muons using this simulations package to determine the muon momentum and direction resolutions as well as their reconstruction and charge identification efficiencies. For 1-20 GeV/c muons in the central region of the detector, we obtain an average angle-dependent momentum resolution of 9-14%, an angular resolution of about a degree, reconstruction efficiency of about 80% and a correct charge identification of about 98%.
Simulation and Analysis of Reciever-Receiver Time Synchronization in Wireless Sensor Networks
Shashank Bholane,Devendrasingh Thakore
International Journal of Computer Technology and Applications , 2012,
Abstract: Wireless sensor networks were initially deployed for military applications. Gradually researchers found them to be very useful in applications like weather monitoring, target tracking, agriculture, industrial applications, and recently smart homes and kindergartens. All the WSN applications need partial or full time synchronization. Applications like acoustic ranging, target tracking or monitoring need a common notion of time. Every data is time stamped sensor nodes local clock. Two main approaches to time synchronization are receiver-receiver synchronization and sender-receiver synchronization. In this paper we analyze the receiver-receiver synchronization and discuss the results of simulation in network simulator. This study, design considerations and simulation methodology will help a lot to the designer for designing a time synchronization scheme or system.
An Approach for Extracting the Keyword Using Frequency and Distance of the Word Calculations
Ashwini Madane,Devendra Thakore
International Journal of Soft Computing & Engineering , 2012,
Abstract: A significant word used in indexing or cataloguing is regarded as a Keyword. Keywords provide a concise and precise high-level summarization of a document. They therefore constitute an important feature for document retrieval, classification, topic search and other tasks even if full text search is available. Keywords are useful tools as they give the shortest summary of the document. A keyword is identified by finding the relevance of the word with or without prior vocabulary of the document or the web page. Extracting keywords manually is an extremely difficult and time consuming process, therefore it is almost impossible to extract keywords manually even for the articles published in a single conference. Therefore there is a need for automated process that extracts keywords from documents. This paper concentrates on the extracting the keywords by understanding the linguistic, non-linguistic and various other approaches but applying the simple statistics approach.
A Framework: Secure Data Aggregation In Wireless Sensor Networks
VIMAL PAMBHAR, BHOOMI BANGORIA, BHAVIK KATARIA
International Journal of Advanced Research in Electrical, Electronics and Instrumentation Engineering , 2013,
Abstract: Wireless Sensor Networks (WSNs) are used in many applications in the area of tracking and monitoring. WSNs have many constraints like low computational power, small memory, and limited energy resources. Most of the energy consumption is due to data transmission. For that we apply Data aggregation approach on the sensed data by the deployed sensor nodes. This approach helps to reduce the number of transmissions and improves the life time of wireless sensor network with less energy usage of sensor nodes and also to protect Data Aggregation process from various kinds of attacks becomes extremely critical. So we give some general framework for Secure Data Aggregation.
Page 1 /138709
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.