Kirjojen hintavertailu. Mukana 11 244 527 kirjaa ja 12 kauppaa.

Kirjahaku

Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.

127 tulosta hakusanalla Brij Mohan

God

God

Brij Mohan Sharma

MAPLE PRESS PVT LTD
2022
pokkari
Riddled with the hunger epidemic and the evil practice of untouchability, Bengal faces appalling conditions. Amidst the suffering, starvation and death, society unites in snatching a victim from the jaws of untouchability, thereby giving him a dignified place amongst men. In doing so, humankind realises that sorrows end only in God's embrace. Thenceforth, history will stand witness as society conquerors all evils and triumphs over demonic forces.
Anti-Stress-Aktivität von RNH-12 (Arylsäure-Hydrazon-Derivat)

Anti-Stress-Aktivität von RNH-12 (Arylsäure-Hydrazon-Derivat)

Gaurav Kumar; Brij Mohan Sharma

Verlag Unser Wissen
2023
pokkari
Zielsetzung: Die vorliegende Studie wurde durchgef hrt, um die Anti-Stress-Wirkung von RNH-12 auf experimentell induzierten Stress bei Ratten zu untersuchen.Methodik: Die Anti-Stress-Wirkung wurde bei Stress, der durch K lteeinwirkung ausgel st wurde, und bei Stress, der durch Ausdauerschwimmen ausgel st wurde, untersucht. RNH-12 wurde oral in zwei verschiedenen Dosen von 40 und 60 mg/kg verabreicht. Withania somnifera, eine bekannte Anti-Stress-Formulierung (500 mg/kg p.o.), wurde als Standardmedikament verwendet.Ergebnisse: Beide Dosierungen von RNH-12 zeigten eine gute Anti-Stress-Wirkung in allen getesteten Tiermodellen. RNH-12 reduzierte die Entwicklung von Magengeschw ren, die durch K lteeinwirkung ausgel st wurden, und verhinderte die biochemischen Ver nderungen, die durch Ausdauerschwimmen und Ausdauerschwimmen ausgel st wurden, wie z. B. die Erh hung der Plasmaspiegel von Aspartat-Aminotransferase, Alanin-Aminotransferase, alkalischer Phosphatase, Glukose, Cholesterin und Cortiosol. RNH-12 war auch wirksam bei der Verl ngerung der Latenzzeit von durch anoxischen Stress ausgel sten Kr mpfen bei Ratten.Schlussfolgerung: Das Pr fpr parat RNH-12 besitzt in einer Dosierung von 40 und 60 mg/kg oral eine gute Anti-Stress-Aktivit t.
Activité anti-stress du RNH-12 (dérivé de l'hydrazone de l'acide arylique)

Activité anti-stress du RNH-12 (dérivé de l'hydrazone de l'acide arylique)

Gaurav Kumar; Brij Mohan Sharma

Editions Notre Savoir
2023
pokkari
Objectif: La pr sente tude a t entreprise pour valuer l'effet anti-stress du RNH-12 sur le stress exp rimental induit chez le rat.M thodologie: L'effet anti-stress a t valu sur le stress induit par la contention par le froid et sur le stress induit par l'endurance la nage. Le RNH-12 a t administr par voie orale deux doses diff rentes de 40 et 60 mg/kg. Withania somnifera, une formulation anti-stress connue (500 mg/kg p.o.) a t utilis e comme m dicament standard.R sultats: Les deux doses de RNH-12 ont montr un bon effet anti-stress dans tous les mod les animaux test s. Le RNH-12 a r duit le d veloppement d'ulc res gastriques induits par la contention par le froid et a emp ch les changements biochimiques induits par l'endurance la natation et le stress de l'endurance la natation, tels que l'augmentation des niveaux plasmatiques d'aspartate aminotransf rase, d'alanine aminotransf rase, de phosphatase alcaline, de glucose, de cholest rol et de Cortiosol. Le RNH-12 a galement t efficace pour augmenter la latence des convulsions induites par le stress anoxique chez le rat.Conclusion: Le m dicament exp rimental RNH-12 des doses de 40 et 60 mg/kg par voie orale poss de une bonne activit anti-stress.
Attività antistress di RNH-12 (derivato idrazonico dell'acido arilico)

Attività antistress di RNH-12 (derivato idrazonico dell'acido arilico)

Gaurav Kumar; Brij Mohan Sharma

Edizioni Sapienza
2023
pokkari
Obiettivo: Il presente studio stato intrapreso per valutare l'effetto antistress di RNH-12 sullo stress indotto sperimentalmente nel ratto.Metodologia: L'effetto antistress stato valutato sullo stress indotto dalla costrizione al freddo e sulla resistenza al nuoto. L'RNH-12 stato somministrato per via orale a due diverse dosi di 40 e 60 mg/kg. Come farmaco standard stata utilizzata la Withania somnifera, una nota formulazione antistress (500 mg/kg p.o.).Risultati: Entrambe le dosi di RNH-12 hanno mostrato un buon effetto antistress in tutti i modelli animali testati. L'RNH-12 ha ridotto lo sviluppo di ulcere gastriche indotte dalla costrizione al freddo e ha impedito i cambiamenti biochimici indotti dallo stress da resistenza al nuoto e dal nuoto di resistenza, come l'aumento dei livelli plasmatici di aspartato aminotransferasi, alanina aminotransferasi, fosfatasi alcalina, glucosio, colesterolo e cortiosolo. L'RNH-12 risultato efficace anche nell'aumentare la latenza delle convulsioni indotte dallo stress anossico nel ratto.Conclusioni: Il farmaco sperimentale RNH-12 alle dosi di 40 e 60 mg/kg per via orale possiede una buona attivit antistress.
Atividade anti-stress do RNH-12 (derivado de hidrazona de ácido arilo)

Atividade anti-stress do RNH-12 (derivado de hidrazona de ácido arilo)

Gaurav Kumar; Brij Mohan Sharma

Edicoes Nosso Conhecimento
2023
pokkari
Objetivo: O presente estudo foi realizado para avaliar o efeito anti-stress do RNH-12 no stress experimental induzido no rato.Metodologia: O efeito anti-stress foi avaliado no stress induzido pela restri o ao frio e no stress induzido pela resist ncia nata o. O RNH-12 foi administrado por via oral em duas doses diferentes de 40 e 60 mg/kg. Withania somnifera, uma formula o anti-stress conhecida (500 mg/kg p.o) foi utilizada como medicamento padr o.Resultados: Ambas as doses de RNH-12 mostraram um bom efeito anti-stress em todos os modelos animais testados. O RNH-12 reduziu o desenvolvimento de lceras g stricas induzidas pela conten o pelo frio e impediu as altera es bioqu micas induzidas pela resist ncia nata o e pelo stress da resist ncia nata o, como o aumento dos n veis plasm ticos de aspartato aminotransferase, alanina aminotransferase, fosfatase alcalina, glicose, colesterol e Cortiosol. O RNH-12 tamb m foi eficaz no aumento da lat ncia das convuls es induzidas pelo stress an xico no rato.Conclus es: O medicamento experimental RNH-12, nas doses de 40 e 60 mg/kg por via oral, possui uma boa atividade anti-stress.
Corrosion Preventive Materials and Corrosion Testing

Corrosion Preventive Materials and Corrosion Testing

S.K. Dhawan; Hema Bhandari; Gazala Ruhi; Brij Mohan Singh Bisht; Pradeep Sambyal

CRC Press
2021
nidottu
The book provides an extensive coverage of conjugated polymer based nano-composite coatings with advanced anti-corrosive properties. The book gives detailed explanation of corrosion testing methods and techniques to evaluate the corrosion resistance of the coatings. It includes elaborate discussion on classification of corrosion, electrochemistry of corrosion process, theories explaining the mechanism of corrosion and various corrosion testing standards. Electrochemical studies like open circuit potential (OCP) variation with time, potentiodynamic polarization, Electrochemical Impedance Spectroscopy (EIS) and accelerated corrosion testing are highlighted as important tools to extract information about the behavior of coatings under corrosive conditions. The book discusses epoxy-conjugated polymer based novel composite coating formulations, including aniline and o-toluidine, o-anisidine, phenetidine and pentafluoroaniline with appropriate fillers like SiO2, flyash, ZrO2 nanoparticles, and chitosan for the protection of metallic substrates. A general discussion on the self healing mechanism of epoxy-polypyrrole based biopolymer hybrid composite coatings is included in this book. This book provides a critical review on the conjugated polymer based composite coatings with superior corrosion resistance, good mechanical integrity, better adhesion properties and self healing ability under highly aggressive conditions which can be commercially used for the protection of metal substrates from corrosion.
Corrosion Preventive Materials and Corrosion Testing

Corrosion Preventive Materials and Corrosion Testing

S.K. Dhawan; Hema Bhandari; Gazala Ruhi; Brij Mohan Singh Bisht; Pradeep Sambyal

CRC Press
2020
sidottu
The book provides an extensive coverage of conjugated polymer based nano-composite coatings with advanced anti-corrosive properties. The book gives detailed explanation of corrosion testing methods and techniques to evaluate the corrosion resistance of the coatings. It includes elaborate discussion on classification of corrosion, electrochemistry of corrosion process, theories explaining the mechanism of corrosion and various corrosion testing standards. Electrochemical studies like open circuit potential (OCP) variation with time, potentiodynamic polarization, Electrochemical Impedance Spectroscopy (EIS) and accelerated corrosion testing are highlighted as important tools to extract information about the behavior of coatings under corrosive conditions. The book discusses epoxy-conjugated polymer based novel composite coating formulations, including aniline and o-toluidine, o-anisidine, phenetidine and pentafluoroaniline with appropriate fillers like SiO2, flyash, ZrO2 nanoparticles, and chitosan for the protection of metallic substrates. A general discussion on the self healing mechanism of epoxy-polypyrrole based biopolymer hybrid composite coatings is included in this book. This book provides a critical review on the conjugated polymer based composite coatings with superior corrosion resistance, good mechanical integrity, better adhesion properties and self healing ability under highly aggressive conditions which can be commercially used for the protection of metal substrates from corrosion.
Green Symbiotic Cloud Communications

Green Symbiotic Cloud Communications

H.D Mustafa; Shabbir N. Merchant; Uday B. Desai; Brij Mohan Baveja

Springer Verlag, Singapore
2017
sidottu
This book intends to change the perception of modern day telecommunications. Communication systems, usually perceived as “dumb pipes”, carrying information / data from one point to another, are evolved into intelligently communicating smart systems. The book introduces a new field of cloud communications. The concept, theory, and architecture of this new field of cloud communications are discussed. The book lays down nine design postulates that form the basis of the development of a first of its kind cloud communication paradigm entitled Green Symbiotic Cloud Communications or GSCC. The proposed design postulates are formulated in a generic way to form the backbone for development of systems and technologies of the future. The book can be used to develop courses that serve as an essential part of graduate curriculum in computer science and electrical engineering. Such courses can be independent or part of high-level research courses. The book will also be of interest to a widerange of readers including both scientific and non-scientific domains as it discusses innovations from a simplistic explanatory viewpoint.
Green Symbiotic Cloud Communications

Green Symbiotic Cloud Communications

H.D Mustafa; Shabbir N. Merchant; Uday B. Desai; Brij Mohan Baveja

Springer Verlag, Singapore
2018
nidottu
This book intends to change the perception of modern day telecommunications. Communication systems, usually perceived as “dumb pipes”, carrying information / data from one point to another, are evolved into intelligently communicating smart systems. The book introduces a new field of cloud communications. The concept, theory, and architecture of this new field of cloud communications are discussed. The book lays down nine design postulates that form the basis of the development of a first of its kind cloud communication paradigm entitled Green Symbiotic Cloud Communications or GSCC. The proposed design postulates are formulated in a generic way to form the backbone for development of systems and technologies of the future. The book can be used to develop courses that serve as an essential part of graduate curriculum in computer science and electrical engineering. Such courses can be independent or part of high-level research courses. The book will also be of interest to a wide range of readers including both scientific and non-scientific domains as it discusses innovations from a simplistic explanatory viewpoint.
Smart Card Security

Smart Card Security

Brij B. Gupta; Megha Quamara

CRC Press
2019
sidottu
Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it. It covers the origin of smart cards, types of smart cards, and how they work. It discusses security attacks associated with hardware, software, data, and users that are a part of smart card–based systems.The book starts with an introduction to the concept of smart cards and continues with a discussion of the different types of smart cards in use today, including various aspects regarding their configuration, underlying operating system, and usage. It then discusses different hardware- and software-level security attacks in smart card–based systems and applications and the appropriate countermeasures for these security attacks. It then investigates the security attacks on confidentiality, integrity, and availability of data in smart card–based systems and applications, including unauthorized remote monitoring, communication protocol exploitation, denial of service (DoS) attacks, and so forth, and presents the possible countermeasures for these attacks.The book continues with a focus on the security attacks against remote user authentication mechanisms in smart card–based applications and proposes a possible countermeasure for these attacks. Then it covers different communication standards for smart card–based applications and discusses the role of smart cards in various application areas as well as various open-source tools for the development and maintenance of smart card–based systems and applications. The final chapter explains the role of blockchain technology for securing smart card–based transactions and quantum cryptography for designing secure smart card–based algorithms.Smart Card Security: Applications, Attacks, and Countermeasures provides you with a broad overview of smart card technology and its various applications.
Cross-Site Scripting Attacks

Cross-Site Scripting Attacks

Brij B. Gupta; Pooja Chaudhary

CRC Press
2020
sidottu
Social network usage has increased exponentially in recent years. Platforms like Facebook, Twitter, Google+, LinkedIn and Instagram, not only facilitate sharing of personal data but also connect people professionally. However, development of these platforms with more enhanced features like HTML5, CSS, XHTML and Java Script expose these sites to various vulnerabilities that may be the root cause of various threats. Therefore, social networking sites have become an attack surface for various cyber-attacks such as XSS attack and SQL Injection. Numerous defensive techniques have been proposed, yet with technology up-gradation current scenarios demand for more efficient and robust solutions. Cross-Site Scripting Attacks: Classification, Attack, and Countermeasures is a comprehensive source which provides an overview of web-based vulnerabilities and explores XSS attack in detail. This book provides a detailed overview of the XSS attack; its classification, recent incidences on various web applications, and impacts of the XSS attack on the target victim. This book addresses the main contributions of various researchers in XSS domain. It provides in-depth analysis of these methods along with their comparative study. The main focus is a novel framework which is based on Clustering and Context based sanitization approach to protect against XSS attack on social network. The implementation details conclude that it is an effective technique to thwart XSS attack. The open challenges and future research direction discussed in this book will help further to the academic researchers and industry specific persons in the domain of security.
Internet of Things Security

Internet of Things Security

Brij B. Gupta; Megha Quamara

CRC Press
2020
sidottu
The Internet of Things (IoT), with its technological advancements and massive innovations, is building the idea of inter-connectivity among everyday life objects. With an explosive growth in the number of Internet-connected devices, the implications of the idea of IoT on enterprises, individuals, and society are huge. IoT is getting attention from both academia and industry due to its powerful real-time applications that raise demands to understand the entire spectrum of the field. However, due to increasing security issues, safeguarding the IoT ecosystem has become an important concern. With devices and information becoming more exposed and leading to increased attack possibilities, adequate security measures are required to leverage the benefits of this emerging concept.Internet of Things Security: Principles, Applications, Attacks, and Countermeasures is an extensive source that aims at establishing an understanding of the core concepts of IoT among its readers and the challenges and corresponding countermeasures in the field.Key features: Containment of theoretical aspects, as well as recent empirical findings associated with the underlying technologies Exploration of various challenges and trade-offs associated with the field and approaches to ensure security, privacy, safety, and trust across its key elements Vision of exciting areas for future research in the field to enhance the overall productivityThis book is suitable for industrial professionals and practitioners, researchers, faculty members, and students across universities who aim to carry out research and development in the field of IoT security.
A Beginner’s Guide to Internet of Things Security

A Beginner’s Guide to Internet of Things Security

Brij B. Gupta; Aakanksha Tewari

CRC Press
2020
sidottu
A Beginner’s Guide to Internet of Things Security focuses on security issues and developments in the Internet of Things (IoT) environment. The wide-ranging applications of IoT, including home appliances, transportation, logistics, healthcare, and smart cities, necessitate security applications that can be applied to every domain with minimal cost. IoT contains three layers: application layer, middleware layer, and perception layer. The security problems of each layer are analyzed separately to identify solutions, along with the integration and scalability issues with the cross-layer architecture of IoT. The book discusses the state-of-the-art authentication-based security schemes, which can secure radio frequency identification (RFID) tags, along with some security models that are used to verify whether an authentication scheme is secure against any potential security risks. It also looks at existing authentication schemes and security models with their strengths and weaknesses. The book uses statistical and analytical data and explains its impact on the IoT field, as well as an extensive literature survey focusing on trust and privacy problems.The open challenges and future research direction discussed in this book will help to further academic researchers and industry professionals in the domain of security.Dr. Brij B. Gupta is an assistant professor in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India. Ms. Aakanksha Tewari is a PhD Scholar in the Department of Computer Engineering, National Institute of Technology, Kurukshetra, India.
Secure Searchable Encryption and Data Management
With the advent of the IT revolution, the volume of data produced has increased exponentially and is still showing an upward trend. This data may be abundant and enormous, but it’s a precious resource and should be managed properly. Cloud technology plays an important role in data management.Storing data in the cloud rather than on local storage has many benefits, but apart from these benefits, there are privacy concerns in storing sensitive data over third-party servers. These concerns can be addressed by storing data in an encrypted form; however, while encryption solves the problem of privacy, it engenders other serious issues, including the infeasibility of the fundamental search operation and a reduction in flexibility when sharing data with other users, amongst others. The concept of searchable encryption addresses these issues. This book provides every necessary detail required to develop a secure, searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models to ensure the minimum security requirements for real-world applications.