V. Singhal
YOU?
Author Swipe
View article: Testing a large size triple GEM detector for the first station of the CBM-Muon Chambers with a high-intensity gamma source at GIF++ under large-area illumination
Testing a large size triple GEM detector for the first station of the CBM-Muon Chambers with a high-intensity gamma source at GIF++ under large-area illumination Open
The physics studies at heavy-ion nucleus-nucleus collision experiments demand reliable detectors at high particle flux. Therefore, Gas Electron Multipliers (GEM) detectors, which show resilience to extreme radiation, are one of the prime c…
View article: Effect of herbal extracts and Saroglitazar on high-fat diet-induced obesity, insulin resistance, dyslipidemia, and hepatic lipidome in C57BL/6J mice
Effect of herbal extracts and Saroglitazar on high-fat diet-induced obesity, insulin resistance, dyslipidemia, and hepatic lipidome in C57BL/6J mice Open
We evaluated the effects of select herbal extracts (Tinospora cordifolia [TC], Tinospora cordifolia with Piper longum [TC + PL], Withania somnifera [WS], Glycyrrhiza glabra [GG], AYUSH-64 [AY-64], and Saroglitazar [S]) on various parameter…
View article: Cast Index as a Tool for Predicting Re-displacement after Closed Reduction and Cast Immobilization in Forearm Fractures in the Pediatric Age Group
Cast Index as a Tool for Predicting Re-displacement after Closed Reduction and Cast Immobilization in Forearm Fractures in the Pediatric Age Group Open
Objectives Forearm fractures are very common in all age groups. 81% of forearm fractures happen in children aged above 5 years with the peak of incidence between 9 and 12 years in females and 12 and 15 years in males. In children aged >9 y…
View article: A Novel Approach for Enhancement of Blowfish Algorithm by using DES, DCT Methods for Providing, Strong Encryption and Decryption Capabilities
A Novel Approach for Enhancement of Blowfish Algorithm by using DES, DCT Methods for Providing, Strong Encryption and Decryption Capabilities Open
Data safety has evolved into a critical requirement and a duty in modern life. Most of our systems are designed in such a way that it can get hacked, putting our private information at danger. As a result, for numerous safety motives, we u…
View article: Data Encryption Technique based on Enhancement of Blowfish Algorithm in Comparison of DES and DCT Methods
Data Encryption Technique based on Enhancement of Blowfish Algorithm in Comparison of DES and DCT Methods Open
The International Scientific Research Organization for Science, Engineering and Technology (ISROSET) is a Non-Profit Organization; The ISROSET is dedicated to improvement in academic sectors of Science (Chemistry, Bio-chemistry, Zoology, B…
View article: Percutaneous Transpedicular Vertebroplasty using Calcium Phosphate Cement for Osteoporotic Vertebral Fractures
Percutaneous Transpedicular Vertebroplasty using Calcium Phosphate Cement for Osteoporotic Vertebral Fractures Open
Context: Vertebral compression fractures are the most common osteoporotic fracture in old age group causing incapacitating pain and producing significant disability. Approximately one-third of these patients do not respond to traditional c…
View article: Student Grade Prediction by using Machine Learning Methods and Data Analytics Techniques
Student Grade Prediction by using Machine Learning Methods and Data Analytics Techniques Open
The International Scientific Research Organization for Science, Engineering and Technology (ISROSET) is a Non-Profit Organization; The ISROSET is dedicated to improvement in academic sectors of Science (Chemistry, Bio-chemistry, Zoology, B…
View article: Development and implementation of a time-based signal generation scheme for the muon chamber simulation of the CBM experiment at FAIR
Development and implementation of a time-based signal generation scheme for the muon chamber simulation of the CBM experiment at FAIR Open
The Compressed Baryonic Matter~(CBM) experiment in the upcoming Facility for Antiproton and Ion Research~(FAIR), designed to take data in nuclear collisions at very high interaction rates of up to 10 MHz, will employ a free-streaming data …
View article: Literature Review on Improving Data Security using DES and DCT
Literature Review on Improving Data Security using DES and DCT Open
International Journal of Computer Sciences and Engineering (A UGC Approved and indexed with DOI, ICI and Approved, DPI Digital Library) is one of the leading and growing open access, peer-reviewed, monthly, and scientific research journal …
View article: Offline Handwritten Hindi Word Recognition
Offline Handwritten Hindi Word Recognition Open
There are few approaches to character distinguishing proof.Basic stages of character recognition incorporate pre-processing, segmentation, features extraction and classification of features.A few classification techniques have been talked …
View article: Improved machine learning-driven patient health prediction system
Improved machine learning-driven patient health prediction system Open
In the healthcare industry, the ability to accurately forecast a patient's health status is critical. With the growing availability of patient data and the advancement of machine learning techniques, there is a growing interest in using ma…
View article: STUDY OF ROAD TRAFFIC ACCIDENT CASES REPORTED IN A TERTIARY CARE HOSPITAL IN VINDHYA REGION OF M.P. WITH THE USE OF WHO/CDC INJURY SURVEILLANCE SYSTEM
STUDY OF ROAD TRAFFIC ACCIDENT CASES REPORTED IN A TERTIARY CARE HOSPITAL IN VINDHYA REGION OF M.P. WITH THE USE OF WHO/CDC INJURY SURVEILLANCE SYSTEM Open
INTRODUCTION
\nAccidental trauma in general and road traffic accidents in particular can be rightly termed as “invited disease of modern society”.
\nRoad traffic accidents are both predictable and preventable. Our aim for this study is t…