全部文献期刊学位论文会议报纸专利标准年鉴图书|学者科研项目
中外文文献  中文文献  外文文献
作者:Manoj Kumar , Ranjeet Kumar Singh , Rakesh Kapoor
来源:[J].Indian Journal of Surgery(IF 0.092), 2016, Vol.78 (1), pp.66-67Springer
摘要:Abstract(#br)A 44-year-old female presented with the history of recurrent UTI and intermittent hematuria. She underwent augmentation ileocystoplasty for small capacity bladder 19 years back. Patient was on clean intermittent catheterization (CIC) since then. Abdominal radiograph ...
作者:Ranjeet Kumar Singh , Kumar Hemant Singh
来源:[J].International Journal of Rock Mechanics and Mining Sciences(IF 1.2), 2018, Vol.107, pp.261-270Elsevier
摘要:Abstract(#br)In an undisturbed state, a stress field present in the earth consists of virgin stress in the rock. A change in this stress occurs due to drilling the borehole and disturbing the original stress by either introducing drilling fluids or by getting reservoir flow in th...
作者:Ganesh Chalavadi , Ranjeet Kumar Singh , Avimanyu Das
来源:[J].International Journal of Mineral Processing(IF 1.378), 2016, Vol.149, pp.9-17Elsevier
摘要:Abstract(#br)Dry beneficiation of fine coal was investigated using air fluidization in a vibrating air table. A systematic study based on a response surface method of experimentation revealed the features of separation. The ash content of the − 1.0 mm coal feed was reduced f...
作者:Ranjeet Kumar Singh , Avimanyu Das
来源:[J].Fuel Processing Technology(IF 2.816), 2013, Vol.115, pp.71-78Elsevier
摘要:Abstract(#br)Beneficiation of fine coal of size 300 × 150 μm was investigated in a laboratory Kelsey jig. A number of process variables were studied while others were kept constant. Silica sand of size − 1.68 + 0.85 mm was used as ragging material to prevent pegging of the i...
作者:Ranjeet Kumar Singh , Binod Kumar ...
来源:[J].Journal of King Saud University - Computer and Information Sciences, 2018Elsevier
摘要:Abstract(#br)Informal availability of Internet and easy accessibility of network resources to a general public has created a new era of security design challenge for multimedia contents which is available in the form of image, text, video and audio etc. This paper presents a nove...
作者:Ranjeet Kumar Singh , Dilip Kumar Shaw , M. Javed Alam
来源:[J].Procedia Computer Science, 2015, Vol.54, pp.612-620Elsevier
摘要:Abstract(#br)Now a day information security is the biggest issue of social network. there are numerous technique are available for image and data security, watermarking is one of them. Digital watermarking is a way which is used to verify and authenticate the texts, image, video ...
作者:Ranjeet Kumar Singh , Dillip Kumar Shaw ...
来源:[J].Journal of Information and Optimization Sciences, 2018, Vol.39 (1), pp.67-81Taylor & Francis
摘要:Abstract(#br)In this paper a novel image based data security and authentication based, image watermarking scheme that combines the discrete wavelet transform (DWT) and Singular value decomposition (SVD) is proposed. This paper explains a dual watermarking scheme with different al...
作者:Ranjeet Kumar Singh , Dillip Kumar Shaw , Jayakrushna Sahoo
来源:[J].Journal of Information and Optimization Sciences, 2017, Vol.38 (6), pp.911-925Taylor & Francis
摘要:Abstract(#br)Now days, the protection of digital data in multimedia communication, in the form of image, text, video and audio has become an important problem because it can be copied and modified easily. Therefore, with the rapid development of the network multimedia systems, co...

我们正在为您处理中,这可能需要一些时间,请稍等。

资源合作:cnki.scholar@cnki.net, +86-10-82896619   意见反馈:scholar@cnki.net

×