oalib

OALib Journal期刊

ISSN: 2333-9721

费用:99美元

投稿

时间不限

( 2023 )

( 2022 )

( 2020 )

( 2019 )

自定义范围…

匹配条件: “ Vikrant Saluja” ,找到相关结果约203条。
列表显示的所有文章,均可免费获取
第1页/共203条
每页显示
Biosimilars: an overview
Bhupinder Singh Sekhon, Vikrant Saluja
Biosimilars , 2011, DOI: http://dx.doi.org/10.2147/BS.S16120
Abstract: iosimilars: an overview Expert Opinion (11192) Total Article Views Authors: Bhupinder Singh Sekhon, Vikrant Saluja Published Date March 2011 Volume 2011:1 Pages 1 - 11 DOI: http://dx.doi.org/10.2147/BS.S16120 Bhupinder Singh Sekhon, Vikrant Saluja Institute of Pharmacy, PCTE Group of Institutes, Near Baddowal Cantt. (Ludhiana), India Abstract: “Biologics”, considered one of the fastest growing sectors of the pharmaceutical industry, has introduced many new treatments to life-threatening and rare illnesses. The first generation of biopharmaceutical products manufactured using recombinant technologies was launched in the 1980s, and they are now on the way to patent expiration. As a result, research-based and generic pharmaceutical companies alike are pursuing the opportunity to develop “generic” substitutes for original biologics, herein referred to as biosimilars. However, the process of introducing a biosimilar to an innovator product is far more complex than the relatively straightforward process of introducing a generic equivalent to an innovator product based on a new chemical entity. Biologics are produced by cells in culture or whole organisms, which are inherently more variable than chemical synthesis methods. Therefore, unlike generic pharmaceuticals, it is impossible to generate the same or identical copy of an innovator product. In this way, biosimilars are “similar but not the same” or in other words biosimilars are “the twin but not the clone” to the original biologic innovator product. Therefore the field of biosimilars presents several important challenges, including i) verification of the similarity, ii) the interchangeability of biosimilars and innovator products, iii) the possible need for unique naming to differentiate the various biopharmaceutical products, iv) regulatory framework, v) commercial opportunities as well as guidelines to assist manufacturers in product development, vi) intellectual property rights, and vii) public safety.
DISTRIBUTED SOURCE RATE LIMITING MECHANISM FOR WIRELESS MESH NETWORK
Navdeep Saluja
Journal of Global Research in Computer Science , 2011,
Abstract: Wireless Mesh Networks (WMNs) built with commodity 802.11 radios are a cost-effective means of providing last mile broadband Internet access. Their multi-hop architecture allows for rapid deployment and organic growth of these networks. In this paper we focus on fair rate allocation requirements. Our approach does not require any changes to individual mesh routers. Further, it uses existing data traffic as capacity probes, thus incurring a zero control traffic overhead. We propose the mechanism based on this approach on aggregate rate control (ARC). ARC limits the aggregate capacity of a network to the sum of fair rates for a given set of flows. We show that the resulting rate allocation achieved approximately max-min fair. We show how it can be used to achieve weighted flow rate fairness. Our comparative analysis show that our mechanisms improve fairness indices when compared with networks without any rate limiting, and are approximately equivalent to results achieved with distributed source rate limiting mechanisms that require software modifications on all mesh routers
Bitcoin—Upsides, Downsides and Bone of Contention—A Deep Dive  [PDF]
Awadhesh Pratap Singh, Vikrant Kulkarni
Theoretical Economics Letters (TEL) , 2019, DOI: 10.4236/tel.2019.95089
Abstract: The purpose of this study is to perform a systematic literature review on Bitcoin and unveil its upsides, downside and divergent views from previous studies. The paper presents a systematic literature review of key studies published on Bitcoin between 2008 and 2019. The focus is given to three topics: benefits of Bitcoin; its shortcomings; and divergent views presented by previous cryptocurrency scholars in details. The results indicate that Bitcoin offers four key benefits—its acceptance as a digital currency, effective portfolio diversifier, hedging capabilities and higher security. Literature review revealed five major shortcomings of Bitcoin—weak substitute for traditional currency, higher volatility, idiosyncratic risks, uncertain regulatory impact and its exogenous supply. Finally, the review reveals three major areas wherein cryptocurrency scholars found to have divergent view—acceptance of its hedging capabilities across regions and portfolios, consensus on Bitcoin as highly secured and safe asset and, general acceptance of Bitcoin as a substitute of traditional currencies.
Hand, foot and mouth disease in Nagpur
Saoji Vikrant
Indian Journal of Dermatology, Venereology and Leprology , 2008,
Abstract: Hand, foot and mouth disease (HFMD) is a viral infection of children caused by Coxsackie virus-A16, a type of enterovirus closely related with the virus that causes herpangina. Although seen worldwide, it is not common in India. Hand, foot and mouth disease is sporadically reported from India as a mild illness. This report describes four cases of HFMD from Nagpur, Central India, seen between September 2005 and April 2006. All patients presented with a mild febrile prodrome followed by the appearance of aphthous-like oral ulcers and vesicular lesions on the hands and feet. All cases were clinically diagnosed. Coxsackie virus A16 was isolated from the serum of one of the patients. All the patients were in the age group of 3-5 years from different schools. It was a mild illness and all the four patients recovered without any complication. There were no secondary cases in the families.
Premature ovarian failure due to cyclophosphamide: A report of four cases in dermatology practice
Saoji Vikrant
Indian Journal of Dermatology, Venereology and Leprology , 2008,
Abstract: Immunosuppressant drugs like cyclophosphamide are used in the treatment of a variety of skin disorders. Though it is a very useful drug, it has some serious side-effects. Prolonged amenorrhea due to premature ovarian failure leading to infertility is one of the serious side-effects of cyclophosphamide. Four cases of cyclophosphamide-induced premature ovarian failure are presented. Two patients of scleroderma, one patient of pemphigus and one patient of hypersensitivity vasculitis developed amenorrhea due to premature ovarian failure leading to infertility after receiving cyclophosphamide 50 mg OD for eight months to one year. The ages of these patients ranged from 28-38 years. All these patients had good improvement of their disease with cyclophosphamide. These patients did not experience any other side-effects and their routine blood and urine tests were normal. There were no spontaneous menses during the follow-up period of one to two years. Because of the serious risk of developing premature ovarian failure, cyclophosphamide should be avoided in those patients where the family is not complete.
Consumer Perceived Value of International Networked Services: An Exploratory Study of the Case of an Airline Alliance
Vikrant Janawade
International Business Research , 2012, DOI: 10.5539/ibr.v6n2p20
Abstract: For the past few decades airline alliance has been a talk among the airline industry researchers and practitioners alike. Airline alliances have revolutionalised airline industry and are largely seen as a group of cherry picked culturally diverse international airlines, with an aim to reduce their operating costs and increase their market shares in regions where they can’t freely operate. The significance of multi-lateral airline alliances and the benefits derived by the members that forge an alliance have regularly featured in strategic alliance literature. Researchers have shed light on the strategic alliance’s operations, their revenue management and human resource management. However, with respect to marketing strategies of an airline alliance, to date, researchers have not addressed consumer perceptions of value gained by using the services offered by a multi-lateral airline alliance. Therefore, this paper aims to understand the attributes of consumer perceived value of an airline alliance and the services which influence consumers to form attributes of consumer’s perceived value of an airline alliance.
Microscopic Studies on Lens Esculenta
Vikrant Arya
Journal of Pharmacognosy and Phytochemistry , 2012,
Abstract: Microscopic analysis of a crude drug facilitate the researchers for appropriate identification of a drug and abolish adulteration and provide a basis for authentication of crude drug. The present investigation involves the plant drug Lens esculenta Moench. belonging to family Papilionaceae. It is cultivated as a pulse crop. Even though the plant has captured scientific emphasis recently, there is a need for standardization. Hence in present work the seed part of the plant is subjected to various microscopic assessments. In the microscopic studies different cell structure and arrangement were studied.
Efficient Routing Using Temporal Distance in Intermittently Connected Mobile Ad-hoc Networks  [PDF]
Hemal Shah, Yogeshwar Kosta, Vikrant Patel
Communications and Network (CN) , 2013, DOI: 10.4236/cn.2013.53033
Abstract:

The analysis of real social, biological and technological networks has attracted a lot of attention as technological advances have given us a wealth of empirical data. For, analysis and investigation time varying graphs are used to understand the relationship, contact duration, repeated occurrence of contact. It is under exploring in intermittently connected networks. Now, by extending the same concept in intermittent networks, the efficiency of the routing protocol can be improved. This paper discusses about the temporal characterizing algorithm. Such characterization can help in accurately understanding dynamic behaviors and taking appropriate routing decisions. Therefore, the present research provokes exploring different possibilities of utilizing the same time varying network analyses and designing an Adaptive Routing protocol using temporal distance metric. The adaptive routing protocol is implemented using ONE simulator and is compared with the Epidemic and PropHET for delivery ratio, overhead and the number of dropped messages. The result reveals that Adaptive routing performs better than Epidemic and PropHET for real and synthetic datasets.

High Origin Causes High Hassle—Anomalous Radial Artery Origin Complicating a Radial Percutaneous Transluminal Coronary Angioplasty  [PDF]
Chirag Dodavenkannavar, Rajesh Thachathodiyl, Vikrant Vijan
World Journal of Cardiovascular Diseases (WJCD) , 2017, DOI: 10.4236/wjcd.2017.76019
Abstract:
Since its initial description as a safe and feasible access route for cardiac catheterization, the radial artery has been increasingly used for percutaneous coronary procedures. The transradial approach for percutaneous coronary procedures has the advantage of reduced adverse vascular events. Nevertheless, there are chances of transradial procedure failure due to variation in radial artery anatomy. We report a case of high radial artery origin in a 63 year-old-male patient who was taken up for elective radial percutaneous transluminal coronary angioplasty for in-stent restenosis of proximal left anterior descending artery. Subsequently, there was difficulty in negotiating guide wire and balloons, so imaging of radial artery was carried out which clearly demonstrated a high bifurcating radial origin. This case emphasizes the need for imaging of radial artery to delineate underlying anomalies and identifying patients with unfavorable anatomy when technical difficulties are encountered. Imaging in such a situation helps in planning an appropriate strategy.
Detection techniques of selective forwarding attacks in wireless sensor networks: a survey
Preeti Sharma,Monika Saluja,Krishan Kumar Saluja
Computer Science , 2012, DOI: 10.5120/7718-1082
Abstract: The wireless sensor network has become a hot research area due its wide range of application in military and civilian domain, but as it uses wireless media for communication these are easily prone to security attacks. There are number of attacks on wireless sensor networks like black hole attack, sink hole attack, Sybil attack, selective forwarding attacks etc. in this paper we will concentrate on selective forwarding attacks In selective forwarding attacks, malicious nodes behave like normal nodes and selectively drop packets. The selection of dropping nodes may be random. Identifying such attacks is very difficult and sometimes impossible. In this paper we have listed up some detection techniques, which have been proposed by different researcher in recent years, there we also have tabular representation of qualitative analysis of detection techniques
第1页/共203条
每页显示


Home
Copyright © 2008-2020 Open Access Library. All rights reserved.