Search

Your search keyword '"Narayan Upadhyay"' showing total 70 results

Search Constraints

Start Over You searched for: Author "Narayan Upadhyay" Remove constraint Author: "Narayan Upadhyay"
70 results on '"Narayan Upadhyay"'

Search Results

1. Neurocysticercosis in patients with active epilepsy in the tea garden community of Assam, Northeast India

2. Treatment delayed is treatment denied: A review of late burn care in patients presenting with post burn contractures to a tertiary hospital

11. Phytochemical Screening and biological potentials of Musa × paradisiaca L. leaves extract as anticancer and antioxidant agents

13. Improving security against cache memory attacks for dual field multiplier design based on elliptic curve cryptography

15. Design and Implementation of Chao-Cryptic Architecture on FPGA for Secure Audio Communication

16. High prevalence of neurocysticercosis among patients with epilepsy in a tertiary care hospital of Assam, India

17. Anticancer potential of musa × paradisiaca as cervical carcinoma and malignant melanoma

19. Minimal Test Coverage of SSFs for the Majority Voters of TMR Configuration

23. Chaos Blend DNA Coding for Image Encryption on FPGA

24. Fault-tolerant digital filters on FPGA using hardware redundancy techniques

25. Legal Consequences of a Minor’s Agreement in India

26. Stego on Song-an Amalgam of vi and FPGA for Hardware Info Hide

28. MSB Based Embedding with Integrity: An Adaptive RGB Stego on FPGA Platform

29. Modeling Combo PR Generator for Stego Storage Self Test (SSST)

30. Galois Field Proficient Product for Secure Image Encryption on FPGA

32. Dual Cellular Automata on FPGA: An Image Encryptors Chip

35. Captivating CODEC Stego (CCS): A Cover on Camouflage

36. Cellular automata + LFSR + synthetic image: A trio approach to image encryption

37. On the lossless image recovery analysis of cyclic shift and chaotic system based image encryption

38. Optic assisted image encryption: Confluence of chaos and virtual instrumentation

42. Adapting Scan Based Test Vector for Compression Method Based On Transition Technique

43. Hide and seek in silicon – Performance analysis of Quad block Equisum Hardware Steganographic systems

44. Stego System on Chip with LFSR based Information Hiding Approach

45. Application of fly ash on the growth performance and translocation of toxic heavy metals within Cajanus cajan L.: Implication for safe utilization of fly ash for agricultural production

46. FPGA Implementation of Self-Testing Logic Gates, Adders and Multipliers

47. A Comparative Study of High Speed CMOS Adders using Microwind and FPGA

48. Low Power CMOS Look-Up Tables using PROM

49. Area, delay and power comparison of fault-tolerant systems with TMR using different voter circuits

50. Low Power Spatial Modulation Scheme for Wide Band Multiple Input and Multiple Output Wireless Communication Systems

Catalog

Books, media, physical & digital resources