Zobrazeno 1 - 10
of 45
pro vyhledávání: '"V., Sreelakshmi"'
Autor:
Pattanaik, Amrita, Lodha, Lonika, Marate, Srilatha, K., Dhanya, Sushma Bhandarkar, B., V., Sreelakshmi, Ashtaputre, Nidhi, Mani, Reeta S.
Publikováno v:
In Infectious Diseases Now September 2024 54(6)
Autor:
V., Sreelakshmi, Pattanaik, Amrita, Marate, Srilatha, Mani, Reeta S, Pai, Aparna R., Mukhopadhyay, Chiranjay
Publikováno v:
Neurological Research & Practice; 4/11/2024, Vol. 6 Issue 1, p1-11, 11p
Publikováno v:
In IJID Regions March 2024 10:197-199
Publikováno v:
INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH. :41-43
Objective: We conducted this study to compare the hemodynamic effects of propofol-ketamine combination as induction agents to propofolthiopentone combination. An interventional comparative study was carried out at S Methods: anthiram medical college,
Autor:
V. Sreelakshmi, Annie Abraham
Publikováno v:
Pharmaceutical Biology, Vol 55, Iss 1, Pp 1274-1282 (2017)
Context: Cataract is the clouding of eye lens which causes impairment in vision and accounts for the leading factor of global blindness. Functional food-based prevention of cataract finds application in vision research because of its availability and
Externí odkaz:
https://doaj.org/article/9866a84eb32b4eecb4bdb1c5b9cd8b2e
For a variety of different applications, including processing of image, expert systems, the smart things, and processing of digital systems, low-power and high-speed electronic system are now required. In a general multiplying operation account for m
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::76ae905f68ba318dc31635d2555c2567
Autor:
V, Sreelakshmi, Pattanaik, Amrita, Marate, Srilatha, Mani, Reeta S., Pai, Aparna R., Mukhopadhyay, Chiranjay
Publikováno v:
Neurological Research & Practice; 11/18/2024, Vol. 6 Issue 1, p1-2, 2p
Autor:
K V Sreelakshmi, Dileesh E D
Publikováno v:
International Journal of Scientific Research in Science, Engineering and Technology. :245-251
Malicious codes have become one of the major threats to computer systems. The malicious software which is also referred to as malware is designed by the attackers and can change their code as they propagate. The existing defense against malware is hi
Publikováno v:
Lecture Notes in Electrical Engineering ISBN: 9789811679841
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::3c7d73b189d20c22cc9806cda114046f
https://doi.org/10.1007/978-981-16-7985-8_39
https://doi.org/10.1007/978-981-16-7985-8_39
Publikováno v:
2021 IEEE 9th Region 10 Humanitarian Technology Conference (R10-HTC).