Manoj Kumar - Academia.edu (original) (raw)

Uploads

http://www.atlfoundation.com by Manoj Kumar

Research paper thumbnail of IT Security Training and Information Security

It is usually stated that for everything we eliminate, there exists something we should leave. Th... more It is usually stated that for everything we eliminate, there exists something we should leave. This truism does apply towards the I . T field. The wide spread usage of computers as well as the amazing advances in technology within the last two decades has evolved the facial area of economic. The increasing integration from the internet in to the business sphere has kept this trend entering the current time. We now have certainly gained much, however the price we now have purchased this gain is really a security threat that will not minimized

Research paper thumbnail of How Cyber Security Training Can Protect Your Business From Hackers

Using a secure network is essential for the prosperity of your business. The very last thing your... more Using a secure network is essential for the prosperity of your business. The very last thing your company needs is really a breach of security. Sensitive data, customer information and company documents might be subjected to the incorrect people in case a network is vulnerable. Training your staff in the skill of protecting the business network may prevent future attacks.

Research paper thumbnail of Career Investment in IT Security Training

Two keywords to concentrate on are Security and Industry. Before beginning to increase your eyebr... more Two keywords to concentrate on are Security and Industry. Before beginning to increase your eyebrows as well as sigh in confusion amend those keywords in your mind to Secure and Experienced: let me share a couple of details to assist get the mind around those words. To start with, there are many vacancies prepared to be completed the safety industry and each one of them call for a significant degree of training, and no matter whether they might be for a long time or even the immediate all of them are exactly the same secure professional careers.

Papers by Manoj Kumar

Research paper thumbnail of Profile of Medical Negligence Cases in India

Journal of the Indian Medical Association, 2015

Research paper thumbnail of Some Numerical Techniques for Solving Elliptic Interface Problems

Numerical Methods For Partial Differential Equations, Sep 6, 2010

Page 1. Some Numerical Techniques for Solving Elliptic Interface Problems Manoj Kumar,Pratibha Jo... more Page 1. Some Numerical Techniques for Solving Elliptic Interface Problems Manoj Kumar,Pratibha Joshi Department of Mathematics, Motilal Nehru National Institute of Technology (Deemed University), Allahabad 211004, Uttar Pradesh, India ...

Research paper thumbnail of A Low Noise 16-Bit CMOS Digitally Controlled Oscillator

Research paper thumbnail of A new Image compression technique using principal component analysis and Huffman coding

2014 International Conference on Parallel Distributed and Grid Computing, Dec 1, 2014

Research paper thumbnail of Correlation and path analysis studies in tomato

Environment and Ecology, 2014

Research paper thumbnail of 2,5-diketo-D-gluconic acid (2,5-DKG) permeases

Research paper thumbnail of Developing Hourly Radiation, Wind and Precipitation Surfaces for Hydrologic Modeling in Mountain Basins

Spatially distributed hydrologic modeling over mountain basins requires that forcing parameters f... more Spatially distributed hydrologic modeling over mountain basins requires that forcing parameters from a limited number of monitoring sites be extended across the landscape. Methods used to distribute these parameters over a mountain basin must account for variations caused by elevation, slope and exposure, as well as canopy and terrain structure. More than a decade ago Susong et al. [1999] documented these methods, but because of advances in GIS and computational technology, many are either outdated, or have been replaced by improved approaches. Here we present updated methods for developing hourly solar and thermal radiation, wind field, and precipitation surfaces over mountain basins. Methods are defined, discussed, and examples of the progression of different development stages and significant specific events are presented. This effort will reduce the ad hoc nature of spatially distributed hydrologic modeling, allow more consistent development of forcing surfaces, and allow us to better separate and understand the effect of the forcing data on model results. Ultimately this will allow us to better evaluate our modeling strategies in mountain regions.

Research paper thumbnail of Solute dispersion along unsteady groundwater flow in a semi-infinite aquifer

Hydrol Earth Syst Sci, 1998

Analytical and numerical solutions are obtained for dispersion of pollutants along unsteady groun... more Analytical and numerical solutions are obtained for dispersion of pollutants along unsteady groundwater flow in a longitudinal direction through semi-infinite aquifers the permeability of which is either uniform or varies with position. Sources of pollution are both a concentrated point input at the origin and a spatially distributed background source. One expression chosen to represent the seasonal pattern of the time dependent velocity is sinusoidal behaviour over a year. The solutions obtained predict the time and distance from the location at which an input concentration is introduced at which the pollution concentration becomes harmless. Also, the time period for rehabilitating a polluted aquifer for human use can also be assessed.

Research paper thumbnail of A Cryptographic Study of Some Digital Signature Schemes

Eprint Arxiv Cs 0501010, 2005

In this thesis, we propose some directed signature schemes. In addition, we have discussed their ... more In this thesis, we propose some directed signature schemes. In addition, we have discussed their applications in different situations. In this thesis, we would like to discuss the security aspects during the design process of the proposed directed digital signature schemes. The security of the most digital signature schemes widely use in practice is based on the two difficult problems, viz; the problem of factoring integers (The RSA scheme) and the problem of finding discrete logarithms over finite fields (The ElGamal scheme). The proposed works in this thesis is divided into seven chapters.

Research paper thumbnail of Metabolically engineered bacterial strains having non-functional endogenous gluconate transporters

Research paper thumbnail of Myocardial Bridging a Boon or Bane

Research paper thumbnail of Imaging Dopamine and Serotonin in Live Neurons with Multi-Photon Excited Ultraviolet Auto-Fluorescence

Research paper thumbnail of An Empirical Investigation of Going Public Decision of Indian Companies

Research paper thumbnail of Diet and nutritional status of preschool children: a study of rural anganwadi children of Bhagalpur district of Bihar

Asian Journal of Home Science, 2011

Research paper thumbnail of Synthesis, and the antioxidant, neuroprotective and P-glycoprotein induction activity of 4-arylquinoline-2-carboxylates

Organic Biomolecular Chemistry, 2014

An efficient formic acid catalyzed one-pot synthesis of 4-arylquinoline 2-carboxylates in water v... more An efficient formic acid catalyzed one-pot synthesis of 4-arylquinoline 2-carboxylates in water via three-component coupling of arylamines, glyoxylates and phenylacetylenes has been described. 4-Arylquinoline 2-carboxylates 1o and 1q displayed significant antioxidant activity as indicated by their Fe-reducing power in the ferric reducing ability of plasma (FRAP) assay. The compounds were found to react directly with hydrogen peroxide, which might be one of the mechanisms of their antioxidant effect. Compounds 1o and 1q effectively quenched H2O2 and amyloid-β-generated reactive oxygen species (ROS) and also displayed significant protection against H2O2-induced neurotoxicity in human neuroblastoma SH-SY5Y cells. Additionally, all compounds exhibited promising P-glycoprotein induction activity in human adenocarcinoma LS-180 cells, indicating their potential to enhance amyloid-β clearance from…

Research paper thumbnail of Selection parameters for pigeonpea (Cajanus cajan L. Millsp.) genotypes at early growth stages against soil moisture stress

Journal of Food Legumes, 2013

Research paper thumbnail of Enhanced 2-Keto-L-Gulonic acid production

Research paper thumbnail of IT Security Training and Information Security

It is usually stated that for everything we eliminate, there exists something we should leave. Th... more It is usually stated that for everything we eliminate, there exists something we should leave. This truism does apply towards the I . T field. The wide spread usage of computers as well as the amazing advances in technology within the last two decades has evolved the facial area of economic. The increasing integration from the internet in to the business sphere has kept this trend entering the current time. We now have certainly gained much, however the price we now have purchased this gain is really a security threat that will not minimized

Research paper thumbnail of How Cyber Security Training Can Protect Your Business From Hackers

Using a secure network is essential for the prosperity of your business. The very last thing your... more Using a secure network is essential for the prosperity of your business. The very last thing your company needs is really a breach of security. Sensitive data, customer information and company documents might be subjected to the incorrect people in case a network is vulnerable. Training your staff in the skill of protecting the business network may prevent future attacks.

Research paper thumbnail of Career Investment in IT Security Training

Two keywords to concentrate on are Security and Industry. Before beginning to increase your eyebr... more Two keywords to concentrate on are Security and Industry. Before beginning to increase your eyebrows as well as sigh in confusion amend those keywords in your mind to Secure and Experienced: let me share a couple of details to assist get the mind around those words. To start with, there are many vacancies prepared to be completed the safety industry and each one of them call for a significant degree of training, and no matter whether they might be for a long time or even the immediate all of them are exactly the same secure professional careers.

Research paper thumbnail of Profile of Medical Negligence Cases in India

Journal of the Indian Medical Association, 2015

Research paper thumbnail of Some Numerical Techniques for Solving Elliptic Interface Problems

Numerical Methods For Partial Differential Equations, Sep 6, 2010

Page 1. Some Numerical Techniques for Solving Elliptic Interface Problems Manoj Kumar,Pratibha Jo... more Page 1. Some Numerical Techniques for Solving Elliptic Interface Problems Manoj Kumar,Pratibha Joshi Department of Mathematics, Motilal Nehru National Institute of Technology (Deemed University), Allahabad 211004, Uttar Pradesh, India ...

Research paper thumbnail of A Low Noise 16-Bit CMOS Digitally Controlled Oscillator

Research paper thumbnail of A new Image compression technique using principal component analysis and Huffman coding

2014 International Conference on Parallel Distributed and Grid Computing, Dec 1, 2014

Research paper thumbnail of Correlation and path analysis studies in tomato

Environment and Ecology, 2014

Research paper thumbnail of 2,5-diketo-D-gluconic acid (2,5-DKG) permeases

Research paper thumbnail of Developing Hourly Radiation, Wind and Precipitation Surfaces for Hydrologic Modeling in Mountain Basins

Spatially distributed hydrologic modeling over mountain basins requires that forcing parameters f... more Spatially distributed hydrologic modeling over mountain basins requires that forcing parameters from a limited number of monitoring sites be extended across the landscape. Methods used to distribute these parameters over a mountain basin must account for variations caused by elevation, slope and exposure, as well as canopy and terrain structure. More than a decade ago Susong et al. [1999] documented these methods, but because of advances in GIS and computational technology, many are either outdated, or have been replaced by improved approaches. Here we present updated methods for developing hourly solar and thermal radiation, wind field, and precipitation surfaces over mountain basins. Methods are defined, discussed, and examples of the progression of different development stages and significant specific events are presented. This effort will reduce the ad hoc nature of spatially distributed hydrologic modeling, allow more consistent development of forcing surfaces, and allow us to better separate and understand the effect of the forcing data on model results. Ultimately this will allow us to better evaluate our modeling strategies in mountain regions.

Research paper thumbnail of Solute dispersion along unsteady groundwater flow in a semi-infinite aquifer

Hydrol Earth Syst Sci, 1998

Analytical and numerical solutions are obtained for dispersion of pollutants along unsteady groun... more Analytical and numerical solutions are obtained for dispersion of pollutants along unsteady groundwater flow in a longitudinal direction through semi-infinite aquifers the permeability of which is either uniform or varies with position. Sources of pollution are both a concentrated point input at the origin and a spatially distributed background source. One expression chosen to represent the seasonal pattern of the time dependent velocity is sinusoidal behaviour over a year. The solutions obtained predict the time and distance from the location at which an input concentration is introduced at which the pollution concentration becomes harmless. Also, the time period for rehabilitating a polluted aquifer for human use can also be assessed.

Research paper thumbnail of A Cryptographic Study of Some Digital Signature Schemes

Eprint Arxiv Cs 0501010, 2005

In this thesis, we propose some directed signature schemes. In addition, we have discussed their ... more In this thesis, we propose some directed signature schemes. In addition, we have discussed their applications in different situations. In this thesis, we would like to discuss the security aspects during the design process of the proposed directed digital signature schemes. The security of the most digital signature schemes widely use in practice is based on the two difficult problems, viz; the problem of factoring integers (The RSA scheme) and the problem of finding discrete logarithms over finite fields (The ElGamal scheme). The proposed works in this thesis is divided into seven chapters.

Research paper thumbnail of Metabolically engineered bacterial strains having non-functional endogenous gluconate transporters

Research paper thumbnail of Myocardial Bridging a Boon or Bane

Research paper thumbnail of Imaging Dopamine and Serotonin in Live Neurons with Multi-Photon Excited Ultraviolet Auto-Fluorescence

Research paper thumbnail of An Empirical Investigation of Going Public Decision of Indian Companies

Research paper thumbnail of Diet and nutritional status of preschool children: a study of rural anganwadi children of Bhagalpur district of Bihar

Asian Journal of Home Science, 2011

Research paper thumbnail of Synthesis, and the antioxidant, neuroprotective and P-glycoprotein induction activity of 4-arylquinoline-2-carboxylates

Organic Biomolecular Chemistry, 2014

An efficient formic acid catalyzed one-pot synthesis of 4-arylquinoline 2-carboxylates in water v... more An efficient formic acid catalyzed one-pot synthesis of 4-arylquinoline 2-carboxylates in water via three-component coupling of arylamines, glyoxylates and phenylacetylenes has been described. 4-Arylquinoline 2-carboxylates 1o and 1q displayed significant antioxidant activity as indicated by their Fe-reducing power in the ferric reducing ability of plasma (FRAP) assay. The compounds were found to react directly with hydrogen peroxide, which might be one of the mechanisms of their antioxidant effect. Compounds 1o and 1q effectively quenched H2O2 and amyloid-β-generated reactive oxygen species (ROS) and also displayed significant protection against H2O2-induced neurotoxicity in human neuroblastoma SH-SY5Y cells. Additionally, all compounds exhibited promising P-glycoprotein induction activity in human adenocarcinoma LS-180 cells, indicating their potential to enhance amyloid-β clearance from…

Research paper thumbnail of Selection parameters for pigeonpea (Cajanus cajan L. Millsp.) genotypes at early growth stages against soil moisture stress

Journal of Food Legumes, 2013

Research paper thumbnail of Enhanced 2-Keto-L-Gulonic acid production

Research paper thumbnail of by Targeted Gene Disruption Cell Cytokine Regulation As Revealed Functional Role for I{kappa}BNS in T

Research paper thumbnail of Biocatalytic conversion of granular starch to industrial chemicals

Acs Symposium Series, 2007

ABSTRACT Biocatalytic systems to economically produce biochemicals using less expensive feedstock... more ABSTRACT Biocatalytic systems to economically produce biochemicals using less expensive feedstocks like granular starches are an attractive alternative to petroleum based chemical synthesis. This is due, in part, to significant advances in our understanding and application of genetic and metabolic engineering of host organisms and granular starch hydrolyzing enzymes. This book chapter explores a GSHE (granular starch hydrolyzing enzyme) process for the conversion of granular starch feedstocks to glucose, and the concomitant conversion of glucose by microorganisms and/or enzymes, to desired chemical products. In this process, conversion of glucose to products parallels its formation by enzymatic catalysis. This reduces enzyme inhibition and speeds the conversion of granular starch to products. Furthermore, such a process provides key glucose-controlled biocatalytic conditions, which are critical in many fermentative processes.

Research paper thumbnail of Erratum to: Serological evidence of bovine herpesvirus-1 (BoHV-1) infection in yaks ( Peophagus grunniens ) from the National Research Centre on Yak, India

Tropical Animal Health and Production, Apr 1, 2010