Parimal Patel

Learn More
The impact of juice press fractions upon the content of varietal thiols in Sauvignon blanc has been examined for wines fermented at the laboratory scale (750 mL). Wines made from pressed juices (taken at 0.25 and 1.0 bar) contained less than half the concentration of 3-mercaptohexan-1-ol (3MH) and 3-mercaptohexyl acetate (3MHA), important contributors to(More)
Operation Iraqi Freedom has clearly demonstrated the criticality of transparent armor in many army systems. As the threats have escalated and become more varied, the challenges for rapidly developing optimized threat specific transparent armor packages have become extremely complex. In order to accelerate the development of validated design and predictive(More)
Molecular imprinting technology (MIT) is a technique for generating polymers bearing biomimetic receptors. It offers several advantages to the agrofood industry in areas such as analysis, sensoring, extraction, or preconcentration of components. It has the potential of becoming a tool for acquiring truly simple, rapid, and robust direct measurements. In(More)
The world standards for conventional ceramic hardness have varying requirements for control of loading rate during the indentation cycle. A literature review suggests that loading rate may affect measured hardness in some instances. In view of the uncertainty over this issue, new experiments over a range of indentation loading rates were performed on a(More)
OBJECTIVE Patients with pulmonary hypertension and right heart failure have a high risk of clinical deterioration and death during or soon after endotracheal intubation. The effects of sedation, hypoxia, hypoventilation, and changes in intrathoracic pressure can lead to severe hemodynamic instability. In search for safer approach to endotracheal intubation(More)
With the rapid growth of computer networks and network infrastructures and increased dependency on the Internet to carry out day-to-day activities, it is imperative that the components of the system are secured. In the last few years a number of intrusion detection systems (IDS) have been developed as network security tools. While considerable progress has(More)
Hashing algorithms have been widely adopted to provide a fast address look-up process which involves a search through a large database to find a record associated with a given key. Modern examples include address-lookup in network routers for a forwarding outgoing link, rule-matching in intrusion detection systems comparing incoming packets with a large(More)