Skip to main content
Multimedia transmission over wide-area networks currently only considers the server and network resource constraints and client device capabilities. It is also essential that the accessibility of the multimedia content for different users... more
    • by 
Complex Networks can depict a clear image of real-world systems. A real-world scenario can be represented a graph with interconnected layers-called a multilayer network. Finding motifs can give an idea of the topology of complex systems... more
    • by 
    •   2  
      Computer ScienceTheoretical Computer Science
Cryptography is the art of securing information by applying encryption and decryption on transmission data which ensure that the secret can be understood only by the right person.
    • by 
Three competing models of cognitive aging (neural compensation, capacity limitations, neural inefficiency) were examined in relation to working memory for novel non-verbal material. To accomplish this goal young (n=25) and old (n=25)... more
    • by 
    •   6  
      Cognitive ScienceAgingFace recognition (Psychology)Phonological processing
Sixteen healthy young adults (ages 18-32) and 16 healthy older adults (ages 67-81) completed a delayed response task in which they saw the following visual sequence: memory stimuli (2 abstract shapes; 3,000 ms), a blank delay (5,000 ms),... more
    • by 
    •   6  
      PsychologyCognitive ScienceAgingCognitive reserve
Epidemiologic evidence suggests that cognitive reserve (CR) mitigates the effects of aging on cognitive function. The goal of this study was to see whether a common neural mechanism for CR could be demonstrated in brain imaging data... more
    • by 
    •   4  
      Cognitive ScienceBrain ImagingAgingCanonical Variate Analysis
Are sequential visual arrays represented as separate images or as a combined image in visual short-term memory (VSTM)? Proponents of the integration account suggest that an image of the first array is gradually formed and integrated with... more
    • by 
    •   5  
      PsychologyCognitive ScienceExperimental PsychologyVariable Interval
Two dot arrays, each containing a different set of six randomly selected locations from a 5 × 5 matrix, were presented briefly and were separated by an interstimulus interval (ISI) of 0, 200, 500, or 1,500 msec. Subjects were asked to... more
    • by 
    •   4  
      PsychologyCognitive ScienceTime FactorsVisual Short Term Memory
The capacity of visual short-term memory (VSTM) for a single visual display has been investigated in past research, but VSTM for multiple sequential arrays has been explored only recently. In this study, we investigate the capacity of... more
    • by 
    •   6  
      PsychologyCognitive ScienceColor PerceptionSpace perception
Road infrastructure in India is developing at a very fast pace. A good pavement is needed for the safe, comfortable and economical movement of traffic. The thickness of road depends on geotechnical properties of subgrade soil and traffic... more
    • by 
The Graphics Processing Unit (GPU) has become an integral part of mainstream computing. The advancement and evaluation of GPU has lead to a significant performance improvement of many algorithms used in day today life. Being powerful... more
    • by 
    •   2  
      Image ProcessingARM microcontroller
Simultaneous localization and mapping, usually called as SLAM is the technique used for construction of maps in new environment which digital machines experience. The SLAM technique is also used for updating the maps which already exist.... more
    • by 
    • Artificial Intelligence
Mental computation helps children understand how numbers work, how to make decisions about procedures, and how to create different strategies to solve math problems. Improving the mathematics skills of our citizenry has been a major... more
    • by  and +1
    • Education
Text mining has wide range of applications from biotechnology to media and security. In the area of computer science, text mining can be used to improve the areas of search and to automate analysis processes. Topic modeling, which is a... more
    • by  and +1
Many of the indoor applications like navigation, indoor localization, object tracking require an indoor map. Indoor environments are dynamic in nature because of the objects present in it. To capture the essence of the indoor environment,... more
    • by  and +1
    • Algorithms
Many of the indoor applications like navigation, indoor localization, object tracking require an indoor map. Indoor environments are dynamic in nature because of the objects present in it. To capture the essence of the indoor environment,... more
    • by  and +1
    • Algorithms
We propose SiCaGCN, a learning system to predict the similarity of a given software code to a set of codes that are permitted to run on a computational resource, such as a supercomputer or a cloud server. This code characterization allows... more
    • by 
    • Computer Science
Now-a-days many erogenous personal data may be sent through internet that may be tapped. Different techniques have been used to ensure that secret messages would reach their intended recipient without being tampered with along the way. A... more
    • by 
Due to the morphological characteristics and other biological aspects in histopathological images, the computerized diagnosis of colon cancer in histopathology images has gained popularity. The images acquired using the histopathology... more
    • by 
    •   3  
      Computer ScienceArtificial IntelligenceElectrical and Electronic Engineering
Automated grading of colon biopsy images across all magnifications is challenging because of tailored segmentation and dependent features on each magnification. This work presents a novel approach of robust magnification-independent colon... more
    • by 
    •   6  
      Materials EngineeringComputer ScienceArtificial IntelligenceMedicine