Skip to main content
Video question answering is the task of automatically answering questions about videos. Among query types which include identification, localization, and counting, the most challenging questions enquire about relationships among different... more
    • by 
    •   2  
      Computer ScienceUniversity of British Columbia
This paper presents the machine learning based machine translation system for Hindi to English, which learns the semantically correct corpus. The quantum neural based pattern recognizer is used to recognize and learn the pattern of... more
    • by 
    •   8  
      AlgorithmsNatural Language ProcessingSemanticsQuantum Theory
This paper presents the machine translation system (MTS) which is based on the concept of self learning of semantically correct corpus using pattern recognition. The self learning process using pattern recognition is based on Quantum... more
    • by 
    • by 
    • by 
    •   2  
      Data MiningAdvance Computing
Soft computing techniques are a good solution for the face detection. Neural network is one of the soft computing techniques, which are generally used for learning and training process. Face detection is one of the challenging problems in... more
    • by 
The goal of this thesis is to investigate the current techniques for fingerprint identification system. This target can be mainly decomposed into image preprocessing, feature extraction and feature match. For each sub-task, some classical... more
    • by 
Thesis submitted in partial fulfillment of the requirements for the award of degree of
    • by 
Handwriting recognition has attracted many researchers across the world. Recognition of online handwritten Hindi numerals is a goal of many research efforts in the pattern recognition field. This paper presents an online handwritten Hindi... more
    • by 
    •   2  
      Computer ApplicationsComputer
After the invention of computers, a great amount of work has been done in the field of computer human interface. But the problem of exchanging data between human beings and computing machines is still challenging. An enormous research has... more
    • by 
    • by 
i | P a g e ii | P a g e Acknowledgement No volume of words is enough to express my gratitude towards my guide, Mr. Karun. Verma, Assistant. Professor and also the P.G. Coordinator, Computer Science and Engineering Department, Thapar... more
    • by 
Bat Algorithm is one of the recently-developed nature-inspired methods in the field of computational intelligence. This work presents the development of the Bat Algorithm based Scheduling Tool (BAST) that used to solve multi-stage... more
    • by 
    • Evolutionary algorithms
Power consumption is a major factor that limits the performance of computers. We survey the "state of the art" in techniques that reduce the total power consumed by a microprocessor system over time. These techniques are applied at... more
    • by 
Cloud computing is emerging as a new paradigm of large-scale distributed computing. It is a framework for enabling convenient, on-demand network access to a shared pool of computing resources. Load balancing is one of the main challenges... more
    • by 
    •   7  
      Computer ScienceComputer NetworksGreen ComputingEnergy efficiency
Due to significant advances in miniaturization, low power circuit design but reasonably efficient to carry the sensitive information through wireless communication, wireless sensor network (WSN) have attracted attention a lot in recent... more
    • by 
    •   4  
      CryptographyWireless Sensor Network SecuritySurveyFrameworks
The rate at which cyber-attacks are increasing globally portrays a terrifying picture upfront. The main dynamics of such attacks could be studied in terms of the actions of attackers and defenders in a cyber-security game. However,... more
    • by 
The rate at which cyber-attacks are increasing globally portrays a terrifying picture upfront. The main dynamics of such attacks could be studied in terms of the actions of attackers and defenders in a cyber-security game. However,... more
    • by 
Intrusion Detection Systems (IDSs) help in creating cyber situational awareness for defenders by providing recommendations. Prior research in simulation and game-theory has revealed that the presence and accuracy of IDS-like... more
    • by 
Cyber-attacks are deliberate attempts by adversaries to illegally access online information of other individuals or organizations. There are likely to be severe monetary consequences for organizations and its workers who face... more
    • by 
    •   2  
      PsychologyFrontiers in Psychology