Anurag Shrivastava

Learn More
This paper investigates the temporal dependencies of natural vision by measuring eye and hand movements while subjects made a sandwich. The phenomenon of change blindness suggests these temporal dependencies might be limited. Our observations are largely consistent with this, suggesting that much natural vision can be accomplished with "just-in-time"(More)
The highly task-specific fixation patterns revealed in performance of natural tasks demonstrate the fundamentally active nature of vision, and suggest that in many situations, top-down processes may be a major factor in the acquisition of visual information. Understanding how a top-down visual system could function requires understanding the mechanisms that(More)
The study of human perception has evolved from examining simple tasks executed in reduced laboratory conditions to the examination of complex, real-world behaviors. Virtual environments represent the next evolutionary step by allowing full stimulus control and repeatability for human subjects, and a testbed for evaluating models of human behavior. Visual(More)
The Tiger (Panthera tigris) population in India has undergone a sharp decline during the last few years. Of the number of factors attributed to this decline, habitat fragmentation has been the most worrisome. Wildlife corridors have long been a subject of discussion amongst wildlife biologists and conservationists with contrasting schools of thought arguing(More)
ISSN 2277-1956/V1N2-681-685 Periodic Noise Suppression from ECG Signal using Novel Adaptive Filtering Techniques Yogesh Sharma , Anurag Shrivastava 2 1-Department of Electronics and Telecommunication, Shri Shankaracharya College of Engineering & Technology, Bhilai, Chhattisgarh, India Emailyogeshetc@gmail.com 2Department of Electronics and Instrumentation,(More)
Data mining technology help us in extraction of useful knowledge from large data sets. The process of data collection and data dissemination may, however, result in an inherent risk of privacy threats. Some private information about individuals, businesses and organizations has to be suppressed before it is shared or published. The privacypreserving data(More)
The technology of data mining is used in extraction of useful knowledge from large data sets. The process of data collection and data dissemination may, however, result in an inherent risk of privacy threats. Before publishing or sharing private information about individuals, businesses and organizations have to be suppressed. Privacy-preserving data mining(More)
In Mobile Adhoc networks (MANET) traditional congestion control mechanism RED encounters with new challenges such as high packet drop ratio, degradation of throughput and frequent link failures. Congestion in a network occurs when the demand on the network resources is greater than the available resources and due to increasing mismatch in link speeds caused(More)
The process variation has become inevitable in the present VLSI technology. The IC designed without consideration of process variation fails to do operation correctly Numbers of techniques has proposed to mitigate the effect of process and NBTI effect but have limitation. In this paper Adaptive Body Bias technique is proposed which mitigate the effect of(More)
A good Requirements Engineering (RE) Process description will provide guidance to the people involved and reduce the probability that activities will be forgotten about or carried out in a perfunctory way. If RE Processes of an organization is over budget and/or does it takes longer than predicted, people involved in RE complain that they do not have enough(More)