Publications by authors named "G Selva"

In this work, we introduce a novel NMR apodization function designed to enhance spectral resolution while maintaining compatibility with qNMR standards. This function is based on a modified Savitzky-Golay filter, adapted for time-domain application. It effectively suppresses the negative components typically associated with derivative spectra, while also ensuring the preservation of quantitative integrity in NMR analyses.

View Article and Find Full Text PDF

Tofts models have failed to produce reliable quantitative markers for prostate cancer. We examined the differences between prostate zones and lesion PI-RADS categories and grade group (GG) using regions of interest drawn in tumor and normal-appearing tissue for a two-compartment uptake (2CU) model (including plasma volume (v), plasma flow (F), permeability surface area product (PS), plasma mean transit time (MTT), capillary transit time (T), extraction fraction (E), and transfer constant (K)) and exponential (amplitude (A), arrival time (t), and enhancement rate (α)), sigmoidal (amplitude (A), center time relative to arrival time (A - T), and slope (A)), and empirical mathematical models, and time to peak (TTP) parameters fitted to high temporal resolution (1.695 s) DCE-MRI data.

View Article and Find Full Text PDF

The secure authentication of user data is crucial in various sectors, including digital banking, medical applications and e-governance, especially for images. Secure communication protects against data tampering and forgery, thereby bolstering the foundation for informed decision-making, whether managing traffic, enhancing public safety, or monitoring environmental conditions. Conventional visual cryptographic protocols offer solutions, particularly for color images, though they grapple with challenges such as high computational demands and reliance on multiple cover images.

View Article and Find Full Text PDF

In today's digital landscape, securing multimedia visual information-specifically color images-is of critical importance across a range of sectors, including the burgeoning fields of logistics and supply chain management. Traditional Visual Cryptography (VC) schemes lay the groundwork for encrypting visual data by fragmenting a secret image into multiple shares, thereby ensuring no single share divulges the secret. Nevertheless, VC faces challenges in ascertaining the integrity of reconstructed images, especially when shares are manipulated maliciously.

View Article and Find Full Text PDF

Background: Social cognition has been associated with functional outcome in patients with first episode psychosis (FEP). Social cognition has also been associated with neurocognition and cognitive reserve. Although cognitive reserve, neurocognitive functioning, social cognition, and functional outcome are related, the direction of their associations is not clear.

View Article and Find Full Text PDF