-
Interactions of charged microrods in chiral nematic liquid crystals
Authors:
Muhammed Rasi M,
Ravi Kumar Pujala,
Sathyanarayana Paladugu,
Surajit Dhara
Abstract:
We study the pair interaction of charged silica microrods in chiral nematic liquid crystals and show that the microrods with homeotropic surface anchoring form a bound state due to the competing effect of electrostatic (Coulomb) and elastic interactions. The robustness of the bound state is demonstrated by applying external electrical and mechanical forces that perturbs their equilibrium position…
▽ More
We study the pair interaction of charged silica microrods in chiral nematic liquid crystals and show that the microrods with homeotropic surface anchoring form a bound state due to the competing effect of electrostatic (Coulomb) and elastic interactions. The robustness of the bound state is demonstrated by applying external electrical and mechanical forces that perturbs their equilibrium position as well as orientation. In the bound state we have measured the correlated thermal fluctuations of the position, using two-particle cross-correlation spectroscopy that uncovers their hydrodynamic interaction. These findings reveal unexplored aspects of liquid-crystal dispersions which are important for understanding the assembly and dynamics of nano and microparticles in chiral nematic liquid crystals.
△ Less
Submitted 12 November, 2022; v1 submitted 9 February, 2021;
originally announced February 2021.
-
Fusion of Federated Learning and Industrial Internet of Things: A Survey
Authors:
Parimala M,
Swarna Priya R M,
Quoc-Viet Pham,
Kapal Dev,
Praveen Kumar Reddy Maddikunta,
Thippa Reddy Gadekallu,
Thien Huynh-The
Abstract:
Industrial Internet of Things (IIoT) lays a new paradigm for the concept of Industry 4.0 and paves an insight for new industrial era. Nowadays smart machines and smart factories use machine learning/deep learning based models for incurring intelligence. However, storing and communicating the data to the cloud and end device leads to issues in preserving privacy. In order to address this issue, fed…
▽ More
Industrial Internet of Things (IIoT) lays a new paradigm for the concept of Industry 4.0 and paves an insight for new industrial era. Nowadays smart machines and smart factories use machine learning/deep learning based models for incurring intelligence. However, storing and communicating the data to the cloud and end device leads to issues in preserving privacy. In order to address this issue, federated learning (FL) technology is implemented in IIoT by the researchers nowadays to provide safe, accurate, robust and unbiased models. Integrating FL in IIoT ensures that no local sensitive data is exchanged, as the distribution of learning models over the edge devices has become more common with FL. Therefore, only the encrypted notifications and parameters are communicated to the central server. In this paper, we provide a thorough overview on integrating FL with IIoT in terms of privacy, resource and data management. The survey starts by articulating IIoT characteristics and fundamentals of distributive and FL. The motivation behind integrating IIoT and FL for achieving data privacy preservation and on-device learning are summarized. Then we discuss the potential of using machine learning, deep learning and blockchain techniques for FL in secure IIoT. Further we analyze and summarize the ways to handle the heterogeneous and huge data. Comprehensive background on data and resource management are then presented, followed by applications of IIoT with FL in healthcare and automobile industry. Finally, we shed light on challenges, some possible solutions and potential directions for future research.
△ Less
Submitted 4 January, 2021;
originally announced January 2021.
-
LOCNES: a solar telescope to study stellar activity in the near infrared
Authors:
Claudi R.,
Ghedina A.,
Pace E.,
Di Giorgio A. M.,
D'Orazi V.,
Gallorini L.,
Lanza A. F.,
Liu S. J.,
Rainer M.,
Tozzi A.,
Carleo I.,
Maldonado Prado J.,
Micela G.,
Molinari E.,
Poretti E.,
Phillips D.,
Tripodo G.,
Cecconi M.,
Galli A.,
Gonzalez M. D.,
Guerra Padilla V.,
Guerra Ramòn J. G.,
Harutyunyan A.,
Hernàndez Càceres N.,
Hernàndez Dìaz M.
, et al. (5 additional authors not shown)
Abstract:
LOCNES (LOw-Cost NIR Extended Solar telescope) is a solar telescope installed at the TNG (Telescopio Nazionale Galileo). It feeds the light of the Sun into the NIR spectrograph GIANO-B through a 40-m patch of optical fibers. LOCNES has been designed to obtain high signal-to-noise ratio spectra of the Sun as a star with an accurate wavelength calibration through molecular-band cells. This is an ent…
▽ More
LOCNES (LOw-Cost NIR Extended Solar telescope) is a solar telescope installed at the TNG (Telescopio Nazionale Galileo). It feeds the light of the Sun into the NIR spectrograph GIANO-B through a 40-m patch of optical fibers. LOCNES has been designed to obtain high signal-to-noise ratio spectra of the Sun as a star with an accurate wavelength calibration through molecular-band cells. This is an entirely new area of investigation that will provide timely results to improve the search of telluric planets with NIR spectrographs such as iSHELL, CARMENES, and GIANO-B. We will extract several disc-integrated activity indicators and average magnetic field measurements for the Sun in the NIR. Eventually, they will be correlated with both the RV of the Sun-as-a -star and the resolved images of the solar disc in visible and NIR. Such an approach will allow for a better understanding of the origin of activity-induced RV variations in the two spectral domains and will help in improving the techniques for their corrections. In this paper, we outline the science drivers for the LOCNES project and its first commissioning results.
△ Less
Submitted 21 December, 2020;
originally announced December 2020.
-
Knowledge Distillation for Singing Voice Detection
Authors:
Soumava Paul,
Gurunath Reddy M,
K Sreenivasa Rao,
Partha Pratim Das
Abstract:
Singing Voice Detection (SVD) has been an active area of research in music information retrieval (MIR). Currently, two deep neural network-based methods, one based on CNN and the other on RNN, exist in literature that learn optimized features for the voice detection (VD) task and achieve state-of-the-art performance on common datasets. Both these models have a huge number of parameters (1.4M for C…
▽ More
Singing Voice Detection (SVD) has been an active area of research in music information retrieval (MIR). Currently, two deep neural network-based methods, one based on CNN and the other on RNN, exist in literature that learn optimized features for the voice detection (VD) task and achieve state-of-the-art performance on common datasets. Both these models have a huge number of parameters (1.4M for CNN and 65.7K for RNN) and hence not suitable for deployment on devices like smartphones or embedded sensors with limited capacity in terms of memory and computation power. The most popular method to address this issue is known as knowledge distillation in deep learning literature (in addition to model compression) where a large pre-trained network known as the teacher is used to train a smaller student network. Given the wide applications of SVD in music information retrieval, to the best of our knowledge, model compression for practical deployment has not yet been explored. In this paper, efforts have been made to investigate this issue using both conventional as well as ensemble knowledge distillation techniques.
△ Less
Submitted 19 August, 2021; v1 submitted 9 November, 2020;
originally announced November 2020.
-
Multiclass Model for Agriculture development using Multivariate Statistical method
Authors:
N Deepa,
Mohammad Zubair Khan,
Prabadevi B,
Durai Raj Vincent P M,
Praveen Kumar Reddy Maddikunta,
Thippa Reddy Gadekallu
Abstract:
Mahalanobis taguchi system (MTS) is a multi-variate statistical method extensively used for feature selection and binary classification problems. The calculation of orthogonal array and signal-to-noise ratio in MTS makes the algorithm complicated when more number of factors are involved in the classification problem. Also the decision is based on the accuracy of normal and abnormal observations of…
▽ More
Mahalanobis taguchi system (MTS) is a multi-variate statistical method extensively used for feature selection and binary classification problems. The calculation of orthogonal array and signal-to-noise ratio in MTS makes the algorithm complicated when more number of factors are involved in the classification problem. Also the decision is based on the accuracy of normal and abnormal observations of the dataset. In this paper, a multiclass model using Improved Mahalanobis Taguchi System (IMTS) is proposed based on normal observations and Mahalanobis distance for agriculture development. Twenty-six input factors relevant to crop cultivation have been identified and clustered into six main factors for the development of the model. The multiclass model is developed with the consideration of the relative importance of the factors. An objective function is defined for the classification of three crops, namely paddy, sugarcane and groundnut. The classification results are verified against the results obtained from the agriculture experts working in the field. The proposed classifier provides 100% accuracy, recall, precision and 0% error rate when compared with other traditional classifier models.
△ Less
Submitted 7 October, 2020; v1 submitted 12 September, 2020;
originally announced September 2020.
-
NISP: A Multi-lingual Multi-accent Dataset for Speaker Profiling
Authors:
Shareef Babu Kalluri,
Deepu Vijayasenan,
Sriram Ganapathy,
Ragesh Rajan M,
Prashant Krishnan
Abstract:
Many commercial and forensic applications of speech demand the extraction of information about the speaker characteristics, which falls into the broad category of speaker profiling. The speaker characteristics needed for profiling include physical traits of the speaker like height, age, and gender of the speaker along with the native language of the speaker. Many of the datasets available have onl…
▽ More
Many commercial and forensic applications of speech demand the extraction of information about the speaker characteristics, which falls into the broad category of speaker profiling. The speaker characteristics needed for profiling include physical traits of the speaker like height, age, and gender of the speaker along with the native language of the speaker. Many of the datasets available have only partial information for speaker profiling. In this paper, we attempt to overcome this limitation by develo** a new dataset which has speech data from five different Indian languages along with English. The metadata information for speaker profiling applications like linguistic information, regional information, and physical characteristics of a speaker are also collected. We call this dataset as NITK-IISc Multilingual Multi-accent Speaker Profiling (NISP) dataset. The description of the dataset, potential applications, and baseline results for speaker profiling on this dataset are provided in this paper.
△ Less
Submitted 12 July, 2020;
originally announced July 2020.
-
Complex Wavelet SSIM based Image Data Augmentation
Authors:
Ritin Raveendran,
Aviral Singh,
Rajesh Kumar M
Abstract:
One of the biggest problems in neural learning networks is the lack of training data available to train the network. Data augmentation techniques over the past few years, have therefore been developed, aiming to increase the amount of artificial training data with the limited number of real world samples. In this paper, we look particularly at the MNIST handwritten dataset an image dataset used fo…
▽ More
One of the biggest problems in neural learning networks is the lack of training data available to train the network. Data augmentation techniques over the past few years, have therefore been developed, aiming to increase the amount of artificial training data with the limited number of real world samples. In this paper, we look particularly at the MNIST handwritten dataset an image dataset used for digit recognition, and the methods of data augmentation done on this data set. We then take a detailed look into one of the most popular augmentation techniques used for this data set elastic deformation; and highlight its demerit of degradation in the quality of data, which introduces irrelevant data to the training set. To decrease this irrelevancy, we propose to use a similarity measure called Complex Wavelet Structural Similarity Index Measure (CWSSIM) to selectively filter out the irrelevant data before we augment the data set. We compare our observations with the existing augmentation technique and find our proposed method works yields better results than the existing technique.
△ Less
Submitted 11 July, 2020;
originally announced July 2020.
-
Kinematic-Structure-Preserved Representation for Unsupervised 3D Human Pose Estimation
Authors:
Jogendra Nath Kundu,
Siddharth Seth,
Rahul M V,
Mugalodi Rakesh,
R. Venkatesh Babu,
Anirban Chakraborty
Abstract:
Estimation of 3D human pose from monocular image has gained considerable attention, as a key step to several human-centric applications. However, generalizability of human pose estimation models developed using supervision on large-scale in-studio datasets remains questionable, as these models often perform unsatisfactorily on unseen in-the-wild environments. Though weakly-supervised models have b…
▽ More
Estimation of 3D human pose from monocular image has gained considerable attention, as a key step to several human-centric applications. However, generalizability of human pose estimation models developed using supervision on large-scale in-studio datasets remains questionable, as these models often perform unsatisfactorily on unseen in-the-wild environments. Though weakly-supervised models have been proposed to address this shortcoming, performance of such models relies on availability of paired supervision on some related tasks, such as 2D pose or multi-view image pairs. In contrast, we propose a novel kinematic-structure-preserved unsupervised 3D pose estimation framework, which is not restrained by any paired or unpaired weak supervisions. Our pose estimation framework relies on a minimal set of prior knowledge that defines the underlying kinematic 3D structure, such as skeletal joint connectivity information with bone-length ratios in a fixed canonical scale. The proposed model employs three consecutive differentiable transformations named as forward-kinematics, camera-projection and spatial-map transformation. This design not only acts as a suitable bottleneck stimulating effective pose disentanglement but also yields interpretable latent pose representations avoiding training of an explicit latent embedding to pose mapper. Furthermore, devoid of unstable adversarial setup, we re-utilize the decoder to formalize an energy-based loss, which enables us to learn from in-the-wild videos, beyond laboratory settings. Comprehensive experiments demonstrate our state-of-the-art unsupervised and weakly-supervised pose estimation performance on both Human3.6M and MPI-INF-3DHP datasets. Qualitative results on unseen environments further establish our superior generalization ability.
△ Less
Submitted 24 June, 2020;
originally announced June 2020.
-
Learning to Recognize Code-switched Speech Without Forgetting Monolingual Speech Recognition
Authors:
Sanket Shah,
Basil Abraham,
Gurunath Reddy M,
Sunayana Sitaram,
Vikas Joshi
Abstract:
Recently, there has been significant progress made in Automatic Speech Recognition (ASR) of code-switched speech, leading to gains in accuracy on code-switched datasets in many language pairs. Code-switched speech co-occurs with monolingual speech in one or both languages being mixed. In this work, we show that fine-tuning ASR models on code-switched speech harms performance on monolingual speech.…
▽ More
Recently, there has been significant progress made in Automatic Speech Recognition (ASR) of code-switched speech, leading to gains in accuracy on code-switched datasets in many language pairs. Code-switched speech co-occurs with monolingual speech in one or both languages being mixed. In this work, we show that fine-tuning ASR models on code-switched speech harms performance on monolingual speech. We point out the need to optimize models for code-switching while also ensuring that monolingual performance is not sacrificed. Monolingual models may be trained on thousands of hours of speech which may not be available for re-training a new model. We propose using the Learning Without Forgetting (LWF) framework for code-switched ASR when we only have access to a monolingual model and do not have the data it was trained on. We show that it is possible to train models using this framework that perform well on both code-switched and monolingual test sets. In cases where we have access to monolingual training data as well, we propose regularization strategies for fine-tuning models for code-switching without sacrificing monolingual accuracy. We report improvements in Word Error Rate (WER) in monolingual and code-switched test sets compared to baselines that use pooled data and simple fine-tuning.
△ Less
Submitted 1 June, 2020;
originally announced June 2020.
-
Deepfake Forensics Using Recurrent Neural Networks
Authors:
Rahul U,
Ragul M,
Raja Vignesh K,
Tejeswinee K
Abstract:
As of late an AI based free programming device has made it simple to make authentic face swaps in recordings that leaves barely any hints of control, in what are known as "deepfake" recordings. Situations where these genuine istic counterfeit recordings are utilized to make political pain, extort somebody or phony fear based oppression occasions are effectively imagined. This paper proposes a tran…
▽ More
As of late an AI based free programming device has made it simple to make authentic face swaps in recordings that leaves barely any hints of control, in what are known as "deepfake" recordings. Situations where these genuine istic counterfeit recordings are utilized to make political pain, extort somebody or phony fear based oppression occasions are effectively imagined. This paper proposes a transient mindful pipeline to automat-ically recognize deepfake recordings. Our framework utilizes a convolutional neural system (CNN) to remove outline level highlights. These highlights are then used to prepare a repetitive neural net-work (RNN) that figures out how to characterize if a video has been sub-ject to control or not. We assess our technique against a huge arrangement of deepfake recordings gathered from different video sites. We show how our framework can accomplish aggressive outcomes in this assignment while utilizing a basic design.
△ Less
Submitted 1 May, 2020;
originally announced May 2020.
-
Deepfake Video Forensics based on Transfer Learning
Authors:
Rahul U,
Ragul M,
Raja Vignesh K,
Tejeswinee K
Abstract:
Deeplearning has been used to solve complex problems in various domains. As it advances, it also creates applications which become a major threat to our privacy, security and even to our Democracy. Such an application which is being developed recently is the "Deepfake". Deepfake models can create fake images and videos that humans cannot differentiate them from the genuine ones. Therefore, the cou…
▽ More
Deeplearning has been used to solve complex problems in various domains. As it advances, it also creates applications which become a major threat to our privacy, security and even to our Democracy. Such an application which is being developed recently is the "Deepfake". Deepfake models can create fake images and videos that humans cannot differentiate them from the genuine ones. Therefore, the counter application to automatically detect and analyze the digital visual media is necessary in today world. This paper details retraining the image classification models to apprehend the features from each deepfake video frames. After feeding different sets of deepfake clips of video fringes through a pretrained layer of bottleneck in the neural network is made for every video frame, already stated layer contains condense data for all images and exposes artificial manipulations in Deepfake videos. When checking Deepfake videos, this technique received more than 87 per cent accuracy. This technique has been tested on the Face Forensics dataset and obtained good accuracy in detection.
△ Less
Submitted 29 April, 2020;
originally announced April 2020.
-
Universal Source-Free Domain Adaptation
Authors:
Jogendra Nath Kundu,
Naveen Venkat,
Rahul M V,
R. Venkatesh Babu
Abstract:
There is a strong incentive to develop versatile learning techniques that can transfer the knowledge of class-separability from a labeled source domain to an unlabeled target domain in the presence of a domain-shift. Existing domain adaptation (DA) approaches are not equipped for practical DA scenarios as a result of their reliance on the knowledge of source-target label-set relationship (e.g. Clo…
▽ More
There is a strong incentive to develop versatile learning techniques that can transfer the knowledge of class-separability from a labeled source domain to an unlabeled target domain in the presence of a domain-shift. Existing domain adaptation (DA) approaches are not equipped for practical DA scenarios as a result of their reliance on the knowledge of source-target label-set relationship (e.g. Closed-set, Open-set or Partial DA). Furthermore, almost all prior unsupervised DA works require coexistence of source and target samples even during deployment, making them unsuitable for real-time adaptation. Devoid of such impractical assumptions, we propose a novel two-stage learning process. 1) In the Procurement stage, we aim to equip the model for future source-free deployment, assuming no prior knowledge of the upcoming category-gap and domain-shift. To achieve this, we enhance the model's ability to reject out-of-source distribution samples by leveraging the available source data, in a novel generative classifier framework. 2) In the Deployment stage, the goal is to design a unified adaptation algorithm capable of operating across a wide range of category-gaps, with no access to the previously seen source samples. To this end, in contrast to the usage of complex adversarial training regimes, we define a simple yet effective source-free adaptation objective by utilizing a novel instance-level weighting mechanism, named as Source Similarity Metric (SSM). A thorough evaluation shows the practical usability of the proposed learning framework with superior DA performance even over state-of-the-art source-dependent approaches.
△ Less
Submitted 9 April, 2020;
originally announced April 2020.
-
Towards Inheritable Models for Open-Set Domain Adaptation
Authors:
Jogendra Nath Kundu,
Naveen Venkat,
Ambareesh Revanur,
Rahul M V,
R. Venkatesh Babu
Abstract:
There has been a tremendous progress in Domain Adaptation (DA) for visual recognition tasks. Particularly, open-set DA has gained considerable attention wherein the target domain contains additional unseen categories. Existing open-set DA approaches demand access to a labeled source dataset along with unlabeled target instances. However, this reliance on co-existing source and target data is highl…
▽ More
There has been a tremendous progress in Domain Adaptation (DA) for visual recognition tasks. Particularly, open-set DA has gained considerable attention wherein the target domain contains additional unseen categories. Existing open-set DA approaches demand access to a labeled source dataset along with unlabeled target instances. However, this reliance on co-existing source and target data is highly impractical in scenarios where data-sharing is restricted due to its proprietary nature or privacy concerns. Addressing this, we introduce a practical DA paradigm where a source-trained model is used to facilitate adaptation in the absence of the source dataset in future. To this end, we formalize knowledge inheritability as a novel concept and propose a simple yet effective solution to realize inheritable models suitable for the above practical paradigm. Further, we present an objective way to quantify inheritability to enable the selection of the most suitable source model for a given target domain, even in the absence of the source data. We provide theoretical insights followed by a thorough empirical evaluation demonstrating state-of-the-art open-set domain adaptation performance.
△ Less
Submitted 9 April, 2020;
originally announced April 2020.
-
Influence of Surface Hydrophilicity and Hydration on the Rotational Relaxation of Supercooled Water on Graphene Oxide Surfaces
Authors:
Rajasekaran M,
K. Ganapathy Ayappa
Abstract:
Hydration or interfacial water present in biomolecules and inorganic solids have been shown to exhibit a dynamical transition upon supercooling. However, an understanding of the extent of the underlying surface hydrophilicity as well as the local distribution of hydrophilic/hydrophobic patches on the dynamical transition is unexplored. Here, we use molecular dynamics simulations with a TIP4P/2005…
▽ More
Hydration or interfacial water present in biomolecules and inorganic solids have been shown to exhibit a dynamical transition upon supercooling. However, an understanding of the extent of the underlying surface hydrophilicity as well as the local distribution of hydrophilic/hydrophobic patches on the dynamical transition is unexplored. Here, we use molecular dynamics simulations with a TIP4P/2005 water model to study translational and rotational relaxation dynamics of interfacial water on graphene surfaces. The purpose of this study is to investigate the influence of both surface chemistry as well as the extent of hydration on the rotational transitions of interfacial water on graphene oxide (GO) surfaces in the deeply supercooled region. We have considered three graphene-based surfaces; a GO surface with equal proportions of oxidized and pristine graphene regions in a striped topology, a fully oxidized surface and a pristine graphene surface. The dipole relaxation time of interfacial water shows a strong-to-strong, strong, and a fragile-to-strong transition on these surfaces, respectively, in the temperature range of 210-298 K. In contrast, bulk water shows a fragile-to-strong transition upon supercooling. In all these cases at high hydration, interfacial water co-exists with a thick water film with bulk-like properties. To investigate the influence of bulk water on dynamical transitions, we simulated a low hydration regime where only bound water (surface water) is present on the GO surfaces and found that the rotational relaxation of surface water on both the GO and fully oxidized surfaces show a single Arrhenius behavior. Our results indicate that not only does the local extent of surface hydrophilicity play a role in determining the energy landscape explored by the water molecules upon supercooling, but the presence of bulk water also modulates the dynamic transition.
△ Less
Submitted 23 March, 2020;
originally announced March 2020.
-
Dynamical Transitions of Supercooled Water in Graphene oxide Nanopores: Influence of Surface Hydrophobicity
Authors:
Rajasekaran M,
K. Ganapathy Ayappa
Abstract:
Molecular dynamics simulations are carried out to explore the dynamical crossover phenomenon in strongly confined and mildly supercooled water in graphene oxide nanopores. In contrast to studies where confinement is used to study the properties of bulk water, we are interested in the dynamical transitions for strongly confined water in the absence of any bulk-like water. The influence of the physi…
▽ More
Molecular dynamics simulations are carried out to explore the dynamical crossover phenomenon in strongly confined and mildly supercooled water in graphene oxide nanopores. In contrast to studies where confinement is used to study the properties of bulk water, we are interested in the dynamical transitions for strongly confined water in the absence of any bulk-like water. The influence of the physicochemical nature of the graphene oxide surface on the dynamical transitions is investigated by varying the extent of hydrophobicity on the confining surfaces placed at an inter-surface separation of 10 Å\,. All dynamical quantities show a typical slowing down as the temperature is lowered from 298 to 200 K; however, the nature of the transition is a distinct function of the surface type. Water confined between surfaces consisting of alternating hydrophilic and hydrophobic regions exhibit a strong-to-strong dynamical transition in the diffusion coefficients and rotational relaxation times at a crossover temperature of 237 K and show a fragile-to-strong transition in the $α$-relaxation time at 238 K. The observed crossover temperature is much higher than the freezing point of the SPC/E water model used in this study, indicating that these dynamical transitions can occur with mild supercooling under strong confinement in the absence of bulk-like water. In contrast, water confined in hydrophilic pore shows a single Arrhenius energy barrier over the entire temperature range. Our results indicate that in addition to confinement, the nature of the surface can play a critical role in determining the dynamical transitions for water upon supercooling.
△ Less
Submitted 6 March, 2020;
originally announced March 2020.
-
Data hiding in speech signal using steganography and encryption
Authors:
Hanisha Chowdary N,
Karan K,
Bharath K P,
Rajesh Kumar M
Abstract:
Data privacy and data security are always on highest priority in the world. We need a reliable method to encrypt the data so that it reaches the destination safely. Encryption is a simple yet effective way to protect our data while transmitting it to a destination. The proposed method has state of art technology of steganography and encryption. This paper puts forward a different approach for data…
▽ More
Data privacy and data security are always on highest priority in the world. We need a reliable method to encrypt the data so that it reaches the destination safely. Encryption is a simple yet effective way to protect our data while transmitting it to a destination. The proposed method has state of art technology of steganography and encryption. This paper puts forward a different approach for data hiding in speech signals. A ten-digit number within speech signal using audio steganography and encrypting it with a unique key for better security. At the receiver end the same unique key is used to decrypt the received signal and then hidden numbers are extracted. The proposed approach performance can be evaluated by PSNR, MSE, SSIM and bit-error rate. The simulation results give better performance compared to existing approach.
△ Less
Submitted 13 January, 2020;
originally announced February 2020.
-
OMAP-L138 LCDK Development Kit
Authors:
Bharath K P,
Sylash K,
Pravina K,
Rajesh Kumar M
Abstract:
Low cost and low power consumption processor play a vital role in the field of Digital Signal Processing (DSP). The OMAP-L138 development kit which is low cost, low power consumption, ease and speed, with a wide variety of applications includes Digital signal processing, Image processing and video processing. This paper represents the basic introduction to OMAP-L138 processor and quick procedural…
▽ More
Low cost and low power consumption processor play a vital role in the field of Digital Signal Processing (DSP). The OMAP-L138 development kit which is low cost, low power consumption, ease and speed, with a wide variety of applications includes Digital signal processing, Image processing and video processing. This paper represents the basic introduction to OMAP-L138 processor and quick procedural steps for real time and non-real time implementations with a set of programs. The real time experiments are based on audio in the applications of audio loopback, delay and echo. Whereas the non-real time experiments are generation of a sine wave, low pass and high pass filter.
△ Less
Submitted 13 January, 2020;
originally announced January 2020.
-
Radial Based Analysis of GRNN in Non-Textured Image Inpainting
Authors:
Karthik R,
Anvita Dwivedi,
Haripriya M,
Bharath K P,
Rajesh Kumar M
Abstract:
Image inpainting algorithms are used to restore some damaged or missing information region of an image based on the surrounding information. The method proposed in this paper applies the radial based analysis of image inpainting on GRNN. The damaged areas are first isolated from rest of the areas and then arranged by their size and then inpainted using GRNN. The training of the neural network is d…
▽ More
Image inpainting algorithms are used to restore some damaged or missing information region of an image based on the surrounding information. The method proposed in this paper applies the radial based analysis of image inpainting on GRNN. The damaged areas are first isolated from rest of the areas and then arranged by their size and then inpainted using GRNN. The training of the neural network is done using different radii to achieve a better outcome. A comparative analysis is done for different regression-based algorithms. The overall results are compared with the results achieved by the other algorithms as LS-SVM with reference to the PSNR value.
△ Less
Submitted 13 January, 2020;
originally announced January 2020.
-
Handwritten Character Recognition Using Unique Feature Extraction Technique
Authors:
Sai Abhishikth Ayyadevara,
P N V Sai Ram Teja,
Bharath K P,
Rajesh Kumar M
Abstract:
One of the most arduous and captivating domains under image processing is handwritten character recognition. In this paper we have proposed a feature extraction technique which is a combination of unique features of geometric, zone-based hybrid, gradient features extraction approaches and three different neural networks namely the Multilayer Perceptron network using Backpropagation algorithm (MLP…
▽ More
One of the most arduous and captivating domains under image processing is handwritten character recognition. In this paper we have proposed a feature extraction technique which is a combination of unique features of geometric, zone-based hybrid, gradient features extraction approaches and three different neural networks namely the Multilayer Perceptron network using Backpropagation algorithm (MLP BP), the Multilayer Perceptron network using Levenberg-Marquardt algorithm (MLP LM) and the Convolutional neural network (CNN) which have been implemented along with the Minimum Distance Classifier (MDC). The procedures lead to the conclusion that the proposed feature extraction algorithm is more accurate than its individual counterparts and also that Convolutional Neural Network is the most efficient neural network of the three in consideration.
△ Less
Submitted 13 January, 2020;
originally announced January 2020.
-
Lightning Impulse Current Tests on some Electroconductive Fabrics
Authors:
Jorge A. Cristancho C.,
Carlos A. Rivera G.,
Jorge E. Rodriguez M.,
John J. Pantoja A.,
Liz K. Herrera Q.,
Francisco Roman
Abstract:
On the search of lightweight lightning protection materials that can be used as part of lightning protection systems, we investigate some types of electroconductive fabrics by applying several lightning impulse currents in laboratory. Samples of four commercially available electroconductive textiles were analyzed, two rip-stop, a plain-weave, a nonwoven, and additionally a carbon-impregnated polym…
▽ More
On the search of lightweight lightning protection materials that can be used as part of lightning protection systems, we investigate some types of electroconductive fabrics by applying several lightning impulse currents in laboratory. Samples of four commercially available electroconductive textiles were analyzed, two rip-stop, a plain-weave, a nonwoven, and additionally a carbon-impregnated polymeric film. Under laboratory conditions, each sample was subjected to several lengthwise subsequent lightning-like currents of 8/20 us standard waveform, recording both voltage and current signals. Optical and scanning electron microscope observations were performed after tests, revealing some patterns or morphological changes on the fabric surface. Despite these changes, the investigated conductive textiles withstand the several lightning impulse currents applied. Results suggest that some conductive fabrics could be used in personal mobile shelters, to protect human beings against the earth potential rise caused by a close lightning discharge.
△ Less
Submitted 2 May, 2023; v1 submitted 12 November, 2019;
originally announced November 2019.
-
NAOMI: the adaptive optics system of the Auxiliary Telescopes of the VLTI
Authors:
Woillez J.,
Abad J. A.,
Abuter R.,
Aller Carpentier E.,
Alonso J.,
Andolfato L.,
Barriga P.,
Berger J. -P.,
Beuzit J. -L.,
Bonnet H.,
Bourdarot G.,
Bourget P.,
Brast R.,
Caniguante L.,
Cottalorda E.,
Darré P.,
Delabre B.,
Delboulbé A.,
Delplancke-Ströbele F.,
Dembet R.,
Donaldson R.,
Dorn R.,
Dupeyron J.,
Dupuy C.,
Egner S.
, et al. (58 additional authors not shown)
Abstract:
The tip-tilt stabilisation system of the 1.8 m Auxiliary Telescopes of the Very Large Telescope Interferometer was never dimensioned for robust fringe tracking, except when atmospheric seeing conditions are excellent. Increasing the level of wavefront correction at the telescopes is expected to improve the coupling into the single-mode fibres of the instruments, and enable robust fringe tracking e…
▽ More
The tip-tilt stabilisation system of the 1.8 m Auxiliary Telescopes of the Very Large Telescope Interferometer was never dimensioned for robust fringe tracking, except when atmospheric seeing conditions are excellent. Increasing the level of wavefront correction at the telescopes is expected to improve the coupling into the single-mode fibres of the instruments, and enable robust fringe tracking even in degraded conditions. We deployed a new adaptive optics module for interferometry (NAOMI) on the Auxiliary Telescopes. We present its design, performance, and effect on the observations that are carried out with the interferometric instruments.
△ Less
Submitted 19 August, 2019;
originally announced August 2019.
-
A Novel Beamformed Control Channel Design for LTE with Full Dimension-MIMO
Authors:
Pavan Reddy M.,
Harish Kumar D.,
Saidhiraj Amuru,
Kiran Kuchi
Abstract:
The Full Dimension-MIMO (FD-MIMO) technology is capable of achieving huge improvements in network throughput with simultaneous connectivity of a large number of mobile wireless devices, unmanned aerial vehicles, and the Internet of Things (IoT). In FD-MIMO, with a large number of antennae at the base station and the ability to perform beamforming, the capacity of the physical downlink shared chann…
▽ More
The Full Dimension-MIMO (FD-MIMO) technology is capable of achieving huge improvements in network throughput with simultaneous connectivity of a large number of mobile wireless devices, unmanned aerial vehicles, and the Internet of Things (IoT). In FD-MIMO, with a large number of antennae at the base station and the ability to perform beamforming, the capacity of the physical downlink shared channel (PDSCH) has increased a lot. However, the current specifications of the 3rd Generation Partnership Project (3GPP) does not allow the base station to perform beamforming techniques for the physical downlink control channel (PDCCH), and hence, PDCCH has neither the capacity nor the coverage of PDSCH. Therefore, PDCCH capacity will still limit the performance of a network as it dictates the number of users that can be scheduled at a given time instant. In Release 11, 3GPP introduced enhanced PDCCH (EPDCCH) to increase the PDCCH capacity at the cost of sacrificing the PDSCH resources. The problem of enhancing the PDCCH capacity within the available control channel resources has not been addressed yet in the literature. Hence, in this paper, we propose a novel beamformed PDCCH (BF-PDCCH) design which is aligned to the 3GPP specifications and requires simple software changes at the base station. We rely on the sounding reference signals transmitted in the uplink to decide the best beam for a user and ingeniously schedule the users in PDCCH. We perform system level simulations to evaluate the performance of the proposed design and show that the proposed BF-PDCCH achieves larger network throughput when compared with the current state of art algorithms, PDCCH and EPDCCH schemes.
△ Less
Submitted 14 May, 2019;
originally announced May 2019.
-
hf0: A hybrid pitch extraction method for multimodal voice
Authors:
Pradeep Rengaswamy,
Gurunath Reddy M,
Krothapalli Sreenivasa Rao
Abstract:
Pitch or fundamental frequency (f0) extraction is a fundamental problem studied extensively for its potential applications in speech and clinical applications. In literature, explicit mode specific (modal speech or singing voice or emotional/ expressive speech or noisy speech) signal processing and deep learning f0 extraction methods that exploit the quasi periodic nature of the signal in time, ha…
▽ More
Pitch or fundamental frequency (f0) extraction is a fundamental problem studied extensively for its potential applications in speech and clinical applications. In literature, explicit mode specific (modal speech or singing voice or emotional/ expressive speech or noisy speech) signal processing and deep learning f0 extraction methods that exploit the quasi periodic nature of the signal in time, harmonic property in spectral or combined form to extract the pitch is developed. Hence, there is no single unified method which can reliably extract the pitch from various modes of the acoustic signal. In this work, we propose a hybrid f0 extraction method which seamlessly extracts the pitch across modes of speech production with very high accuracy required for many applications. The proposed hybrid model exploits the advantages of deep learning and signal processing methods to minimize the pitch detection error and adopts to various modes of acoustic signal. Specifically, we propose an ordinal regression convolutional neural networks to map the periodicity rich input representation to obtain the nominal pitch classes which drastically reduces the number of classes required for pitch detection unlike other deep learning approaches. Further, the accurate f0 is estimated from the nominal pitch class labels by filtering and autocorrelation. We show that the proposed method generalizes to the unseen modes of voice production and various noises for large scale datasets. Also, the proposed hybrid model significantly reduces the learning parameters required to train the deep model compared to other methods. Furthermore,the evaluation measures showed that the proposed method is significantly better than the state-of-the-art signal processing and deep learning approaches.
△ Less
Submitted 22 April, 2019;
originally announced April 2019.
-
BacSoft: A Tool to Archive Data on Bacteria
Authors:
Amay Agrawal,
Dixita Limbachiya,
Ravikumar M.,
Taslimarif Saiyed,
Manish K. Gupta
Abstract:
Recently, DNA data storage systems have attracted many researchers worldwide. Motivated by the success stories of such systems, in this work we propose a software called BacSoft to clone the data in a bacterial plasmid by using the concept of genetic engineering. We consider the encoding schemes such that it satisfies constraints significant for bacterial data storage.
Recently, DNA data storage systems have attracted many researchers worldwide. Motivated by the success stories of such systems, in this work we propose a software called BacSoft to clone the data in a bacterial plasmid by using the concept of genetic engineering. We consider the encoding schemes such that it satisfies constraints significant for bacterial data storage.
△ Less
Submitted 5 March, 2019;
originally announced March 2019.
-
First experimental constraint on the $^{191}$Os$(n,γ)$ reaction rate relevant to $s$-process nucleosynthesis
Authors:
I. K. B. Kullmann,
A. C. Larsen,
T. Renstrø m,
K. S. Beckmann,
F. L. Bello Garrote,
L. Crespo Campo,
A. Görgen,
M. Guttormsen,
J. E. Midtbø,
E. Sahin,
S. Siem,
G. M. Tveten,
F. Zeiser
Abstract:
The nuclear level density and $γ$-decay strength of $^{192}$Os have been extracted using particle-$γ$ coincidence data from the $^{192}$Os($α,α^\primeγ$)$^{192}$Os reaction by means of the Oslo method. The level density is found to be a rather smooth function of excitation energy, approximately following the constant temperature model. The $γ$-decay strength is compared to photoneutron cross-secti…
▽ More
The nuclear level density and $γ$-decay strength of $^{192}$Os have been extracted using particle-$γ$ coincidence data from the $^{192}$Os($α,α^\primeγ$)$^{192}$Os reaction by means of the Oslo method. The level density is found to be a rather smooth function of excitation energy, approximately following the constant temperature model. The $γ$-decay strength is compared to photoneutron cross-section data above the neutron separation energy, and to $E1$ and $M1$ strengths for nuclei in this mass region derived from primary transitions following neutron capture. Our results are in good agreement with these previous data and draw a consistent picture of the $γ$-strength function in the range $E_γ\approx 1.5-6 $ MeV.
Using the measured nuclear level density and $γ$-decay strength as input to the nuclear-reaction code TALYS, we provide the first experimentally constrained Maxwellian-averaged cross section (MACS) for the $^{191}$Os($n,γ$)$^{192}$Os reaction relevant to $s$-process nucleosynthesis. The systematic uncertainties introduced by the normalization procedure of the level density and $γ$-strength function were investigated and propagated to the calculated Maxwellian-averaged cross section. The obtained result of the Maxwellian-averaged cross section at $k_BT=30$ keV, $\langle σ\rangle_{n,γ}=1134\pm 375$ mb, is in very good agreement with the theoretical estimate provided by the KADoNiS project, giving experimental support to the adopted KADoNiS value. Good agreement is also found with MACS values obtained from other libraries, such as TENDL-2017, ENDF/B-VII.0, and JEFF.
△ Less
Submitted 16 June, 2019; v1 submitted 6 December, 2018;
originally announced December 2018.
-
Glottal Closure Instants Detection From Pathological Acoustic Speech Signal Using Deep Learning
Authors:
Gurunath Reddy M,
Tanumay Mandal,
Krothapalli Sreenivasa Rao
Abstract:
In this paper, we propose a classification based glottal closure instants (GCI) detection from pathological acoustic speech signal, which finds many applications in vocal disorder analysis. Till date, GCI for pathological disorder is extracted from laryngeal (glottal source) signal recorded from Electroglottograph, a dedicated device designed to measure the vocal folds vibration around the larynx.…
▽ More
In this paper, we propose a classification based glottal closure instants (GCI) detection from pathological acoustic speech signal, which finds many applications in vocal disorder analysis. Till date, GCI for pathological disorder is extracted from laryngeal (glottal source) signal recorded from Electroglottograph, a dedicated device designed to measure the vocal folds vibration around the larynx. We have created a pathological dataset which consists of simultaneous recordings of glottal source and acoustic speech signal of six different disorders from vocal disordered patients. The GCI locations are manually annotated for disorder analysis and supervised learning. We have proposed convolutional neural network based GCI detection method by fusing deep acoustic speech and linear prediction residual features for robust GCI detection. The experimental results showed that the proposed method is significantly better than the state-of-the-art GCI detection methods.
△ Less
Submitted 25 November, 2018;
originally announced November 2018.
-
Semi-supervised and Active-learning Scenarios: Efficient Acoustic Model Refinement for a Low Resource Indian Language
Authors:
Maharajan Chellapriyadharshini,
Anoop Toffy,
Srinivasa Raghavan K. M.,
V Ramasubramanian
Abstract:
We address the problem of efficient acoustic-model refinement (continuous retraining) using semi-supervised and active learning for a low resource Indian language, wherein the low resource constraints are having i) a small labeled corpus from which to train a baseline `seed' acoustic model and ii) a large training corpus without orthographic labeling or from which to perform a data selection for m…
▽ More
We address the problem of efficient acoustic-model refinement (continuous retraining) using semi-supervised and active learning for a low resource Indian language, wherein the low resource constraints are having i) a small labeled corpus from which to train a baseline `seed' acoustic model and ii) a large training corpus without orthographic labeling or from which to perform a data selection for manual labeling at low costs. The proposed semi-supervised learning decodes the unlabeled large training corpus using the seed model and through various protocols, selects the decoded utterances with high reliability using confidence levels (that correlate to the WER of the decoded utterances) and iterative bootstrap**. The proposed active learning protocol uses confidence level based metric to select the decoded utterances from the large unlabeled corpus for further labeling. The semi-supervised learning protocols can offer a WER reduction, from a poorly trained seed model, by as much as 50% of the best WER-reduction realizable from the seed model's WER, if the large corpus were labeled and used for acoustic-model training. The active learning protocols allow that only 60% of the entire training corpus be manually labeled, to reach the same performance as the entire data.
△ Less
Submitted 2 October, 2018;
originally announced October 2018.
-
Intensity and Rescale Invariant Copy Move Forgery Detection Techniques
Authors:
Tejas K,
Swathi C,
Rajesh Kumar M
Abstract:
In this contemporary world digital media such as videos and images behave as an active medium to carry valuable information across the globe on all fronts. However there are several techniques evolved to tamper the image which has made their authenticity untrustworthy. CopyMove Forgery CMF is one of the most common forgeries present in an image where a cluster of pixels are duplicated in the same…
▽ More
In this contemporary world digital media such as videos and images behave as an active medium to carry valuable information across the globe on all fronts. However there are several techniques evolved to tamper the image which has made their authenticity untrustworthy. CopyMove Forgery CMF is one of the most common forgeries present in an image where a cluster of pixels are duplicated in the same image with potential postprocessing techniques. Various state-of-art techniques are developed in the recent years which are effective in detecting passive image forgery. However most methods do fail when the copied image is rescaled or added with certain intensity before being pasted due to de-synchronization of pixels in the searching process. To tackle this problem the paper proposes distinct novel algorithms which recognize a unique approach of using Hus invariant moments and Discreet Cosine Transformations DCT to attain the desired rescale invariant and intensity invariant CMF detection techniques respectively. The experiments conducted quantitatively and qualitatively demonstrate the effectiveness of the algorithm.
△ Less
Submitted 11 September, 2018;
originally announced September 2018.
-
Copy Move Forgery using Hus Invariant Moments and Log Polar Transformations
Authors:
Tejas K,
Swathi C,
Rajesh Kumar M
Abstract:
With the increase in interchange of data, there is a growing necessity of security. Considering the volumes of digital data that is transmitted, they are in need to be secure. Among the many forms of tampering possible, one widespread technique is Copy Move Forgery CMF. This forgery occurs when parts of the image are copied and duplicated elsewhere in the same image. There exist a number of algori…
▽ More
With the increase in interchange of data, there is a growing necessity of security. Considering the volumes of digital data that is transmitted, they are in need to be secure. Among the many forms of tampering possible, one widespread technique is Copy Move Forgery CMF. This forgery occurs when parts of the image are copied and duplicated elsewhere in the same image. There exist a number of algorithms to detect such a forgery in which the primary step involved is feature extraction. The feature extraction techniques employed must have lesser time and space complexity involved for an efficient and faster processing of media. Also, majority of the existing state of art techniques often tend to falsely match similar genuine objects as copy move forged during the detection process. To tackle these problems, the paper proposes a novel algorithm that recognizes a unique approach of using Hus Invariant Moments and Log polar Transformations to reduce feature vector dimension to one feature per block simultaneously detecting CMF among genuine similar objects in an image. The qualitative and quantitative results obtained demonstrate the effectiveness of this algorithm.
△ Less
Submitted 7 June, 2018;
originally announced June 2018.
-
Implementation of Neural Network and feature extraction to classify ECG signals
Authors:
R Karthik,
Dhruv Tyagi,
Amogh Raut,
Soumya Saxena,
Rajesh Kumar M
Abstract:
This paper presents a suitable and efficient implementation of a feature extraction algorithm (Pan Tompkins algorithm) on electrocardiography (ECG) signals, for detection and classification of four cardiac diseases: Sleep Apnea, Arrhythmia, Supraventricular Arrhythmia and Long Term Atrial Fibrillation (AF) and differentiating them from the normal heart beat by using pan Tompkins RR detection follo…
▽ More
This paper presents a suitable and efficient implementation of a feature extraction algorithm (Pan Tompkins algorithm) on electrocardiography (ECG) signals, for detection and classification of four cardiac diseases: Sleep Apnea, Arrhythmia, Supraventricular Arrhythmia and Long Term Atrial Fibrillation (AF) and differentiating them from the normal heart beat by using pan Tompkins RR detection followed by feature extraction for classification purpose .The paper also presents a new approach towards signal classification using the existing neural networks classifiers.
△ Less
Submitted 17 February, 2018;
originally announced February 2018.
-
Sentiment Analysis on Speaker Specific Speech Data
Authors:
Maghilnan S,
Rajesh Kumar M
Abstract:
Sentiment analysis has evolved over past few decades, most of the work in it revolved around textual sentiment analysis with text mining techniques. But audio sentiment analysis is still in a nascent stage in the research community. In this proposed research, we perform sentiment analysis on speaker discriminated speech transcripts to detect the emotions of the individual speakers involved in the…
▽ More
Sentiment analysis has evolved over past few decades, most of the work in it revolved around textual sentiment analysis with text mining techniques. But audio sentiment analysis is still in a nascent stage in the research community. In this proposed research, we perform sentiment analysis on speaker discriminated speech transcripts to detect the emotions of the individual speakers involved in the conversation. We analyzed different techniques to perform speaker discrimination and sentiment analysis to find efficient algorithms to perform this task.
△ Less
Submitted 17 February, 2018;
originally announced February 2018.
-
Automatic Phone Slip Detection System
Authors:
Karthik R,
Preetam Satapath,
Srivatsa Patnaik,
Saurabh Priyadarshi,
Rajesh Kumar M
Abstract:
Mobile phones are becoming increasingly advanced and the latest ones are equipped with many diverse and powerful sensors. These sensors can be used to study different position and orientation of the phone which can help smartphone manufacture to track about their customers handling from the recorded log. The inbuilt sensors such as the accelerometer and gyroscope present in our phones are used to…
▽ More
Mobile phones are becoming increasingly advanced and the latest ones are equipped with many diverse and powerful sensors. These sensors can be used to study different position and orientation of the phone which can help smartphone manufacture to track about their customers handling from the recorded log. The inbuilt sensors such as the accelerometer and gyroscope present in our phones are used to obtain data for acceleration and orientation of the phone in the three axes for different phone vulnerable position. From the data obtained appropriate features are extracted using various feature extraction techniques. The extracted features are then given to classifier such as neural network to classify them and decide whether the phone is in a vulnerable position to fall or it is in a safe position .In this paper we mainly concentrated on various case of handling the smartphone and classified by training the neural network.
△ Less
Submitted 10 February, 2018;
originally announced February 2018.
-
A text-independent speaker verification model: A comparative analysis
Authors:
Rishi Charan,
Manisha. A,
Karthik. R,
Rajesh Kumar M
Abstract:
The most pressing challenge in the field of voice biometrics is selecting the most efficient technique of speaker recognition. Every individual's voice is peculiar, factors like physical differences in vocal organs, accent and pronunciation contributes to the problem's complexity. In this paper, we explore the various methods available in each block in the process of speaker recognition with the o…
▽ More
The most pressing challenge in the field of voice biometrics is selecting the most efficient technique of speaker recognition. Every individual's voice is peculiar, factors like physical differences in vocal organs, accent and pronunciation contributes to the problem's complexity. In this paper, we explore the various methods available in each block in the process of speaker recognition with the objective to identify best of techniques that could be used to get precise results. We study the results on text independent corpora. We use MFCC (Melfrequency cepstral coefficient), LPCC (linear predictive cepstral coefficient) and PLP (perceptual linear prediction) algorithms for feature extraction, PCA (Principal Component Analysis) and tSNE for dimensionality reduction and SVM (Support Vector Machine), feed forward, nearest neighbor and decision tree algorithms for classification block in speaker recognition system and comparatively analyze each block to determine the best technique
△ Less
Submitted 4 December, 2017;
originally announced December 2017.
-
Efficient Licence Plate Detection By Unique Edge Detection Algorithm and Smarter Interpretation Through IoT
Authors:
Tejas K,
Ashok Reddy K,
Pradeep Reddy D,
Rajesh Kumar M
Abstract:
Vehicles play a vital role in modern day transportation systems. Number plate provides a standard means of identification for any vehicle. To serve this purpose, automatic licence plate recognition system was developed. This consisted of four major steps: Pre-processing of the obtained image, extraction of licence plate region, segmentation and character recognition. In earlier research, direct ap…
▽ More
Vehicles play a vital role in modern day transportation systems. Number plate provides a standard means of identification for any vehicle. To serve this purpose, automatic licence plate recognition system was developed. This consisted of four major steps: Pre-processing of the obtained image, extraction of licence plate region, segmentation and character recognition. In earlier research, direct application of Sobel edge detection algorithm or applying threshold were used as key steps to extract the licence plate region, which does not produce effective results when the captured image is subjected to the high intensity of light. The use of morphological operations causes deformity in the characters during segmentation. We propose a novel algorithm to tackle the mentioned issues through a unique edge detection algorithm. It is also a tedious task to create and update the database of required vehicles frequently. This problem is solved by the use of Internet of things(IOT) where an online database can be created and updated from any module instantly. Also, through IoT, we connect all the cameras in a geographical area to one server to create a universal eye which drastically increases the probability of tracing a vehicle over having manual database attached to each camera for identification purpose.
△ Less
Submitted 28 October, 2017;
originally announced October 2017.
-
High Capacity, Secure (n, n/8) Multi Secret Image Sharing Scheme with Security Key
Authors:
Karthik Reddy,
Tejas K,
Swathi C,
Ashok K,
Rajesh Kumar M
Abstract:
The rising need of secret image sharing with high security has led to much advancement in lucrative exchange of important images which contain vital and confidential information. Multi secret image sharing system (MSIS) is an efficient and robust method for transmitting one or more secret images securely. In recent research, n secret images are encrypted into n or n+ 1 shared images and stored in…
▽ More
The rising need of secret image sharing with high security has led to much advancement in lucrative exchange of important images which contain vital and confidential information. Multi secret image sharing system (MSIS) is an efficient and robust method for transmitting one or more secret images securely. In recent research, n secret images are encrypted into n or n+ 1 shared images and stored in different database servers. The decoder has to receive all n or n+1 encrypted images to reproduce the secret image. One can recover partial secret information from n-1 or fewer shared images, which poses risk for the confidential information encrypted. In this proposed paper we developed a novel algorithm to increase the sharing capacity by using (n, n/8) multi-secret sharing scheme with increased security by generating a unique security key. A unrevealed comparison image is used to produce shares which makes the secret image invulnerable to the hackers
△ Less
Submitted 26 October, 2017;
originally announced October 2017.
-
Low Cost Swarm Based Diligent Cargo Transit System
Authors:
Harish Karunakaran,
Varadhan R,
Anurag R M,
Harmanpreet S
Abstract:
The goal of this paper is to present the design and development of a low cost cargo transit system which can be adapted in develo** countries like India where there is abundant and cheap human labour which makes the process of automation in any industry a challenge to innovators. The need of the hour is an automation system that can diligently transfer cargo from one place to another and minimiz…
▽ More
The goal of this paper is to present the design and development of a low cost cargo transit system which can be adapted in develo** countries like India where there is abundant and cheap human labour which makes the process of automation in any industry a challenge to innovators. The need of the hour is an automation system that can diligently transfer cargo from one place to another and minimize human intervention in the cargo transit industry. Therefore, a solution is being proposed which could effectively bring down human labour and the resources needed to implement them. The reduction in human labour and resources is achieved by the use of low cost components and very limited modification of the surroundings and the existing vehicles themselves. The operation of the cargo transit system has been verified and the relevant results are presented. An economical and robust cargo transit system is designed and implemented.
△ Less
Submitted 3 April, 2023; v1 submitted 9 September, 2015;
originally announced September 2015.
-
Assessing the Fault Proneness Degree (DFP) by Estimating the Impact of Change Request Artifacts Correlation
Authors:
Rudra Kumar M,
A Ananda Rao
Abstract:
Exploring the impact of change requests applied to a software maintenance project helps to assess the fault-proneness of the change request to be handled further, which is perhaps a bug fix or even a new feature demand. In practice, the major development community stores change requests and related data using bug tracking systems such as Bugzilla. These data, together with the data stored in a ver…
▽ More
Exploring the impact of change requests applied to a software maintenance project helps to assess the fault-proneness of the change request to be handled further, which is perhaps a bug fix or even a new feature demand. In practice, the major development community stores change requests and related data using bug tracking systems such as Bugzilla. These data, together with the data stored in a versioning system, such as Concurrent Versioning Systems, are a valuable source of information to create descriptions and also can perform useful analyzes. In our earlier work, we proposed a novel statistical bipartite weighted graph-based approach to assessing the degree of fault-proneness of the change request and Change Request artifacts. With the motivation gained from this model, here we propose a novel strategy that estimates the degree of fault-proneness of a change request by assessing the impact of a change request artifact towards fault-proneness that considers the correlation between change requests artifact as another factor, which is in addition to our earlier strategy. The proposed model can be titled as Assessing the Fault Proneness Degree of Change Request Artifacts by estimating the impact of change requests correlation (DFP-CRC). As stated in our earlier model, the method DFP-CRC also makes use of information retrieval methods to identify the change request artifacts of the devised change request. And further evaluates the degree of fault-proneness of the Change Requests by estimating the correlation between change requests. The proposed method is evaluated by applying on concurrent versioning and Change request logs of the production level maintenance project.
△ Less
Submitted 2 February, 2015;
originally announced February 2015.
-
XML Information Retrieval:An overview
Authors:
Suma D.,
U. Dinesh Acharya,
Geetha M.,
Raviraja Holla M
Abstract:
Locating and distilling the valuable relevant information continued to be the major challenges of Information Retrieval (IR) Systems owing to the explosive growth of online web information. These challenges can be considered the XML Information Retrieval challenges as XML has become a de facto standard over the Web. The research on XML IR starts with the classical IR strategies customized to XML I…
▽ More
Locating and distilling the valuable relevant information continued to be the major challenges of Information Retrieval (IR) Systems owing to the explosive growth of online web information. These challenges can be considered the XML Information Retrieval challenges as XML has become a de facto standard over the Web. The research on XML IR starts with the classical IR strategies customized to XML IR. Later novel IR strategies specific to XML IR are evolved. Meanwhile literatures reveal development of the rapid and intelligent IR systems. Despite their success in their specified constrained domains, they have additional limitations in the complex information space. The effectiveness of IR systems is thus unsolved in satisfying the most. This article attemptsan overview of earlier efforts and the gaps in XML IR.
△ Less
Submitted 27 October, 2014;
originally announced October 2014.
-
New Superconductor (Na0.25K0.45) Ba3Bi4O12: A First-principles Study
Authors:
Ali M. S.,
Aftabuzzaman M.,
Roknuzzaman M.,
Rayhan M. A.,
Parvin F.,
Ali M. M.,
Rubel M. H. K.,
Islam A. K. M. A
Abstract:
A new superconductor (Na0.25K0.45)Ba3Bi4O12, having an A-site-ordered double perovskite structure, with a maximum Tc ~ 27 K has very recently been discovered through hydrothermal synthesis at 593 K. The structural, elastic, electronic, and thermal properties of the new synthesized compound have been investigated theoretically. Here we have employed the pseudo-potential plane-wave (PP-PW) approach…
▽ More
A new superconductor (Na0.25K0.45)Ba3Bi4O12, having an A-site-ordered double perovskite structure, with a maximum Tc ~ 27 K has very recently been discovered through hydrothermal synthesis at 593 K. The structural, elastic, electronic, and thermal properties of the new synthesized compound have been investigated theoretically. Here we have employed the pseudo-potential plane-wave (PP-PW) approach based on the density functional (DFT) theory, within the generalized gradient approximation (GGA). The elastic constants (Cij), Pugh`s ratio, Cauchy`s pressure and other elastic parameters are derived and analyzed using energy strain method for the first time. We have discussed the bonding nature in the light of the electronic valence charge density. Both electron and hole-like Fermi surfaces are present in the compound under study which indicate the multiple-band nature of (Na0.25K0.45)Ba3Bi4O12. The compound is indicated to be a strongly coupled superconductor which is based on the estimated e-ph coupling constant. The thermodynamic properties such as bulk modulus, Debye temperature, heat capacities and volume thermal expansion coefficient at elevated temperature and pressure are calculated and analyzed for the first time by using quasi-harmonic model.
Key words: double perovskite, superconductor, elastic properties, electronic properties, thermal properties
△ Less
Submitted 22 July, 2014;
originally announced July 2014.
-
Solar wind reflection from the lunar surface: The view from far and near
Authors:
L. Saul,
P. Wurz,
A. Vorburger,
D. F. Rodríguez M.,
S. A. Fuselier,
D. J. McComas,
E. Möbius,
S. Barabash,
Herb Funsten,
Paul Janzen
Abstract:
The Moon appears bright in the sky as a source of energetic neutral atoms (ENAs). These ENAs have recently been imaged over a broad energy range both from near the lunar surface, by India's Chandrayaan-1 mission (CH-1), and from a much more distant Earth orbit by NASA's Interstellar Boundary Explorer (IBEX) satellite. Both sets of observations have indicated that a relatively large fraction of the…
▽ More
The Moon appears bright in the sky as a source of energetic neutral atoms (ENAs). These ENAs have recently been imaged over a broad energy range both from near the lunar surface, by India's Chandrayaan-1 mission (CH-1), and from a much more distant Earth orbit by NASA's Interstellar Boundary Explorer (IBEX) satellite. Both sets of observations have indicated that a relatively large fraction of the solar wind is reflected from the Moon as energetic neutral hydrogen. CH-1's angular resolution over different viewing angles of the lunar surface has enabled measurement of the emission as a function of angle. IBEX in contrast views not just a swath but a whole quadrant of the Moon as effectively a single pixel, as it subtends even at the closest approach no more than a few degrees on the sky. Here we use the scattering function measured by CH-1 to model global lunar ENA emission and combine these with IBEX observations. The deduced global reflection is modestly larger (by a factor of 1.25) when the angular scattering function is included. This provides a slightly updated IBEX estimate of AH = 0.11 +/- 0.06 for the global neutralized albedo, which is 25 % larger than the previous values of 0.09 +/- 0.05, based on an assumed uniform scattering distribution.
△ Less
Submitted 16 June, 2013;
originally announced June 2013.
-
Securing IEEE 802.11G WLAN Using OpenVPN and Its Impact Analysis
Authors:
Praveen Likhar,
Ravi Shankar Yadav,
Keshava Rao M
Abstract:
Like most advances, wireless LAN poses both opportunities and risks. The evolution of wireless networking in recent years has raised many serious security issues. These security issues are of great concern for this technology as it is being subjected to numerous attacks. Because of the free-space radio transmission in wireless networks, eavesdrop** becomes easy and consequently a security breach…
▽ More
Like most advances, wireless LAN poses both opportunities and risks. The evolution of wireless networking in recent years has raised many serious security issues. These security issues are of great concern for this technology as it is being subjected to numerous attacks. Because of the free-space radio transmission in wireless networks, eavesdrop** becomes easy and consequently a security breach may result in unauthorized access, information theft, interference and service degradation. Virtual Private Networks (VPNs) have emerged as an important solution to security threats surrounding the use of public networks for private communications. While VPNs for wired line networks have matured in both research and commercial environments, the design and deployment of VPNs for WLAN is still an evolving field. This paper presents an approach to secure IEEE 802.11g WLAN using OpenVPN, a transport layer VPN solution and its impact on performance of IEEE 802.11g WLAN.
△ Less
Submitted 2 January, 2012;
originally announced January 2012.
-
On the solutions of the equation x^3+ax=b in Z*_3 with coefficients from Q_3
Authors:
Rikhsiboev I. M.,
Khudoyberdiyev A. Kh.,
Kurbanbaev T. K.,
Masutova K. K
Abstract:
In this paper we present the algorithm of finding the solutions of the equation $x^3+ax=b$ in $\mathbb{Z}^*_3$ with coefficients from $\mathbb{Q}_3$.
In this paper we present the algorithm of finding the solutions of the equation $x^3+ax=b$ in $\mathbb{Z}^*_3$ with coefficients from $\mathbb{Q}_3$.
△ Less
Submitted 13 October, 2013; v1 submitted 5 October, 2011;
originally announced October 2011.
-
Design and Implementation VOIP Service on Open IMS and Asterisk Servers Interconnected through Enum Server
Authors:
Rendy Munadi,
Effan Najwaini,
Asep Mulyana,
R. Rumani. M
Abstract:
Asterisk and Open IMS use SIP signal protocol to enable both of them can be connected. To facilitate both relationships, Enum server- that is able to translate the numbering address such as PSTN (E.164) to URI address (Uniform Resource Identifier)- can be used. In this research, we interconnect Open IMS and Asterisk server Enum server. We then analyze the server performance and PDD (Post Dial Dela…
▽ More
Asterisk and Open IMS use SIP signal protocol to enable both of them can be connected. To facilitate both relationships, Enum server- that is able to translate the numbering address such as PSTN (E.164) to URI address (Uniform Resource Identifier)- can be used. In this research, we interconnect Open IMS and Asterisk server Enum server. We then analyze the server performance and PDD (Post Dial Delay) values resulted by the system. As the result of the experiment, we found that, for a call from Open IMS user to analog Asterisk telephone (FXS) with a arrival call each servers is 30 call/sec, the maximum PDD value is 493.656 ms. Open IMS is able to serve maximum 30 call/s with computer processor 1.55 GHz, while the Asterisk with computer processor 3.0 GHz, may serve up to 55 call/sec. Enum on server with 1.15 GHz computer processor have the capability of serving maximum of 8156 queries/sec.
△ Less
Submitted 17 June, 2010;
originally announced June 2010.
-
Discrete sources as the origin of the Galactic X-ray ridge emission
Authors:
Revnivtsev M.,
Sazonov S.,
Churazov E.,
Forman W.,
Vikhlinin A.,
Sunyaev R.
Abstract:
An unresolved X-ray glow (at energies above a few kiloelectronvolts) was discovered about 25 years ago and found to be coincident with the Galactic disk -the Galactic ridge X-ray emission. This emission has a spectrum characteristic of a 1e8 K optically thin thermal plasma, with a prominent iron emission line at 6.7 keV. The gravitational well of the Galactic disk, however, is far too shallow to…
▽ More
An unresolved X-ray glow (at energies above a few kiloelectronvolts) was discovered about 25 years ago and found to be coincident with the Galactic disk -the Galactic ridge X-ray emission. This emission has a spectrum characteristic of a 1e8 K optically thin thermal plasma, with a prominent iron emission line at 6.7 keV. The gravitational well of the Galactic disk, however, is far too shallow to confine such a hot interstellar medium; instead, it would flow away at a velocity of a few thousand kilometres per second, exceeding the speed of sound in gas. To replenish the energy losses requires a source of 10^{43} erg/s, exceeding by orders of magnitude all plausible energy sources in the Milky Way. An alternative is that the hot plasma is bound to a multitude of faint sources, which is supported by the recently observed similarities in the X-ray and near-infrared surface brightness distributions (the latter traces the Galactic stellar distribution). Here we report that at energies of 6-7 keV, more than 80 per cent of the seemingly diffuse X-ray emission is resolved into discrete sources, probably accreting white dwarfs and coronally active stars.
△ Less
Submitted 29 April, 2009;
originally announced April 2009.
-
On Some Aspects of 4-Dimensional Topology: A Popular Survey
Authors:
R. V. M
Abstract:
The general structure of the paper should be remaid. Hence author removed this paper from arXiv.
The general structure of the paper should be remaid. Hence author removed this paper from arXiv.
△ Less
Submitted 23 October, 2006; v1 submitted 28 March, 2005;
originally announced March 2005.
-
Proper Motion and Kinematics of the Ansae in NGC7009
Authors:
Rodrigo Fernandez M.,
Hektor Monteiro,
Hugo E. Schwarz
Abstract:
We have measured the proper motion (PM) and kinematics of the ansae in NGC 7009 using high dispersion echelle spectra and archive narrow band HST images. Assuming that the ansae are moving at equal and opposite velocities from the central star we obtain a system radial velocity of -53+-2km/s, the eastern ansa approaching and the western ansa receding at Vr=5.3+-1km/s with respect to this value.…
▽ More
We have measured the proper motion (PM) and kinematics of the ansae in NGC 7009 using high dispersion echelle spectra and archive narrow band HST images. Assuming that the ansae are moving at equal and opposite velocities from the central star we obtain a system radial velocity of -53+-2km/s, the eastern ansa approaching and the western ansa receding at Vr=5.3+-1km/s with respect to this value. The PM of the eastern ansa is 28+-8mas/yr, which with our weighted distance to NGC 7009 of 0.86+-0.34kpc gives Vexp=112+-32km/s. The electron temperature and density in both ansae were determined to be Te=9000+-400K and Ne=2300+-400/cc. The dynamic age of the ansae is 925+-260yrs.and the implied PM of the central star is 1+-0.5mas/yr. This is in qualitative but not quantitative agreement with previous work.
△ Less
Submitted 27 November, 2003;
originally announced November 2003.
-
A New Class of Bounds for Correlation Functions in Euclidean Lattice Field Theory and Statistical Mechanics of Spin Systems
Authors:
Requardt M
Abstract:
Starting from an extension of the Poisson bracket structure and Kubo-Martin-Schwinger-property of classical statistical mechanics of continuous systems to spin systems, defined on a lattice, we derive a series of, as we think, new and interesting bounds on correlation functions for general lattice systems. Our method is expected to yield also useful results in Euclidean Field Theory. Furthermore…
▽ More
Starting from an extension of the Poisson bracket structure and Kubo-Martin-Schwinger-property of classical statistical mechanics of continuous systems to spin systems, defined on a lattice, we derive a series of, as we think, new and interesting bounds on correlation functions for general lattice systems. Our method is expected to yield also useful results in Euclidean Field Theory. Furthermore the approach is applicable in situations where other techniques fail, e.g. in the study of phase transitions without breaking of a {\bf continuous} symmetry like $P(φ)$-theories with $φ(x)$ scalar.
△ Less
Submitted 25 April, 1995;
originally announced April 1995.