Skip to main content

Showing 51–97 of 97 results for author: M, R

.
  1. Interactions of charged microrods in chiral nematic liquid crystals

    Authors: Muhammed Rasi M, Ravi Kumar Pujala, Sathyanarayana Paladugu, Surajit Dhara

    Abstract: We study the pair interaction of charged silica microrods in chiral nematic liquid crystals and show that the microrods with homeotropic surface anchoring form a bound state due to the competing effect of electrostatic (Coulomb) and elastic interactions. The robustness of the bound state is demonstrated by applying external electrical and mechanical forces that perturbs their equilibrium position… ▽ More

    Submitted 12 November, 2022; v1 submitted 9 February, 2021; originally announced February 2021.

    Comments: 9 pages, 10 figures

    Journal ref: Phys. Rev. E 104, 014706 (2021)

  2. arXiv:2101.00798  [pdf, other

    cs.NI cs.AI

    Fusion of Federated Learning and Industrial Internet of Things: A Survey

    Authors: Parimala M, Swarna Priya R M, Quoc-Viet Pham, Kapal Dev, Praveen Kumar Reddy Maddikunta, Thippa Reddy Gadekallu, Thien Huynh-The

    Abstract: Industrial Internet of Things (IIoT) lays a new paradigm for the concept of Industry 4.0 and paves an insight for new industrial era. Nowadays smart machines and smart factories use machine learning/deep learning based models for incurring intelligence. However, storing and communicating the data to the cloud and end device leads to issues in preserving privacy. In order to address this issue, fed… ▽ More

    Submitted 4 January, 2021; originally announced January 2021.

    Comments: This work has been submitted for possible publication. Any comments and suggestions are appreciated

  3. arXiv:2012.11350  [pdf, other

    astro-ph.IM astro-ph.EP astro-ph.SR

    LOCNES: a solar telescope to study stellar activity in the near infrared

    Authors: Claudi R., Ghedina A., Pace E., Di Giorgio A. M., D'Orazi V., Gallorini L., Lanza A. F., Liu S. J., Rainer M., Tozzi A., Carleo I., Maldonado Prado J., Micela G., Molinari E., Poretti E., Phillips D., Tripodo G., Cecconi M., Galli A., Gonzalez M. D., Guerra Padilla V., Guerra Ramòn J. G., Harutyunyan A., Hernàndez Càceres N., Hernàndez Dìaz M. , et al. (5 additional authors not shown)

    Abstract: LOCNES (LOw-Cost NIR Extended Solar telescope) is a solar telescope installed at the TNG (Telescopio Nazionale Galileo). It feeds the light of the Sun into the NIR spectrograph GIANO-B through a 40-m patch of optical fibers. LOCNES has been designed to obtain high signal-to-noise ratio spectra of the Sun as a star with an accurate wavelength calibration through molecular-band cells. This is an ent… ▽ More

    Submitted 21 December, 2020; originally announced December 2020.

    Comments: 12 pages, 8 Figures, SPIE 2020 Conference

  4. arXiv:2011.04297  [pdf, other

    cs.SD cs.CL cs.LG eess.AS

    Knowledge Distillation for Singing Voice Detection

    Authors: Soumava Paul, Gurunath Reddy M, K Sreenivasa Rao, Partha Pratim Das

    Abstract: Singing Voice Detection (SVD) has been an active area of research in music information retrieval (MIR). Currently, two deep neural network-based methods, one based on CNN and the other on RNN, exist in literature that learn optimized features for the voice detection (VD) task and achieve state-of-the-art performance on common datasets. Both these models have a huge number of parameters (1.4M for C… ▽ More

    Submitted 19 August, 2021; v1 submitted 9 November, 2020; originally announced November 2020.

    Comments: Accepted at INTERSPEECH 2021. 5 pages, 3 figures

  5. Multiclass Model for Agriculture development using Multivariate Statistical method

    Authors: N Deepa, Mohammad Zubair Khan, Prabadevi B, Durai Raj Vincent P M, Praveen Kumar Reddy Maddikunta, Thippa Reddy Gadekallu

    Abstract: Mahalanobis taguchi system (MTS) is a multi-variate statistical method extensively used for feature selection and binary classification problems. The calculation of orthogonal array and signal-to-noise ratio in MTS makes the algorithm complicated when more number of factors are involved in the classification problem. Also the decision is based on the accuracy of normal and abnormal observations of… ▽ More

    Submitted 7 October, 2020; v1 submitted 12 September, 2020; originally announced September 2020.

    Comments: in IEEE Access

  6. arXiv:2007.06021  [pdf, other

    eess.AS cs.LG

    NISP: A Multi-lingual Multi-accent Dataset for Speaker Profiling

    Authors: Shareef Babu Kalluri, Deepu Vijayasenan, Sriram Ganapathy, Ragesh Rajan M, Prashant Krishnan

    Abstract: Many commercial and forensic applications of speech demand the extraction of information about the speaker characteristics, which falls into the broad category of speaker profiling. The speaker characteristics needed for profiling include physical traits of the speaker like height, age, and gender of the speaker along with the native language of the speaker. Many of the datasets available have onl… ▽ More

    Submitted 12 July, 2020; originally announced July 2020.

    Comments: 5pages, Initial version submitted to Interspeech2020

  7. arXiv:2007.05853  [pdf

    cs.CV

    Complex Wavelet SSIM based Image Data Augmentation

    Authors: Ritin Raveendran, Aviral Singh, Rajesh Kumar M

    Abstract: One of the biggest problems in neural learning networks is the lack of training data available to train the network. Data augmentation techniques over the past few years, have therefore been developed, aiming to increase the amount of artificial training data with the limited number of real world samples. In this paper, we look particularly at the MNIST handwritten dataset an image dataset used fo… ▽ More

    Submitted 11 July, 2020; originally announced July 2020.

  8. arXiv:2006.14107  [pdf, other

    cs.CV

    Kinematic-Structure-Preserved Representation for Unsupervised 3D Human Pose Estimation

    Authors: Jogendra Nath Kundu, Siddharth Seth, Rahul M V, Mugalodi Rakesh, R. Venkatesh Babu, Anirban Chakraborty

    Abstract: Estimation of 3D human pose from monocular image has gained considerable attention, as a key step to several human-centric applications. However, generalizability of human pose estimation models developed using supervision on large-scale in-studio datasets remains questionable, as these models often perform unsatisfactorily on unseen in-the-wild environments. Though weakly-supervised models have b… ▽ More

    Submitted 24 June, 2020; originally announced June 2020.

    Comments: AAAI 2020 (Oral)

  9. arXiv:2006.00782  [pdf, other

    eess.AS cs.CL cs.SD

    Learning to Recognize Code-switched Speech Without Forgetting Monolingual Speech Recognition

    Authors: Sanket Shah, Basil Abraham, Gurunath Reddy M, Sunayana Sitaram, Vikas Joshi

    Abstract: Recently, there has been significant progress made in Automatic Speech Recognition (ASR) of code-switched speech, leading to gains in accuracy on code-switched datasets in many language pairs. Code-switched speech co-occurs with monolingual speech in one or both languages being mixed. In this work, we show that fine-tuning ASR models on code-switched speech harms performance on monolingual speech.… ▽ More

    Submitted 1 June, 2020; originally announced June 2020.

    Comments: 5 pages (4 pages + 1 page references), 5 tables, 1 figure, 1 algorithm, 16 references

  10. Deepfake Forensics Using Recurrent Neural Networks

    Authors: Rahul U, Ragul M, Raja Vignesh K, Tejeswinee K

    Abstract: As of late an AI based free programming device has made it simple to make authentic face swaps in recordings that leaves barely any hints of control, in what are known as "deepfake" recordings. Situations where these genuine istic counterfeit recordings are utilized to make political pain, extort somebody or phony fear based oppression occasions are effectively imagined. This paper proposes a tran… ▽ More

    Submitted 1 May, 2020; originally announced May 2020.

    Comments: This submission has been removed by arXiv administrators due to copyright infringement

  11. Deepfake Video Forensics based on Transfer Learning

    Authors: Rahul U, Ragul M, Raja Vignesh K, Tejeswinee K

    Abstract: Deeplearning has been used to solve complex problems in various domains. As it advances, it also creates applications which become a major threat to our privacy, security and even to our Democracy. Such an application which is being developed recently is the "Deepfake". Deepfake models can create fake images and videos that humans cannot differentiate them from the genuine ones. Therefore, the cou… ▽ More

    Submitted 29 April, 2020; originally announced April 2020.

    Comments: This submission has been removed by arXiv administrators due to copyright infringement

    Report number: F9747038620

  12. arXiv:2004.04393  [pdf, other

    cs.CV cs.LG

    Universal Source-Free Domain Adaptation

    Authors: Jogendra Nath Kundu, Naveen Venkat, Rahul M V, R. Venkatesh Babu

    Abstract: There is a strong incentive to develop versatile learning techniques that can transfer the knowledge of class-separability from a labeled source domain to an unlabeled target domain in the presence of a domain-shift. Existing domain adaptation (DA) approaches are not equipped for practical DA scenarios as a result of their reliance on the knowledge of source-target label-set relationship (e.g. Clo… ▽ More

    Submitted 9 April, 2020; originally announced April 2020.

    Comments: CVPR 2020. Code available at https://github.com/val-iisc/usfda

  13. arXiv:2004.04388  [pdf, other

    cs.CV cs.LG

    Towards Inheritable Models for Open-Set Domain Adaptation

    Authors: Jogendra Nath Kundu, Naveen Venkat, Ambareesh Revanur, Rahul M V, R. Venkatesh Babu

    Abstract: There has been a tremendous progress in Domain Adaptation (DA) for visual recognition tasks. Particularly, open-set DA has gained considerable attention wherein the target domain contains additional unseen categories. Existing open-set DA approaches demand access to a labeled source dataset along with unlabeled target instances. However, this reliance on co-existing source and target data is highl… ▽ More

    Submitted 9 April, 2020; originally announced April 2020.

    Comments: CVPR 2020 (Oral). Code available at https://github.com/val-iisc/inheritune

  14. arXiv:2003.10515  [pdf, other

    cond-mat.soft

    Influence of Surface Hydrophilicity and Hydration on the Rotational Relaxation of Supercooled Water on Graphene Oxide Surfaces

    Authors: Rajasekaran M, K. Ganapathy Ayappa

    Abstract: Hydration or interfacial water present in biomolecules and inorganic solids have been shown to exhibit a dynamical transition upon supercooling. However, an understanding of the extent of the underlying surface hydrophilicity as well as the local distribution of hydrophilic/hydrophobic patches on the dynamical transition is unexplored. Here, we use molecular dynamics simulations with a TIP4P/2005… ▽ More

    Submitted 23 March, 2020; originally announced March 2020.

    Comments: 14 pages, 9 figures

  15. arXiv:2003.03163  [pdf, other

    cond-mat.soft

    Dynamical Transitions of Supercooled Water in Graphene oxide Nanopores: Influence of Surface Hydrophobicity

    Authors: Rajasekaran M, K. Ganapathy Ayappa

    Abstract: Molecular dynamics simulations are carried out to explore the dynamical crossover phenomenon in strongly confined and mildly supercooled water in graphene oxide nanopores. In contrast to studies where confinement is used to study the properties of bulk water, we are interested in the dynamical transitions for strongly confined water in the absence of any bulk-like water. The influence of the physi… ▽ More

    Submitted 6 March, 2020; originally announced March 2020.

    Comments: 16 pages, 8 figures

  16. arXiv:2002.02370  [pdf

    cs.MM

    Data hiding in speech signal using steganography and encryption

    Authors: Hanisha Chowdary N, Karan K, Bharath K P, Rajesh Kumar M

    Abstract: Data privacy and data security are always on highest priority in the world. We need a reliable method to encrypt the data so that it reaches the destination safely. Encryption is a simple yet effective way to protect our data while transmitting it to a destination. The proposed method has state of art technology of steganography and encryption. This paper puts forward a different approach for data… ▽ More

    Submitted 13 January, 2020; originally announced February 2020.

  17. arXiv:2001.10094  [pdf

    eess.AS cs.SD

    OMAP-L138 LCDK Development Kit

    Authors: Bharath K P, Sylash K, Pravina K, Rajesh Kumar M

    Abstract: Low cost and low power consumption processor play a vital role in the field of Digital Signal Processing (DSP). The OMAP-L138 development kit which is low cost, low power consumption, ease and speed, with a wide variety of applications includes Digital signal processing, Image processing and video processing. This paper represents the basic introduction to OMAP-L138 processor and quick procedural… ▽ More

    Submitted 13 January, 2020; originally announced January 2020.

  18. arXiv:2001.04215  [pdf

    cs.CV

    Radial Based Analysis of GRNN in Non-Textured Image Inpainting

    Authors: Karthik R, Anvita Dwivedi, Haripriya M, Bharath K P, Rajesh Kumar M

    Abstract: Image inpainting algorithms are used to restore some damaged or missing information region of an image based on the surrounding information. The method proposed in this paper applies the radial based analysis of image inpainting on GRNN. The damaged areas are first isolated from rest of the areas and then arranged by their size and then inpainted using GRNN. The training of the neural network is d… ▽ More

    Submitted 13 January, 2020; originally announced January 2020.

  19. arXiv:2001.04208  [pdf

    cs.CV

    Handwritten Character Recognition Using Unique Feature Extraction Technique

    Authors: Sai Abhishikth Ayyadevara, P N V Sai Ram Teja, Bharath K P, Rajesh Kumar M

    Abstract: One of the most arduous and captivating domains under image processing is handwritten character recognition. In this paper we have proposed a feature extraction technique which is a combination of unique features of geometric, zone-based hybrid, gradient features extraction approaches and three different neural networks namely the Multilayer Perceptron network using Backpropagation algorithm (MLP… ▽ More

    Submitted 13 January, 2020; originally announced January 2020.

  20. Lightning Impulse Current Tests on some Electroconductive Fabrics

    Authors: Jorge A. Cristancho C., Carlos A. Rivera G., Jorge E. Rodriguez M., John J. Pantoja A., Liz K. Herrera Q., Francisco Roman

    Abstract: On the search of lightweight lightning protection materials that can be used as part of lightning protection systems, we investigate some types of electroconductive fabrics by applying several lightning impulse currents in laboratory. Samples of four commercially available electroconductive textiles were analyzed, two rip-stop, a plain-weave, a nonwoven, and additionally a carbon-impregnated polym… ▽ More

    Submitted 2 May, 2023; v1 submitted 12 November, 2019; originally announced November 2019.

    Comments: Published on Journal of Applied Research and Technology 21 (2023) 241-255; 15 pages, 6 figures, 3 tables

    Journal ref: Journal of Applied Research and Technology 2023, 21(2), 241-255

  21. NAOMI: the adaptive optics system of the Auxiliary Telescopes of the VLTI

    Authors: Woillez J., Abad J. A., Abuter R., Aller Carpentier E., Alonso J., Andolfato L., Barriga P., Berger J. -P., Beuzit J. -L., Bonnet H., Bourdarot G., Bourget P., Brast R., Caniguante L., Cottalorda E., Darré P., Delabre B., Delboulbé A., Delplancke-Ströbele F., Dembet R., Donaldson R., Dorn R., Dupeyron J., Dupuy C., Egner S. , et al. (58 additional authors not shown)

    Abstract: The tip-tilt stabilisation system of the 1.8 m Auxiliary Telescopes of the Very Large Telescope Interferometer was never dimensioned for robust fringe tracking, except when atmospheric seeing conditions are excellent. Increasing the level of wavefront correction at the telescopes is expected to improve the coupling into the single-mode fibres of the instruments, and enable robust fringe tracking e… ▽ More

    Submitted 19 August, 2019; originally announced August 2019.

    Comments: 10 pages, 18 figures, 2 tables, A&A forthcoming

  22. arXiv:1905.05520  [pdf, other

    eess.SP cs.IT

    A Novel Beamformed Control Channel Design for LTE with Full Dimension-MIMO

    Authors: Pavan Reddy M., Harish Kumar D., Saidhiraj Amuru, Kiran Kuchi

    Abstract: The Full Dimension-MIMO (FD-MIMO) technology is capable of achieving huge improvements in network throughput with simultaneous connectivity of a large number of mobile wireless devices, unmanned aerial vehicles, and the Internet of Things (IoT). In FD-MIMO, with a large number of antennae at the base station and the ability to perform beamforming, the capacity of the physical downlink shared chann… ▽ More

    Submitted 14 May, 2019; originally announced May 2019.

  23. arXiv:1904.09765  [pdf, other

    cs.SD cs.LG eess.AS stat.ML

    hf0: A hybrid pitch extraction method for multimodal voice

    Authors: Pradeep Rengaswamy, Gurunath Reddy M, Krothapalli Sreenivasa Rao

    Abstract: Pitch or fundamental frequency (f0) extraction is a fundamental problem studied extensively for its potential applications in speech and clinical applications. In literature, explicit mode specific (modal speech or singing voice or emotional/ expressive speech or noisy speech) signal processing and deep learning f0 extraction methods that exploit the quasi periodic nature of the signal in time, ha… ▽ More

    Submitted 22 April, 2019; originally announced April 2019.

    Comments: Pitch Extraction, F0 extraction, harmonic signals, speech, monophonic songs, Convolutional Neural Network, 5 pages, 5 figures

  24. arXiv:1903.01902  [pdf, other

    cs.ET q-bio.QM

    BacSoft: A Tool to Archive Data on Bacteria

    Authors: Amay Agrawal, Dixita Limbachiya, Ravikumar M., Taslimarif Saiyed, Manish K. Gupta

    Abstract: Recently, DNA data storage systems have attracted many researchers worldwide. Motivated by the success stories of such systems, in this work we propose a software called BacSoft to clone the data in a bacterial plasmid by using the concept of genetic engineering. We consider the encoding schemes such that it satisfies constraints significant for bacterial data storage.

    Submitted 5 March, 2019; originally announced March 2019.

    Comments: 8 pages, 13 figures, poster abstract DNA Computing and Molecular Programming, DNA24 conference, **an, China, Oct 2018

  25. First experimental constraint on the $^{191}$Os$(n,γ)$ reaction rate relevant to $s$-process nucleosynthesis

    Authors: I. K. B. Kullmann, A. C. Larsen, T. Renstrø m, K. S. Beckmann, F. L. Bello Garrote, L. Crespo Campo, A. Görgen, M. Guttormsen, J. E. Midtbø, E. Sahin, S. Siem, G. M. Tveten, F. Zeiser

    Abstract: The nuclear level density and $γ$-decay strength of $^{192}$Os have been extracted using particle-$γ$ coincidence data from the $^{192}$Os($α,α^\primeγ$)$^{192}$Os reaction by means of the Oslo method. The level density is found to be a rather smooth function of excitation energy, approximately following the constant temperature model. The $γ$-decay strength is compared to photoneutron cross-secti… ▽ More

    Submitted 16 June, 2019; v1 submitted 6 December, 2018; originally announced December 2018.

    Comments: 14 pages, 11 figures, accepted to Phys. Rev C

    Journal ref: Phys. Rev. C 99, 065806 (2019)

  26. arXiv:1811.09956  [pdf, other

    cs.SD cs.LG eess.AS stat.ML

    Glottal Closure Instants Detection From Pathological Acoustic Speech Signal Using Deep Learning

    Authors: Gurunath Reddy M, Tanumay Mandal, Krothapalli Sreenivasa Rao

    Abstract: In this paper, we propose a classification based glottal closure instants (GCI) detection from pathological acoustic speech signal, which finds many applications in vocal disorder analysis. Till date, GCI for pathological disorder is extracted from laryngeal (glottal source) signal recorded from Electroglottograph, a dedicated device designed to measure the vocal folds vibration around the larynx.… ▽ More

    Submitted 25 November, 2018; originally announced November 2018.

    Comments: Machine Learning for Health (ML4H) Workshop at NeurIPS 2018 arXiv:1811.07216

    Report number: ML4H/2018/39

  27. arXiv:1810.06635  [pdf, other

    cs.CL cs.CV cs.SD eess.AS

    Semi-supervised and Active-learning Scenarios: Efficient Acoustic Model Refinement for a Low Resource Indian Language

    Authors: Maharajan Chellapriyadharshini, Anoop Toffy, Srinivasa Raghavan K. M., V Ramasubramanian

    Abstract: We address the problem of efficient acoustic-model refinement (continuous retraining) using semi-supervised and active learning for a low resource Indian language, wherein the low resource constraints are having i) a small labeled corpus from which to train a baseline `seed' acoustic model and ii) a large training corpus without orthographic labeling or from which to perform a data selection for m… ▽ More

    Submitted 2 October, 2018; originally announced October 2018.

    Journal ref: Proc. Interspeech 2018

  28. arXiv:1809.04154  [pdf

    cs.CV

    Intensity and Rescale Invariant Copy Move Forgery Detection Techniques

    Authors: Tejas K, Swathi C, Rajesh Kumar M

    Abstract: In this contemporary world digital media such as videos and images behave as an active medium to carry valuable information across the globe on all fronts. However there are several techniques evolved to tamper the image which has made their authenticity untrustworthy. CopyMove Forgery CMF is one of the most common forgeries present in an image where a cluster of pixels are duplicated in the same… ▽ More

    Submitted 11 September, 2018; originally announced September 2018.

    Comments: Further research is active on this paper in VIT University. Hence, the paper is yet not published

  29. arXiv:1806.02907  [pdf

    cs.CV

    Copy Move Forgery using Hus Invariant Moments and Log Polar Transformations

    Authors: Tejas K, Swathi C, Rajesh Kumar M

    Abstract: With the increase in interchange of data, there is a growing necessity of security. Considering the volumes of digital data that is transmitted, they are in need to be secure. Among the many forms of tampering possible, one widespread technique is Copy Move Forgery CMF. This forgery occurs when parts of the image are copied and duplicated elsewhere in the same image. There exist a number of algori… ▽ More

    Submitted 7 June, 2018; originally announced June 2018.

    Comments: This paper was submitted, accepted and presented in the 3rd International Conference on RTEICT, IEEE Conference

  30. arXiv:1802.06288  [pdf

    cs.NE

    Implementation of Neural Network and feature extraction to classify ECG signals

    Authors: R Karthik, Dhruv Tyagi, Amogh Raut, Soumya Saxena, Rajesh Kumar M

    Abstract: This paper presents a suitable and efficient implementation of a feature extraction algorithm (Pan Tompkins algorithm) on electrocardiography (ECG) signals, for detection and classification of four cardiac diseases: Sleep Apnea, Arrhythmia, Supraventricular Arrhythmia and Long Term Atrial Fibrillation (AF) and differentiating them from the normal heart beat by using pan Tompkins RR detection follo… ▽ More

    Submitted 17 February, 2018; originally announced February 2018.

    Comments: SPRINGER LNEE

  31. arXiv:1802.06209  [pdf

    cs.CL cs.SD eess.AS

    Sentiment Analysis on Speaker Specific Speech Data

    Authors: Maghilnan S, Rajesh Kumar M

    Abstract: Sentiment analysis has evolved over past few decades, most of the work in it revolved around textual sentiment analysis with text mining techniques. But audio sentiment analysis is still in a nascent stage in the research community. In this proposed research, we perform sentiment analysis on speaker discriminated speech transcripts to detect the emotions of the individual speakers involved in the… ▽ More

    Submitted 17 February, 2018; originally announced February 2018.

    Comments: Accepted and Published in 2017 IEEE International Conference on Intelligent Computing and Control (I2C2), 23 Jun - 24 Jun 2017, India

  32. arXiv:1802.04252  [pdf

    cs.CY

    Automatic Phone Slip Detection System

    Authors: Karthik R, Preetam Satapath, Srivatsa Patnaik, Saurabh Priyadarshi, Rajesh Kumar M

    Abstract: Mobile phones are becoming increasingly advanced and the latest ones are equipped with many diverse and powerful sensors. These sensors can be used to study different position and orientation of the phone which can help smartphone manufacture to track about their customers handling from the recorded log. The inbuilt sensors such as the accelerometer and gyroscope present in our phones are used to… ▽ More

    Submitted 10 February, 2018; originally announced February 2018.

    Comments: Accepted for publication in Springer LNEE

  33. arXiv:1712.00917  [pdf

    cs.SD eess.AS

    A text-independent speaker verification model: A comparative analysis

    Authors: Rishi Charan, Manisha. A, Karthik. R, Rajesh Kumar M

    Abstract: The most pressing challenge in the field of voice biometrics is selecting the most efficient technique of speaker recognition. Every individual's voice is peculiar, factors like physical differences in vocal organs, accent and pronunciation contributes to the problem's complexity. In this paper, we explore the various methods available in each block in the process of speaker recognition with the o… ▽ More

    Submitted 4 December, 2017; originally announced December 2017.

    Comments: presented and accepted by 2017 International Conference on Intelligent Computing and Control (I2C2)

  34. arXiv:1710.10418  [pdf

    cs.NE

    Efficient Licence Plate Detection By Unique Edge Detection Algorithm and Smarter Interpretation Through IoT

    Authors: Tejas K, Ashok Reddy K, Pradeep Reddy D, Rajesh Kumar M

    Abstract: Vehicles play a vital role in modern day transportation systems. Number plate provides a standard means of identification for any vehicle. To serve this purpose, automatic licence plate recognition system was developed. This consisted of four major steps: Pre-processing of the obtained image, extraction of licence plate region, segmentation and character recognition. In earlier research, direct ap… ▽ More

    Submitted 28 October, 2017; originally announced October 2017.

    Comments: Paper has been submitted to SocPros17, 7th international conference on soft computing and problem solving, Scopus indexed. If accepted paper will be published in AISC series SPRINGER. Some of the extended/modified selected quality papers will be published in a Special Issue of 'Swarm and Evolutionary Computation journal, Elsevier (SCI). 10 pages

  35. arXiv:1710.09550  [pdf

    cs.CR

    High Capacity, Secure (n, n/8) Multi Secret Image Sharing Scheme with Security Key

    Authors: Karthik Reddy, Tejas K, Swathi C, Ashok K, Rajesh Kumar M

    Abstract: The rising need of secret image sharing with high security has led to much advancement in lucrative exchange of important images which contain vital and confidential information. Multi secret image sharing system (MSIS) is an efficient and robust method for transmitting one or more secret images securely. In recent research, n secret images are encrypted into n or n+ 1 shared images and stored in… ▽ More

    Submitted 26 October, 2017; originally announced October 2017.

    Comments: Accepted and Presented in International Conference on Intelligent Computing and Control (I2C2) IEEE conference, June 2017

  36. arXiv:1509.02876  [pdf

    cs.RO

    Low Cost Swarm Based Diligent Cargo Transit System

    Authors: Harish Karunakaran, Varadhan R, Anurag R M, Harmanpreet S

    Abstract: The goal of this paper is to present the design and development of a low cost cargo transit system which can be adapted in develo** countries like India where there is abundant and cheap human labour which makes the process of automation in any industry a challenge to innovators. The need of the hour is an automation system that can diligently transfer cargo from one place to another and minimiz… ▽ More

    Submitted 3 April, 2023; v1 submitted 9 September, 2015; originally announced September 2015.

    Comments: 6 pages, 9 figures, 1 block diagram

  37. arXiv:1502.00695  [pdf

    cs.SE

    Assessing the Fault Proneness Degree (DFP) by Estimating the Impact of Change Request Artifacts Correlation

    Authors: Rudra Kumar M, A Ananda Rao

    Abstract: Exploring the impact of change requests applied to a software maintenance project helps to assess the fault-proneness of the change request to be handled further, which is perhaps a bug fix or even a new feature demand. In practice, the major development community stores change requests and related data using bug tracking systems such as Bugzilla. These data, together with the data stored in a ver… ▽ More

    Submitted 2 February, 2015; originally announced February 2015.

    Comments: Originally published in Eighth International Conference on Data Mining and Warehousing (ICDMW-2014), Further the extended version is selected to publish in International Journal of Information Processing, volume 8 and issue 4, 2014

    Journal ref: International Journal of Information Processing, 8(4), 35-44, 2014

  38. arXiv:1410.7654  [pdf

    cs.IR

    XML Information Retrieval:An overview

    Authors: Suma D., U. Dinesh Acharya, Geetha M., Raviraja Holla M

    Abstract: Locating and distilling the valuable relevant information continued to be the major challenges of Information Retrieval (IR) Systems owing to the explosive growth of online web information. These challenges can be considered the XML Information Retrieval challenges as XML has become a de facto standard over the Web. The research on XML IR starts with the classical IR strategies customized to XML I… ▽ More

    Submitted 27 October, 2014; originally announced October 2014.

    Comments: 7 pages, 0 figures

    Journal ref: International Global Journal For Engineering Research, Volume 10 Issue 1, 2014 pg. 26-32

  39. arXiv:1407.5733  [pdf

    cond-mat.mtrl-sci

    New Superconductor (Na0.25K0.45) Ba3Bi4O12: A First-principles Study

    Authors: Ali M. S., Aftabuzzaman M., Roknuzzaman M., Rayhan M. A., Parvin F., Ali M. M., Rubel M. H. K., Islam A. K. M. A

    Abstract: A new superconductor (Na0.25K0.45)Ba3Bi4O12, having an A-site-ordered double perovskite structure, with a maximum Tc ~ 27 K has very recently been discovered through hydrothermal synthesis at 593 K. The structural, elastic, electronic, and thermal properties of the new synthesized compound have been investigated theoretically. Here we have employed the pseudo-potential plane-wave (PP-PW) approach… ▽ More

    Submitted 22 July, 2014; originally announced July 2014.

    Comments: 10 pages, 7 figures, 1 table

  40. Solar wind reflection from the lunar surface: The view from far and near

    Authors: L. Saul, P. Wurz, A. Vorburger, D. F. Rodríguez M., S. A. Fuselier, D. J. McComas, E. Möbius, S. Barabash, Herb Funsten, Paul Janzen

    Abstract: The Moon appears bright in the sky as a source of energetic neutral atoms (ENAs). These ENAs have recently been imaged over a broad energy range both from near the lunar surface, by India's Chandrayaan-1 mission (CH-1), and from a much more distant Earth orbit by NASA's Interstellar Boundary Explorer (IBEX) satellite. Both sets of observations have indicated that a relatively large fraction of the… ▽ More

    Submitted 16 June, 2013; originally announced June 2013.

    Comments: This is a preprint. Please see Planetary and Space Sciences for published version, Available online 27 February 2013

  41. Securing IEEE 802.11G WLAN Using OpenVPN and Its Impact Analysis

    Authors: Praveen Likhar, Ravi Shankar Yadav, Keshava Rao M

    Abstract: Like most advances, wireless LAN poses both opportunities and risks. The evolution of wireless networking in recent years has raised many serious security issues. These security issues are of great concern for this technology as it is being subjected to numerous attacks. Because of the free-space radio transmission in wireless networks, eavesdrop** becomes easy and consequently a security breach… ▽ More

    Submitted 2 January, 2012; originally announced January 2012.

    Journal ref: International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, November 2011, 97-113

  42. arXiv:1110.1010  [pdf, ps, other

    math.RA

    On the solutions of the equation x^3+ax=b in Z*_3 with coefficients from Q_3

    Authors: Rikhsiboev I. M., Khudoyberdiyev A. Kh., Kurbanbaev T. K., Masutova K. K

    Abstract: In this paper we present the algorithm of finding the solutions of the equation $x^3+ax=b$ in $\mathbb{Z}^*_3$ with coefficients from $\mathbb{Q}_3$.

    Submitted 13 October, 2013; v1 submitted 5 October, 2011; originally announced October 2011.

  43. Design and Implementation VOIP Service on Open IMS and Asterisk Servers Interconnected through Enum Server

    Authors: Rendy Munadi, Effan Najwaini, Asep Mulyana, R. Rumani. M

    Abstract: Asterisk and Open IMS use SIP signal protocol to enable both of them can be connected. To facilitate both relationships, Enum server- that is able to translate the numbering address such as PSTN (E.164) to URI address (Uniform Resource Identifier)- can be used. In this research, we interconnect Open IMS and Asterisk server Enum server. We then analyze the server performance and PDD (Post Dial Dela… ▽ More

    Submitted 17 June, 2010; originally announced June 2010.

    Comments: 12 Pages

    Journal ref: International Journal of Next-Generation Networks 2.2 (2010) 1-12

  44. arXiv:0904.4649  [pdf, ps, other

    astro-ph.GA astro-ph.HE

    Discrete sources as the origin of the Galactic X-ray ridge emission

    Authors: Revnivtsev M., Sazonov S., Churazov E., Forman W., Vikhlinin A., Sunyaev R.

    Abstract: An unresolved X-ray glow (at energies above a few kiloelectronvolts) was discovered about 25 years ago and found to be coincident with the Galactic disk -the Galactic ridge X-ray emission. This emission has a spectrum characteristic of a 1e8 K optically thin thermal plasma, with a prominent iron emission line at 6.7 keV. The gravitational well of the Galactic disk, however, is far too shallow to… ▽ More

    Submitted 29 April, 2009; originally announced April 2009.

    Comments: 16 pages, 3 figures. Draft version of the paper that will appear in Nature, Issue April 30, 2009

  45. arXiv:math/0503636   

    math.GT

    On Some Aspects of 4-Dimensional Topology: A Popular Survey

    Authors: R. V. M

    Abstract: The general structure of the paper should be remaid. Hence author removed this paper from arXiv.

    Submitted 23 October, 2006; v1 submitted 28 March, 2005; originally announced March 2005.

    Comments: The general structure of the paper should be remaid. Hence author removed this paper from arXiv

  46. Proper Motion and Kinematics of the Ansae in NGC7009

    Authors: Rodrigo Fernandez M., Hektor Monteiro, Hugo E. Schwarz

    Abstract: We have measured the proper motion (PM) and kinematics of the ansae in NGC 7009 using high dispersion echelle spectra and archive narrow band HST images. Assuming that the ansae are moving at equal and opposite velocities from the central star we obtain a system radial velocity of -53+-2km/s, the eastern ansa approaching and the western ansa receding at Vr=5.3+-1km/s with respect to this value.… ▽ More

    Submitted 27 November, 2003; originally announced November 2003.

    Comments: 9 pp., 4 tables, 2 figures; accepted for publication by the ApJ

    Journal ref: Astrophys.J.603:595-598,2004

  47. arXiv:hep-th/9504128  [pdf, ps, other

    hep-th

    A New Class of Bounds for Correlation Functions in Euclidean Lattice Field Theory and Statistical Mechanics of Spin Systems

    Authors: Requardt M

    Abstract: Starting from an extension of the Poisson bracket structure and Kubo-Martin-Schwinger-property of classical statistical mechanics of continuous systems to spin systems, defined on a lattice, we derive a series of, as we think, new and interesting bounds on correlation functions for general lattice systems. Our method is expected to yield also useful results in Euclidean Field Theory. Furthermore… ▽ More

    Submitted 25 April, 1995; originally announced April 1995.

    Comments: 9 pages, Latex

    Report number: GOET-TP 102/95