Skip to main content

Showing 51–100 of 103 results for author: R, K

.
  1. arXiv:2012.00866  [pdf, other

    cs.DS

    Huskysort

    Authors: R. C. Hillyard, Yunlu Liaozheng, Sai Vineeth K. R

    Abstract: Much of the copious literature on the subject of sorting has concentrated on minimizing the number of comparisons and/or exchanges/copies. However, a more appropriate yardstick for the performance of sorting algorithms is based on the total number of array accesses that are required (the "work"). For a sort that is based on divide-and-conquer (including iterative variations on that theme), we can… ▽ More

    Submitted 1 December, 2020; originally announced December 2020.

    Comments: 9 pages, Github repo for the algorithm included

  2. arXiv:2004.11460  [pdf, other

    q-bio.QM cs.CY cs.LG stat.ML

    Development of a Machine Learning Model and Mobile Application to Aid in Predicting Dosage of Vitamin K Antagonists Among Indian Patients

    Authors: Amruthlal M, Devika S, Ameer Suhail P A, Aravind K Menon, Vignesh Krishnan, Alan Thomas, Manu Thomas, Sanjay G, Lakshmi Kanth L R, Jimmy Jose, Harikrishnan S

    Abstract: Patients who undergo mechanical heart valve replacements or have conditions like Atrial Fibrillation have to take Vitamin K Antagonists (VKA) drugs to prevent coagulation of blood. These drugs have narrow therapeutic range and need to be very closely monitored due to life threatening side effects. The dosage of VKA drug is determined and revised by a physician based on Prothrombin Time - Internati… ▽ More

    Submitted 19 April, 2020; originally announced April 2020.

  3. arXiv:2004.05811  [pdf, other

    eess.SP cs.LG eess.SY

    Gait Recovery System for Parkinson's Disease using Machine Learning on Embedded Platforms

    Authors: Gokul H., Prithvi Suresh, Hari Vignesh B, Pravin Kumaar R, Vineeth Vijayaraghavan

    Abstract: Freezing of Gait (FoG) is a common gait deficit among patients diagnosed with Parkinson's Disease (PD). In order to help these patients recover from FoG episodes, Rhythmic Auditory Stimulation (RAS) is needed. The authors propose a ubiquitous embedded system that detects FOG events with a Machine Learning (ML) subsystem from accelerometer signals . By making inferences on-device, we avoid issues p… ▽ More

    Submitted 13 April, 2020; originally announced April 2020.

  4. arXiv:2003.00810  [pdf

    cs.CV cs.IR eess.IV

    Medicine Strip Identification using 2-D Cepstral Feature Extraction and Multiclass Classification Methods

    Authors: Anirudh Itagi, Ritam Sil, Saurav Mohapatra, Subham Rout, Bharath K P, Karthik R, Rajesh Kumar Muthu

    Abstract: Misclassification of medicine is perilous to the health of a patient, more so if the said patient is visually impaired or simply did not recognize the color, shape or type of medicine strip. This paper proposes a method for identification of medicine strips by 2-D cepstral analysis of their images followed by performing classification that has been done using the K-Nearest Neighbor (KNN), Support… ▽ More

    Submitted 3 February, 2020; originally announced March 2020.

  5. arXiv:2003.00418  [pdf, other

    cs.CV cs.AI cs.LG cs.MM cs.SD

    Towards Automatic Face-to-Face Translation

    Authors: Prajwal K R, Rudrabha Mukhopadhyay, Jerin Philip, Abhishek Jha, Vinay Namboodiri, C. V. Jawahar

    Abstract: In light of the recent breakthroughs in automatic machine translation systems, we propose a novel approach that we term as "Face-to-Face Translation". As today's digital communication becomes increasingly visual, we argue that there is a need for systems that can automatically translate a video of a person speaking in language A into a target language B with realistic lip synchronization. In this… ▽ More

    Submitted 1 March, 2020; originally announced March 2020.

    Comments: 9 pages (including references), 5 figures, Published in ACM Multimedia, 2019

    Journal ref: MM '19: Proceedings of the 27th ACM International Conference on Multimedia; October 2019; Pages 1428-1436

  6. arXiv:2002.07677  [pdf

    cs.SD cs.MM eess.AS

    Performance Analysis of Adaptive Noise Cancellation for Speech Signal

    Authors: Pratibha Balaji, Shruthi Narayan, Durga Sraddha, Bharath K P, Karthik R, Rajesh Kumar Muthu

    Abstract: This paper gives a broader insight on the application of adaptive filter in noise cancellation during various processes where signal is transmitted. Adaptive filtering techniques like RLS, LMS and normalized LMS are used to filter the input signal using the concept of negative feedback to predict its nature and remove it effectively from the input. In this paper a comparative study between the eff… ▽ More

    Submitted 3 February, 2020; originally announced February 2020.

  7. arXiv:2002.07590  [pdf

    eess.AS cs.IR cs.SD

    Speech Emotion Recognition using Support Vector Machine

    Authors: Manas Jain, Shruthi Narayan, Pratibha Balaji, Bharath K P, Abhijit Bhowmick, Karthik R, Rajesh Kumar Muthu

    Abstract: In this project, we aim to classify the speech taken as one of the four emotions namely, sadness, anger, fear and happiness. The samples that have been taken to complete this project are taken from Linguistic Data Consortium (LDC) and UGA database. The important characteristics determined from the samples are energy, pitch, MFCC coefficients, LPCC coefficients and speaker rate. The classifier used… ▽ More

    Submitted 3 February, 2020; originally announced February 2020.

  8. arXiv:2001.04215  [pdf

    cs.CV

    Radial Based Analysis of GRNN in Non-Textured Image Inpainting

    Authors: Karthik R, Anvita Dwivedi, Haripriya M, Bharath K P, Rajesh Kumar M

    Abstract: Image inpainting algorithms are used to restore some damaged or missing information region of an image based on the surrounding information. The method proposed in this paper applies the radial based analysis of image inpainting on GRNN. The damaged areas are first isolated from rest of the areas and then arranged by their size and then inpainted using GRNN. The training of the neural network is d… ▽ More

    Submitted 13 January, 2020; originally announced January 2020.

  9. arXiv:1911.10730  [pdf

    cond-mat.mtrl-sci

    Magnetic Structure and dielectric properties of antiferromagnetic FeCrO3

    Authors: Rajesh kumar R, C. Dhanasekhar, N. Vijay Prakash Chaudhary, A. Das, A. Venimadhav

    Abstract: We report the enhancement of Néel temperature of Cr2O3 by replacing 50% of Cr by Fe prepared by sol-gel method. The structural analysis by neutron diffraction has revealed that FeCrO3 belongs to a corundum structure (R-3c space group) with an antiferromagnetic spin structure having collinear spins along a-axis with propagation vector k=0; the high-temperature magnetisation study indicated a Néel t… ▽ More

    Submitted 25 November, 2019; originally announced November 2019.

    Comments: 15 pages

  10. arXiv:1909.13103  [pdf, other

    math.NA

    Analysis of an Asymptotic Preserving Low Mach Number Accurate IMEX-RK Scheme for the Wave Equation System

    Authors: Arun K. R., Arnab J. Das Gupta, Saurav Samantaray

    Abstract: In this paper the analysis of an asymptotic preserving (AP) IMEX-RK finite volume scheme for the wave equation system in the zero Mach number limit is presented. The accuracy of a numerical scheme at low Mach numbers is its ability to maintain the solution close to the incompressible solution for all times, and this can be formulated in terms of the invariance of a space of constant densities and… ▽ More

    Submitted 28 September, 2019; originally announced September 2019.

  11. arXiv:1907.02789  [pdf, other

    eess.SY eess.SP physics.app-ph

    Double Input Boost/Y-Source DC-DC Converter for Renewable Energy Sources

    Authors: Niteesh S Shanbog, Pushpa K R

    Abstract: With the increasing adoption of renewable energy sources by domestic users, decentralisation of the grid is fast becoming a reality. Distributed generation is an important part of a decentralised grid. This approach employs several small-scale technologies to produce electrical energy close to the end users or consumers. The higher reliability of these systems proves to be of advantage when compar… ▽ More

    Submitted 5 July, 2019; originally announced July 2019.

  12. arXiv:1906.04400  [pdf, other

    cond-mat.str-el cond-mat.mes-hall

    A Study of Berry Connection and Complex Analysis for Topological Characterization

    Authors: Y R Kartik, Rahul S, Ranjith Kumar R, Sujit Sarkar

    Abstract: We study and present the results of Berry connection for the topological states in quantum matter. The Berry connection plays a central role in the geometric phase and topological phenomenon in quantum many-body system. We present the necessary and sufficient conditions to characterize the topological nature of the system through the complex analysis. We also present the different topological aspe… ▽ More

    Submitted 11 June, 2019; originally announced June 2019.

  13. ElfStore: A Resilient Data Storage Service for Federated Edge and Fog Resources

    Authors: Sumit Kumar Monga, Sheshadri K R, Yogesh Simmhan

    Abstract: Edge and fog computing have grown popular as IoT deployments become wide-spread. While application composition and scheduling on such resources are being explored, there exists a gap in a distributed data storage service on the edge and fog layer, instead depending solely on the cloud for data persistence. Such a service should reliably store and manage data on fog and edge devices, even in the pr… ▽ More

    Submitted 21 May, 2019; originally announced May 2019.

    Comments: 24 pages, 14 figures, To appear in IEEE International Conference on Web Services (ICWS), Milan, Italy, 2019

    Journal ref: Proceedings of the 2019 IEEE International Conference on Web Services (ICWS) Conference

  14. arXiv:1903.10641  [pdf, other

    cs.CV cs.RO

    INFER: INtermediate representations for FuturE pRediction

    Authors: Shashank Srikanth, Junaid Ahmed Ansari, Karnik Ram R, Sarthak Sharma, Krishna Murthy J., Madhava Krishna K

    Abstract: In urban driving scenarios, forecasting future trajectories of surrounding vehicles is of paramount importance. While several approaches for the problem have been proposed, the best-performing ones tend to require extremely detailed input representations (eg. image sequences). But, such methods do not generalize to datasets they have not been trained on. We propose intermediate representations tha… ▽ More

    Submitted 25 March, 2019; originally announced March 2019.

    Comments: Manuscript under review. Submitted to IROS 2019

  15. Plasma environment effects on K lines of astrophysical interest I. Atomic structure, radiative rates and Auger widths of oxygen ions

    Authors: Deprince J., Bautista M. A., Fritzsche S., Garcia J. A., Kallman T. R., Mendoza C., Palmeri P., Quinet P

    Abstract: Aims. In the context of black-hole accretion disks, the main goal of the present study is to estimate the plasma environment effects on the atomic structure and radiative parameters associated with the K-vacancy states in ions of the oxygen isonuclear sequence. Methods. We use a time-averaged Debye-Huckel potential for both the electron-nucleus and the electron-electron interactions implemented in… ▽ More

    Submitted 11 March, 2019; originally announced March 2019.

    Comments: 8 pages, 6 figures, to be published in A&A

    Journal ref: A&A 624, A74 (2019)

  16. arXiv:1901.05151  [pdf, ps, other

    physics.optics quant-ph

    Experimental observation of polarization coherence theorem

    Authors: Bhaskar Kanseri, Sethuraj K. R

    Abstract: For light fields, the manifestation of correlations between fluctuating electric field components at different space-time points is referred to as coherence, whereas these correlations appearing between orthogonal electric field components at single space-time point are referred to as polarization. In this context, a natural question is: how coherence and polarization are interconnected? Very rece… ▽ More

    Submitted 16 January, 2019; originally announced January 2019.

    Journal ref: Optics Letters 44, 159 (2019)

  17. arXiv:1901.02033  [pdf, ps, other

    cs.IT

    The Effect of Introducing Redundancy in a Probabilistic Forwarding Protocol

    Authors: Vinay Kumar B. R., Roshan Antony, Navin Kashyap

    Abstract: This paper is concerned with the problem of broadcasting information from a source node to every node in an ad-hoc network. Flooding, as a broadcast mechanism, involves each node forwarding any packet it receives to all its neighbours. This results in excessive transmissions and thus a high energy expenditure overall. Probabilistic forwarding or gossi** involves each node forwarding a received p… ▽ More

    Submitted 10 January, 2019; v1 submitted 7 January, 2019; originally announced January 2019.

    Comments: Appears in the Proceedings of the 2018 National Conference on Communications (NCC 2018)

  18. arXiv:1901.00413  [pdf

    cs.CV

    Lipi Gnani - A Versatile OCR for Documents in any Language Printed in Kannada Script

    Authors: Shiva Kumar H R, Ramakrishnan A G

    Abstract: A Kannada OCR, named Lipi Gnani, has been designed and developed from scratch, with the motivation of it being able to convert printed text or poetry in Kannada script, without any restriction on vocabulary. The training and test sets have been collected from over 35 books published between the period 1970 to 2002, and this includes books written in Halegannada and pages containing Sanskrit slokas… ▽ More

    Submitted 2 January, 2019; originally announced January 2019.

    Comments: 21 pages, 16 figures, 12 tables, submitted to ACM Transactions on Asian and Low-Resource Language Information Processing

    Report number: mile_shr_agr_01_2019

  19. Emergence of a new symmetry class for Bogoliubov-de Gennes (BdG) Hamiltonians: Expanding ten-fold symmetry classes

    Authors: Ranjith Kumar R, Sujit Sarkar

    Abstract: Symmetry plays an important role in the topological states of quantum matter. Cartan found three symmetry classes, Altland and Zirnbauer extended it to the ten-fold symmetry class for mesoscopic systems. We observe emergence of a new symmetry class for BdG Hamiltonians. This new symmetry class appears for the BdG Hamiltonian in spinful background. We also observe the interesting feature that there… ▽ More

    Submitted 24 July, 2019; v1 submitted 17 October, 2018; originally announced October 2018.

    Comments: Extensively revised version with a few new interpretations of calculations. Comments will be very much appreciated

    Journal ref: Phase Transitions, 93:3, 287-300 (2020)

  20. arXiv:1810.01741  [pdf, other

    cond-mat.stat-mech cond-mat.other

    Quantum Berezinskii-Kosterltz-Thouless Transition for Topological Insulator

    Authors: Ranjith Kumar R, Rahul S, Surya Narayan, Sujit Sarkar

    Abstract: We consider the interacting helical liquid system at the one-dimensional edge of a two-dimensional topological insulator, coupled to an external magnetic field and s-wave superconductor and map it to an XYZ spin chain system. This model undergoes quantum Berezinskii-Kosterlitz-Thouless (BKT) transition with two limiting conditions. We derive the renormalization group (RG) equations explicitly and… ▽ More

    Submitted 16 August, 2020; v1 submitted 2 October, 2018; originally announced October 2018.

    Comments: Comments are welcome. arXiv admin note: text overlap with arXiv:1805.07973

    Journal ref: Phase Transitions, 93:6, 606-629 (2020)

  21. An Interplay of Topology and Quantized Geometric Phase for two Different Symmetry-Class Hamiltonians

    Authors: Rahul S, Ranjith Kumar R, Y R Kartik, Amitava Banerjee, Sujit Sarkar

    Abstract: Study of symmetry, topology and geometric phase can reveal many new and interesting results on the topological states of matter. Here we present a completely new and interesting result of symmetry, topology and quantization of geometric phase along with the physical explanation for two different symmetry classes. We present a detailed study of the auxiliary space for two different symmetry classes… ▽ More

    Submitted 16 August, 2020; v1 submitted 26 September, 2018; originally announced September 2018.

    Comments: Comments are welcome

    Journal ref: Phys. Scr., 94, 115803 (2019)

  22. arXiv:1805.07973  [pdf, other

    cond-mat.mes-hall

    A Study of Asymptotic Freedom like Behavior for Topological States of Matter

    Authors: Ranjith Kumar R, Rahul S, Surya Narayan, Sujit Sarkar

    Abstract: We present results for asymptotic freedom like behavior for the topological state of the helical spin liquid system with finite proximity induced superconducting gap. We derive two different quantum Berezinskii-Kosterlitz-Thouless (BKT) equations for the two different limit of this model Hamiltonian. The common quantum phase for these two quantum BKT transitions is the helical Luttinger liquid pha… ▽ More

    Submitted 21 January, 2020; v1 submitted 21 May, 2018; originally announced May 2018.

    Comments: Comments are welcome

  23. arXiv:1804.10711  [pdf

    cs.AI cs.DB

    Modified Apriori Graph Algorithm for Frequent Pattern Mining

    Authors: Pritish Yuvraj, Suneetha K. R

    Abstract: Web Usage Mining is an application of Data Mining Techniques to discover interesting usage patterns from web data in order to understand and better serve the needs of web-based applications. The paper proposes an algorithm for finding these usage patterns using a modified version of Apriori Algorithm called Apriori-Graph. These rules will help service providers to predict, which web pages, the use… ▽ More

    Submitted 27 April, 2018; originally announced April 2018.

  24. arXiv:1803.04621  [pdf

    eess.IV

    Cubic Spline Interpolation Segmenting over Conventional Segmentation Procedures: Application and Advantages

    Authors: Chetan Sai Tutika, Charan Vallapaneni, Karthik R, Bharath KP, N Ruban, Rajesh Kumar Muthu

    Abstract: To design a novel method for segmenting the image using Cubic Spline Interpolation and compare it with different techniques to determine which gives an efficient data to segment an image. This paper compares polynomial least square interpolation and the conventional Otsu thresholding with spline interpolation technique for image segmentation. The threshold value is determined using the above-menti… ▽ More

    Submitted 13 March, 2018; originally announced March 2018.

    Comments: 7 pages, 2018 International Conference on Informatics Computing in Engineering Systems (ICICES)

  25. arXiv:1803.04620  [pdf

    eess.IV cs.CV

    Image Segmentation and Processing for Efficient Parking Space Analysis

    Authors: Chetan Sai Tutika, Charan Vallapaneni, Karthik R, Bharath KP, N Ruban Rajesh Kumar Muthu

    Abstract: In this paper, we develop a method to detect vacant parking spaces in an environment with unclear segments and contours with the help of MATLAB image processing capabilities. Due to the anomalies present in the parking spaces, such as uneven illumination, distorted slot lines and overlap** of cars. The present-day conventional algorithms have difficulties processing the image for accurate result… ▽ More

    Submitted 13 March, 2018; originally announced March 2018.

    Comments: 6 pages, 2018 International Conference on Informatics Computing in Engineering Systems (ICICES)

  26. arXiv:1802.04252  [pdf

    cs.CY

    Automatic Phone Slip Detection System

    Authors: Karthik R, Preetam Satapath, Srivatsa Patnaik, Saurabh Priyadarshi, Rajesh Kumar M

    Abstract: Mobile phones are becoming increasingly advanced and the latest ones are equipped with many diverse and powerful sensors. These sensors can be used to study different position and orientation of the phone which can help smartphone manufacture to track about their customers handling from the recorded log. The inbuilt sensors such as the accelerometer and gyroscope present in our phones are used to… ▽ More

    Submitted 10 February, 2018; originally announced February 2018.

    Comments: Accepted for publication in Springer LNEE

  27. arXiv:1712.00917  [pdf

    cs.SD eess.AS

    A text-independent speaker verification model: A comparative analysis

    Authors: Rishi Charan, Manisha. A, Karthik. R, Rajesh Kumar M

    Abstract: The most pressing challenge in the field of voice biometrics is selecting the most efficient technique of speaker recognition. Every individual's voice is peculiar, factors like physical differences in vocal organs, accent and pronunciation contributes to the problem's complexity. In this paper, we explore the various methods available in each block in the process of speaker recognition with the o… ▽ More

    Submitted 4 December, 2017; originally announced December 2017.

    Comments: presented and accepted by 2017 International Conference on Intelligent Computing and Control (I2C2)

  28. arXiv:1703.08849  [pdf, ps, other

    math.CO

    On the number of geodesics of Petersen graph $GP(n,2)$

    Authors: Sunil Kumar R, Kannan Balakrishnan

    Abstract: In any network, the interconnection of nodes by means of geodesics and the number of geodesics existing between nodes are important. There exists a class of centrality measures based on the number of geodesics passing through a vertex. Betweenness centrality indicates the betweenness of a vertex or how often a vertex appears on geodesics between other vertices. It has wide applications in the anal… ▽ More

    Submitted 26 March, 2017; originally announced March 2017.

    Comments: 17 pages

  29. arXiv:1609.03744  [pdf, ps, other

    quant-ph

    Methods for Finding Analytic Solutions for Time Dependent Two-Level Quantum Systems and Its Generalizations

    Authors: Rajath Krishna R, N. S. Vidhyadhiraja

    Abstract: Two-level systems are one of the most important quantum systems and they form the basis of quantum computers. We briefly look at the traditional approach to two-level systems with an external driving field as well as those subjected to noise. This project is aimed at studying two specific methods for obtaining analytic solutions for two-level systems. One of the methods enables us to obtain analyt… ▽ More

    Submitted 13 September, 2016; originally announced September 2016.

    Comments: 14 pages

  30. arXiv:1603.04258  [pdf, ps, other

    math.CO

    Betweenness Centrality of Cartesian Product of Graphs

    Authors: Sunil Kumar R, Kannan Balakrishnan

    Abstract: Betweenness centrality is a widely-used measure in the analysis of large complex networks. It measures the potential or power of a vertex to control the communication over the network under the assumption that information primarily flows over the shortest paths between them. In this paper we prove several results on betweenness centrality of Cartesian product of graphs.

    Submitted 14 March, 2016; originally announced March 2016.

  31. arXiv:1510.02956  [pdf, ps, other

    cs.IT

    On The Number of Optimal Linear Index Codes For Unicast Index Coding Problems

    Authors: Kavitha R., Niranjana Ambadi, B. Sundar Rajan

    Abstract: An index coding problem arises when there is a single source with a number of messages and multiple receivers each wanting a subset of messages and knowing a different set of messages a priori. The noiseless Index Coding Problem is to identify the minimum number of transmissions (optimal length) to be made by the source through noiseless channels so that all receivers can decode their wanted messa… ▽ More

    Submitted 10 October, 2015; originally announced October 2015.

    Comments: Part of the content appears in Proceedings of IEEE International Symposium on Information Theory, (ISIT 2015), Hong Kong, 14-19 June 2015, pp.1044-1048

  32. arXiv:1508.00354  [pdf, ps, other

    cs.SD cs.CL

    Significance of Maximum Spectral Amplitude in Sub-bands for Spectral Envelope Estimation and Its Application to Statistical Parametric Speech Synthesis

    Authors: Sivanand Achanta, Anandaswarup Vadapalli, Sai Krishna R., Suryakanth V. Gangashetty

    Abstract: In this paper we propose a technique for spectral envelope estimation using maximum values in the sub-bands of Fourier magnitude spectrum (MSASB). Most other methods in the literature parametrize spectral envelope in cepstral domain such as Mel-generalized cepstrum etc. Such cepstral domain representations, although compact, are not readily interpretable. This difficulty is overcome by our method… ▽ More

    Submitted 3 August, 2015; originally announced August 2015.

  33. arXiv:1504.05008  [pdf, other

    cs.IT

    On the Number of Optimal Index Codes

    Authors: Kavitha. R, B. Sundar Rajan

    Abstract: In Index coding there is a single sender with multiple messages and multiple receivers each wanting a different set of messages and knowing a different set of messages a priori. The Index Coding problem is to identify the minimum number of transmissions (optimal length) to be made so that all receivers can decode their wanted messages using the transmitted symbols and their respective prior inform… ▽ More

    Submitted 20 April, 2015; originally announced April 2015.

  34. arXiv:1410.6038  [pdf, other

    cs.IT

    Optimal Index Coding with Min-Max Probability of Error over Fading Channels

    Authors: Anoop Thomas, Kavitha R., Chandramouli A., B. Sundar Rajan

    Abstract: An index coding scheme in which the source (transmitter) transmits binary symbols over a wireless fading channel is considered. Index codes with the transmitter using minimum number of transmissions are known as optimal index codes. Different optimal index codes give different performances in terms of probability of error in a fading environment and this also varies from receiver to receiver. In t… ▽ More

    Submitted 13 April, 2015; v1 submitted 22 October, 2014; originally announced October 2014.

  35. arXiv:1410.4074  [pdf, ps, other

    cs.IT

    Distributed Nonparametric Sequential Spectrum Sensing under Electromagnetic Interference

    Authors: Sahasranand K. R., Vinod Sharma

    Abstract: A nonparametric distributed sequential algorithm for quick detection of spectral holes in a Cognitive Radio set up is proposed. Two or more local nodes make decisions and inform the fusion centre (FC) over a reporting Multiple Access Channel (MAC), which then makes the final decision. The local nodes use energy detection and the FC uses mean detection in the presence of fading, heavy-tailed electr… ▽ More

    Submitted 30 April, 2015; v1 submitted 14 October, 2014; originally announced October 2014.

    Comments: 8 pages; 6 figures; Version 2 has the proofs for the theorems. Version 3 contains a new section on approximation analysis

  36. arXiv:1407.8377  [pdf

    cs.SE

    SLI, a New Metric to determine Success of a Software Project

    Authors: Shashi Kumar N. R., T. R. Gopalakrishnan Nair, Suma V

    Abstract: Project Management process plays a critical role in managing factors such as cost, time, technology and personnel towards achieving the success of a project and henceforth the sustainability of the company in the industrial market. This paper emphasizes empirical study of several projects developed over a period of time in a product and service based CMMI Level 5 Software Company. The investigatio… ▽ More

    Submitted 31 July, 2014; originally announced July 2014.

    Comments: 5 pages, 4 tables, IEEE International Conference on Electronics and Communication Systems (ICECS)2014

  37. arXiv:1407.5319  [pdf

    cs.SE

    Impact Analysis of Allocation of Resources by Project Manager on Success of Software Projects

    Authors: T. R. Gopalakrishnan Nair, Suma V, Shashi Kumar N. R

    Abstract: Generation Production of successful software project is one of the prime considerations of software industry. Engineering high quality software products is further influenced by several factors such as budget, schedule, resource constraints etc. A project manager is responsible for estimation and allocation of these resources in a project. Hence, role of project manager has a vital influence on su… ▽ More

    Submitted 20 July, 2014; originally announced July 2014.

    Comments: 5 pages,5 figures, 1 tables, International Conference on Data Mining and Computer Engineering (ICDMCE'2012) December 21-22, 2012 Bangkok (Thailand)

  38. arXiv:1407.2082  [pdf

    cs.AR

    FPGA Based Efficient Multiplier for Image Processing Applications Using Recursive Error Free Mitchell Log Multiplier and KOM Architecture

    Authors: Satish S Bhairannawar, Rathan R, Raja K B, Venugopal K R, L M Patnaik

    Abstract: The Digital Image processing applications like medical imaging, satellite imaging, Biometric trait images etc., rely on multipliers to improve the quality of image. However, existing multiplication techniques introduce errors in the output with consumption of more time, hence error free high speed multipliers has to be designed. In this paper we propose FPGA based Recursive Error Free Mitchell Log… ▽ More

    Submitted 8 July, 2014; originally announced July 2014.

  39. QoS group based optimal retransmission medium access protocol for wireless sensor networks

    Authors: Kumaraswamy M, Shaila K, Tejaswi V, Venugopal K R, S S Iyengar, L M Patnaik

    Abstract: This paper presents, a Group Based Optimal Retransmission Medium Access (GORMA) Protocol is designed that combines protocol of Collision Avoidance (CA) and energy management for low-cost, short-range, low-data rate and low-energy sensor nodes applications in environment monitoring, agriculture, industrial plants etc. In this paper, the GORMA protocol focuses on efficient MAC protocol to provide au… ▽ More

    Submitted 11 April, 2014; originally announced April 2014.

    Comments: 9 pages in IEEE format and 6 figures

    Journal ref: IJCNC, Vol.6, No.2, March 2014

  40. arXiv:1403.4701  [pdf, ps, other

    math.CO

    Betweenness Centrality in Some Classes of Graphs

    Authors: Sunil Kumar R, Kannan Balakrishnan, M. Jathavedan

    Abstract: There are several centrality measures that have been introduced and studied for real world networks. They account for the different vertex characteristics that permit them to be ranked in order of importance in the network. Betweenness centrality is a measure of the influence of a vertex over the flow of information between every pair of vertices under the assumption that information primarily flo… ▽ More

    Submitted 19 March, 2014; originally announced March 2014.

    Comments: 18 pages,2 figures

  41. arXiv:1312.3182  [pdf, ps, other

    cs.DM math.CO

    On The Center Sets and Center Numbers of Some Graph Classes

    Authors: Ram Kumar. R, Kannan Balakrishnan, Manoj Changat, A. Sreekumar, Prasanth G. Narasimha-Shenoi

    Abstract: For a set $S$ of vertices and the vertex $v$ in a connected graph $G$, $\displaystyle\max_{x \in S}d(x,v)$ is called the $S$-eccentricity of $v$ in $G$. The set of vertices with minimum $S$-eccentricity is called the $S$-center of $G$. Any set $A$ of vertices of $G$ such that $A$ is an $S$-center for some set $S$ of vertices of $G$ is called a center set. We identify the center sets of certain cla… ▽ More

    Submitted 11 December, 2013; originally announced December 2013.

  42. arXiv:1309.5601  [pdf, ps, other

    cs.CR cs.NI

    Multiple Domain Secure Routing for Wireless Sensor Networks

    Authors: Lata B T, Jansi P K R, Shaila K, D N Sujatha, Venugopal K R, L M Patnaik

    Abstract: Secure Transmission of data packets in Wireless Sensor Networks is an important area of Research. There is a possibility of an attacker creating security holes in the network. Hence, network security and reliability can be achieved by discovering random multiple paths using multiple domains, and forwarding data packets from the source node to the destination node. We have designed, Multiple Domain… ▽ More

    Submitted 22 September, 2013; originally announced September 2013.

    Comments: 10 pages

    Journal ref: International Journal of Information Processing, 7(2), 59-68, 2013

  43. arXiv:1306.6839  [pdf

    cs.CR

    W3-Scrape - A Windows based Reconnaissance Tool for Web Application Fingerprinting

    Authors: Karthik R, Raghavendra Karthik, Pramod S, Sowmya Kamath

    Abstract: Web Application finger printing is a quintessential part of the Information Gathering phase of (ethical) hacking. It allows narrowing down the specifics instead of looking for all clues. Also an application that has been correctly recognized can help in quickly analyzing known weaknesses and then moving ahead with remaining aspects. This step is also essential to allow a pen tester to customize it… ▽ More

    Submitted 24 June, 2013; originally announced June 2013.

    Comments: International Conference on Emerging Trends in Electrical, Communication and Information Technologies (ICECIT 2012), 6 pages; Organised by SRIT, Ananthpur, India during Dec 21 - 23, 2012. (Publisher - Elsevier Science & Technology; ISBN 8131234118, 9788131234112)

    ACM Class: D.4.6; E.3

  44. arXiv:1303.5867  [pdf

    cs.IR cs.DB

    Similarity based Dynamic Web Data Extraction and Integration System from Search Engine Result Pages for Web Content Mining

    Authors: Srikantaiah K C, Suraj M, Venugopal K R, L M Patnaik

    Abstract: There is an explosive growth of information in the World Wide Web thus posing a challenge to Web users to extract essential knowledge from the Web. Search engines help us to narrow down the search in the form of Search Engine Result Pages (SERP). Web Content Mining is one of the techniques that help users to extract useful information from these SERPs. In this paper, we propose two similarity base… ▽ More

    Submitted 23 March, 2013; originally announced March 2013.

    Comments: 8 pages

    Journal ref: ACEEE International Journal on Information Technology, Volume 3, Issue 1, 2013

  45. arXiv:1303.0445  [pdf

    cs.IR cs.CL

    Detecting and resolving spatial ambiguity in text using named entity extraction and self learning fuzzy logic techniques

    Authors: Kanagavalli V R, Raja. K

    Abstract: Information extraction identifies useful and relevant text in a document and converts unstructured text into a form that can be loaded into a database table. Named entity extraction is a main task in the process of information extraction and is a classification problem in which words are assigned to one or more semantic classes or to a default non-entity class. A word which can belong to one or mo… ▽ More

    Submitted 2 March, 2013; originally announced March 2013.

    Comments: National Conference on Recent Trends in Data Mining and Distributed Systems September 2011

    Report number: ISBN 978-81-909042-5-4 P.no.71-76

  46. arXiv:1302.6340  [pdf

    cs.IR

    A Fuzzy Logic based Method for Efficient Retrieval of Vague and Uncertain Spatial Expressions in Text Exploiting the Granulation of the Spatial Event Queries

    Authors: Kanagavalli. V. R, Raja. K

    Abstract: The arrangement of things in n-dimensional space is specified as Spatial. Spatial data consists of values that denote the location and shape of objects and areas on the earths surface. Spatial information includes facts such as location of features, the relationship of geographic features and measurements of geographic features. The spatial cognition is a primal area of study in various other fiel… ▽ More

    Submitted 26 February, 2013; originally announced February 2013.

    Comments: National Conference on Future Computing,0975 8887,IJCA,February2013

  47. arXiv:1208.1448  [pdf, other

    cs.IR cs.SI

    The Best Answers? Think Twice: Online Detection of Commercial Campaigns in the CQA Forums

    Authors: Cheng Chen, Kui Wu, Venkatesh Srinivasan, Kesav Bharadwaj R

    Abstract: In an emerging trend, more and more Internet users search for information from Community Question and Answer (CQA) websites, as interactive communication in such websites provides users with a rare feeling of trust. More often than not, end users look for instant help when they browse the CQA websites for the best answers. Hence, it is imperative that they should be warned of any potential commerc… ▽ More

    Submitted 5 January, 2013; v1 submitted 7 August, 2012; originally announced August 2012.

    Comments: 9 pages, 10 figures

  48. arXiv:1106.3517  [pdf

    cs.CV

    DWT Based Fingerprint Recognition using Non Minutiae Features

    Authors: Shashi Kumar D. R., K. B. Raja, R. K. Chhootaray, Sabyasachi Pattanaik

    Abstract: Forensic applications like criminal investigations, terrorist identification and National security issues require a strong fingerprint data base and efficient identification system. In this paper we propose DWT based Fingerprint Recognition using Non Minutiae (DWTFR) algorithm. Fingerprint image is decomposed into multi resolution sub bands of LL, LH, HL and HH by applying 3 level DWT. The Dominan… ▽ More

    Submitted 17 June, 2011; originally announced June 2011.

    Comments: 9 pages

    Journal ref: IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 2, March 2011, 257-265

  49. arXiv:1011.5326  [pdf, other

    cs.NI

    Energy Efficient Clustering and Routing in Mobile Wireless Sensor Network

    Authors: Getsy S. Sara, Kalaiarasi. R, Neelavathy Pari. S, Sridharan . D

    Abstract: A critical need in Mobile Wireless Sensor Network (MWSN) is to achieve energy efficiency during routing as the sensor nodes have scarce energy resource. The nodes' mobility in MWSN poses a challenge to design an energy efficient routing protocol. Clustering helps to achieve energy efficiency by reducing the organization complexity overhead of the network which is proportional to the number of node… ▽ More

    Submitted 24 November, 2010; originally announced November 2010.

    Comments: 9 pages, 4 figures

  50. arXiv:1002.3015  [pdf, other

    cs.SE

    GPRS Based Intranet Remote Administration GIRA

    Authors: Shashi Kumar N. R., R. Selvarani, Pushpavathi T. P

    Abstract: In a world of increasing mobility, there is a growing need for people to communicate with each other and have timely access to information regardless of the location of the individuals or the information. With the advent of moblle technology, the way of communication has changed. The gira system is basically a mobile phone technology service. In this paper we discuss about a novel local area net… ▽ More

    Submitted 16 February, 2010; originally announced February 2010.

    Comments: 4 pages, 2 figures

    Journal ref: Journal of Research and Industry, Volume 1, pp 36-39, 2008