-
Comparative Study of Machine Learning Algorithms in Detecting Cardiovascular Diseases
Authors:
Dayana K,
S. Nandini,
Sanjjushri Varshini R
Abstract:
The detection of cardiovascular diseases (CVD) using machine learning techniques represents a significant advancement in medical diagnostics, aiming to enhance early detection, accuracy, and efficiency. This study explores a comparative analysis of various machine learning algorithms, including Logistic Regression, Decision Tree, Random Forest, Gradient Boosting, Support Vector Machine (SVM), K-Ne…
▽ More
The detection of cardiovascular diseases (CVD) using machine learning techniques represents a significant advancement in medical diagnostics, aiming to enhance early detection, accuracy, and efficiency. This study explores a comparative analysis of various machine learning algorithms, including Logistic Regression, Decision Tree, Random Forest, Gradient Boosting, Support Vector Machine (SVM), K-Nearest Neighbors (KNN), and XGBoost. By utilising a structured workflow encompassing data collection, preprocessing, model selection and hyperparameter tuning, training, evaluation, and choice of the optimal model, this research addresses the critical need for improved diagnostic tools. The findings highlight the efficacy of ensemble methods and advanced algorithms in providing reliable predictions, thereby offering a comprehensive framework for CVD detection that can be readily implemented and adapted in clinical settings.
△ Less
Submitted 27 May, 2024;
originally announced May 2024.
-
Hop** of the center-of-mass of single G centers in silicon-on-insulator
Authors:
Alrik Durand,
Yoann Baron,
Péter Udvarhelyi,
Félix Cache,
Krithika V. R.,
Tobias Herzig,
Mario Khoury,
Sébastien Pezzagna,
Jan Meijer,
Jean-Michel Hartmann,
Shay Reboh,
Marco Abbarchi,
Isabelle Robert-Philip,
Adam Gali,
Jean-Michel Gérard,
Vincent Jacques,
Guillaume Cassabois,
Anaïs Dréau
Abstract:
Among the wealth of single fluorescent defects recently detected in silicon, the G center catches interest for its telecom single-photon emission that could be coupled to a metastable electron spin triplet. The G center is a unique defect where the standard Born-Oppenheimer approximation breaks down as one of its atoms can move between 6 lattice sites under optical excitation. The impact of this a…
▽ More
Among the wealth of single fluorescent defects recently detected in silicon, the G center catches interest for its telecom single-photon emission that could be coupled to a metastable electron spin triplet. The G center is a unique defect where the standard Born-Oppenheimer approximation breaks down as one of its atoms can move between 6 lattice sites under optical excitation. The impact of this atomic reconfiguration on the photoluminescence properties of G centers is still largely unknown, especially in silicon-on-insulator (SOI) samples. Here, we investigate the displacement of the center-of-mass of the G center in silicon. We show that single G defects in SOI exhibit a multipolar emission and zero-phonon line fine structures with splittings up to $\sim1$ meV, both indicating a motion of the defect central atom over time. Combining polarization and spectral analysis at the single-photon level, we evidence that the reconfiguration dynamics are drastically different from the one of the unperturbed G center in bulk silicon. The SOI structure freezes the delocalization of the G defect center-of-mass and as a result, enables to isolate linearly polarized optical lines. Under above-bandgap optical excitation, the central atom of G centers in SOI behaves as if it were in a 6-slot roulette wheel, randomly alternating between localized crystal sites at each optical cycle. Comparative measurements in a bulk silicon sample and ab initio calculations highlight that strain is likely the dominant perturbation impacting the G center geometry. These results shed light on the importance of the atomic reconfiguration dynamics to understand and control the photoluminescence properties of the G center in silicon. More generally, these findings emphasize the impact of strain fluctuations inherent to SOI wafers for future quantum integrated photonics applications based on color centers in silicon.
△ Less
Submitted 23 April, 2024;
originally announced April 2024.
-
Automating REST API Postman Test Cases Using LLM
Authors:
S Deepika Sri,
Mohammed Aadil S,
Sanjjushri Varshini R,
Raja CSP Raman,
Gopinath Rajagopal,
S Taranath Chan
Abstract:
In the contemporary landscape of technological advancements, the automation of manual processes is crucial, compelling the demand for huge datasets to effectively train and test machines. This research paper is dedicated to the exploration and implementation of an automated approach to generate test cases specifically using Large Language Models. The methodology integrates the use of Open AI to en…
▽ More
In the contemporary landscape of technological advancements, the automation of manual processes is crucial, compelling the demand for huge datasets to effectively train and test machines. This research paper is dedicated to the exploration and implementation of an automated approach to generate test cases specifically using Large Language Models. The methodology integrates the use of Open AI to enhance the efficiency and effectiveness of test case generation for training and evaluating Large Language Models. This formalized approach with LLMs simplifies the testing process, making it more efficient and comprehensive. Leveraging natural language understanding, LLMs can intelligently formulate test cases that cover a broad range of REST API properties, ensuring comprehensive testing. The model that is developed during the research is trained using manually collected postman test cases or instances for various Rest APIs. LLMs enhance the creation of Postman test cases by automating the generation of varied and intricate test scenarios. Postman test cases offer streamlined automation, collaboration, and dynamic data handling, providing a user-friendly and efficient approach to API testing compared to traditional test cases. Thus, the model developed not only conforms to current technological standards but also holds the promise of evolving into an idea of substantial importance in future technological advancements.
△ Less
Submitted 16 April, 2024;
originally announced April 2024.
-
Observations of the Crab Nebula with MACE (Major Atmospheric Cherenkov Experiment)
Authors:
Borwankar C.,
Sharma M.,
Hariharan J.,
Venugopal K.,
Godambe S.,
Mankuzhyil N.,
Chandra P.,
Khurana M.,
Pathania A.,
Chouhan N.,
Dhar V. K.,
Thubstan R.,
Norlha S.,
Keshavananda,
Sarkar D.,
Dar Z. A.,
Kotwal S. V.,
Godiyal S.,
Kushwaha C. P.,
Singh K. K.,
Das M. P.,
Tolamatti A.,
Ghosal B.,
Chanchalani K.,
Pandey P.
, et al. (10 additional authors not shown)
Abstract:
The Major Atmospheric Cherenkov Experiment (MACE) is a large size (21m) Imaging Atmospheric Cherenkov Telescope (IACT) installed at an altitude of 4270m above sea level at Hanle, Ladakh in northern India. Here we report the detection of Very High Energy (VHE) gamma-ray emission from Crab Nebula above 80 GeV. We analysed ~15 hours of data collected at low zenith angle between November 2022 and Febr…
▽ More
The Major Atmospheric Cherenkov Experiment (MACE) is a large size (21m) Imaging Atmospheric Cherenkov Telescope (IACT) installed at an altitude of 4270m above sea level at Hanle, Ladakh in northern India. Here we report the detection of Very High Energy (VHE) gamma-ray emission from Crab Nebula above 80 GeV. We analysed ~15 hours of data collected at low zenith angle between November 2022 and February 2023. The energy spectrum is well described by a log-parabola function with a flux of ~(3.46 +/- 0.26stat) x 10-10 TeV-1 cm-2 s-1, at 400 GeV with spectral index of 2.09 +/- 0.06stat and a curvature parameter of 0.08 +/- 0.07stat. The gamma-rays are detected in an energy range spanning from 80 GeV to ~5 TeV. The energy resolution improves from ~34% at an analysis energy threshold of 80 GeV to ~21% above 1 TeV. The daily light curve and the spectral energy distribution obtained for the Crab Nebula is in agreement with previous measurements, considering statistical and systematic uncertainties.
△ Less
Submitted 2 April, 2024;
originally announced April 2024.
-
Spin ice evidence in the frustrated Gd2GaSbO7 and Gd2InSbO7 pyrochlore compounds
Authors:
S. Nallamuthu,
Andrea Dzubinska,
K. Arun,
Vimaljith A. R,
Marian Reiffers,
R. Nagalakshmi,
Ivan Čurlik,
Sergej Iľkovič
Abstract:
Gd2GaSbO7 and Gd2InSbO7 pyrochlore compounds have exhibited spin ice behavior. These compounds have not been adequately reported based on the concept of magnetic frustration. Here, we have synthesized and characterized Gd2GaSbO7 and Gd2InSbO7 to study the ground state magnetic properties. We confirmed the cubic pyrochlore structure via X-ray powder diffraction. Magnetic and heat capacity measureme…
▽ More
Gd2GaSbO7 and Gd2InSbO7 pyrochlore compounds have exhibited spin ice behavior. These compounds have not been adequately reported based on the concept of magnetic frustration. Here, we have synthesized and characterized Gd2GaSbO7 and Gd2InSbO7 to study the ground state magnetic properties. We confirmed the cubic pyrochlore structure via X-ray powder diffraction. Magnetic and heat capacity measurements show an absence of magnetic order down to 400 mK. Interestingly, the low-temperature magnetic heat capacity exhibited a broad maximum around Tmax = 0.9 K for Gd2GaSbO7 and Tmax = 1 K for Gd2InSbO7, suggesting the presence of spin fluctuations and following the T^1.71 and T^1.49 dependence for Gd2GaSbO7 and Gd2InSbO7 respectively. We scale the ratio between nearest-neighbour exchange and dipolar interaction of all the reported Gd-based pyrochlores, where Gd2InSbO7 has the lowest and weaker exchange interaction of all among others. It states that chemical pressure has an impact on exchange interaction due to the different pathways of mediators between magnetic ions. This study reveals the robust spin ice behaviour in the ground state like Dy2Ti2O7 and Ho2Ti2O7. It is in stark contrast with other Gd-Pyrochlore compounds that hold the long-range magnetic order.
△ Less
Submitted 2 April, 2024; v1 submitted 22 February, 2024;
originally announced February 2024.
-
No epistemic model can explain anti-distinguishability of quantum mixed preparations
Authors:
Sagnik Ray,
Visweshwaran R,
Debashis Saha
Abstract:
We address the fundamental question of whether epistemic models can reproduce the empirical predictions of general quantum preparations. This involves comparing the common quantum overlap determined by the anti-distinguishability of a set of mixed preparations with the common epistemic overlap of the probability distribution over the ontic states describing these preparations. A set of quantum mix…
▽ More
We address the fundamental question of whether epistemic models can reproduce the empirical predictions of general quantum preparations. This involves comparing the common quantum overlap determined by the anti-distinguishability of a set of mixed preparations with the common epistemic overlap of the probability distribution over the ontic states describing these preparations. A set of quantum mixed preparations is deemed to be non-epistemic when the epistemic overlap must be zero while the corresponding quantum overlap remains non-zero. In its strongest manifestation, a set of mixed quantum preparations is fully non-epistemic if the epistemic overlap vanishes while the quantum overlap reaches its maximum value of one. Remarkably, we show that there exist sets of non-epistemic mixed preparations even in dimension 2, when the overlap between three mixed preparations is concerned. Moreover, we present quantum mixed preparations in dimensions 3 and 4 that are fully non-epistemic concerning the overlap between four and three preparations, respectively. We also establish a generic upper bound on the average ratio between the epistemic and quantum overlap for two mixed preparations. Consequently, the ratio for certain pairs of quantum mixed preparations is shown to be arbitrarily small in two different instances, signifying they are non-epistemic in one case and fully non-epistemic in the other. Finally, we delve into some of the remarkable implications stemming from our findings.
△ Less
Submitted 16 May, 2024; v1 submitted 31 January, 2024;
originally announced January 2024.
-
Empowering Communication: Speech Technology for Indian and Western Accents through AI-powered Speech Synthesis
Authors:
Vinotha R,
Hepsiba D,
L. D. Vijay Anand,
Deepak John Reji
Abstract:
Neural Text-to-speech (TTS) synthesis is a powerful technology that can generate speech using neural networks. One of the most remarkable features of TTS synthesis is its capability to produce speech in the voice of different speakers. This paper introduces voice cloning and speech synthesis https://pypi.org/project/voice-cloning/ an open-source python package for hel** speech disorders to commu…
▽ More
Neural Text-to-speech (TTS) synthesis is a powerful technology that can generate speech using neural networks. One of the most remarkable features of TTS synthesis is its capability to produce speech in the voice of different speakers. This paper introduces voice cloning and speech synthesis https://pypi.org/project/voice-cloning/ an open-source python package for hel** speech disorders to communicate more effectively as well as for professionals seeking to integrate voice cloning or speech synthesis capabilities into their projects. This package aims to generate synthetic speech that sounds like the natural voice of an individual, but it does not replace the natural human voice. The architecture of the system comprises a speaker verification system, a synthesizer, a vocoder, and noise reduction. Speaker verification system trained on a varied set of speakers to achieve optimal generalization performance without relying on transcriptions. Synthesizer is trained using both audio and transcriptions that generate Mel spectrogram from a text and vocoder which converts the generated Mel Spectrogram into corresponding audio signal. Then the audio signal is processed by a noise reduction algorithm to eliminate unwanted noise and enhance speech clarity. The performance of synthesized speech from seen and unseen speakers are then evaluated using subjective and objective evaluation such as Mean Opinion Score (MOS), Gross Pitch Error (GPE), and Spectral distortion (SD). The model can create speech in distinct voices by including speaker characteristics that are chosen randomly.
△ Less
Submitted 16 February, 2024; v1 submitted 22 January, 2024;
originally announced January 2024.
-
Dislocation assisted coarsening of coherent precipitates: a phase field study
Authors:
Arjun Varma R,
Prita Pant,
M P Gururajan
Abstract:
Coarsening of precipitates in coherent systems is influenced by the elastic fields of the precipitates and the interfacial curvature. It is also known that if precipitates are connected by dislocations, coarsening is affected by the elastic fields of the dislocations and the pipe diffusivity. Although there is experimental evidence of accelerated coarsening in the presence of dislocations, these s…
▽ More
Coarsening of precipitates in coherent systems is influenced by the elastic fields of the precipitates and the interfacial curvature. It is also known that if precipitates are connected by dislocations, coarsening is affected by the elastic fields of the dislocations and the pipe diffusivity. Although there is experimental evidence of accelerated coarsening in the presence of dislocations, these studies do not capture the effect of the elastic fields. There exist generic theoretical models that can predict the average sizes and size distributions of coarsening precipitates considering the coherency related elastic stress fields. In this paper, we use a phase field model to study the coarsening of precipitates connected by dislocations, incorporating its elastic fields and pipe diffusivity. Specifically, we study the effects of misfit strain, elastic moduli mismatch, faster pipe mobility and the elastic fields of the dislocation on the morphology and kinetics of the coarsening precipitates. The dilatational component, associated with the edge character of the dislocations interact with the precipitates in an elastically homogeneous system. In an elastically inhomogeneous system, the deviatoric elastic fields also interact with the precipitates influencing the morphology and kinetics of coarsening precipitates. The kinetics of coarsening is different as well, with hard precipitates coarsening faster as compared to soft precipitates, when connected by dislocations. Further, we note that the modified Gibbs-Thomson equation, which was originally derived for an isolated precipitate in an infinite matrix, is also applicable for coarsening precipitates at close proximity.
△ Less
Submitted 9 January, 2024;
originally announced January 2024.
-
Estimating Countries with Similar Maternal Mortality Rate using Cluster Analysis and Pairing Countries with Identical MMR
Authors:
S. Nandini,
Sanjjushri Varshini R
Abstract:
In the evolving world, we require more additionally the young era to flourish and evolve into developed land. Most of the population all around the world are unaware of the complications involved in the routine they follow while they are pregnant and how hospital facilities affect maternal health. Maternal Mortality is the death of a pregnant woman due to intricacies correlated to pregnancy, under…
▽ More
In the evolving world, we require more additionally the young era to flourish and evolve into developed land. Most of the population all around the world are unaware of the complications involved in the routine they follow while they are pregnant and how hospital facilities affect maternal health. Maternal Mortality is the death of a pregnant woman due to intricacies correlated to pregnancy, underlying circumstances exacerbated by the pregnancy or management of these situations. It is crucial to consider the Maternal Mortality Rate (MMR) in diverse locations and determine which human routines and hospital facilities diminish the Maternal Mortality Rate (MMR). This research aims to examine and discover the countries which are kee** more lavish threats of MMR and countries alike in MMR encountered. Data is examined and collected for various countries, data consists of the earlier years' observation. From the perspective of Machine Learning, Unsupervised Machine Learning is implemented to perform Cluster Analysis. Therefore the pairs of countries with similar MMR as well as the extreme opposite pair concerning the MMR are found.
△ Less
Submitted 7 December, 2023;
originally announced December 2023.
-
Single-shot recognition of orbital angular momentum from speckles with spatially multiplexed point detection (SMPD)
Authors:
Zhiyuan Wang,
Haoran Li,
Qi Zhao,
Vinu R V,
Xiaocong Yuan,
Ziyang Chen,
Puxiang Lai,
Jixiong Pu
Abstract:
The widely adopted optical information detection strategies nowadays can be roughly classified into spatial-resolve-based and time-sequence-based methods. The former is highly reliant on detectors with spatial resolution that works in a limited spectrum range to capture the intensity distribution of the object, whereas the latter employs single-pixel detectors (SPDs) with improved reliability and…
▽ More
The widely adopted optical information detection strategies nowadays can be roughly classified into spatial-resolve-based and time-sequence-based methods. The former is highly reliant on detectors with spatial resolution that works in a limited spectrum range to capture the intensity distribution of the object, whereas the latter employs single-pixel detectors (SPDs) with improved reliability and stability in detection at the expense of time consumption due to sequential intensity recording. However, there is a scarcity of research on using high-performance SPDs for single-shot object information detection. To capture and extract features of objects efficiently and economically, in this work, we propose a single-shot optical information-detecting method, tentatively named spatially multiplexed point detection (SMPD) technology, in which some SPDs are randomly distributed at different locations to acquire the information of the object. To validate the validity of the proposed method, we demonstrate high-fidelity recognition of orbital angular momentum (OAM) modes from speckle patterns generated by the transmission of two orthogonally polarized vortex beams through a multimode fiber. It is feasible to apply this approach in wide applications, such as image transmission based on multiplexed-OAM decoding and recognizing hand-written digits. Compared with traditional image recognition methods, the new approach yields a recognition accuracy of over 98% with an effective detection area that is only 0.02% of its counterparts. With further engineering, the proposed method may spur many exciting developments in OAM-based optical communication systems, image classification, object detections, and other optical information detections.
△ Less
Submitted 6 October, 2023;
originally announced October 2023.
-
Comparative Study and Framework for Automated Summariser Evaluation: LangChain and Hybrid Algorithms
Authors:
Bagiya Lakshmi S,
Sanjjushri Varshini R,
Rohith Mahadevan,
Raja CSP Raman
Abstract:
Automated Essay Score (AES) is proven to be one of the cutting-edge technologies. Scoring techniques are used for various purposes. Reliable scores are calculated based on influential variables. Such variables can be computed by different methods based on the domain. The research is concentrated on the user's understanding of a given topic. The analysis is based on a scoring index by using Large L…
▽ More
Automated Essay Score (AES) is proven to be one of the cutting-edge technologies. Scoring techniques are used for various purposes. Reliable scores are calculated based on influential variables. Such variables can be computed by different methods based on the domain. The research is concentrated on the user's understanding of a given topic. The analysis is based on a scoring index by using Large Language Models. The user can then compare and contrast the understanding of a topic that they recently learned. The results are then contributed towards learning analytics and progression is made for enhancing the learning ability. In this research, the focus is on summarizing a PDF document and gauging a user's understanding of its content. The process involves utilizing a Langchain tool to summarize the PDF and extract the essential information. By employing this technique, the research aims to determine how well the user comprehends the summarized content.
△ Less
Submitted 4 October, 2023;
originally announced October 2023.
-
Novel Deep Learning Pipeline for Automatic Weapon Detection
Authors:
Haribharathi Sivakumar,
Vijay Arvind. R,
Pawan Ragavendhar V,
G. Balamurugan
Abstract:
Weapon and gun violence have recently become a pressing issue today. The degree of these crimes and activities has risen to the point of being termed as an epidemic. This prevalent misuse of weapons calls for an automatic system that detects weapons in real-time. Real-time surveillance video is captured and recorded in almost all public forums and places. These videos contain abundant raw data whi…
▽ More
Weapon and gun violence have recently become a pressing issue today. The degree of these crimes and activities has risen to the point of being termed as an epidemic. This prevalent misuse of weapons calls for an automatic system that detects weapons in real-time. Real-time surveillance video is captured and recorded in almost all public forums and places. These videos contain abundant raw data which can be extracted and processed into meaningful information. This paper proposes a novel pipeline consisting of an ensemble of convolutional neural networks with distinct architectures. Each neural network is trained with a unique mini-batch with little to no overlap in the training samples. This paper will present several promising results using multiple datasets associated with comparing the proposed architecture and state-of-the-art (SoA) models. The proposed pipeline produced an average increase of 5% in accuracy, specificity, and recall compared to the SoA systems.
△ Less
Submitted 28 September, 2023;
originally announced September 2023.
-
End-to-End Optimized Pipeline for Prediction of Protein Folding Kinetics
Authors:
Vijay Arvind. R,
Haribharathi Sivakumar,
Brindha. R
Abstract:
Protein folding is the intricate process by which a linear sequence of amino acids self-assembles into a unique three-dimensional structure. Protein folding kinetics is the study of pathways and time-dependent mechanisms a protein undergoes when it folds. Understanding protein kinetics is essential as a protein needs to fold correctly for it to perform its biological functions optimally, and a mis…
▽ More
Protein folding is the intricate process by which a linear sequence of amino acids self-assembles into a unique three-dimensional structure. Protein folding kinetics is the study of pathways and time-dependent mechanisms a protein undergoes when it folds. Understanding protein kinetics is essential as a protein needs to fold correctly for it to perform its biological functions optimally, and a misfolded protein can sometimes be contorted into shapes that are not ideal for a cellular environment giving rise to many degenerative, neuro-degenerative disorders and amyloid diseases. Monitoring at-risk individuals and detecting protein discrepancies in a protein's folding kinetics at the early stages could majorly result in public health benefits, as preventive measures can be taken. This research proposes an efficient pipeline for predicting protein folding kinetics with high accuracy and low memory footprint. The deployed machine learning (ML) model outperformed the state-of-the-art ML models by 4.8% in terms of accuracy while consuming 327x lesser memory and being 7.3% faster.
△ Less
Submitted 17 September, 2023;
originally announced September 2023.
-
Imbalanced Data Stream Classification using Dynamic Ensemble Selection
Authors:
Priya. S,
Haribharathi Sivakumar,
Vijay Arvind. R
Abstract:
Modern streaming data categorization faces significant challenges from concept drift and class imbalanced data. This negatively impacts the output of the classifier, leading to improper classification. Furthermore, other factors such as the overlap** of multiple classes limit the extent of the correctness of the output. This work proposes a novel framework for integrating data pre-processing and…
▽ More
Modern streaming data categorization faces significant challenges from concept drift and class imbalanced data. This negatively impacts the output of the classifier, leading to improper classification. Furthermore, other factors such as the overlap** of multiple classes limit the extent of the correctness of the output. This work proposes a novel framework for integrating data pre-processing and dynamic ensemble selection, by formulating the classification framework for the nonstationary drifting imbalanced data stream, which employs the data pre-processing and dynamic ensemble selection techniques. The proposed framework was evaluated using six artificially generated data streams with differing imbalance ratios in combination with two different types of concept drifts. Each stream is composed of 200 chunks of 500 objects described by eight features and contains five concept drifts. Seven pre-processing techniques and two dynamic ensemble selection methods were considered. According to experimental results, data pre-processing combined with Dynamic Ensemble Selection techniques significantly delivers more accuracy when dealing with imbalanced data streams.
△ Less
Submitted 28 September, 2023; v1 submitted 17 September, 2023;
originally announced September 2023.
-
Search Engine and Recommendation System for the Music Industry built with **aAI
Authors:
Ishita Gopalakrishnan,
Sanjjushri Varshini R,
Ponshriharini V
Abstract:
One of the most intriguing debates regarding a novel task is the development of search engines and recommendation-based systems in the music industry. Studies have shown a drastic depression in the search engine fields, due to concerning factors such as speed, accuracy and the format of data given for querying. Often people face difficulty in searching for a song solely based on the title, hence a…
▽ More
One of the most intriguing debates regarding a novel task is the development of search engines and recommendation-based systems in the music industry. Studies have shown a drastic depression in the search engine fields, due to concerning factors such as speed, accuracy and the format of data given for querying. Often people face difficulty in searching for a song solely based on the title, hence a solution is proposed to complete a search analysis through a single query input and is matched with the lyrics of the songs present in the database. Hence it is essential to incorporate cutting-edge technology tools for develo** a user-friendly search engine. **a AI is an MLOps framework for building neural search engines that are utilized, in order for the user to obtain accurate results. **a AI effectively helps to maintain and enhance the quality of performance for the search engine for the query given. An effective search engine and a recommendation system for the music industry, built with **aAI.
△ Less
Submitted 7 August, 2023;
originally announced August 2023.
-
A Novel SLCA-UNet Architecture for Automatic MRI Brain Tumor Segmentation
Authors:
Tejashwini P S,
Thriveni J,
Venugopal K R
Abstract:
Brain tumor is deliberated as one of the severe health complications which lead to decrease in life expectancy of the individuals and is also considered as a prominent cause of mortality worldwide. Therefore, timely detection and prediction of brain tumors can be helpful to prevent death rates due to brain tumors. Biomedical image analysis is a widely known solution to diagnose brain tumor. Althou…
▽ More
Brain tumor is deliberated as one of the severe health complications which lead to decrease in life expectancy of the individuals and is also considered as a prominent cause of mortality worldwide. Therefore, timely detection and prediction of brain tumors can be helpful to prevent death rates due to brain tumors. Biomedical image analysis is a widely known solution to diagnose brain tumor. Although MRI is the current standard method for imaging tumors, its clinical usefulness is constrained by the requirement of manual segmentation which is time-consuming. Deep learning-based approaches have emerged as a promising solution to develop automated biomedical image exploration tools and the UNet architecture is commonly used for segmentation. However, the traditional UNet has limitations in terms of complexity, training, accuracy, and contextual information processing. As a result, the modified UNet architecture, which incorporates residual dense blocks, layered attention, and channel attention modules, in addition to stacked convolution, can effectively capture both coarse and fine feature information. The proposed SLCA UNet approach achieves good performance on the freely accessible Brain Tumor Segmentation (BraTS) dataset, with an average performance of 0.845, 0.845, 0.999, and 8.1 in terms of Dice, Sensitivity, Specificity, and Hausdorff95 for BraTS 2020 dataset, respectively.
△ Less
Submitted 16 July, 2023;
originally announced July 2023.
-
Role of long-range coupling on the properties of single polarons in models with dual electron-phonon couplings
Authors:
Monodeep Chakraborty,
Sankeerth S. Narayan,
Vigneshwaran R.,
Mona Berciu
Abstract:
We use the Variational Exact Diagonalization to investigate the single polaron properties for four different dual models, combining a short-range off-diagonal (Peierls) plus a longer-range diagonal (Holstein or breathing-mode) coupling. This allows us to investigate the sensitivity of various polaron properties both to the range of the diagonal coupling and to the specific diagonal coupling chosen…
▽ More
We use the Variational Exact Diagonalization to investigate the single polaron properties for four different dual models, combining a short-range off-diagonal (Peierls) plus a longer-range diagonal (Holstein or breathing-mode) coupling. This allows us to investigate the sensitivity of various polaron properties both to the range of the diagonal coupling and to the specific diagonal coupling chosen. We find strong sensitivity to the range for all duals models as the adiabatic limit is approached, however considerable sensitivity is observed for some quantities even for large phonon frequencies. Also, the strong dependence of the results on the specific form of the diagonal coupling is observed everywhere in the parameter space. Taken together, these results suggest that careful consideration must be given to the specific coupling and its proper range when quantitative comparisons with experiments are sought.
△ Less
Submitted 19 April, 2022;
originally announced April 2022.
-
On The Diameter of Pancake Graphs
Authors:
Harigovind V R,
Pramod P Nair
Abstract:
The Pancake graph($P_n$) represents the group of all permutations on n elements, namely $S_n$, with respect to the generating set containing all prefix reversals. The diameter of a graph is the maximum of all distances on the graph, where the distance between two vertices is the shortest path between them. In the case of the $P_n$, it is the maximum of the shortest generating sequence of each perm…
▽ More
The Pancake graph($P_n$) represents the group of all permutations on n elements, namely $S_n$, with respect to the generating set containing all prefix reversals. The diameter of a graph is the maximum of all distances on the graph, where the distance between two vertices is the shortest path between them. In the case of the $P_n$, it is the maximum of the shortest generating sequence of each permutation in $S_n$. Here we propose a method to realise better upper bounds to the diameter of $P_n$ that has its focus on Graph Theoretical concepts rather than Algebra.
△ Less
Submitted 18 April, 2022;
originally announced April 2022.
-
Contiguous Hetero-structures & Co-existing Morphological Derivatives of Preferentially Grown Carbo-nitrides in Long Term Aged SS 316LN with Varying Nitrogen Concentration
Authors:
Alphy George,
Vaishnavi Krupa B. R.,
R. Mythili,
Arup Dasgupta,
J. Ganesh Kumar,
G. V. Prasad Reddy
Abstract:
To assess long-term structural integrity under operational conditions in nuclear reactors, SS 316LN with varying nitrogen content is subjected to thermal aging for 20000 hours at 650°C. While the annealing twins and heterogeneous grain evolution by bimodal division are independent of chemical composition, the type, size and morphology of evolving secondary phases are characteristic for nitrogen co…
▽ More
To assess long-term structural integrity under operational conditions in nuclear reactors, SS 316LN with varying nitrogen content is subjected to thermal aging for 20000 hours at 650°C. While the annealing twins and heterogeneous grain evolution by bimodal division are independent of chemical composition, the type, size and morphology of evolving secondary phases are characteristic for nitrogen concentration. Colour contrast in bright field optical microscopy combined with transmission electron microscopy reveals the presence of three major precipitate phases; M23(C, N)6, Fe2Mo intermetallics and Cr2N. Contiguously formed hetero-structures of Fe2Mo and Cr2N are quantified and extensive formation has been observed in steels with high nitrogen content (0.14 wt. % and 0.22 wt. %). A unique occurrence of morphological derivatives of intra-granular M23(C, N)6 precipitates with cube-on-cube orientation relationship such as (1) isolated cubes, (2) primary stringers/strings of cubes, (3) secondary stringers/clusters of branched primary strings, and (4) clusters of laths are identified. The stringers and laths are preferentially grown in{111}/<110>γ and have crystallographic variants. The conclusions are drawn from bright field colour contrast optical micrographs in the present study demonstrate the potential of light optical microscopy to be used as a significant tool to efficiently and accurately process huge amount of data including the preferential growth planes/directions ({111}/<110>) of morphological derivatives of M23(C, N)6 precipitates, by analyzing the symmetry and dense planes/directions of secondary phases. Overall mechanical properties have been reformed by the precipitation strengthening effect arising from the excess nitrogen content.
△ Less
Submitted 10 August, 2021;
originally announced August 2021.
-
Dislocation assisted phase separation: a phase field study
Authors:
Arjun Varma R,
Prita Pant,
M P Gururajan
Abstract:
Defects play a key role in deciding the mechanisms and kinetics of phase transformations. In this paper, we show how dislocations influence phase separation in alloys with miscibility gap. Specifically, depending on the ratio of pipe mobility to bulk mobility, it is seen that even in a system with nominal compositions outside the spinodal limit, spinodal phase separation is possible. Surprisingly,…
▽ More
Defects play a key role in deciding the mechanisms and kinetics of phase transformations. In this paper, we show how dislocations influence phase separation in alloys with miscibility gap. Specifically, depending on the ratio of pipe mobility to bulk mobility, it is seen that even in a system with nominal compositions outside the spinodal limit, spinodal phase separation is possible. Surprisingly, phase separation through both nucleation and growth, and spinodal decomposition, is seen concurrently (for the case of intersecting dislocations). Finally, the prominent role played by dislocations in influencing the morphology of precipitates is explored. We show that these results agree qualitatively with recent experimental results in iron based systems obtained using Atom Probe Tomography (APT).
△ Less
Submitted 27 July, 2021;
originally announced July 2021.
-
Of Access and Inclusivity Digital Divide in Online Education
Authors:
Bheemeshwar Reddy A,
Sunny Jose,
Vaidehi R
Abstract:
Can online education enable all students to participate in and benefit from it equally? Massive online education without addressing the huge access gap and disparities in digital infrastructure would not only exclude a vast majority of students from learning opportunities but also exacerbate the existing socio-economic disparities in educational opportunities.
Can online education enable all students to participate in and benefit from it equally? Massive online education without addressing the huge access gap and disparities in digital infrastructure would not only exclude a vast majority of students from learning opportunities but also exacerbate the existing socio-economic disparities in educational opportunities.
△ Less
Submitted 22 July, 2021;
originally announced July 2021.
-
A projection operator approach for computing the dynamics of AS2S3 chalcogenide birefringent photonic crystal fiber coupler
Authors:
Uthayakumar T,
Vasantha Jayakantha Raja R,
Porsezian K
Abstract:
A variety of AS2S3 chalcogenide photonic crystal fiber coupler of special properties are proposed to study the role of birefringence in all optical coupling characteristics based on the projection operator method (POM). The equations of motion describing the dynamics of the individual pulse parameters through x- and y-polarized modes are arrived at by employing POM from the coupled nonlinear Schrö…
▽ More
A variety of AS2S3 chalcogenide photonic crystal fiber coupler of special properties are proposed to study the role of birefringence in all optical coupling characteristics based on the projection operator method (POM). The equations of motion describing the dynamics of the individual pulse parameters through x- and y-polarized modes are arrived at by employing POM from the coupled nonlinear Schrödinger equations. From the pulse parameter dynamics, it is observed that the amplitudes of the polarization components are significantly influenced by the pulse being introduced with different polarizing angle even at low input power level. Such a selective polarizing angles of the input pulse will provide efficient control over the desired splitting ratio as well as the ability to decide the desired polarization component.
△ Less
Submitted 12 July, 2021;
originally announced July 2021.
-
Phase-field study of surface diffusion enhanced break-ups of nanowire junctions
Authors:
Abhinav Roy,
Arjun Varma R,
M P Gururajan
Abstract:
Using a phase-field model which incorporates enhanced diffusion at the nanowire surfaces, we study the effect of different parameters on the stability of intersecting nanowires. Our study shows that at the intersection of nanowires, sintering (curvature driven material flow) leads to the formation of junctions. These junctions act the initiators of nanowire break-up. The subsequent break-ups take…
▽ More
Using a phase-field model which incorporates enhanced diffusion at the nanowire surfaces, we study the effect of different parameters on the stability of intersecting nanowires. Our study shows that at the intersection of nanowires, sintering (curvature driven material flow) leads to the formation of junctions. These junctions act the initiators of nanowire break-up. The subsequent break-ups take place due to Rayleigh instability at the arms away from these junctions. Finally, at long time scales, the fragments coarsen due to the differences in sizes. The radii of the nanowires that form the junction, the difference in size of the intersecting nanowires and the angle of intersection play a dominant role in determining the kinetics of break-up while the density of intersections has little or no effect on the kinetics. We rationalise our results using maps of (i) mean curvatures (and, hence, chemical potentials), and, (ii) Interfacial Shape Distributions (ISDs) (which are based on probability densities associated with different combinations of the two principal curvatures). Finally, we use the moment of inertia tensor to characterise the (non-spherical) shapes and morphologies of (central) nanowire fragments at the junctions.
△ Less
Submitted 9 October, 2021; v1 submitted 5 July, 2021;
originally announced July 2021.
-
Explaining Caste-based Digital Divide in India
Authors:
R Vaidehi,
A Bheemeshwar Reddy,
Sudatta Banerjee
Abstract:
With the increasing importance of information and communication technologies in access to basic services like education and health, the question of the digital divide based on caste assumes importance in India where large socioeconomic disparities persist between different caste groups. Studies on caste-based digital inequality are still scanty in India. Using nationally representative survey data…
▽ More
With the increasing importance of information and communication technologies in access to basic services like education and health, the question of the digital divide based on caste assumes importance in India where large socioeconomic disparities persist between different caste groups. Studies on caste-based digital inequality are still scanty in India. Using nationally representative survey data, this paper analyzes the first-level digital divide (ownership of computer and access to the internet) and the second-level digital divide (individual's skill to use computer and the internet) between the disadvantaged caste group and the others. Further, this paper identifies the caste group-based differences in socioeconomic factors that contribute to the digital divide between these groups using a non-linear decomposition method. The results show that there exists a large first-level and second-level digital divide between the disadvantaged caste groups and others in India. The non-linear decomposition results indicate that the caste-based digital divide in India is rooted in historical socioeconomic deprivation of disadvantaged caste groups. More than half of the caste-based digital gap is attributable to differences in educational attainment and income between the disadvantaged caste groups and others. The findings of this study highlight the urgent need for addressing educational and income inequality between the different caste groups in India in order to bridge the digital divide.
△ Less
Submitted 30 June, 2021;
originally announced June 2021.
-
Logic gates based all-optical binary half adder using triple core PCF
Authors:
Uthayakumar T,
Vasantha Jayakantha Raja R
Abstract:
This study presents the implementation of an all-optical binary logic half adder by employing triple core photonic crystal fiber (TPCF). The noteworthy feature of the present investigation is that an identical set of TPCF schemes, which demonstrated all-optical logic functions in our previous report has revealed the ability to demonstrate the successful half adder operation. The control signal (CS…
▽ More
This study presents the implementation of an all-optical binary logic half adder by employing triple core photonic crystal fiber (TPCF). The noteworthy feature of the present investigation is that an identical set of TPCF schemes, which demonstrated all-optical logic functions in our previous report has revealed the ability to demonstrate the successful half adder operation. The control signal (CS) power defining the extinction ratios of the output ports for the considered symmetric planar and triangular TPCFs are evaluated through numerical algorithm. Through suitable CS power and input combinations, the logic outputs are generated from extinction ratios to demonstrate the half adder operation. The results obtained display the significant influence of the input conditions on the delivery of half adder operation for different TPCF schemes considered. Furthermore, chloroform filled TPCF structures demonstrated the efficient low power half adder operation with significant figure of merit, compared to that of the silica counterpart.
△ Less
Submitted 27 June, 2021;
originally announced June 2021.
-
The MICCAI Hackathon on reproducibility, diversity, and selection of papers at the MICCAI conference
Authors:
Fabian Balsiger,
Alain Jungo,
Naren Akash R J,
Jianan Chen,
Ivan Ezhov,
Shengnan Liu,
Jun Ma,
Johannes C. Paetzold,
Vishva Saravanan R,
Anjany Sekuboyina,
Suprosanna Shit,
Yannick Suter,
Moshood Yekini,
Guodong Zeng,
Markus Rempfler
Abstract:
The MICCAI conference has encountered tremendous growth over the last years in terms of the size of the community, as well as the number of contributions and their technical success. With this growth, however, come new challenges for the community. Methods are more difficult to reproduce and the ever-increasing number of paper submissions to the MICCAI conference poses new questions regarding the…
▽ More
The MICCAI conference has encountered tremendous growth over the last years in terms of the size of the community, as well as the number of contributions and their technical success. With this growth, however, come new challenges for the community. Methods are more difficult to reproduce and the ever-increasing number of paper submissions to the MICCAI conference poses new questions regarding the selection process and the diversity of topics. To exchange, discuss, and find novel and creative solutions to these challenges, a new format of a hackathon was initiated as a satellite event at the MICCAI 2020 conference: The MICCAI Hackathon. The first edition of the MICCAI Hackathon covered the topics reproducibility, diversity, and selection of MICCAI papers. In the manner of a small think-tank, participants collaborated to find solutions to these challenges. In this report, we summarize the insights from the MICCAI Hackathon into immediate and long-term measures to address these challenges. The proposed measures can be seen as starting points and guidelines for discussions and actions to possibly improve the MICCAI conference with regards to reproducibility, diversity, and selection of papers.
△ Less
Submitted 28 April, 2021; v1 submitted 4 March, 2021;
originally announced March 2021.
-
Star-topology Registers: NMR and Quantum Information Perspectives
Authors:
T S Mahesh,
Deepak Khurana,
Krithika V R,
Sreejith G J,
C S Sudheer Kumar
Abstract:
Quantum control of large spin registers is crucial for many applications ranging from spectroscopy to quantum information. A key factor that determines the efficiency of a register for implementing a given information processing task is its network topology. One particular type, called star-topology, involves a central qubit uniformly interacting with a set of ancillary qubits. A particular advant…
▽ More
Quantum control of large spin registers is crucial for many applications ranging from spectroscopy to quantum information. A key factor that determines the efficiency of a register for implementing a given information processing task is its network topology. One particular type, called star-topology, involves a central qubit uniformly interacting with a set of ancillary qubits. A particular advantage of the star-topology quantum registers is in the efficient preparation of large entangled states, called NOON states, and their generalized variants. Thanks to the robust generation of such correlated states, spectral simplicity, ease of polarization transfer from ancillary qubits to the central qubit, as well as the availability of large spin-clusters, the star-topology registers have been utilized for several interesting applications over the last few years. Here we review some recent progress with the star-topology registers, particularly via nuclear magnetic resonance methods.
△ Less
Submitted 9 February, 2021;
originally announced February 2021.
-
Microcontroller based bidirectional buck boost converter for photo voltaic power plant
Authors:
Viswanatha V,
Venkata Siva Reddy R
Abstract:
A common configuration for a stand-alone PV power system may consist of three converters: a buck converter for the PV panelto charge the battery, a boost converter for the battery to discharge to the load and one for the load voltage regulation. Such a systemrequires a coordinated control scheme for three converters which can be complicated. A simple structure for a stand-alone PV plantconsists of…
▽ More
A common configuration for a stand-alone PV power system may consist of three converters: a buck converter for the PV panelto charge the battery, a boost converter for the battery to discharge to the load and one for the load voltage regulation. Such a systemrequires a coordinated control scheme for three converters which can be complicated. A simple structure for a stand-alone PV plantconsists of a PV array, a battery unit, and its associated bidirectional converter which is a combination of a buck and boost converter.When controlled properly the system can provide uninterrupted power to the load, despite the intermittent availability of sunlight. Inthis paper complete design of the converter is carried out and the simulation has been performed using Psim. From the simulation,the graphs are presented to show the converter working in buck mode and boost mode. Controller is designed to take care of modetransition, buck to boost and boost to buck mode automatically based on source voltage. Hardware implementation has been doneusing microcontroller (8051).
△ Less
Submitted 23 January, 2021;
originally announced January 2021.
-
Design and Development of Robots End Effector Test Rig
Authors:
Josephine Selvarani Ruth D,
Saniya Zeba,
Vibha M R,
Rokesh Laishram,
Gauthama Anand
Abstract:
A Test Rig for end-effectors of a robot is designed such that it achieves a prismatic motion in x-y-z axes for gras** an object. It is a structure, designed with a compact combination of sensors and actuators. Sensors are used for detecting presence, position and disturbance of target work piece or any object and actuators with motor driving system meant for controlling and moving the mechanism…
▽ More
A Test Rig for end-effectors of a robot is designed such that it achieves a prismatic motion in x-y-z axes for gras** an object. It is a structure, designed with a compact combination of sensors and actuators. Sensors are used for detecting presence, position and disturbance of target work piece or any object and actuators with motor driving system meant for controlling and moving the mechanism of the system. Hence, it improves the ergonomics and accuracy of an operation with enhanced repeatability.
△ Less
Submitted 4 January, 2021;
originally announced January 2021.
-
Huskysort
Authors:
R. C. Hillyard,
Yunlu Liaozheng,
Sai Vineeth K. R
Abstract:
Much of the copious literature on the subject of sorting has concentrated on minimizing the number of comparisons and/or exchanges/copies. However, a more appropriate yardstick for the performance of sorting algorithms is based on the total number of array accesses that are required (the "work"). For a sort that is based on divide-and-conquer (including iterative variations on that theme), we can…
▽ More
Much of the copious literature on the subject of sorting has concentrated on minimizing the number of comparisons and/or exchanges/copies. However, a more appropriate yardstick for the performance of sorting algorithms is based on the total number of array accesses that are required (the "work"). For a sort that is based on divide-and-conquer (including iterative variations on that theme), we can divide the work into linear, i.e. $\textbf{O}(N)$, work and linearithmic, i.e. $\textbf{O}(N log N)$, work. An algorithm that moves work from the linearithmic phase to the linear phase may be able to reduce the total number of array accesses and, indirectly, processing time. This paper describes an approach to sorting which reduces the number of expensive comparisons in the linearithmic phase as much as possible by substituting inexpensive comparisons. In Java, the two system sorts are dual-pivot quicksort (for primitives) and Timsort for objects. We demonstrate that a combination of these two algorithms can run significantly faster than either algorithm alone for the types of objects which are expensive to compare. We call this improved sorting algorithm Huskysort.
△ Less
Submitted 1 December, 2020;
originally announced December 2020.
-
Eco-Routing Using Open Street Maps
Authors:
R K Ghosh,
Vinay R,
Arnab Bhattacharyya
Abstract:
A vehicle's fuel consumption depends on its type, the speed, the condition, and the gradients of the road on which it is moving. We developed a Routing Engine for finding an eco-route (one with low fuel consumption) between a source and a destination. Open Street Maps has data on road conditions. We used CGIAR-CSI road elevation data 16[4] to integrate the road gradients into the proposed route-fi…
▽ More
A vehicle's fuel consumption depends on its type, the speed, the condition, and the gradients of the road on which it is moving. We developed a Routing Engine for finding an eco-route (one with low fuel consumption) between a source and a destination. Open Street Maps has data on road conditions. We used CGIAR-CSI road elevation data 16[4] to integrate the road gradients into the proposed route-finding algorithm that modifies Open Street Routing Machine (OSRM). It allowed us to dynamically predict a vehicle's velocity, considering both the conditions and the road segment's slope. Using Highway EneRgy Assessment (HERA) methodology, we calculated the fuel consumed by a vehicle given its type and velocity. We have created both web and mobile interfaces through which users can specify Geo coordinates or human-readable addresses of a source and a destination. The user interface graphically displays the route obtained from the proposed Routing Engine with a detailed travel itinerary.
△ Less
Submitted 26 November, 2020;
originally announced November 2020.
-
Turbocharging Treewidth-Bounded Bayesian Network Structure Learning
Authors:
Vaidyanathan P. R.,
Stefan Szeider
Abstract:
We present a new approach for learning the structure of a treewidth-bounded Bayesian Network (BN). The key to our approach is applying an exact method (based on MaxSAT) locally, to improve the score of a heuristically computed BN. This approach allows us to scale the power of exact methods -- so far only applicable to BNs with several dozens of random variables -- to large BNs with several thousan…
▽ More
We present a new approach for learning the structure of a treewidth-bounded Bayesian Network (BN). The key to our approach is applying an exact method (based on MaxSAT) locally, to improve the score of a heuristically computed BN. This approach allows us to scale the power of exact methods -- so far only applicable to BNs with several dozens of random variables -- to large BNs with several thousands of random variables. Our experiments show that our method improves the score of BNs provided by state-of-the-art heuristic methods, often significantly.
△ Less
Submitted 5 February, 2021; v1 submitted 24 June, 2020;
originally announced June 2020.
-
Internet of Things(IoT) Based Multilevel Drunken Driving Detection and Prevention System Using Raspberry Pi 3
Authors:
Viswanatha V,
Venkata Siva Reddy R,
Ashwini Kumari P,
Pradeep Kumar S
Abstract:
In this paper, the proposed system has demonstrated three ways of detecting alcohol level in the body of the car driver and prevent car driver from driving the vehicle by turning off the ignition system. It also sends messages to concerned people. In order to detect breath alcohol level MQ-3 sensor is included in this module along with a heartbeat sensor which can detect the heart beat rate of dri…
▽ More
In this paper, the proposed system has demonstrated three ways of detecting alcohol level in the body of the car driver and prevent car driver from driving the vehicle by turning off the ignition system. It also sends messages to concerned people. In order to detect breath alcohol level MQ-3 sensor is included in this module along with a heartbeat sensor which can detect the heart beat rate of driver, facial recognition using webcam & MATLAB and a Wi-Fi module to send a message through the TCP/IP App, a Raspberry pi module to turn off the ignition and an alarm as prevention module. If a driver alcohol intake is more than the prescribed range, set by government the ignition will be made off provided either his heart beat abnormal or the driver is drowsy. In both the cases there will be a message sent to the App and from the App you can send it to family, friend, and well-wisher or nearest cop for the help. The system is developed considering the fact if driver is drunk and he needs a help, his friend can drive the car if he is not drunk. The safety of both the driver and the surroundings are aimed by this system and this aids in minimizing death cases by drunken driving and also burden on the cops.
△ Less
Submitted 21 April, 2020;
originally announced April 2020.
-
Characterization of analog and digital control loops for bidirectional buck-boost converter using PID/PIDN algorithms
Authors:
Viswanatha V,
Venkata Siva Reddy R,
Rajeswari
Abstract:
This article presents the characterization of analog and digital control loops using PID and PIDN control algorithms for bidirectional buck and boost converter (BBC). Control loops of BBC are designed and implemented in MATLAB code using transfer functions in time domain with unit step response and in frequency domain with bode plots and pole-zero plots. These transfer functions are obtained by av…
▽ More
This article presents the characterization of analog and digital control loops using PID and PIDN control algorithms for bidirectional buck and boost converter (BBC). Control loops of BBC are designed and implemented in MATLAB code using transfer functions in time domain with unit step response and in frequency domain with bode plots and pole-zero plots. These transfer functions are obtained by average large signal modeling of BBC. Actions of analog and digital control loops are characterized in order to ensure stability and dynamic response of BBC which is a bottleneck in renewable energy applications. Improvement in dynamic response and stability of BBC with PIDN control algorithm is demonstrated using bode plots, pole-zero plots, and step response. Control loop gain due to transfer functions of power stage and controllers is demonstrated, and it is found stable in both analog and digital control loops. PIDN compensator is proposed to maintain a healthy balance between the stability and transient behavior since both are indirectly proportional. BBC is modeled using average large signal modeling technique, simulated using MATLAB tool, and analysis of dynamic and stability response is done through unit step input, bode plot, and pole-zero plot. Hardware is designed and implemented using TMS320F28335 controller.
△ Less
Submitted 21 April, 2020;
originally announced April 2020.
-
RPnet: A Deep Learning approach for robust R Peak detection in noisy ECG
Authors:
Sricharan Vijayarangan,
Vignesh R,
Balamurali Murugesan,
Preejith SP,
Jayaraj Joseph,
Mohansankar Sivaprakasam
Abstract:
Automatic detection of R-peaks in an Electrocardiogram signal is crucial in a multitude of applications including Heart Rate Variability (HRV) analysis and Cardio Vascular Disease(CVD) diagnosis. Although there have been numerous approaches that have successfully addressed the problem, there has been a notable dip in the performance of these existing detectors on ECG episodes that contain noise an…
▽ More
Automatic detection of R-peaks in an Electrocardiogram signal is crucial in a multitude of applications including Heart Rate Variability (HRV) analysis and Cardio Vascular Disease(CVD) diagnosis. Although there have been numerous approaches that have successfully addressed the problem, there has been a notable dip in the performance of these existing detectors on ECG episodes that contain noise and HRV Irregulates. On the other hand, Deep Learning(DL) based methods have shown to be adept at modelling data that contain noise. In image to image translation, Unet is the fundamental block in many of the networks. In this work, a novel application of the Unet combined with Inception and Residual blocks is proposed to perform the extraction of R-peaks from an ECG. Furthermore, the problem formulation also robustly deals with issues of variability and sparsity of ECG R-peaks. The proposed network was trained on a database containing ECG episodes that have CVD and was tested against three traditional ECG detectors on a validation set. The model achieved an F1 score of 0.9837, which is a substantial improvement over the other beat detectors. Furthermore, the model was also evaluated on three other databases. The proposed network achieved high F1 scores across all datasets which established its generalizing capacity. Additionally, a thorough analysis of the model's performance in the presence of different levels of noise was carried out.
△ Less
Submitted 17 April, 2020;
originally announced April 2020.
-
Interpreting Deep Neural Networks for Single-Lead ECG Arrhythmia Classification
Authors:
Sricharan Vijayarangan,
Balamurali Murugesan,
Vignesh R,
Preejith SP,
Jayaraj Joseph,
Mohansankar Sivaprakasam
Abstract:
Cardiac arrhythmia is a prevalent and significant cause of morbidity and mortality among cardiac ailments. Early diagnosis is crucial in providing intervention for patients suffering from cardiac arrhythmia. Traditionally, diagnosis is performed by examination of the Electrocardiogram (ECG) by a cardiologist. This method of diagnosis is hampered by the lack of accessibility to expert cardiologists…
▽ More
Cardiac arrhythmia is a prevalent and significant cause of morbidity and mortality among cardiac ailments. Early diagnosis is crucial in providing intervention for patients suffering from cardiac arrhythmia. Traditionally, diagnosis is performed by examination of the Electrocardiogram (ECG) by a cardiologist. This method of diagnosis is hampered by the lack of accessibility to expert cardiologists. For quite some time, signal processing methods had been used to automate arrhythmia diagnosis. However, these traditional methods require expert knowledge and are unable to model a wide range of arrhythmia. Recently, Deep Learning methods have provided solutions to performing arrhythmia diagnosis at scale. However, the black-box nature of these models prohibit clinical interpretation of cardiac arrhythmia. There is a dire need to correlate the obtained model outputs to the corresponding segments of the ECG. To this end, two methods are proposed to provide interpretability to the models. The first method is a novel application of Gradient-weighted Class Activation Map (Grad-CAM) for visualizing the saliency of the CNN model. In the second approach, saliency is derived by learning the input deletion mask for the LSTM model. The visualizations are provided on a model whose competence is established by comparisons against baselines. The results of model saliency not only provide insight into the prediction capability of the model but also aligns with the medical literature for the classification of cardiac arrhythmia.
△ Less
Submitted 11 April, 2020;
originally announced April 2020.
-
Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream
Authors:
Simran K,
Prathiksha Balakrishna,
Vinayakumar R,
Soman KP
Abstract:
In recent days, the amount of Cyber Security text data shared via social media resources mainly Twitter has increased. An accurate analysis of this data can help to develop cyber threat situational awareness framework for a cyber threat. This work proposes a deep learning based approach for tweet data analysis. To convert the tweets into numerical representations, various text representations are…
▽ More
In recent days, the amount of Cyber Security text data shared via social media resources mainly Twitter has increased. An accurate analysis of this data can help to develop cyber threat situational awareness framework for a cyber threat. This work proposes a deep learning based approach for tweet data analysis. To convert the tweets into numerical representations, various text representations are employed. These features are feed into deep learning architecture for optimal feature extraction as well as classification. Various hyperparameter tuning approaches are used for identifying optimal text representation method as well as optimal network parameters and network structures for deep learning models. For comparative analysis, the classical text representation method with classical machine learning algorithm is employed. From the detailed analysis of experiments, we found that the deep learning architecture with advanced text representation methods performed better than the classical text representation and classical machine learning algorithms. The primary reason for this is that the advanced text representation methods have the capability to learn sequential properties which exist among the textual data and deep learning architectures learns the optimal features along with decreasing the feature size.
△ Less
Submitted 30 March, 2020;
originally announced April 2020.
-
Deep Learning Approach for Intelligent Named Entity Recognition of Cyber Security
Authors:
Simran K,
Sriram S,
Vinayakumar R,
Soman KP
Abstract:
In recent years, the amount of Cyber Security data generated in the form of unstructured texts, for example, social media resources, blogs, articles, and so on has exceptionally increased. Named Entity Recognition (NER) is an initial step towards converting this unstructured data into structured data which can be used by a lot of applications. The existing methods on NER for Cyber Security data ar…
▽ More
In recent years, the amount of Cyber Security data generated in the form of unstructured texts, for example, social media resources, blogs, articles, and so on has exceptionally increased. Named Entity Recognition (NER) is an initial step towards converting this unstructured data into structured data which can be used by a lot of applications. The existing methods on NER for Cyber Security data are based on rules and linguistic characteristics. A Deep Learning (DL) based approach embedded with Conditional Random Fields (CRFs) is proposed in this paper. Several DL architectures are evaluated to find the most optimal architecture. The combination of Bidirectional Gated Recurrent Unit (Bi-GRU), Convolutional Neural Network (CNN), and CRF performed better compared to various other DL frameworks on a publicly available benchmark dataset. This may be due to the reason that the bidirectional structures preserve the features related to the future and previous words in a sequence.
△ Less
Submitted 30 March, 2020;
originally announced April 2020.
-
Segmenting Ships in Satellite Imagery With Squeeze and Excitation U-Net
Authors:
Venkatesh R,
Anand Metha
Abstract:
The ship-detection task in satellite imagery presents significant obstacles to even the most state of the art segmentation models due to lack of labelled dataset or approaches which are not able to generalize to unseen images. The most common methods for semantic segmentation involve complex two-stage networks or networks which make use of a multi-scale scene parsing module. In this paper, we prop…
▽ More
The ship-detection task in satellite imagery presents significant obstacles to even the most state of the art segmentation models due to lack of labelled dataset or approaches which are not able to generalize to unseen images. The most common methods for semantic segmentation involve complex two-stage networks or networks which make use of a multi-scale scene parsing module. In this paper, we propose a modified version of the popular U-Net architecture called Squeeze and Excitation U-Net and train it with a loss that helps in directly optimizing the intersection over union (IoU) score. Our method gives comparable performance to other methods while having the additional benefit of being computationally efficient.
△ Less
Submitted 27 October, 2019;
originally announced October 2019.
-
Intrusion detection systems using classical machine learning techniques versus integrated unsupervised feature learning and deep neural network
Authors:
Shisrut Rawat,
Aishwarya Srinivasan,
Vinayakumar R
Abstract:
Security analysts and administrators face a lot of challenges to detect and prevent network intrusions in their organizations, and to prevent network breaches, detecting the breach on time is crucial. Challenges arise while detecting unforeseen attacks. This work includes a performance comparison of classical machine learning approaches that require vast feature engineering, versus integrated unsu…
▽ More
Security analysts and administrators face a lot of challenges to detect and prevent network intrusions in their organizations, and to prevent network breaches, detecting the breach on time is crucial. Challenges arise while detecting unforeseen attacks. This work includes a performance comparison of classical machine learning approaches that require vast feature engineering, versus integrated unsupervised feature learning and deep neural networks on the NSL-KDD dataset. Various trials of experiments were run to identify suitable hyper-parameters and network configurations of machine learning models. The DNN using 15 features extracted using Principal Component analysis was the most effective modeling method. The further analysis using the Software Defined Networking features also presented a good accuracy using Deep Neural network.
△ Less
Submitted 1 October, 2019;
originally announced October 2019.
-
Subpacketization in Coded Caching with Demand Privacy
Authors:
Aravind V R,
Pradeep Sarvepalli,
Andrew Thangaraj
Abstract:
Coded caching is a technique where we utilize multi-casting opportunities to reduce rate in cached networks. One limitation of coded caching schemes is that they reveal the demands of all users to their peers. In this work, we consider coded caching schemes that assure privacy for user demands with a particular focus on reducing subpacketization. For the 2-user, 2-file case, we present a new linea…
▽ More
Coded caching is a technique where we utilize multi-casting opportunities to reduce rate in cached networks. One limitation of coded caching schemes is that they reveal the demands of all users to their peers. In this work, we consider coded caching schemes that assure privacy for user demands with a particular focus on reducing subpacketization. For the 2-user, 2-file case, we present a new linear demand-private scheme with the lowest possible subpacketization. This is done by presenting the scheme explicitly and proving impossibility results under lower subpacketization. Additionally, when only partial privacy is required, we show that subpacketization can be significantly reduced when there are a large number of files.
△ Less
Submitted 23 September, 2019;
originally announced September 2019.
-
Submodular Batch Selection for Training Deep Neural Networks
Authors:
K J Joseph,
Vamshi Teja R,
Krishnakant Singh,
Vineeth N Balasubramanian
Abstract:
Mini-batch gradient descent based methods are the de facto algorithms for training neural network architectures today. We introduce a mini-batch selection strategy based on submodular function maximization. Our novel submodular formulation captures the informativeness of each sample and diversity of the whole subset. We design an efficient, greedy algorithm which can give high-quality solutions to…
▽ More
Mini-batch gradient descent based methods are the de facto algorithms for training neural network architectures today. We introduce a mini-batch selection strategy based on submodular function maximization. Our novel submodular formulation captures the informativeness of each sample and diversity of the whole subset. We design an efficient, greedy algorithm which can give high-quality solutions to this NP-hard combinatorial optimization problem. Our extensive experiments on standard datasets show that the deep models trained using the proposed batch selection strategy provide better generalization than Stochastic Gradient Descent as well as a popular baseline sampling strategy across different learning rates, batch sizes, and distance metrics.
△ Less
Submitted 20 June, 2019;
originally announced June 2019.
-
RNNSecureNet: Recurrent neural networks for Cyber security use-cases
Authors:
Mohammed Harun Babu R,
Vinayakumar R,
Soman KP
Abstract:
Recurrent neural network (RNN) is an effective neural network in solving very complex supervised and unsupervised tasks. There has been a significant improvement in RNN field such as natural language processing, speech processing, computer vision and other multiple domains. This paper deals with RNN application on different use cases like Incident Detection, Fraud Detection, and Android Malware Cl…
▽ More
Recurrent neural network (RNN) is an effective neural network in solving very complex supervised and unsupervised tasks. There has been a significant improvement in RNN field such as natural language processing, speech processing, computer vision and other multiple domains. This paper deals with RNN application on different use cases like Incident Detection, Fraud Detection, and Android Malware Classification. The best performing neural network architecture is chosen by conducting different chain of experiments for different network parameters and structures. The network is run up to 1000 epochs with learning rate set in the range of 0.01 to 0.5.Obviously, RNN performed very well when compared to classical machine learning algorithms. This is mainly possible because RNNs implicitly extracts the underlying features and also identifies the characteristics of the data. This helps to achieve better accuracy.
△ Less
Submitted 5 January, 2019;
originally announced January 2019.
-
Emotion Detection using Data Driven Models
Authors:
Naveenkumar K S,
Vinayakumar R,
Soman KP
Abstract:
Text is the major method that is used for communication now a days, each and every day lots of text are created. In this paper the text data is used for the classification of the emotions. Emotions are the way of expression of the persons feelings which has an high influence on the decision making tasks. Datasets are collected which are available publically and combined together based on the three…
▽ More
Text is the major method that is used for communication now a days, each and every day lots of text are created. In this paper the text data is used for the classification of the emotions. Emotions are the way of expression of the persons feelings which has an high influence on the decision making tasks. Datasets are collected which are available publically and combined together based on the three emotions that are considered here positive, negative and neutral. In this paper we have proposed the text representation method TFIDF and keras embedding and then given to the classical machine learning algorithms of which Logistics Regression gives the highest accuracy of about 75.6%, after which it is passed to the deep learning algorithm which is the CNN which gives the state of art accuracy of about 45.25%. For the research purpose the datasets that has been collected are released.
△ Less
Submitted 10 January, 2019;
originally announced January 2019.
-
The Effect of Introducing Redundancy in a Probabilistic Forwarding Protocol
Authors:
Vinay Kumar B. R.,
Roshan Antony,
Navin Kashyap
Abstract:
This paper is concerned with the problem of broadcasting information from a source node to every node in an ad-hoc network. Flooding, as a broadcast mechanism, involves each node forwarding any packet it receives to all its neighbours. This results in excessive transmissions and thus a high energy expenditure overall. Probabilistic forwarding or gossi** involves each node forwarding a received p…
▽ More
This paper is concerned with the problem of broadcasting information from a source node to every node in an ad-hoc network. Flooding, as a broadcast mechanism, involves each node forwarding any packet it receives to all its neighbours. This results in excessive transmissions and thus a high energy expenditure overall. Probabilistic forwarding or gossi** involves each node forwarding a received packet to all its neighbours only with a certain probability $p$. In this paper, we study the effect of introducing redundancy, in the form of coded packets, into a probabilistic forwarding protocol. Specifically, we assume that the source node has $k$ data packets to broadcast, which are encoded into $n \ge k$ coded packets, such that any $k$ of these coded packets are sufficient to recover the original $k$ data packets. Our interest is in determining the minimum forwarding probability $p$ for a "successful broadcast", which we take to be the event that the expected fraction of network nodes that receive at least $k$ of the $n$ coded packets is close to 1. We examine, via simulations and analysis of a number of different network topologies (e.g., trees, grids, random geometric graphs), how this minimum forwarding probability, and correspondingly, the expected total number of packet transmissions varies with the amount of redundancy added. Our simulation results indicate that over network topologies that are highly connected, the introduction of redundancy into the probabilistic forwarding protocol is useful, as it can significantly reduce the expected total number of transmissions needed for a successful broadcast. On the other hand, for trees, our analysis shows that the expected total number of transmissions needed increases with redundancy.
△ Less
Submitted 10 January, 2019; v1 submitted 7 January, 2019;
originally announced January 2019.
-
A Deep Learning Approach for Similar Languages, Varieties and Dialects
Authors:
Vidya Prasad K,
Akarsh S,
Vinayakumar R,
Soman KP
Abstract:
Deep learning mechanisms are prevailing approaches in recent days for the various tasks in natural language processing, speech recognition, image processing and many others. To leverage this we use deep learning based mechanism specifically Bidirectional- Long Short-Term Memory (B-LSTM) for the task of dialectic identification in Arabic and German broadcast speech and Long Short-Term Memory (LSTM)…
▽ More
Deep learning mechanisms are prevailing approaches in recent days for the various tasks in natural language processing, speech recognition, image processing and many others. To leverage this we use deep learning based mechanism specifically Bidirectional- Long Short-Term Memory (B-LSTM) for the task of dialectic identification in Arabic and German broadcast speech and Long Short-Term Memory (LSTM) for discriminating between similar Languages. Two unique B-LSTM models are created using the Large-vocabulary Continuous Speech Recognition (LVCSR) based lexical features and a fixed length of 400 per utterance bottleneck features generated by i-vector framework. These models were evaluated on the VarDial 2017 datasets for the tasks Arabic, German dialect identification with dialects of Egyptian, Gulf, Levantine, North African, and MSA for Arabic and Basel, Bern, Lucerne, and Zurich for German. Also for the task of Discriminating between Similar Languages like Bosnian, Croatian and Serbian. The B-LSTM model showed accuracy of 0.246 on lexical features and accuracy of 0.577 bottleneck features of i-Vector framework.
△ Less
Submitted 2 January, 2019;
originally announced January 2019.
-
A short review on Applications of Deep learning for Cyber security
Authors:
Mohammed Harun Babu R,
Vinayakumar R,
Soman KP
Abstract:
Deep learning is an advanced model of traditional machine learning. This has the capability to extract optimal feature representation from raw input samples. This has been applied towards various use cases in cyber security such as intrusion detection, malware classification, android malware detection, spam and phishing detection and binary analysis. This paper outlines the survey of all the works…
▽ More
Deep learning is an advanced model of traditional machine learning. This has the capability to extract optimal feature representation from raw input samples. This has been applied towards various use cases in cyber security such as intrusion detection, malware classification, android malware detection, spam and phishing detection and binary analysis. This paper outlines the survey of all the works related to deep learning based solutions for various cyber security use cases. Keywords: Deep learning, intrusion detection, malware detection, Android malware detection, spam & phishing detection, traffic analysis, binary analysis.
△ Less
Submitted 29 January, 2019; v1 submitted 15 December, 2018;
originally announced December 2018.
-
Deep-Net: Deep Neural Network for Cyber Security Use Cases
Authors:
Vinayakumar R,
Barathi Ganesh HB,
Prabaharan Poornachandran,
Anand Kumar M,
Soman KP
Abstract:
Deep neural networks (DNNs) have witnessed as a powerful approach in this year by solving long-standing Artificial intelligence (AI) supervised and unsupervised tasks exists in natural language processing, speech processing, computer vision and others. In this paper, we attempt to apply DNNs on three different cyber security use cases: Android malware classification, incident detection and fraud d…
▽ More
Deep neural networks (DNNs) have witnessed as a powerful approach in this year by solving long-standing Artificial intelligence (AI) supervised and unsupervised tasks exists in natural language processing, speech processing, computer vision and others. In this paper, we attempt to apply DNNs on three different cyber security use cases: Android malware classification, incident detection and fraud detection. The data set of each use case contains real known benign and malicious activities samples. The efficient network architecture for DNN is chosen by conducting various trails of experiments for network parameters and network structures. The experiments of such chosen efficient configurations of DNNs are run up to 1000 epochs with learning rate set in the range [0.01-0.5]. Experiments of DNN performed well in comparison to the classical machine learning algorithms in all cases of experiments of cyber security use cases. This is due to the fact that DNNs implicitly extract and build better features, identifies the characteristics of the data that lead to better accuracy. The best accuracy obtained by DNN and XGBoost on Android malware classification 0.940 and 0.741, incident detection 1.00 and 0.997 fraud detection 0.972 and 0.916 respectively.
△ Less
Submitted 9 December, 2018;
originally announced December 2018.
-
A Brief Survey on Autonomous Vehicle Possible Attacks, Exploits and Vulnerabilities
Authors:
Amara Dinesh Kumar,
Koti Naga Renu Chebrolu,
Vinayakumar R,
Soman KP
Abstract:
Advanced driver assistance systems are advancing at a rapid pace and all major companies started investing in develo** the autonomous vehicles. But the security and reliability is still uncertain and debatable. Imagine that a vehicle is compromised by the attackers and then what they can do. An attacker can control brake, accelerate and even steering which can lead to catastrophic consequences.…
▽ More
Advanced driver assistance systems are advancing at a rapid pace and all major companies started investing in develo** the autonomous vehicles. But the security and reliability is still uncertain and debatable. Imagine that a vehicle is compromised by the attackers and then what they can do. An attacker can control brake, accelerate and even steering which can lead to catastrophic consequences. This paper gives a very short and brief overview of most of the possible attacks on autonomous vehicle software and hardware and their potential implications.
△ Less
Submitted 3 October, 2018;
originally announced October 2018.
-
DeepImageSpam: Deep Learning based Image Spam Detection
Authors:
Amara Dinesh Kumar,
Vinayakumar R,
Soman KP
Abstract:
Hackers and spammers are employing innovative and novel techniques to deceive novice and even knowledgeable internet users. Image spam is one of such technique where the spammer varies and changes some portion of the image such that it is indistinguishable from the original image fooling the users. This paper proposes a deep learning based approach for image spam detection using the convolutional…
▽ More
Hackers and spammers are employing innovative and novel techniques to deceive novice and even knowledgeable internet users. Image spam is one of such technique where the spammer varies and changes some portion of the image such that it is indistinguishable from the original image fooling the users. This paper proposes a deep learning based approach for image spam detection using the convolutional neural networks which uses a dataset with 810 natural images and 928 spam images for classification achieving an accuracy of 91.7% outperforming the existing image processing and machine learning techniques
△ Less
Submitted 3 October, 2018;
originally announced October 2018.