Skip to main content

Showing 1–50 of 72 results for author: R, V

.
  1. arXiv:2405.17059  [pdf

    cs.LG

    Comparative Study of Machine Learning Algorithms in Detecting Cardiovascular Diseases

    Authors: Dayana K, S. Nandini, Sanjjushri Varshini R

    Abstract: The detection of cardiovascular diseases (CVD) using machine learning techniques represents a significant advancement in medical diagnostics, aiming to enhance early detection, accuracy, and efficiency. This study explores a comparative analysis of various machine learning algorithms, including Logistic Regression, Decision Tree, Random Forest, Gradient Boosting, Support Vector Machine (SVM), K-Ne… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

  2. arXiv:2404.15069  [pdf, other

    quant-ph

    Hop** of the center-of-mass of single G centers in silicon-on-insulator

    Authors: Alrik Durand, Yoann Baron, Péter Udvarhelyi, Félix Cache, Krithika V. R., Tobias Herzig, Mario Khoury, Sébastien Pezzagna, Jan Meijer, Jean-Michel Hartmann, Shay Reboh, Marco Abbarchi, Isabelle Robert-Philip, Adam Gali, Jean-Michel Gérard, Vincent Jacques, Guillaume Cassabois, Anaïs Dréau

    Abstract: Among the wealth of single fluorescent defects recently detected in silicon, the G center catches interest for its telecom single-photon emission that could be coupled to a metastable electron spin triplet. The G center is a unique defect where the standard Born-Oppenheimer approximation breaks down as one of its atoms can move between 6 lattice sites under optical excitation. The impact of this a… ▽ More

    Submitted 23 April, 2024; originally announced April 2024.

  3. arXiv:2404.10678  [pdf

    cs.SE cs.LG

    Automating REST API Postman Test Cases Using LLM

    Authors: S Deepika Sri, Mohammed Aadil S, Sanjjushri Varshini R, Raja CSP Raman, Gopinath Rajagopal, S Taranath Chan

    Abstract: In the contemporary landscape of technological advancements, the automation of manual processes is crucial, compelling the demand for huge datasets to effectively train and test machines. This research paper is dedicated to the exploration and implementation of an automated approach to generate test cases specifically using Large Language Models. The methodology integrates the use of Open AI to en… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

  4. Observations of the Crab Nebula with MACE (Major Atmospheric Cherenkov Experiment)

    Authors: Borwankar C., Sharma M., Hariharan J., Venugopal K., Godambe S., Mankuzhyil N., Chandra P., Khurana M., Pathania A., Chouhan N., Dhar V. K., Thubstan R., Norlha S., Keshavananda, Sarkar D., Dar Z. A., Kotwal S. V., Godiyal S., Kushwaha C. P., Singh K. K., Das M. P., Tolamatti A., Ghosal B., Chanchalani K., Pandey P. , et al. (10 additional authors not shown)

    Abstract: The Major Atmospheric Cherenkov Experiment (MACE) is a large size (21m) Imaging Atmospheric Cherenkov Telescope (IACT) installed at an altitude of 4270m above sea level at Hanle, Ladakh in northern India. Here we report the detection of Very High Energy (VHE) gamma-ray emission from Crab Nebula above 80 GeV. We analysed ~15 hours of data collected at low zenith angle between November 2022 and Febr… ▽ More

    Submitted 2 April, 2024; originally announced April 2024.

    Comments: Accepted for publication in Astroparticle Physics

    Journal ref: Astroparticle Physics 159 (2024) 102960

  5. arXiv:2402.14413  [pdf

    cond-mat.str-el cond-mat.mtrl-sci

    Spin ice evidence in the frustrated Gd2GaSbO7 and Gd2InSbO7 pyrochlore compounds

    Authors: S. Nallamuthu, Andrea Dzubinska, K. Arun, Vimaljith A. R, Marian Reiffers, R. Nagalakshmi, Ivan Čurlik, Sergej Iľkovič

    Abstract: Gd2GaSbO7 and Gd2InSbO7 pyrochlore compounds have exhibited spin ice behavior. These compounds have not been adequately reported based on the concept of magnetic frustration. Here, we have synthesized and characterized Gd2GaSbO7 and Gd2InSbO7 to study the ground state magnetic properties. We confirmed the cubic pyrochlore structure via X-ray powder diffraction. Magnetic and heat capacity measureme… ▽ More

    Submitted 2 April, 2024; v1 submitted 22 February, 2024; originally announced February 2024.

  6. arXiv:2401.17980  [pdf, other

    quant-ph

    No epistemic model can explain anti-distinguishability of quantum mixed preparations

    Authors: Sagnik Ray, Visweshwaran R, Debashis Saha

    Abstract: We address the fundamental question of whether epistemic models can reproduce the empirical predictions of general quantum preparations. This involves comparing the common quantum overlap determined by the anti-distinguishability of a set of mixed preparations with the common epistemic overlap of the probability distribution over the ontic states describing these preparations. A set of quantum mix… ▽ More

    Submitted 16 May, 2024; v1 submitted 31 January, 2024; originally announced January 2024.

    Comments: Comments are welcome

  7. arXiv:2401.11771  [pdf

    eess.AS cs.SD

    Empowering Communication: Speech Technology for Indian and Western Accents through AI-powered Speech Synthesis

    Authors: Vinotha R, Hepsiba D, L. D. Vijay Anand, Deepak John Reji

    Abstract: Neural Text-to-speech (TTS) synthesis is a powerful technology that can generate speech using neural networks. One of the most remarkable features of TTS synthesis is its capability to produce speech in the voice of different speakers. This paper introduces voice cloning and speech synthesis https://pypi.org/project/voice-cloning/ an open-source python package for hel** speech disorders to commu… ▽ More

    Submitted 16 February, 2024; v1 submitted 22 January, 2024; originally announced January 2024.

  8. arXiv:2401.04382  [pdf, other

    cond-mat.mtrl-sci

    Dislocation assisted coarsening of coherent precipitates: a phase field study

    Authors: Arjun Varma R, Prita Pant, M P Gururajan

    Abstract: Coarsening of precipitates in coherent systems is influenced by the elastic fields of the precipitates and the interfacial curvature. It is also known that if precipitates are connected by dislocations, coarsening is affected by the elastic fields of the dislocations and the pipe diffusivity. Although there is experimental evidence of accelerated coarsening in the presence of dislocations, these s… ▽ More

    Submitted 9 January, 2024; originally announced January 2024.

    Comments: 30 pages, 14 figures, 3 tables and a supplementary file

  9. arXiv:2312.04275  [pdf

    cs.LG cs.CY

    Estimating Countries with Similar Maternal Mortality Rate using Cluster Analysis and Pairing Countries with Identical MMR

    Authors: S. Nandini, Sanjjushri Varshini R

    Abstract: In the evolving world, we require more additionally the young era to flourish and evolve into developed land. Most of the population all around the world are unaware of the complications involved in the routine they follow while they are pregnant and how hospital facilities affect maternal health. Maternal Mortality is the death of a pregnant woman due to intricacies correlated to pregnancy, under… ▽ More

    Submitted 7 December, 2023; originally announced December 2023.

    Comments: 14 pages, 6 figures

  10. arXiv:2310.04658  [pdf

    physics.optics

    Single-shot recognition of orbital angular momentum from speckles with spatially multiplexed point detection (SMPD)

    Authors: Zhiyuan Wang, Haoran Li, Qi Zhao, Vinu R V, Xiaocong Yuan, Ziyang Chen, Puxiang Lai, Jixiong Pu

    Abstract: The widely adopted optical information detection strategies nowadays can be roughly classified into spatial-resolve-based and time-sequence-based methods. The former is highly reliant on detectors with spatial resolution that works in a limited spectrum range to capture the intensity distribution of the object, whereas the latter employs single-pixel detectors (SPDs) with improved reliability and… ▽ More

    Submitted 6 October, 2023; originally announced October 2023.

  11. arXiv:2310.02759  [pdf

    cs.LG cs.CL

    Comparative Study and Framework for Automated Summariser Evaluation: LangChain and Hybrid Algorithms

    Authors: Bagiya Lakshmi S, Sanjjushri Varshini R, Rohith Mahadevan, Raja CSP Raman

    Abstract: Automated Essay Score (AES) is proven to be one of the cutting-edge technologies. Scoring techniques are used for various purposes. Reliable scores are calculated based on influential variables. Such variables can be computed by different methods based on the domain. The research is concentrated on the user's understanding of a given topic. The analysis is based on a scoring index by using Large L… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

  12. arXiv:2309.16654  [pdf, other

    cs.CV

    Novel Deep Learning Pipeline for Automatic Weapon Detection

    Authors: Haribharathi Sivakumar, Vijay Arvind. R, Pawan Ragavendhar V, G. Balamurugan

    Abstract: Weapon and gun violence have recently become a pressing issue today. The degree of these crimes and activities has risen to the point of being termed as an epidemic. This prevalent misuse of weapons calls for an automatic system that detects weapons in real-time. Real-time surveillance video is captured and recorded in almost all public forums and places. These videos contain abundant raw data whi… ▽ More

    Submitted 28 September, 2023; originally announced September 2023.

    Comments: Accepted for presentation at the IEEE 2nd International Conference on Automation, Robotics and Computer Engineering

  13. arXiv:2309.09191  [pdf, other

    cs.LG q-bio.BM

    End-to-End Optimized Pipeline for Prediction of Protein Folding Kinetics

    Authors: Vijay Arvind. R, Haribharathi Sivakumar, Brindha. R

    Abstract: Protein folding is the intricate process by which a linear sequence of amino acids self-assembles into a unique three-dimensional structure. Protein folding kinetics is the study of pathways and time-dependent mechanisms a protein undergoes when it folds. Understanding protein kinetics is essential as a protein needs to fold correctly for it to perform its biological functions optimally, and a mis… ▽ More

    Submitted 17 September, 2023; originally announced September 2023.

    Comments: Accepted for presentation at the 22nd International Conference on Machine Learning and Applications

  14. arXiv:2309.09175   

    cs.LG cs.AI

    Imbalanced Data Stream Classification using Dynamic Ensemble Selection

    Authors: Priya. S, Haribharathi Sivakumar, Vijay Arvind. R

    Abstract: Modern streaming data categorization faces significant challenges from concept drift and class imbalanced data. This negatively impacts the output of the classifier, leading to improper classification. Furthermore, other factors such as the overlap** of multiple classes limit the extent of the correctness of the output. This work proposes a novel framework for integrating data pre-processing and… ▽ More

    Submitted 28 September, 2023; v1 submitted 17 September, 2023; originally announced September 2023.

    Comments: Made an error in the research and need to rectify it

  15. arXiv:2308.03842  [pdf, other

    cs.LG cs.IR

    Search Engine and Recommendation System for the Music Industry built with **aAI

    Authors: Ishita Gopalakrishnan, Sanjjushri Varshini R, Ponshriharini V

    Abstract: One of the most intriguing debates regarding a novel task is the development of search engines and recommendation-based systems in the music industry. Studies have shown a drastic depression in the search engine fields, due to concerning factors such as speed, accuracy and the format of data given for querying. Often people face difficulty in searching for a song solely based on the title, hence a… ▽ More

    Submitted 7 August, 2023; originally announced August 2023.

  16. arXiv:2307.08048  [pdf

    eess.IV cs.CV

    A Novel SLCA-UNet Architecture for Automatic MRI Brain Tumor Segmentation

    Authors: Tejashwini P S, Thriveni J, Venugopal K R

    Abstract: Brain tumor is deliberated as one of the severe health complications which lead to decrease in life expectancy of the individuals and is also considered as a prominent cause of mortality worldwide. Therefore, timely detection and prediction of brain tumors can be helpful to prevent death rates due to brain tumors. Biomedical image analysis is a widely known solution to diagnose brain tumor. Althou… ▽ More

    Submitted 16 July, 2023; originally announced July 2023.

  17. Role of long-range coupling on the properties of single polarons in models with dual electron-phonon couplings

    Authors: Monodeep Chakraborty, Sankeerth S. Narayan, Vigneshwaran R., Mona Berciu

    Abstract: We use the Variational Exact Diagonalization to investigate the single polaron properties for four different dual models, combining a short-range off-diagonal (Peierls) plus a longer-range diagonal (Holstein or breathing-mode) coupling. This allows us to investigate the sensitivity of various polaron properties both to the range of the diagonal coupling and to the specific diagonal coupling chosen… ▽ More

    Submitted 19 April, 2022; originally announced April 2022.

    Comments: 9 pages, 12 figures, submitted to Physical Review B

    MSC Class: 81Vxx

  18. arXiv:2204.08184  [pdf, ps, other

    math.CO

    On The Diameter of Pancake Graphs

    Authors: Harigovind V R, Pramod P Nair

    Abstract: The Pancake graph($P_n$) represents the group of all permutations on n elements, namely $S_n$, with respect to the generating set containing all prefix reversals. The diameter of a graph is the maximum of all distances on the graph, where the distance between two vertices is the shortest path between them. In the case of the $P_n$, it is the maximum of the shortest generating sequence of each perm… ▽ More

    Submitted 18 April, 2022; originally announced April 2022.

  19. arXiv:2108.04460  [pdf

    cond-mat.mtrl-sci

    Contiguous Hetero-structures & Co-existing Morphological Derivatives of Preferentially Grown Carbo-nitrides in Long Term Aged SS 316LN with Varying Nitrogen Concentration

    Authors: Alphy George, Vaishnavi Krupa B. R., R. Mythili, Arup Dasgupta, J. Ganesh Kumar, G. V. Prasad Reddy

    Abstract: To assess long-term structural integrity under operational conditions in nuclear reactors, SS 316LN with varying nitrogen content is subjected to thermal aging for 20000 hours at 650°C. While the annealing twins and heterogeneous grain evolution by bimodal division are independent of chemical composition, the type, size and morphology of evolving secondary phases are characteristic for nitrogen co… ▽ More

    Submitted 10 August, 2021; originally announced August 2021.

  20. arXiv:2107.12703  [pdf, other

    cond-mat.mtrl-sci cond-mat.mes-hall

    Dislocation assisted phase separation: a phase field study

    Authors: Arjun Varma R, Prita Pant, M P Gururajan

    Abstract: Defects play a key role in deciding the mechanisms and kinetics of phase transformations. In this paper, we show how dislocations influence phase separation in alloys with miscibility gap. Specifically, depending on the ratio of pipe mobility to bulk mobility, it is seen that even in a system with nominal compositions outside the spinodal limit, spinodal phase separation is possible. Surprisingly,… ▽ More

    Submitted 27 July, 2021; originally announced July 2021.

    Comments: 21 pages, 7 figures, 1 supplementary figure

  21. arXiv:2107.10723  [pdf, other

    econ.GN

    Of Access and Inclusivity Digital Divide in Online Education

    Authors: Bheemeshwar Reddy A, Sunny Jose, Vaidehi R

    Abstract: Can online education enable all students to participate in and benefit from it equally? Massive online education without addressing the huge access gap and disparities in digital infrastructure would not only exclude a vast majority of students from learning opportunities but also exacerbate the existing socio-economic disparities in educational opportunities.

    Submitted 22 July, 2021; originally announced July 2021.

    Journal ref: Economic and Political Weekly,Vol 36, pp 23-26 (2020)

  22. A projection operator approach for computing the dynamics of AS2S3 chalcogenide birefringent photonic crystal fiber coupler

    Authors: Uthayakumar T, Vasantha Jayakantha Raja R, Porsezian K

    Abstract: A variety of AS2S3 chalcogenide photonic crystal fiber coupler of special properties are proposed to study the role of birefringence in all optical coupling characteristics based on the projection operator method (POM). The equations of motion describing the dynamics of the individual pulse parameters through x- and y-polarized modes are arrived at by employing POM from the coupled nonlinear Schrö… ▽ More

    Submitted 12 July, 2021; originally announced July 2021.

    Comments: 16 pages, 9 figures

    MSC Class: 35Gxx; 47J35; 35Q55; 65Kxx; 78M10; 78M30;

    Journal ref: J. Opt. 17 025504 (2015)

  23. arXiv:2107.01801  [pdf, other

    cond-mat.mtrl-sci cond-mat.mes-hall

    Phase-field study of surface diffusion enhanced break-ups of nanowire junctions

    Authors: Abhinav Roy, Arjun Varma R, M P Gururajan

    Abstract: Using a phase-field model which incorporates enhanced diffusion at the nanowire surfaces, we study the effect of different parameters on the stability of intersecting nanowires. Our study shows that at the intersection of nanowires, sintering (curvature driven material flow) leads to the formation of junctions. These junctions act the initiators of nanowire break-up. The subsequent break-ups take… ▽ More

    Submitted 9 October, 2021; v1 submitted 5 July, 2021; originally announced July 2021.

    Comments: 38 pages, 22 figures; revised version with substantially improved discussion and analysis

  24. arXiv:2106.15917  [pdf, other

    econ.GN cs.CY

    Explaining Caste-based Digital Divide in India

    Authors: R Vaidehi, A Bheemeshwar Reddy, Sudatta Banerjee

    Abstract: With the increasing importance of information and communication technologies in access to basic services like education and health, the question of the digital divide based on caste assumes importance in India where large socioeconomic disparities persist between different caste groups. Studies on caste-based digital inequality are still scanty in India. Using nationally representative survey data… ▽ More

    Submitted 30 June, 2021; originally announced June 2021.

  25. arXiv:2106.15401  [pdf, ps, other

    physics.optics nlin.PS

    Logic gates based all-optical binary half adder using triple core PCF

    Authors: Uthayakumar T, Vasantha Jayakantha Raja R

    Abstract: This study presents the implementation of an all-optical binary logic half adder by employing triple core photonic crystal fiber (TPCF). The noteworthy feature of the present investigation is that an identical set of TPCF schemes, which demonstrated all-optical logic functions in our previous report has revealed the ability to demonstrate the successful half adder operation. The control signal (CS… ▽ More

    Submitted 27 June, 2021; originally announced June 2021.

    Comments: 10pages, 5 figures

    MSC Class: 78A60; 81V80

    Journal ref: J. Opt. 20 065503 (2018)

  26. arXiv:2103.05437  [pdf, other

    cs.CV

    The MICCAI Hackathon on reproducibility, diversity, and selection of papers at the MICCAI conference

    Authors: Fabian Balsiger, Alain Jungo, Naren Akash R J, Jianan Chen, Ivan Ezhov, Shengnan Liu, Jun Ma, Johannes C. Paetzold, Vishva Saravanan R, Anjany Sekuboyina, Suprosanna Shit, Yannick Suter, Moshood Yekini, Guodong Zeng, Markus Rempfler

    Abstract: The MICCAI conference has encountered tremendous growth over the last years in terms of the size of the community, as well as the number of contributions and their technical success. With this growth, however, come new challenges for the community. Methods are more difficult to reproduce and the ever-increasing number of paper submissions to the MICCAI conference poses new questions regarding the… ▽ More

    Submitted 28 April, 2021; v1 submitted 4 March, 2021; originally announced March 2021.

    Comments: Revision of discussion; update e-mail address of one author

  27. arXiv:2102.05203  [pdf, other

    quant-ph

    Star-topology Registers: NMR and Quantum Information Perspectives

    Authors: T S Mahesh, Deepak Khurana, Krithika V R, Sreejith G J, C S Sudheer Kumar

    Abstract: Quantum control of large spin registers is crucial for many applications ranging from spectroscopy to quantum information. A key factor that determines the efficiency of a register for implementing a given information processing task is its network topology. One particular type, called star-topology, involves a central qubit uniformly interacting with a set of ancillary qubits. A particular advant… ▽ More

    Submitted 9 February, 2021; originally announced February 2021.

    Comments: 15 pages, 10 figures

  28. Microcontroller based bidirectional buck boost converter for photo voltaic power plant

    Authors: Viswanatha V, Venkata Siva Reddy R

    Abstract: A common configuration for a stand-alone PV power system may consist of three converters: a buck converter for the PV panelto charge the battery, a boost converter for the battery to discharge to the load and one for the load voltage regulation. Such a systemrequires a coordinated control scheme for three converters which can be complicated. A simple structure for a stand-alone PV plantconsists of… ▽ More

    Submitted 23 January, 2021; originally announced January 2021.

    Journal ref: https://www.sciencedirect.com/science/article/pii/S231471721730017X -2018

  29. arXiv:2101.00875  [pdf

    cs.RO physics.app-ph

    Design and Development of Robots End Effector Test Rig

    Authors: Josephine Selvarani Ruth D, Saniya Zeba, Vibha M R, Rokesh Laishram, Gauthama Anand

    Abstract: A Test Rig for end-effectors of a robot is designed such that it achieves a prismatic motion in x-y-z axes for gras** an object. It is a structure, designed with a compact combination of sensors and actuators. Sensors are used for detecting presence, position and disturbance of target work piece or any object and actuators with motor driving system meant for controlling and moving the mechanism… ▽ More

    Submitted 4 January, 2021; originally announced January 2021.

  30. arXiv:2012.00866  [pdf, other

    cs.DS

    Huskysort

    Authors: R. C. Hillyard, Yunlu Liaozheng, Sai Vineeth K. R

    Abstract: Much of the copious literature on the subject of sorting has concentrated on minimizing the number of comparisons and/or exchanges/copies. However, a more appropriate yardstick for the performance of sorting algorithms is based on the total number of array accesses that are required (the "work"). For a sort that is based on divide-and-conquer (including iterative variations on that theme), we can… ▽ More

    Submitted 1 December, 2020; originally announced December 2020.

    Comments: 9 pages, Github repo for the algorithm included

  31. arXiv:2011.13556  [pdf, other

    cs.NI cs.IR

    Eco-Routing Using Open Street Maps

    Authors: R K Ghosh, Vinay R, Arnab Bhattacharyya

    Abstract: A vehicle's fuel consumption depends on its type, the speed, the condition, and the gradients of the road on which it is moving. We developed a Routing Engine for finding an eco-route (one with low fuel consumption) between a source and a destination. Open Street Maps has data on road conditions. We used CGIAR-CSI road elevation data 16[4] to integrate the road gradients into the proposed route-fi… ▽ More

    Submitted 26 November, 2020; originally announced November 2020.

    Comments: 16 pages, 17 figures, 41 references

  32. arXiv:2006.13843  [pdf, other

    cs.AI cs.LG

    Turbocharging Treewidth-Bounded Bayesian Network Structure Learning

    Authors: Vaidyanathan P. R., Stefan Szeider

    Abstract: We present a new approach for learning the structure of a treewidth-bounded Bayesian Network (BN). The key to our approach is applying an exact method (based on MaxSAT) locally, to improve the score of a heuristically computed BN. This approach allows us to scale the power of exact methods -- so far only applicable to BNs with several dozens of random variables -- to large BNs with several thousan… ▽ More

    Submitted 5 February, 2021; v1 submitted 24 June, 2020; originally announced June 2020.

    Comments: 15 pages, 4 figures, 3 tables. To be published in AAAI 2021. Updated: synced with AAAI version. Source code available at http://github.com/aditya95sriram/bn-slim

    ACM Class: I.2.6

  33. arXiv:2004.10174  [pdf

    eess.SY cs.CY

    Internet of Things(IoT) Based Multilevel Drunken Driving Detection and Prevention System Using Raspberry Pi 3

    Authors: Viswanatha V, Venkata Siva Reddy R, Ashwini Kumari P, Pradeep Kumar S

    Abstract: In this paper, the proposed system has demonstrated three ways of detecting alcohol level in the body of the car driver and prevent car driver from driving the vehicle by turning off the ignition system. It also sends messages to concerned people. In order to detect breath alcohol level MQ-3 sensor is included in this module along with a heartbeat sensor which can detect the heart beat rate of dri… ▽ More

    Submitted 21 April, 2020; originally announced April 2020.

  34. Characterization of analog and digital control loops for bidirectional buck-boost converter using PID/PIDN algorithms

    Authors: Viswanatha V, Venkata Siva Reddy R, Rajeswari

    Abstract: This article presents the characterization of analog and digital control loops using PID and PIDN control algorithms for bidirectional buck and boost converter (BBC). Control loops of BBC are designed and implemented in MATLAB code using transfer functions in time domain with unit step response and in frequency domain with bode plots and pole-zero plots. These transfer functions are obtained by av… ▽ More

    Submitted 21 April, 2020; originally announced April 2020.

  35. arXiv:2004.08103  [pdf, other

    eess.SP cs.LG

    RPnet: A Deep Learning approach for robust R Peak detection in noisy ECG

    Authors: Sricharan Vijayarangan, Vignesh R, Balamurali Murugesan, Preejith SP, Jayaraj Joseph, Mohansankar Sivaprakasam

    Abstract: Automatic detection of R-peaks in an Electrocardiogram signal is crucial in a multitude of applications including Heart Rate Variability (HRV) analysis and Cardio Vascular Disease(CVD) diagnosis. Although there have been numerous approaches that have successfully addressed the problem, there has been a notable dip in the performance of these existing detectors on ECG episodes that contain noise an… ▽ More

    Submitted 17 April, 2020; originally announced April 2020.

    Comments: Accepted in EMBC 2020

  36. arXiv:2004.05399  [pdf, other

    eess.SP cs.LG

    Interpreting Deep Neural Networks for Single-Lead ECG Arrhythmia Classification

    Authors: Sricharan Vijayarangan, Balamurali Murugesan, Vignesh R, Preejith SP, Jayaraj Joseph, Mohansankar Sivaprakasam

    Abstract: Cardiac arrhythmia is a prevalent and significant cause of morbidity and mortality among cardiac ailments. Early diagnosis is crucial in providing intervention for patients suffering from cardiac arrhythmia. Traditionally, diagnosis is performed by examination of the Electrocardiogram (ECG) by a cardiologist. This method of diagnosis is hampered by the lack of accessibility to expert cardiologists… ▽ More

    Submitted 11 April, 2020; originally announced April 2020.

    Comments: Accepted in EMBC 2020(EMBS)

  37. arXiv:2004.00503  [pdf, other

    cs.CL cs.CR cs.LG cs.NE cs.SI

    Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream

    Authors: Simran K, Prathiksha Balakrishna, Vinayakumar R, Soman KP

    Abstract: In recent days, the amount of Cyber Security text data shared via social media resources mainly Twitter has increased. An accurate analysis of this data can help to develop cyber threat situational awareness framework for a cyber threat. This work proposes a deep learning based approach for tweet data analysis. To convert the tweets into numerical representations, various text representations are… ▽ More

    Submitted 30 March, 2020; originally announced April 2020.

    Comments: 11 pages

  38. arXiv:2004.00502  [pdf, other

    cs.CL cs.CR cs.LG cs.NE

    Deep Learning Approach for Intelligent Named Entity Recognition of Cyber Security

    Authors: Simran K, Sriram S, Vinayakumar R, Soman KP

    Abstract: In recent years, the amount of Cyber Security data generated in the form of unstructured texts, for example, social media resources, blogs, articles, and so on has exceptionally increased. Named Entity Recognition (NER) is an initial step towards converting this unstructured data into structured data which can be used by a lot of applications. The existing methods on NER for Cyber Security data ar… ▽ More

    Submitted 30 March, 2020; originally announced April 2020.

    Comments: 10 pages

  39. arXiv:1910.12206  [pdf, other

    cs.CV eess.IV

    Segmenting Ships in Satellite Imagery With Squeeze and Excitation U-Net

    Authors: Venkatesh R, Anand Metha

    Abstract: The ship-detection task in satellite imagery presents significant obstacles to even the most state of the art segmentation models due to lack of labelled dataset or approaches which are not able to generalize to unseen images. The most common methods for semantic segmentation involve complex two-stage networks or networks which make use of a multi-scale scene parsing module. In this paper, we prop… ▽ More

    Submitted 27 October, 2019; originally announced October 2019.

  40. arXiv:1910.01114  [pdf

    cs.CR cs.LG cs.NI

    Intrusion detection systems using classical machine learning techniques versus integrated unsupervised feature learning and deep neural network

    Authors: Shisrut Rawat, Aishwarya Srinivasan, Vinayakumar R

    Abstract: Security analysts and administrators face a lot of challenges to detect and prevent network intrusions in their organizations, and to prevent network breaches, detecting the breach on time is crucial. Challenges arise while detecting unforeseen attacks. This work includes a performance comparison of classical machine learning approaches that require vast feature engineering, versus integrated unsu… ▽ More

    Submitted 1 October, 2019; originally announced October 2019.

    Comments: 9 pages

  41. arXiv:1909.10471  [pdf, ps, other

    cs.IT

    Subpacketization in Coded Caching with Demand Privacy

    Authors: Aravind V R, Pradeep Sarvepalli, Andrew Thangaraj

    Abstract: Coded caching is a technique where we utilize multi-casting opportunities to reduce rate in cached networks. One limitation of coded caching schemes is that they reveal the demands of all users to their peers. In this work, we consider coded caching schemes that assure privacy for user demands with a particular focus on reducing subpacketization. For the 2-user, 2-file case, we present a new linea… ▽ More

    Submitted 23 September, 2019; originally announced September 2019.

    Comments: 13 pages, 5 figures

  42. arXiv:1906.08771  [pdf, other

    cs.LG stat.ML

    Submodular Batch Selection for Training Deep Neural Networks

    Authors: K J Joseph, Vamshi Teja R, Krishnakant Singh, Vineeth N Balasubramanian

    Abstract: Mini-batch gradient descent based methods are the de facto algorithms for training neural network architectures today. We introduce a mini-batch selection strategy based on submodular function maximization. Our novel submodular formulation captures the informativeness of each sample and diversity of the whole subset. We design an efficient, greedy algorithm which can give high-quality solutions to… ▽ More

    Submitted 20 June, 2019; originally announced June 2019.

    Comments: IJCAI 2019

  43. RNNSecureNet: Recurrent neural networks for Cyber security use-cases

    Authors: Mohammed Harun Babu R, Vinayakumar R, Soman KP

    Abstract: Recurrent neural network (RNN) is an effective neural network in solving very complex supervised and unsupervised tasks. There has been a significant improvement in RNN field such as natural language processing, speech processing, computer vision and other multiple domains. This paper deals with RNN application on different use cases like Incident Detection, Fraud Detection, and Android Malware Cl… ▽ More

    Submitted 5 January, 2019; originally announced January 2019.

    Comments: 12 pages. arXiv admin note: text overlap with arXiv:1812.03519

  44. arXiv:1901.03141  [pdf

    cs.CL cs.LG

    Emotion Detection using Data Driven Models

    Authors: Naveenkumar K S, Vinayakumar R, Soman KP

    Abstract: Text is the major method that is used for communication now a days, each and every day lots of text are created. In this paper the text data is used for the classification of the emotions. Emotions are the way of expression of the persons feelings which has an high influence on the decision making tasks. Datasets are collected which are available publically and combined together based on the three… ▽ More

    Submitted 10 January, 2019; originally announced January 2019.

    Comments: 11 pages

  45. arXiv:1901.02033  [pdf, ps, other

    cs.IT

    The Effect of Introducing Redundancy in a Probabilistic Forwarding Protocol

    Authors: Vinay Kumar B. R., Roshan Antony, Navin Kashyap

    Abstract: This paper is concerned with the problem of broadcasting information from a source node to every node in an ad-hoc network. Flooding, as a broadcast mechanism, involves each node forwarding any packet it receives to all its neighbours. This results in excessive transmissions and thus a high energy expenditure overall. Probabilistic forwarding or gossi** involves each node forwarding a received p… ▽ More

    Submitted 10 January, 2019; v1 submitted 7 January, 2019; originally announced January 2019.

    Comments: Appears in the Proceedings of the 2018 National Conference on Communications (NCC 2018)

  46. arXiv:1901.00297  [pdf

    cs.CL

    A Deep Learning Approach for Similar Languages, Varieties and Dialects

    Authors: Vidya Prasad K, Akarsh S, Vinayakumar R, Soman KP

    Abstract: Deep learning mechanisms are prevailing approaches in recent days for the various tasks in natural language processing, speech recognition, image processing and many others. To leverage this we use deep learning based mechanism specifically Bidirectional- Long Short-Term Memory (B-LSTM) for the task of dialectic identification in Arabic and German broadcast speech and Long Short-Term Memory (LSTM)… ▽ More

    Submitted 2 January, 2019; originally announced January 2019.

    Comments: 17 pages

  47. arXiv:1812.06292  [pdf

    cs.CR cs.AI cs.LG

    A short review on Applications of Deep learning for Cyber security

    Authors: Mohammed Harun Babu R, Vinayakumar R, Soman KP

    Abstract: Deep learning is an advanced model of traditional machine learning. This has the capability to extract optimal feature representation from raw input samples. This has been applied towards various use cases in cyber security such as intrusion detection, malware classification, android malware detection, spam and phishing detection and binary analysis. This paper outlines the survey of all the works… ▽ More

    Submitted 29 January, 2019; v1 submitted 15 December, 2018; originally announced December 2018.

    Comments: 15 pages

  48. arXiv:1812.03519  [pdf

    cs.LG cs.CL cs.CR

    Deep-Net: Deep Neural Network for Cyber Security Use Cases

    Authors: Vinayakumar R, Barathi Ganesh HB, Prabaharan Poornachandran, Anand Kumar M, Soman KP

    Abstract: Deep neural networks (DNNs) have witnessed as a powerful approach in this year by solving long-standing Artificial intelligence (AI) supervised and unsupervised tasks exists in natural language processing, speech processing, computer vision and others. In this paper, we attempt to apply DNNs on three different cyber security use cases: Android malware classification, incident detection and fraud d… ▽ More

    Submitted 9 December, 2018; originally announced December 2018.

    MSC Class: 68T50

  49. arXiv:1810.04144  [pdf, other

    cs.HC cs.CV cs.RO

    A Brief Survey on Autonomous Vehicle Possible Attacks, Exploits and Vulnerabilities

    Authors: Amara Dinesh Kumar, Koti Naga Renu Chebrolu, Vinayakumar R, Soman KP

    Abstract: Advanced driver assistance systems are advancing at a rapid pace and all major companies started investing in develo** the autonomous vehicles. But the security and reliability is still uncertain and debatable. Imagine that a vehicle is compromised by the attackers and then what they can do. An attacker can control brake, accelerate and even steering which can lead to catastrophic consequences.… ▽ More

    Submitted 3 October, 2018; originally announced October 2018.

    Comments: 5 Pages,1 Figure

  50. arXiv:1810.03977  [pdf, other

    cs.CV cs.CR

    DeepImageSpam: Deep Learning based Image Spam Detection

    Authors: Amara Dinesh Kumar, Vinayakumar R, Soman KP

    Abstract: Hackers and spammers are employing innovative and novel techniques to deceive novice and even knowledgeable internet users. Image spam is one of such technique where the spammer varies and changes some portion of the image such that it is indistinguishable from the original image fooling the users. This paper proposes a deep learning based approach for image spam detection using the convolutional… ▽ More

    Submitted 3 October, 2018; originally announced October 2018.

    Comments: 4 pages