Skip to main content

Showing 1–50 of 50 results for author: Saini, R

.
  1. arXiv:2406.03048  [pdf, other

    cs.CV

    Giving each task what it needs -- leveraging structured sparsity for tailored multi-task learning

    Authors: Richa Upadhyay, Ronald Phlypo, Rajkumar Saini, Marcus Liwicki

    Abstract: Every task demands distinct feature representations, ranging from low-level to high-level attributes, so it is vital to address the specific needs of each task, especially in the Multi-task Learning (MTL) framework. This work, therefore, introduces Layer-Optimized Multi-Task (LOMT) models that utilize structured sparsity to refine feature selection for individual tasks and enhance the performance… ▽ More

    Submitted 5 June, 2024; originally announced June 2024.

  2. arXiv:2405.14874  [pdf, other

    cs.CV

    Investigating Robustness of Open-Vocabulary Foundation Object Detectors under Distribution Shifts

    Authors: Prakash Chandra Chhipa, Kanjar De, Meenakshi Subhash Chippa, Rajkumar Saini, Marcus Liwicki

    Abstract: The challenge of Out-Of-Distribution (OOD) robustness remains a critical hurdle towards deploying deep vision models. Open-vocabulary object detection extends the capabilities of traditional object detection frameworks to recognize and classify objects beyond predefined categories. Investigating OOD robustness in open-vocabulary object detection is essential to increase the trustworthiness of thes… ▽ More

    Submitted 1 June, 2024; v1 submitted 1 April, 2024; originally announced May 2024.

    Comments: 13 + 3 single column pages

  3. arXiv:2405.02296  [pdf, other

    cs.CV

    Möbius Transform for Mitigating Perspective Distortions in Representation Learning

    Authors: Prakash Chandra Chhipa, Meenakshi Subhash Chippa, Kanjar De, Rajkumar Saini, Marcus Liwicki, Mubarak Shah

    Abstract: Perspective distortion (PD) causes unprecedented changes in shape, size, orientation, angles, and other spatial relationships of visual concepts in images. Precisely estimating camera intrinsic and extrinsic parameters is a challenging task that prevents synthesizing perspective distortion. Non-availability of dedicated training data poses a critical barrier to develo** robust computer vision me… ▽ More

    Submitted 7 March, 2024; originally announced May 2024.

  4. arXiv:2403.15017  [pdf, other

    cs.CV cs.LG

    Vehicle Detection Performance in Nordic Region

    Authors: Hamam Mokayed, Rajkumar Saini, Oluwatosin Adewumi, Lama Alkhaled, Bjorn Backe, Palaiahnakote Shivakumara, Olle Hagner, Yan Chai Hum

    Abstract: This paper addresses the critical challenge of vehicle detection in the harsh winter conditions in the Nordic regions, characterized by heavy snowfall, reduced visibility, and low lighting. Due to their susceptibility to environmental distortions and occlusions, traditional vehicle detection methods have struggled in these adverse conditions. The advanced proposed deep learning architectures broug… ▽ More

    Submitted 22 March, 2024; originally announced March 2024.

    Comments: submitted to ICPR2024

  5. arXiv:2308.12114  [pdf, other

    cs.CV cs.LG

    Less is More -- Towards parsimonious multi-task models using structured sparsity

    Authors: Richa Upadhyay, Ronald Phlypo, Rajkumar Saini, Marcus Liwicki

    Abstract: Model sparsification in deep learning promotes simpler, more interpretable models with fewer parameters. This not only reduces the model's memory footprint and computational needs but also shortens inference time. This work focuses on creating sparse models optimized for multiple tasks with fewer parameters. These parsimonious models also possess the potential to match or outperform dense models i… ▽ More

    Submitted 30 November, 2023; v1 submitted 23 August, 2023; originally announced August 2023.

    Comments: accepted at First Conference on Parsimony and Learning (CPAL 2024)

  6. arXiv:2308.08818  [pdf, ps, other

    cs.IT

    User-Pair Selection for QoS-Aware Secrecy Rate Maximization in Untrusted NOMA

    Authors: Sapna Thapar, Deepak Mishra, Ravikant Saini, Zhiguo Ding

    Abstract: Non-orthogonal multiple access (NOMA) has been recognized as one of the key enabling technologies for future generation wireless networks. Sharing the same time-frequency resource among users imposes secrecy challenges in NOMA in the presence of untrusted users. This paper characterizes the impact of user-pair selection on the secrecy performance of an untrusted NOMA system. In this regard, an opt… ▽ More

    Submitted 17 August, 2023; originally announced August 2023.

  7. arXiv:2308.08813  [pdf, ps, other

    cs.IT eess.SP

    Untrusted NOMA with Imperfect SIC: Outage Performance Analysis and Optimization

    Authors: Sapna Thapar, Deepak Mishra, Ravikant Saini

    Abstract: Non-orthogonal multiple access (NOMA) has come to the fore as a spectral-efficient technique for fifth-generation and beyond communication networks. We consider the downlink of a NOMA system with untrusted users. In order to consider a more realistic scenario, imperfect successive interference cancellation is assumed at the receivers during the decoding process. Since pair outage probability (POP)… ▽ More

    Submitted 17 August, 2023; originally announced August 2023.

    Comments: 6 pages, 5 figures, WCNC 2022

  8. arXiv:2308.08811  [pdf, ps, other

    cs.IT

    Secrecy Outage Probability Analysis for Downlink NOMA with Imperfect SIC at Untrusted Users

    Authors: Sapna Thapar, Insha Amin, Deepak Mishra, Ravikant Saini

    Abstract: Non-orthogonal multiple access (NOMA) has come to the fore as a spectrally efficient technique for fifth-generation networks and beyond. At the same time, NOMA faces severe security issues in the presence of untrusted users due to successive interference cancellation (SIC)-based decoding at receivers. In this paper, to make the system model more realistic, we consider the impact of imperfect SIC d… ▽ More

    Submitted 17 August, 2023; originally announced August 2023.

    Comments: 5 pages, 5 figures, and EUSIPCO 2021

  9. arXiv:2308.08804  [pdf, ps, other

    cs.IT eess.SP

    Secrecy Outage Probability Analysis for Downlink Untrusted NOMA Under Practical SIC Error

    Authors: Sapna Thapar, Deepak Mishra, Derrick Wing Kwan Ng, Ravikant Saini

    Abstract: Non-orthogonal multiple access (NOMA) serves multiple users simultaneously via the same resource block by exploiting superposition coding at the transmitter and successive interference cancellation (SIC) at the receivers. Under practical considerations, perfect SIC may not be achieved. Thus, residual interference (RI) occurs inevitably due to imperfect SIC. In this work, we first propose a novel m… ▽ More

    Submitted 17 August, 2023; originally announced August 2023.

    Comments: 6 pages, 5 figures, GLOBECOM 2021

  10. arXiv:2308.08800  [pdf, other

    cs.IT

    Secure Transmission in NOMA-enabled Industrial IoT with Resource-Constrained Untrusted Devices

    Authors: Sapna Thapar, Deepak Mishra, Ravikant Saini

    Abstract: The security of confidential information associated with devices in the industrial Internet of Things (IIoT) network is a serious concern. This article focuses on achieving a nonorthogonal multiple access (NOMA)-enabled secure IIoT network in the presence of untrusted devices by jointly optimizing the resources, such as decoding order and power allocated to devices. Assuming that the devices are r… ▽ More

    Submitted 17 August, 2023; originally announced August 2023.

    Comments: 10 pages and 6 figures

  11. arXiv:2308.02525  [pdf, other

    cs.CV

    Can Self-Supervised Representation Learning Methods Withstand Distribution Shifts and Corruptions?

    Authors: Prakash Chandra Chhipa, Johan Rodahl Holmgren, Kanjar De, Rajkumar Saini, Marcus Liwicki

    Abstract: Self-supervised learning in computer vision aims to leverage the inherent structure and relationships within data to learn meaningful representations without explicit human annotation, enabling a holistic understanding of visual scenes. Robustness in vision machine learning ensures reliable and consistent performance, enhancing generalization, adaptability, and resistance to noise, variations, and… ▽ More

    Submitted 11 August, 2023; v1 submitted 31 July, 2023; originally announced August 2023.

    Comments: Accepted at 2023 IEEE/CVF International Conference on Computer Vision Workshops (ICCVW). Corresponding author - [email protected]

  12. arXiv:2306.10854  [pdf, other

    cs.LG cs.HC

    Performance of data-driven inner speech decoding with same-task EEG-fMRI data fusion and bimodal models

    Authors: Holly Wilson, Scott Wellington, Foteini Simistira Liwicki, Vibha Gupta, Rajkumar Saini, Kanjar De, Nosheen Abid, Sumit Rakesh, Johan Eriksson, Oliver Watts, Xi Chen, Mohammad Golbabaee, Michael J. Proulx, Marcus Liwicki, Eamonn O'Neill, Benjamin Metcalfe

    Abstract: Decoding inner speech from the brain signal via hybridisation of fMRI and EEG data is explored to investigate the performance benefits over unimodal models. Two different bimodal fusion approaches are examined: concatenation of probability vectors output from unimodal fMRI and EEG machine learning models, and data fusion with feature engineering. Same task inner speech data are recorded from four… ▽ More

    Submitted 19 June, 2023; originally announced June 2023.

  13. arXiv:2304.14462  [pdf, other

    cs.CV cs.LG

    Robust and Fast Vehicle Detection using Augmented Confidence Map

    Authors: Hamam Mokayed, Palaiahnakote Shivakumara, Lama Alkhaled, Rajkumar Saini, Muhammad Zeshan Afzal, Yan Chai Hum, Marcus Liwicki

    Abstract: Vehicle detection in real-time scenarios is challenging because of the time constraints and the presence of multiple types of vehicles with different speeds, shapes, structures, etc. This paper presents a new method relied on generating a confidence map-for robust and faster vehicle detection. To reduce the adverse effect of different speeds, shapes, structures, and the presence of several vehicle… ▽ More

    Submitted 27 April, 2023; originally announced April 2023.

  14. arXiv:2304.01354  [pdf, other

    cs.CV

    Functional Knowledge Transfer with Self-supervised Representation Learning

    Authors: Prakash Chandra Chhipa, Muskaan Chopra, Gopal Mengi, Varun Gupta, Richa Upadhyay, Meenakshi Subhash Chippa, Kanjar De, Rajkumar Saini, Seiichi Uchida, Marcus Liwicki

    Abstract: This work investigates the unexplored usability of self-supervised representation learning in the direction of functional knowledge transfer. In this work, functional knowledge transfer is achieved by joint optimization of self-supervised learning pseudo task and supervised learning task, improving supervised learning task performance. Recent progress in self-supervised learning uses a large volum… ▽ More

    Submitted 10 July, 2023; v1 submitted 12 March, 2023; originally announced April 2023.

    Comments: Accepted at IEEE International Conference on Image Processing (ICIP 2023)

  15. arXiv:2303.10624  [pdf, other

    cs.LG cs.DC

    PFSL: Personalized & Fair Split Learning with Data & Label Privacy for thin clients

    Authors: Manas Wadhwa, Gagan Raj Gupta, Ashutosh Sahu, Rahul Saini, Vidhi Mittal

    Abstract: The traditional framework of federated learning (FL) requires each client to re-train their models in every iteration, making it infeasible for resource-constrained mobile devices to train deep-learning (DL) models. Split learning (SL) provides an alternative by using a centralized server to offload the computation of activations and gradients for a subset of the model but suffers from problems of… ▽ More

    Submitted 19 March, 2023; originally announced March 2023.

    Comments: To be published in : THE 23RD IEEE/ACM INTERNATIONAL SYMPOSIUM ON Cluster, Cloud and Internet Computing. Granted: Open Research Objects (ORO) and Research Objects Reviewed (ROR) badges. See https://www.niso.org/publications/rp-31-2021-badging for definitions of the badges. Code available at: https://github.com/mnswdhw/PFSL

  16. arXiv:2302.04032  [pdf, other

    cs.CV cs.LG

    A Systematic Performance Analysis of Deep Perceptual Loss Networks: Breaking Transfer Learning Conventions

    Authors: Gustav Grund Pihlgren, Konstantina Nikolaidou, Prakash Chandra Chhipa, Nosheen Abid, Rajkumar Saini, Fredrik Sandin, Marcus Liwicki

    Abstract: In recent years, deep perceptual loss has been widely and successfully used to train machine learning models for many computer vision tasks, including image synthesis, segmentation, and autoencoding. Deep perceptual loss is a type of loss function for images that computes the error between two images as the distance between deep features extracted from a neural network. Most applications of the lo… ▽ More

    Submitted 3 July, 2024; v1 submitted 8 February, 2023; originally announced February 2023.

  17. arXiv:2210.10633  [pdf, ps, other

    cs.CV

    Depth Contrast: Self-Supervised Pretraining on 3DPM Images for Mining Material Classification

    Authors: Prakash Chandra Chhipa, Richa Upadhyay, Rajkumar Saini, Lars Lindqvist, Richard Nordenskjold, Seiichi Uchida, Marcus Liwicki

    Abstract: This work presents a novel self-supervised representation learning method to learn efficient representations without labels on images from a 3DPM sensor (3-Dimensional Particle Measurement; estimates the particle size distribution of material) utilizing RGB images and depth maps of mining material on the conveyor belt. Human annotations for material categories on sensor-generated data are scarce a… ▽ More

    Submitted 18 October, 2022; originally announced October 2022.

    Comments: Accepted to CVF European Conference on Computer Vision Workshop(ECCVW 2022)

  18. arXiv:2210.06989  [pdf, other

    cs.CV

    Multi-Task Meta Learning: learn how to adapt to unseen tasks

    Authors: Richa Upadhyay, Prakash Chandra Chhipa, Ronald Phlypo, Rajkumar Saini, Marcus Liwicki

    Abstract: This work proposes Multi-task Meta Learning (MTML), integrating two learning paradigms Multi-Task Learning (MTL) and meta learning, to bring together the best of both worlds. In particular, it focuses simultaneous learning of multiple tasks, an element of MTL and promptly adapting to new tasks, a quality of meta learning. It is important to highlight that we focus on heterogeneous tasks, which are… ▽ More

    Submitted 26 April, 2023; v1 submitted 13 October, 2022; originally announced October 2022.

  19. arXiv:2207.02489  [pdf, other

    cs.CR cs.NI

    RIDS : Real-time Intrusion Detection System for WPA3 enabled Enterprise Networks

    Authors: Rahul Saini, Debajyoti Halder, Anand M. Baswade

    Abstract: With the advent of new IEEE 802.11ax (WiFi 6) devices, enabling security is a priority. Since previous versions were found to have security vulnerabilities, to fix the most common security flaws, the WiFi Protected Access 3 (WPA3) got introduced. Although WPA3 is an improvement over its predecessor in terms of security, recently it was found that WPA3 has a few security vulnerabilities as well. In… ▽ More

    Submitted 6 July, 2022; originally announced July 2022.

  20. arXiv:2204.07996  [pdf, other

    quant-ph

    NEQRX: Efficient Quantum Image Encryption with Reduced Circuit Complexity

    Authors: Rakesh Saini, Bikash K. Behera, Saif Al-Kuwari, Ahmed Farouk

    Abstract: Cryptography plays an important role in ensuring data security and authentication within information processing systems. As the prevalence of digital imagery continues to grow, safeguarding this form of data becomes increasingly crucial. However, existing security protocols, reliant on complex mathematical models, exhibit vulnerabilities in effectively protecting information from both internal and… ▽ More

    Submitted 26 March, 2024; v1 submitted 14 April, 2022; originally announced April 2022.

  21. arXiv:2203.07707  [pdf, other

    eess.IV cs.CV

    Magnification Prior: A Self-Supervised Method for Learning Representations on Breast Cancer Histopathological Images

    Authors: Prakash Chandra Chhipa, Richa Upadhyay, Gustav Grund Pihlgren, Rajkumar Saini, Seiichi Uchida, Marcus Liwicki

    Abstract: This work presents a novel self-supervised pre-training method to learn efficient representations without labels on histopathology medical images utilizing magnification factors. Other state-of-theart works mainly focus on fully supervised learning approaches that rely heavily on human annotations. However, the scarcity of labeled and unlabeled data is a long-standing challenge in histopathology.… ▽ More

    Submitted 8 September, 2022; v1 submitted 15 March, 2022; originally announced March 2022.

    Comments: Accepted to IEEE/CVF Winter Conference on Applications of Computer Vision (WACV 2023)

  22. arXiv:2111.12146  [pdf, other

    cs.LG

    Sharing to learn and learning to share; Fitting together Meta-Learning, Multi-Task Learning, and Transfer Learning: A meta review

    Authors: Richa Upadhyay, Ronald Phlypo, Rajkumar Saini, Marcus Liwicki

    Abstract: Integrating knowledge across different domains is an essential feature of human learning. Learning paradigms such as transfer learning, meta learning, and multi-task learning reflect the human learning process by exploiting the prior knowledge for new tasks, encouraging faster learning and good generalization for new tasks. This article gives a detailed view of these learning paradigms and their c… ▽ More

    Submitted 5 May, 2024; v1 submitted 23 November, 2021; originally announced November 2021.

  23. Novel Outage-Aware NOMA Protocol for Secrecy Fairness Maximization Among Untrusted Users

    Authors: Sapna Thapar, Deepak Mishra, Ravikant Saini

    Abstract: Observing the significance of spectrally-efficient secure non-orthogonal multiple access (NOMA), this paper proposes a novel quality of service (QoS) aware secure NOMA protocol that maximizes secrecy fairness among untrusted users. Considering a base station (BS) and two users, a novel decoding order is designed that provides security to both users. With the objective of ensuring secrecy fairness… ▽ More

    Submitted 31 March, 2021; originally announced March 2021.

    Comments: 14 pages, 12 figures

    Journal ref: IEEE Transactions on Vehicular Technology, Volume: 69, Issue: 11, Pages: 13259 - 13272, September 2020

  24. Decoding Orders and Power Allocation for Untrusted NOMA: A Secrecy Perspective

    Authors: Sapna Thapar, Deepak Mishra, Ravikant Saini

    Abstract: The amalgamation of non-orthogonal multiple access (NOMA) and physical layer security is a significant research interest for providing spectrally-efficient secure fifth-generation networks. Observing the secrecy issue among multiplexed NOMA users, which is stemmed from successive interference cancellation based decoding at receivers, we focus on safeguarding untrusted NOMA. Considering the problem… ▽ More

    Submitted 30 March, 2021; originally announced March 2021.

    Comments: Conference paper, 6 pages,7 figures

    Journal ref: IEEE WCNC 2020

  25. Decoding Orders for Securing Untrusted NOMA

    Authors: Sapna Thapar, Deepak Mishra, Ravikant Saini

    Abstract: This letter focuses on exploring a new decoding order to resolve the secrecy issue among untrusted nonorthogonal multiple access users. In this context, firstly, we identify the total number of possible decoding orders analytically. Then, we propose a decoding order strategy ensuring positive secrecy rate for all users, and obtain the number of feasible secure decoding orders based on this propose… ▽ More

    Submitted 30 March, 2021; originally announced March 2021.

    Comments: IEEE Networking Letters, 4 Pages, 2 Figures

    Journal ref: IEEE Networking Letters, Volume: 3, Issue: 1, Pages: 27 - 30, January 2021

  26. Secrecy Fairness Aware NOMA for Untrusted Users

    Authors: Sapna Thapar, Deepak Mishra, Ravikant Saini

    Abstract: Spectrally-efficient secure non-orthogonal multiple access (NOMA) has recently attained a substantial research interest for fifth generation development. This work explores crucial security issue in NOMA which is stemmed from utilizing the decoding concept of successive interference cancellation. Considering untrusted users, we design a novel secure NOMA transmission protocol to maximize secrecy f… ▽ More

    Submitted 30 March, 2021; originally announced March 2021.

    Comments: Conference paper, IEEE GLOBECOM2019, 6pages, 6 figures

    Journal ref: IEEE GLOBECOM 2019

  27. Investigation of NOx in piloted stabilized methane-air diffusion flames using Finite-rate and Infinitely-fast chemistry based combustion models

    Authors: Rohit Saini, Swetha Prakash, Ashoke De, Rakesh Yadav

    Abstract: The present work reports on the numerical investigation of NOx in three turbulent piloted diffusion flames of different levels of extinction. The study involves two-dimensional axisymmetric modeling of combustion in these flames with fairly detailed chemistry, i.e. GRI 3.0 mechanism. The main focus of the study is to analyze the effects of the two different combustion model approaches, such as inf… ▽ More

    Submitted 1 March, 2021; originally announced March 2021.

    Journal ref: Thermal Science and Engineering Progress, 2018

  28. Assessment of Soot Formation Models in Lifted Ethylene/Air Turbulent Diffusion Flame

    Authors: Rohit Saini, Ashoke De

    Abstract: In the present study, soot formation in the turbulent lifted diffusion flame, consisting of ethylene-air is numerically investigated using three different soot modeling approaches and is comprehensively reported. For turbulence-chemistry interaction, Flamelet generated manifold (FGM) model is used. A detailed kinetics is used which is represented through POLIMI mechanism (Ranzi et al. 2012). Soot… ▽ More

    Submitted 1 March, 2021; originally announced March 2021.

    Journal ref: Thermal Science and Engineering Progress, 2017

  29. arXiv:2102.05993  [pdf, ps, other

    math.AG math.NT

    Finite groups scheme actions and incompressibility of Galois covers: beyond the ordinary case

    Authors: Najmuddin Fakhruddin, Rijul Saini

    Abstract: Inspired by recent work of Farb, Kisin and Wolfson, we develop a method for using actions of finite group schemes over a mixed characteristic dvr R to get lower bounds for the essential dimension of a cover of a variety over K = Frac(R). We then apply this to prove p-incompressibility for congruence covers of a class of unitary Shimura varieties for primes p at which the reduction of the Shimura v… ▽ More

    Submitted 11 February, 2021; originally announced February 2021.

    Comments: Comments welcome!

  30. arXiv:2012.07562  [pdf, other

    quant-ph

    Experimental Realization of Quantum Darwinism State on Quantum Computers

    Authors: Rakesh Saini, Bikash K. Behera

    Abstract: It is well-known that decoherence is a crucial barrier in realizing various quantum information processing tasks; on the other hand, it plays a pivotal role in explaining how a quantum system's fragile state leads to the robust classical state. Zurek [Nat. Phys. 5, 181-188 (2009)] has developed the theory which successfully describes the emergence of classical objectivity of quantum system via dec… ▽ More

    Submitted 10 December, 2020; originally announced December 2020.

    Comments: 8 figures, 10 pages

  31. arXiv:2011.10329  [pdf, other

    quant-ph

    Protection of qubits by nonlinear resonances

    Authors: Rakesh Kumar Saini, Raman Sehgal, Sudhir R. Jain

    Abstract: We show that quantized superconducting circuits are non-integrable at the classical level of description, adorned by nonlinear resonances amidst stochastic sea. The spectral fluctuations of these quasi-integrable systems exhibit intermediate behaviour between regularity and chaos. The distribution function of ratios of adjacent spacings, and, nearest-neighbour spacing distribution functions attest… ▽ More

    Submitted 20 November, 2020; originally announced November 2020.

    Comments: 7 pages, 4 figures

  32. arXiv:2011.10181  [pdf, ps, other

    math.AG

    Rational curves on K3 surfaces of small genus

    Authors: Rijul Saini

    Abstract: Let $\mathfrak B_g$ denote the moduli space of primitively polarized $K3$ surfaces $(S,H)$ of genus $g$ over $\mathbb C$. It is well-known that $\mathfrak B_g$ is irreducible and that there are only finitely many rational curves in $|H|$ for any primitively polarized $K3$ surface $(S,H)$. So we can ask the question of finding the monodromy group of such curves. The case of $g=2$ essentially follow… ▽ More

    Submitted 19 January, 2023; v1 submitted 19 November, 2020; originally announced November 2020.

    Comments: 53 pages, made corrections to calculation errors in dimension counts

    MSC Class: 14J28 (Primary); 20B25; 14H45 (Secondary)

  33. arXiv:2006.16589  [pdf, other

    cs.CV

    On the Demystification of Knowledge Distillation: A Residual Network Perspective

    Authors: Nandan Kumar Jha, Rajat Saini, Sparsh Mittal

    Abstract: Knowledge distillation (KD) is generally considered as a technique for performing model compression and learned-label smoothing. However, in this paper, we study and investigate the KD approach from a new perspective: we study its efficacy in training a deeper network without any residual connections. We find that in most of the cases, non-residual student networks perform equally or better than t… ▽ More

    Submitted 30 June, 2020; originally announced June 2020.

    ACM Class: I.5.1; I.5.1

  34. ULSAM: Ultra-Lightweight Subspace Attention Module for Compact Convolutional Neural Networks

    Authors: Rajat Saini, Nandan Kumar Jha, Bedanta Das, Sparsh Mittal, C. Krishna Mohan

    Abstract: The capability of the self-attention mechanism to model the long-range dependencies has catapulted its deployment in vision models. Unlike convolution operators, self-attention offers infinite receptive field and enables compute-efficient modeling of global dependencies. However, the existing state-of-the-art attention mechanisms incur high compute and/or parameter overheads, and hence unfit for c… ▽ More

    Submitted 26 June, 2020; originally announced June 2020.

    Comments: Accepted as a conference paper in 2020 IEEE Winter Conference on Applications of Computer Vision (WACV)

    ACM Class: I.5.1; I.5.2; I.5.4

    Journal ref: WACV (2020) 1627-1636

  35. arXiv:2006.15100  [pdf, other

    cs.LG eess.SP stat.ML

    E2GC: Energy-efficient Group Convolution in Deep Neural Networks

    Authors: Nandan Kumar Jha, Rajat Saini, Subhrajit Nag, Sparsh Mittal

    Abstract: The number of groups ($g$) in group convolution (GConv) is selected to boost the predictive performance of deep neural networks (DNNs) in a compute and parameter efficient manner. However, we show that naive selection of $g$ in GConv creates an imbalance between the computational complexity and degree of data reuse, which leads to suboptimal energy efficiency in DNNs. We devise an optimum group si… ▽ More

    Submitted 26 June, 2020; originally announced June 2020.

    Comments: Accepted as a conference paper in 2020 33rd International Conference on VLSI Design and 2020 19th International Conference on Embedded Systems (VLSID)

    ACM Class: I.5.1; I.5.2; I.5.5; C.0

    Journal ref: VLSID (2020) 155-160

  36. Novel Language Resources for Hindi: An Aesthetics Text Corpus and a Comprehensive Stop Lemma List

    Authors: Gayatri Venugopal-Wairagade, Jatinderkumar R. Saini, Dhanya Pramod

    Abstract: This paper is an effort to complement the contributions made by researchers working toward the inclusion of non-English languages in natural language processing studies. Two novel Hindi language resources have been created and released for public consumption. The first resource is a corpus consisting of nearly thousand pre-processed fictional and nonfictional texts spanning over hundred years. The… ▽ More

    Submitted 1 February, 2020; originally announced February 2020.

    Comments: 7 pages, 3 figures

  37. arXiv:1907.07869  [pdf, ps, other

    math.ST

    Bounds on Spreads of Matrices related to Fourth Central Moment. II

    Authors: R. Sharma, R. Kumar, R. Saini, P. Devi

    Abstract: We derive some inequalities involving first four central moments of discrete and continuous distributions. Bounds for the eigenvalues and spread of a matrix are obtained when all its eigenvalues are real. Likewise, we discuss bounds for the roots and span of a polynomial equation.

    Submitted 18 July, 2019; originally announced July 2019.

    MSC Class: 60E15; 15A42; 12D10

  38. arXiv:1905.07568  [pdf, ps, other

    math.FA math.ST

    A note on variance bounds and location of eigenvalues

    Authors: R. Sharma, A. Sharma, R. Saini

    Abstract: We discuss some extensions and refinements of the variance bounds for both real and complex numbers. The related bounds for the eigenvalues and spread of a matrix are also derived here.

    Submitted 18 May, 2019; originally announced May 2019.

    MSC Class: 15A42; 26C10; 60E15

  39. arXiv:1903.03341  [pdf, ps, other

    cs.CV

    ICDAR 2019 Historical Document Reading Challenge on Large Structured Chinese Family Records

    Authors: Rajkumar Saini, Derek Dobson, Jon Morrey, Marcus Liwicki, Foteini Simistira Liwicki

    Abstract: We propose a Historical Document Reading Challenge on Large Chinese Structured Family Records, in short ICDAR2019 HDRC CHINESE. The objective of the proposed competition is to recognize and analyze the layout, and finally detect and recognize the textlines and characters of the large historical document collection containing more than 20 000 pages kindly provided by FamilySearch.

    Submitted 10 May, 2019; v1 submitted 8 March, 2019; originally announced March 2019.

  40. arXiv:1901.05177  [pdf, other

    cs.IT

    Utility Regions for DF Relay in OFDMA-based Secure Communication with Untrusted Users

    Authors: Ravikant Saini, Deepak Mishra, Swades De

    Abstract: This paper investigates the utility of a trusted decode-and-forward relay in OFDMA-based secure communication system with untrusted users. For deciding whether to use the relay or not, we first present optimal subcarrier allocation policies for direct communication (DC) and relayed communication (RC). Next we identify exclusive RC mode, exclusive DC mode, and mixed (RDC) mode subcarriers which can… ▽ More

    Submitted 16 January, 2019; originally announced January 2019.

  41. arXiv:1901.03637  [pdf, ps, other

    cs.IT

    Subcarrier Pairing as Channel Gain Tailoring: Joint Resource Allocation for Relay-Assisted Secure OFDMA with Untrusted Users

    Authors: Ravikant Saini, Deepak Mishra, Swades De

    Abstract: Joint resource allocation involving optimization of subcarrier allocation, subcarrier pairing (SCP), and power allocation in a cooperative secure orthogonal frequency division multiple access (OFDMA) communication system with untrusted users is considered. Both amplify and forward (AF), and decode and forward (DF) modes of operations are considered with individual power budget constraints for sour… ▽ More

    Submitted 11 January, 2019; originally announced January 2019.

  42. arXiv:1901.03614  [pdf, other

    cs.IT

    Jammer-Assisted Resource Allocation in Secure OFDMA With Untrusted Users

    Authors: Ravikant Saini, Abhishek **dal, Swades De

    Abstract: In this paper, we consider the problem of resource allocation in the orthogonal frequency division multiple access system with single source and M untrusted users in presence of a friendly jammer. The jammer is used to improve either the weighted sum secure rate or the overall system fairness. The formulated optimization problem in both the cases is a mixed integer non-linear programming problem,… ▽ More

    Submitted 11 January, 2019; originally announced January 2019.

  43. arXiv:1901.03585  [pdf, ps, other

    cs.IT

    OFDMA-based DF Secure Cooperative Communication with Untrusted Users

    Authors: Ravikant Saini, Deepak Mishra, Swades De

    Abstract: In this letter we consider resource allocation for OFDMA-based secure cooperative communication by employing a trusted Decode and Forward (DF) relay among the untrusted users. We formulate two optimization problems, namely, (i) sum rate maximization subject to individual power constraints on source and relay, and (ii) sum power minimization subject to a fairness constraint in terms of per-user min… ▽ More

    Submitted 11 January, 2019; originally announced January 2019.

  44. arXiv:1712.01661  [pdf, other

    cs.CV

    Recognizing Gender from Human Facial Regions using Genetic Algorithm

    Authors: Avirup Bhattacharyya, Rajkumar Saini, Partha Pratim Roy, Debi Prosad Dogra, Samarjit Kar

    Abstract: Recently, recognition of gender from facial images has gained a lot of importance. There exist a handful of research work that focus on feature extraction to obtain gender specific information from facial images. However, analyzing different facial regions and their fusion help in deciding the gender of a person from facial images. In this paper, we propose a new approach to identify gender from f… ▽ More

    Submitted 5 December, 2017; originally announced December 2017.

    Comments: Preprint Submitted

  45. arXiv:1706.00496  [pdf

    physics.med-ph

    Wall Shear Stress Analysis in Stenosed Carotid Arteries with Different Shapes of Plaque

    Authors: Ruchika Bhatia, Sharda Vashisth, Renu Saini

    Abstract: Atherosclerosis is a disease caused due to formation of plaque into the artery. Increase in plaque affects the wall shear stress. The present study is performed to calculate wall shear stress in different geometries of stenosed carotid artery. A 2D model of different geometries is generated using CFD for Non- Newtonian model. After this WSS of different geometries of stenosed arteries is calculate… ▽ More

    Submitted 31 May, 2017; originally announced June 2017.

    Journal ref: International Journal of Computer Applications, Volume 145, No.4, July 2016

  46. Classification of Pressure Gradient of Human Common Carotid Artery and Ascending Aorta on the Basis of Age and Gender

    Authors: Renu Saini, Sharda Vashisth, Ruchika Bhatia

    Abstract: The current work is done to see which artery has more chance of having cardiovascular diseases by measuring value of pressure gradient in the common carotid artery (CCA) and ascending aorta according to age and gender. Pressure gradient is determined in the CCA and ascending aorta of presumed healthy volunteers, having age between 10 and 60 years. A real 2D model of both aorta and common carotid a… ▽ More

    Submitted 31 May, 2017; originally announced June 2017.

    Journal ref: International Journal of computer Applications, Volume 145, No.1, July 2016

  47. arXiv:1702.04665  [pdf, ps, other

    math.ST

    Means Moments and Newton's Inequalities

    Authors: R. Sharma, A. Sharma, R. Saini, G. Kapoor

    Abstract: It is shown that Newton's inequalities and the related Maclaurin's inequalities provide several refinements of the fundamental Arithmetic mean - Geometric mean - Harmonic mean inequality in terms of the means and variance of positive real numbers. We also obtain some inequalities involving third and fourth central moments of real numbers.

    Submitted 15 February, 2017; originally announced February 2017.

  48. arXiv:1503.03786  [pdf, ps, other

    math.ST

    Complementary upper bounds for fourth central moment with extensions and applications

    Authors: R. Sharma, R. Kumar, R. Saini, G. Kapoor

    Abstract: We prove some inequalities involving fourth central moment of a random variable that takes values in a given finite interval. Both discrete and continuous cases are considered. Bounds for the spread are obtained when a given nxn complex matrix has real eigenvalues. Likewise, we discuss bounds for the spans of polynomial equations.

    Submitted 12 March, 2015; originally announced March 2015.

    Comments: 17 pages

    MSC Class: 60E15; 15A42; 12D10

  49. arXiv:1409.0096  [pdf, ps, other

    math.FA

    Note on Bounds for Eigenvalues using Traces

    Authors: R. Sharma, R. Kumar, R. Saini

    Abstract: We show that various old and new bounds involving eigenvalues of a complex n x n matrix are immediate consequences of the inequalities involving variance of real and complex numbers.

    Submitted 30 August, 2014; originally announced September 2014.

    Comments: 13 pages

    MSC Class: 15A18; 15A45; 65F35

  50. arXiv:1310.1549  [pdf, ps, other

    math.ST

    On Lower bounds for variance and moments of unimodal distributions

    Authors: R. Sharma, R. Bhandari, R. Saini

    Abstract: We provide an elementary proof of the lower bound for the variance of continuous unimodal distributions and obtain analogous bounds for the higher order central moments. A lower bound for the rth central moment of discrete distribution is given and compared favorably with a related bound for discrete unimodal distribution in literature.

    Submitted 6 October, 2013; originally announced October 2013.

    Comments: 13 pages

    MSC Class: 60E15

    Journal ref: Bulletin of Calcutta Statistical Association, vol 67, Nos 265-266, pp1-14, (2015)