Skip to main content

Showing 1–16 of 16 results for author: Venkatesan, V

.
  1. arXiv:2404.09277  [pdf, other

    cs.CV

    SyntStereo2Real: Edge-Aware GAN for Remote Sensing Image-to-Image Translation while Maintaining Stereo Constraint

    Authors: Vasudha Venkatesan, Daniel Panangian, Mario Fuentes Reyes, Ksenia Bittner

    Abstract: In the field of remote sensing, the scarcity of stereo-matched and particularly lack of accurate ground truth data often hinders the training of deep neural networks. The use of synthetically generated images as an alternative, alleviates this problem but suffers from the problem of domain generalization. Unifying the capabilities of image-to-image translation and stereo-matching presents an effec… ▽ More

    Submitted 14 April, 2024; originally announced April 2024.

    Comments: Accepted to IEEE Conference on Computer Vision and Pattern Recognition Workshop (CVPRW) EarthVision

  2. arXiv:2201.05232  [pdf, other

    cs.AR

    FARSI: Facebook AR System Investigator for Agile Domain-Specific System-on-Chip Exploration

    Authors: Behzad Boroujerdian, Ying **g, Amit Kumar, Lavanya Subramanian, Luke Yen, Vincent Lee, Vivek Venkatesan, Amit **dal, Robert Shearer, Vijay Janapa Reddi

    Abstract: Domain-specific SoCs (DSSoCs) are attractive solutions for domains with stringent power/performance/area constraints; however, they suffer from two fundamental complexities. On the one hand, their many specialized hardware blocks result in complex systems and thus high development effort. On the other, their many system knobs expand the complexity of design space, making the search for the optimal… ▽ More

    Submitted 17 January, 2022; v1 submitted 13 January, 2022; originally announced January 2022.

  3. arXiv:2103.00754  [pdf, other

    physics.comp-ph

    Network Compression for Machine-Learnt Fluid Simulations

    Authors: Peetak Mitra, Vaidehi Venkatesan, Nomit Jangid, Ashwati Nambiar, Dhananjay Kumar, Vignesh Roa, Niccolo Dal Santo, Majid Haghshenas, Shounak Mitra, David Schmidt

    Abstract: Multi-scale, multi-fidelity numerical simulations form the pillar of scientific applications related to numerically modeling fluids. However, simulating the fluid behavior characterized by the non-linear Navier Stokes equations are often times computational expensive. Physics informed machine learning methods is a viable alternative and as such has seen great interest in the community [refer to Ku… ▽ More

    Submitted 28 February, 2021; originally announced March 2021.

  4. arXiv:1312.2341  [pdf

    cs.SE

    Visitor Pattern: Implementation of Enquiry Pattern for Internet Banking

    Authors: A. Meiappane, V. Prasanna Venkatesan, J. Prabavadhi

    Abstract: This paper brings out the design patterns according to the various services involved in internet banking. The Pattern oriented Software Architecture uses the pattern which eliminates the difficulty of reusability in a particular context. The patterns are to be designed using BPM (Business Process Model) for effective cross cutting on process level. For implementing the above said BPM, the Internet… ▽ More

    Submitted 9 December, 2013; originally announced December 2013.

    Comments: 8 pages

  5. arXiv:1312.2327  [pdf

    cs.SE

    Strategy pattern: payment pattern for Internet banking

    Authors: A. Meiappane, J. Prabavadhi, V. Prasanna Venkatesan

    Abstract: This paper brings out the design patterns according to the various services involved in internet banking. The Pattern oriented Software Architecture uses the pattern which eliminates the difficulty of reusability in a particular context. The patterns are to be designed using BPM (Business Process Model) for effective cross cutting on process level. For implementing the above said BPM, the Internet… ▽ More

    Submitted 9 December, 2013; originally announced December 2013.

    Comments: 6 pages

  6. arXiv:1312.2325  [pdf

    cs.SE

    Pattern Based Adaptive Architecture for Internet Banking

    Authors: A. Meiappane, V. Prasanna Venkatesan, V. Jegatheeswari, B. Kalpana, U. Sarumathy

    Abstract: Pattern plays a vital role in software architecture and it is a general reusable solution to commonly occurring problem. Software architecture of a system is the set of structures needed to reason about the system, which comprise software elements, relations among them, and properties of both. Patterns can be implemented at run-time; they identify key resource constraints and best practices. Archi… ▽ More

    Submitted 9 December, 2013; originally announced December 2013.

  7. arXiv:1312.2323  [pdf

    cs.SE cs.CY

    Architectural Pattern of Health Care System Using GSM Networks

    Authors: Meiappane. A, Dr. V. Prasanna Venkatesan, Selva Murugan. S, Arun. A, Ramachandran. A

    Abstract: Large-scale networked environments, such as the Internet, possess the characteristics of centralised data, centralised access and centralised control; this gives the user a powerful mechanism for building and integrating large repositories of centralised information from diverse resources set. However, a centralised network system with GSM Networks development for a hospital information systems or… ▽ More

    Submitted 9 December, 2013; originally announced December 2013.

    Comments: 7 pages

    Journal ref: (IJCTE), ISSN: 1793-8201. vol. 3, no. 1, pp. 64-70, February 2011

  8. arXiv:1207.1173  [pdf

    cs.SE

    A Comprehensive Model to achieve Service Reusability for Multi level stakeholders using Non-Functional attributes of Service Oriented Architecture

    Authors: Shanmugasundaram G., V. Prasanna Venkatesan, C. Punitha Devi

    Abstract: SOA is a prominent paradigm for accomplishing reuse of services. Service reusability is one dominant factor which has a greater influence on achieving quality in SOA systems. There exists sufficient research in this area and researchers have contributed many works towards achieving quality in SOA systems but much emphasis was not provided on service reusability [1] [2] [3]. Few authors have addres… ▽ More

    Submitted 5 July, 2012; originally announced July 2012.

  9. arXiv:1206.2914  [pdf

    cs.CR

    Steganalysis Using Color Model Conversion

    Authors: P. Thiyagarajan, G. Aghila, V. Prasanna Venkatesan

    Abstract: The major threat in cyber crime for digital forensic examiner is to identify, analyze and interpret the concealed information inside digital medium such as image, audio and video. There are strong indications that hiding information inside digital medium has been used for planning criminal activities. In this way, it is important to develop a steganalysis technique which detects the existence of h… ▽ More

    Submitted 12 June, 2012; originally announced June 2012.

    Comments: arXiv admin note: substantial text overlap with arXiv:1206.2586

    Journal ref: Thiyagarajan P, Aghila G, Prasanna Venkatesan V, "Steganalysis using Color Model Conversion", Signal and Image Processing: An International Journal (SIPIJ) ISSN 0976-710x Volume 2, No 4 December 2011

  10. arXiv:1206.2586  [pdf

    cs.CR

    Stego-Image Generator (SIG) - Building Steganography Image Database

    Authors: P. Thiyagarajan, G. Aghila, V. Prasanna Venkatesan

    Abstract: Any Universal Steganalysis algorithm developed should be tested with various stego-images to prove its efficiency. This work is aimed to build the stego-image database which is obtained by implementing various RGB Least Significant Bit Steganographic algorithms. Though there are many stego-images sources available on the internet it lacks in the information such as how many rows has been infected… ▽ More

    Submitted 12 June, 2012; originally announced June 2012.

    Comments: First International Conference on Digital Image Processing and Pattern Recognition, Springer (LNCS) in Communications in Computer and Information Science (CCIS) Series, ISSN: 1865:0929, September 2011

  11. arXiv:1206.2583  [pdf

    cs.CR

    Dynamic Pattern Based Image Steganography

    Authors: P. Thiyagarajan, G. Aghila, V. Prasanna Venkatesan

    Abstract: Steganography is the art of hiding secret information in media such as image, audio and video. The purpose of steganography is to conceal the existence of the secret information in any given medium. This work aims at strengthening the security in steganography algorithm by generating dynamic pattern in selection of indicator sequence. In addition to this dynamicity is also encompassed in number of… ▽ More

    Submitted 12 June, 2012; originally announced June 2012.

    Comments: Journal of Computing ISSN 2151-9617, Volume 3, Issue 2 February 2011

  12. arXiv:1206.2445  [pdf

    cs.CR

    Pixastic: Steganography based Anti-Phihsing Browser Plug-in

    Authors: P. Thiyagarajan, G. Aghila, V. Prasanna Venkatesan

    Abstract: In spite of existence of many standard security mechanisms for ensuring secure e-Commerce business, users still fall prey for online attacks. One such simple but powerful attack is 'Phishing'. Phishing is the most alarming threat in the e-Commerce world and effective anti-phishing technique is the need of the hour. This paper focuses on a novel anti-phishing browser plug-in which uses information… ▽ More

    Submitted 12 June, 2012; originally announced June 2012.

    Comments: Thiyagarajan P, Aghila G, Prasanna Venkatesan V, "Pixastic: Steganography based Anti-Phishing Browser Plug-in", Journal of Internet Banking and Commerce, April 2012, Vol. 17, no. 1, ISSN: 1204-5357

  13. arXiv:1109.1088  [pdf

    cs.IR

    A Framework for Business Intelligence Application using Ontological Classification

    Authors: A. Martin, D. Maladhy, V. Prasanna Venkatesan

    Abstract: Every business needs knowledge about their competitors to survive better. One of the information repositories is web. Retrieving Specific information from the web is challenging. An Ontological model is developed to capture specific information by using web semantics. From the Ontology model, the relations between the data are mined using decision tree. From all these a new framework is developed… ▽ More

    Submitted 6 September, 2011; originally announced September 2011.

    Comments: Classification, Ontology, Business Intelligence, Datamining, Inverted Index, Ontology Tree Index

    Journal ref: International Journal of Engineering Science and Technology (IJEST) Vol. 3 No. 2, (2011) 1213-1221

  14. arXiv:1109.1087  [pdf

    cs.DB

    A Business Intelligence Model to Predict Bankruptcy using Financial Domain Ontology with Association Rule Mining Algorithm

    Authors: A. Martin, M. Manjula, Dr. V. Prasanna Venkatesan

    Abstract: Today in every organization financial analysis provides the basis for understanding and evaluating the results of business operations and delivering how well a business is doing. This means that the organizations can control the operational activities primarily related to corporate finance. One way that doing this is by analysis of bankruptcy prediction. This paper develops an ontological model fr… ▽ More

    Submitted 6 September, 2011; originally announced September 2011.

    Comments: Bankruptcy, Financial domain Ontology, Data Mining, Z-Score Model, Business Intelligence, Altman Bankruptcy model

    Journal ref: IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 3, No. 2, May 2011 ISSN (Online): 1694-0814

  15. arXiv:1109.1074  [pdf

    cs.NE

    A Framework for Predicting Phishing Websites using Neural Networks

    Authors: A. Martin, Na. Ba. Anutthamaa, M. Sathyavathy, Marie Manjari Saint Francois, Dr. V. Prasanna Venkatesan

    Abstract: In India many people are now dependent on online banking. This raises security concerns as the banking websites are forged and fraud can be committed by identity theft. These forged websites are called as Phishing websites and created by malicious people to mimic web pages of real websites and it attempts to defraud people of their personal information. Detecting and identifying phishing websites… ▽ More

    Submitted 6 September, 2011; originally announced September 2011.

    Comments: Phishing, Neural Networks, Classification,Learning, Phishing Detection

    Journal ref: IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 2, 2011, 330-336

  16. arXiv:0810.3564  [pdf, ps, other

    cs.IT

    The Poisson Channel at Low Input Powers

    Authors: Amos Lapidoth, Jeffrey H. Shapiro, Vinodh Venkatesan, Ligong Wang

    Abstract: The asymptotic capacity at low input powers of an average-power limited or an average- and peak-power limited discrete-time Poisson channel is considered. For a Poisson channel whose dark current is zero or decays to zero linearly with its average input power $E$, capacity scales like $E\log\frac{1}{E}$ for small $E$. For a Poisson channel whose dark current is a nonzero constant, capacity scale… ▽ More

    Submitted 20 October, 2008; originally announced October 2008.

    Comments: To be presented at IEEEI 2008, December 3-5 2008, Eilat, Israel