-
SyntStereo2Real: Edge-Aware GAN for Remote Sensing Image-to-Image Translation while Maintaining Stereo Constraint
Authors:
Vasudha Venkatesan,
Daniel Panangian,
Mario Fuentes Reyes,
Ksenia Bittner
Abstract:
In the field of remote sensing, the scarcity of stereo-matched and particularly lack of accurate ground truth data often hinders the training of deep neural networks. The use of synthetically generated images as an alternative, alleviates this problem but suffers from the problem of domain generalization. Unifying the capabilities of image-to-image translation and stereo-matching presents an effec…
▽ More
In the field of remote sensing, the scarcity of stereo-matched and particularly lack of accurate ground truth data often hinders the training of deep neural networks. The use of synthetically generated images as an alternative, alleviates this problem but suffers from the problem of domain generalization. Unifying the capabilities of image-to-image translation and stereo-matching presents an effective solution to address the issue of domain generalization. Current methods involve combining two networks, an unpaired image-to-image translation network and a stereo-matching network, while jointly optimizing them. We propose an edge-aware GAN-based network that effectively tackles both tasks simultaneously. We obtain edge maps of input images from the Sobel operator and use it as an additional input to the encoder in the generator to enforce geometric consistency during translation. We additionally include a war** loss calculated from the translated images to maintain the stereo consistency. We demonstrate that our model produces qualitatively and quantitatively superior results than existing models, and its applicability extends to diverse domains, including autonomous driving.
△ Less
Submitted 14 April, 2024;
originally announced April 2024.
-
FARSI: Facebook AR System Investigator for Agile Domain-Specific System-on-Chip Exploration
Authors:
Behzad Boroujerdian,
Ying **g,
Amit Kumar,
Lavanya Subramanian,
Luke Yen,
Vincent Lee,
Vivek Venkatesan,
Amit **dal,
Robert Shearer,
Vijay Janapa Reddi
Abstract:
Domain-specific SoCs (DSSoCs) are attractive solutions for domains with stringent power/performance/area constraints; however, they suffer from two fundamental complexities. On the one hand, their many specialized hardware blocks result in complex systems and thus high development effort. On the other, their many system knobs expand the complexity of design space, making the search for the optimal…
▽ More
Domain-specific SoCs (DSSoCs) are attractive solutions for domains with stringent power/performance/area constraints; however, they suffer from two fundamental complexities. On the one hand, their many specialized hardware blocks result in complex systems and thus high development effort. On the other, their many system knobs expand the complexity of design space, making the search for the optimal design difficult. Thus to reach prevalence, taming such complexities is necessary. This work identifies necessary features of an early-stage design space exploration (DSE) framework that targets the complex design space of DSSoCs and further provides an instance of one called FARSI, (F)acebook (AR) (S)ystem (I)nvestigator. Concretely, FARSI provides an agile system-level simulator with speed up and accuracy of 8,400X and 98.5% comparing to Synopsys Platform Architect. FARSI also provides an efficient exploration heuristic and achieves up to 16X improvementin convergence time comparing to naive simulated annealing (SA). This is done by augmenting SA with architectural reasoning such as locality exploitation and bottleneck relaxation. Furthermore, we embed various co-design capabilities and show that on average, they have a 32% impact on the convergence rate. Finally, we demonstrate that using simple development-cost-aware policies can lower the system complexity, both in terms of the component count and variation by as much as 150% and 118% (e,g., for Network-on-a-Chip subsystem)
△ Less
Submitted 17 January, 2022; v1 submitted 13 January, 2022;
originally announced January 2022.
-
Network Compression for Machine-Learnt Fluid Simulations
Authors:
Peetak Mitra,
Vaidehi Venkatesan,
Nomit Jangid,
Ashwati Nambiar,
Dhananjay Kumar,
Vignesh Roa,
Niccolo Dal Santo,
Majid Haghshenas,
Shounak Mitra,
David Schmidt
Abstract:
Multi-scale, multi-fidelity numerical simulations form the pillar of scientific applications related to numerically modeling fluids. However, simulating the fluid behavior characterized by the non-linear Navier Stokes equations are often times computational expensive. Physics informed machine learning methods is a viable alternative and as such has seen great interest in the community [refer to Ku…
▽ More
Multi-scale, multi-fidelity numerical simulations form the pillar of scientific applications related to numerically modeling fluids. However, simulating the fluid behavior characterized by the non-linear Navier Stokes equations are often times computational expensive. Physics informed machine learning methods is a viable alternative and as such has seen great interest in the community [refer to Kutz (2017); Brunton et al. (2020); Duraisamy et al. (2019) for a detailed review on this topic]. For full physics emulators, the cost of network inference is often trivial. However, in the current paradigm of data-driven fluid mechanics models are built as surrogates for complex sub-processes. These models are then used in conjunction to the Navier Stokes solvers, which makes ML model inference an important factor in the terms of algorithmic latency. With the ever growing size of networks, and often times overparameterization, exploring effective network compression techniques becomes not only relevant but critical for engineering systems design. In this study, we explore the applicability of pruning and quantization (FP32 to int8) methods for one such application relevant to modeling fluid turbulence. Post-compression, we demonstrate the improvement in the accuracy of network predictions and build intuition in the process by comparing the compressed to the original network state.
△ Less
Submitted 28 February, 2021;
originally announced March 2021.
-
Visitor Pattern: Implementation of Enquiry Pattern for Internet Banking
Authors:
A. Meiappane,
V. Prasanna Venkatesan,
J. Prabavadhi
Abstract:
This paper brings out the design patterns according to the various services involved in internet banking. The Pattern oriented Software Architecture uses the pattern which eliminates the difficulty of reusability in a particular context. The patterns are to be designed using BPM (Business Process Model) for effective cross cutting on process level. For implementing the above said BPM, the Internet…
▽ More
This paper brings out the design patterns according to the various services involved in internet banking. The Pattern oriented Software Architecture uses the pattern which eliminates the difficulty of reusability in a particular context. The patterns are to be designed using BPM (Business Process Model) for effective cross cutting on process level. For implementing the above said BPM, the Internet banking has been taken to implement the pattern into it. The Analysis and identification of various processes in Internet Banking have been done, to identify the effective cross cutting features. With this process the pattern has been designed, as a reusability component to be used by the Software Architect. The pattern help us to resolve recurring problems constructively and based on proven solutions and also support us in understanding the architecture of a given software system. Once the model is finalized by analyzing we found enquiry pattern as the visitor pattern and implement the pattern.
△ Less
Submitted 9 December, 2013;
originally announced December 2013.
-
Strategy pattern: payment pattern for Internet banking
Authors:
A. Meiappane,
J. Prabavadhi,
V. Prasanna Venkatesan
Abstract:
This paper brings out the design patterns according to the various services involved in internet banking. The Pattern oriented Software Architecture uses the pattern which eliminates the difficulty of reusability in a particular context. The patterns are to be designed using BPM (Business Process Model) for effective cross cutting on process level. For implementing the above said BPM, the Internet…
▽ More
This paper brings out the design patterns according to the various services involved in internet banking. The Pattern oriented Software Architecture uses the pattern which eliminates the difficulty of reusability in a particular context. The patterns are to be designed using BPM (Business Process Model) for effective cross cutting on process level. For implementing the above said BPM, the Internet banking has been taken to implement the pattern into it. The Analysis and identification of various processes in Internet Banking have been done, to identify the effective cross cutting features. With this process the pattern has been designed, as a reusability component to be used by the Software Architect. The pattern help us to resolve recurring problems constructively and based on proven solutions and also support us in understanding the architecture of a given software system. Once the model is finalized by analyzing, we found payment in the process of internet banking has a strategy pattern.
△ Less
Submitted 9 December, 2013;
originally announced December 2013.
-
Pattern Based Adaptive Architecture for Internet Banking
Authors:
A. Meiappane,
V. Prasanna Venkatesan,
V. Jegatheeswari,
B. Kalpana,
U. Sarumathy
Abstract:
Pattern plays a vital role in software architecture and it is a general reusable solution to commonly occurring problem. Software architecture of a system is the set of structures needed to reason about the system, which comprise software elements, relations among them, and properties of both. Patterns can be implemented at run-time; they identify key resource constraints and best practices. Archi…
▽ More
Pattern plays a vital role in software architecture and it is a general reusable solution to commonly occurring problem. Software architecture of a system is the set of structures needed to reason about the system, which comprise software elements, relations among them, and properties of both. Patterns can be implemented at run-time; they identify key resource constraints and best practices. Architecture Pattern expresses a fundamental structural organization or schema for software systems. Patterns in software architecture, offer the promise of hel** the architect to identify combinations of Architecture or Solution Building Blocks that have been proven to deliver effective solutions. In Internet banking, we analyzed some attributes such as reliability, security, availability, load balancing and so on. The use of patterns, which is of a reusable component, is a good tool to help designers build load balancing systems. In this paper we are going to propose pattern based adaptive architecture for internet banking system and so the above attributes can be improved by the usage of patterns.
△ Less
Submitted 9 December, 2013;
originally announced December 2013.
-
Architectural Pattern of Health Care System Using GSM Networks
Authors:
Meiappane. A,
Dr. V. Prasanna Venkatesan,
Selva Murugan. S,
Arun. A,
Ramachandran. A
Abstract:
Large-scale networked environments, such as the Internet, possess the characteristics of centralised data, centralised access and centralised control; this gives the user a powerful mechanism for building and integrating large repositories of centralised information from diverse resources set. However, a centralised network system with GSM Networks development for a hospital information systems or…
▽ More
Large-scale networked environments, such as the Internet, possess the characteristics of centralised data, centralised access and centralised control; this gives the user a powerful mechanism for building and integrating large repositories of centralised information from diverse resources set. However, a centralised network system with GSM Networks development for a hospital information systems or a health care information portal is still in its infancy. The shortcomings of the currently available tools have made the use of mobile devices more appealing. In mobile computing, the issues such as low bandwidth, high latency wireless Networks, loss or degradation of wireless connections, and network errors or failures need to be dealt with. Other issues to be addressed include system adaptability, reliability, robustness, extensibility, flexibility, and maintainability. GSM approach has emerged as the most viable approach for development of intelligent software applications for wireless mobile devices in a centralized environment, which gives higher band width of 900 MHz for transmission. The e-healthcare system that we have developed provides support for physicians, nurses, pharmacists and other healthcare professionals, as well as for patients and medical devices used to monitor patients. In this paper, we present the architecture and the demonstration prototype.
△ Less
Submitted 9 December, 2013;
originally announced December 2013.
-
A Comprehensive Model to achieve Service Reusability for Multi level stakeholders using Non-Functional attributes of Service Oriented Architecture
Authors:
Shanmugasundaram G.,
V. Prasanna Venkatesan,
C. Punitha Devi
Abstract:
SOA is a prominent paradigm for accomplishing reuse of services. Service reusability is one dominant factor which has a greater influence on achieving quality in SOA systems. There exists sufficient research in this area and researchers have contributed many works towards achieving quality in SOA systems but much emphasis was not provided on service reusability [1] [2] [3]. Few authors have addres…
▽ More
SOA is a prominent paradigm for accomplishing reuse of services. Service reusability is one dominant factor which has a greater influence on achieving quality in SOA systems. There exists sufficient research in this area and researchers have contributed many works towards achieving quality in SOA systems but much emphasis was not provided on service reusability [1] [2] [3]. Few authors have addressed reusability factor with limited non-functional attributes. Our study focuses on identifying the non-functional attributes which have major or greater influence towards obtaining reusability in SOA systems. The objective of this study goes into the next level, to categorize the non-functional attributes on multi stakeholder's perspective i.e. Service Consumer, Service Provider and Service Developer which paves the way to build a comprehensive quality model for achieving Service Reusability
△ Less
Submitted 5 July, 2012;
originally announced July 2012.
-
Steganalysis Using Color Model Conversion
Authors:
P. Thiyagarajan,
G. Aghila,
V. Prasanna Venkatesan
Abstract:
The major threat in cyber crime for digital forensic examiner is to identify, analyze and interpret the concealed information inside digital medium such as image, audio and video. There are strong indications that hiding information inside digital medium has been used for planning criminal activities. In this way, it is important to develop a steganalysis technique which detects the existence of h…
▽ More
The major threat in cyber crime for digital forensic examiner is to identify, analyze and interpret the concealed information inside digital medium such as image, audio and video. There are strong indications that hiding information inside digital medium has been used for planning criminal activities. In this way, it is important to develop a steganalysis technique which detects the existence of hidden messages inside digital medium. This paper focuses on universal image steganalysis method which uses RGB to HSI colour model conversion. Any Universal Steganalysis algorithm developed should be tested with various stego-images to prove its efficiency. The developed Universal Steganalysis algorithm is tested in stego-image database which is obtained by implementing various RGB Least Significant Bit Steganographic algorithms. Though there are many stego-image sources available on the internet it lacks in the information such as how many rows has been infected by the steganography algorithms, how many bits have been modified and which channel has been affected. These parameters are important for Steganalysis algorithms and it helps to rate its efficiency. Proposed Steganalysis using Colour Model has been tested with our Image Database and the results were affirmative.
△ Less
Submitted 12 June, 2012;
originally announced June 2012.
-
Stego-Image Generator (SIG) - Building Steganography Image Database
Authors:
P. Thiyagarajan,
G. Aghila,
V. Prasanna Venkatesan
Abstract:
Any Universal Steganalysis algorithm developed should be tested with various stego-images to prove its efficiency. This work is aimed to build the stego-image database which is obtained by implementing various RGB Least Significant Bit Steganographic algorithms. Though there are many stego-images sources available on the internet it lacks in the information such as how many rows has been infected…
▽ More
Any Universal Steganalysis algorithm developed should be tested with various stego-images to prove its efficiency. This work is aimed to build the stego-image database which is obtained by implementing various RGB Least Significant Bit Steganographic algorithms. Though there are many stego-images sources available on the internet it lacks in the information such as how many rows has been infected by the steganography algorithms, how many bits have been modified and which channel has been affected. These parameters are important for Steganalysis algorithms and it helps to rate its efficiency. Images are chosen from board categories such as animals, nature, person to produce variety of Stego-Image.
△ Less
Submitted 12 June, 2012;
originally announced June 2012.
-
Dynamic Pattern Based Image Steganography
Authors:
P. Thiyagarajan,
G. Aghila,
V. Prasanna Venkatesan
Abstract:
Steganography is the art of hiding secret information in media such as image, audio and video. The purpose of steganography is to conceal the existence of the secret information in any given medium. This work aims at strengthening the security in steganography algorithm by generating dynamic pattern in selection of indicator sequence. In addition to this dynamicity is also encompassed in number of…
▽ More
Steganography is the art of hiding secret information in media such as image, audio and video. The purpose of steganography is to conceal the existence of the secret information in any given medium. This work aims at strengthening the security in steganography algorithm by generating dynamic pattern in selection of indicator sequence. In addition to this dynamicity is also encompassed in number of bits embedded in data channel. This technique has been implemented and the results have been compared and evaluated with existing similar techniques.
△ Less
Submitted 12 June, 2012;
originally announced June 2012.
-
Pixastic: Steganography based Anti-Phihsing Browser Plug-in
Authors:
P. Thiyagarajan,
G. Aghila,
V. Prasanna Venkatesan
Abstract:
In spite of existence of many standard security mechanisms for ensuring secure e-Commerce business, users still fall prey for online attacks. One such simple but powerful attack is 'Phishing'. Phishing is the most alarming threat in the e-Commerce world and effective anti-phishing technique is the need of the hour. This paper focuses on a novel anti-phishing browser plug-in which uses information…
▽ More
In spite of existence of many standard security mechanisms for ensuring secure e-Commerce business, users still fall prey for online attacks. One such simple but powerful attack is 'Phishing'. Phishing is the most alarming threat in the e-Commerce world and effective anti-phishing technique is the need of the hour. This paper focuses on a novel anti-phishing browser plug-in which uses information hiding technique - Steganography. A Robust Message based Image Steganography (RMIS) algorithm has been proposed. The same has been incorporated in the form of a browser plug-in (safari) called Pixastic. Pixastic is tested in an online banking scenario and it is compared with other well-known anti-phishing plug-in methods in practice. Various parameters such as robustness, usability and its behavior on various attacks have been analysed. From experimental results, it is evident that our method Pixastic performs well compared to other anti-phishing plug-ins.
△ Less
Submitted 12 June, 2012;
originally announced June 2012.
-
A Framework for Business Intelligence Application using Ontological Classification
Authors:
A. Martin,
D. Maladhy,
V. Prasanna Venkatesan
Abstract:
Every business needs knowledge about their competitors to survive better. One of the information repositories is web. Retrieving Specific information from the web is challenging. An Ontological model is developed to capture specific information by using web semantics. From the Ontology model, the relations between the data are mined using decision tree. From all these a new framework is developed…
▽ More
Every business needs knowledge about their competitors to survive better. One of the information repositories is web. Retrieving Specific information from the web is challenging. An Ontological model is developed to capture specific information by using web semantics. From the Ontology model, the relations between the data are mined using decision tree. From all these a new framework is developed for Business Intelligence.
△ Less
Submitted 6 September, 2011;
originally announced September 2011.
-
A Business Intelligence Model to Predict Bankruptcy using Financial Domain Ontology with Association Rule Mining Algorithm
Authors:
A. Martin,
M. Manjula,
Dr. V. Prasanna Venkatesan
Abstract:
Today in every organization financial analysis provides the basis for understanding and evaluating the results of business operations and delivering how well a business is doing. This means that the organizations can control the operational activities primarily related to corporate finance. One way that doing this is by analysis of bankruptcy prediction. This paper develops an ontological model fr…
▽ More
Today in every organization financial analysis provides the basis for understanding and evaluating the results of business operations and delivering how well a business is doing. This means that the organizations can control the operational activities primarily related to corporate finance. One way that doing this is by analysis of bankruptcy prediction. This paper develops an ontological model from financial information of an organization by analyzing the Semantics of the financial statement of a business. One of the best bankruptcy prediction models is Altman Z-score model. Altman Z-score method uses financial rations to predict bankruptcy. From the financial ontological model the relation between financial data is discovered by using data mining algorithm. By combining financial domain ontological model with association rule mining algorithm and Zscore model a new business intelligence model is developed to predict the bankruptcy.
△ Less
Submitted 6 September, 2011;
originally announced September 2011.
-
A Framework for Predicting Phishing Websites using Neural Networks
Authors:
A. Martin,
Na. Ba. Anutthamaa,
M. Sathyavathy,
Marie Manjari Saint Francois,
Dr. V. Prasanna Venkatesan
Abstract:
In India many people are now dependent on online banking. This raises security concerns as the banking websites are forged and fraud can be committed by identity theft. These forged websites are called as Phishing websites and created by malicious people to mimic web pages of real websites and it attempts to defraud people of their personal information. Detecting and identifying phishing websites…
▽ More
In India many people are now dependent on online banking. This raises security concerns as the banking websites are forged and fraud can be committed by identity theft. These forged websites are called as Phishing websites and created by malicious people to mimic web pages of real websites and it attempts to defraud people of their personal information. Detecting and identifying phishing websites is a really complex and dynamic problem involving many factors and criteria. This paper discusses about the prediction of phishing websites using neural networks. A neural network is a multilayer system which reduces the error and increases the performance. This paper describes a framework to better classify and predict the phishing sites using neural networks.
△ Less
Submitted 6 September, 2011;
originally announced September 2011.
-
The Poisson Channel at Low Input Powers
Authors:
Amos Lapidoth,
Jeffrey H. Shapiro,
Vinodh Venkatesan,
Ligong Wang
Abstract:
The asymptotic capacity at low input powers of an average-power limited or an average- and peak-power limited discrete-time Poisson channel is considered. For a Poisson channel whose dark current is zero or decays to zero linearly with its average input power $E$, capacity scales like $E\log\frac{1}{E}$ for small $E$. For a Poisson channel whose dark current is a nonzero constant, capacity scale…
▽ More
The asymptotic capacity at low input powers of an average-power limited or an average- and peak-power limited discrete-time Poisson channel is considered. For a Poisson channel whose dark current is zero or decays to zero linearly with its average input power $E$, capacity scales like $E\log\frac{1}{E}$ for small $E$. For a Poisson channel whose dark current is a nonzero constant, capacity scales, to within a constant, like $E\log\log\frac{1}{E}$ for small $E$.
△ Less
Submitted 20 October, 2008;
originally announced October 2008.