Skip to main content

Showing 1–49 of 49 results for author: Ao, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.05757  [pdf

    cs.CV cs.LG

    Vision Mamba: Cutting-Edge Classification of Alzheimer's Disease with 3D MRI Scans

    Authors: Muthukumar K A, Amit Gurung, Priya Ranjan

    Abstract: Classifying 3D MRI images for early detection of Alzheimer's disease is a critical task in medical imaging. Traditional approaches using Convolutional Neural Networks (CNNs) and Transformers face significant challenges in this domain. CNNs, while effective in capturing local spatial features, struggle with long-range dependencies and often require extensive computational resources for high-resolut… ▽ More

    Submitted 9 June, 2024; originally announced June 2024.

    Comments: 12 pages with 5 figures and 3 tables, to be submitted as a book chapter

  2. arXiv:2405.20972  [pdf, other

    cs.MA eess.SY

    Congestion-Aware Path Re-routing Strategy for Dense Urban Airspace

    Authors: Sajid Ahamed M A, Prathyush P Menon, Debasish Ghose

    Abstract: Existing UAS Traffic Management (UTM) frameworks designate preplanned flight paths to uncrewed aircraft systems (UAS), enabling the UAS to deliver payloads. However, with increasing delivery demand between the source-destination pairs in the urban airspace, UAS will likely experience considerable congestion on the nominal paths. We propose a rule-based congestion mitigation strategy that improves… ▽ More

    Submitted 31 May, 2024; originally announced May 2024.

  3. arXiv:2404.19548  [pdf

    cs.ET cs.CR

    An Extensive Survey of Digital Image Steganography: State of the Art

    Authors: Idakwo M. A., Muazu M. B., Adedokun A. E., Sadiq B. O

    Abstract: The need to protect sensitive information privacy duringinformation exchange over the internet/intranet has led towider adoption of cryptography and steganography. The cryptography approaches convert the information into an unreadable format however draws the attention of cryptanalyst owing to the uncommon random nature flow of the bytes when viewing the flowing structured bytes on a computer. Whi… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

  4. arXiv:2404.14248  [pdf, other

    cs.CV

    NTIRE 2024 Challenge on Low Light Image Enhancement: Methods and Results

    Authors: Xiaoning Liu, Zongwei Wu, Ao Li, Florin-Alexandru Vasluianu, Yulun Zhang, Shuhang Gu, Le Zhang, Ce Zhu, Radu Timofte, Zhi **, Hongjun Wu, Chenxi Wang, Haitao Ling, Yuanhao Cai, Hao Bian, Yuxin Zheng, **g Lin, Alan Yuille, Ben Shao, ** Guo, Tianli Liu, Mohao Wu, Yixu Feng, Shuo Hou, Haotian Lin , et al. (87 additional authors not shown)

    Abstract: This paper reviews the NTIRE 2024 low light image enhancement challenge, highlighting the proposed solutions and results. The aim of this challenge is to discover an effective network design or solution capable of generating brighter, clearer, and visually appealing results when dealing with a variety of conditions, including ultra-high resolution (4K and beyond), non-uniform illumination, backlig… ▽ More

    Submitted 22 April, 2024; originally announced April 2024.

    Comments: NTIRE 2024 Challenge Report

  5. arXiv:2312.00086  [pdf, ps, other

    math.CO cs.DM

    Star colouring and locally constrained graph homomorphisms

    Authors: Shalu M. A., Cyriac Antony

    Abstract: Dvořák, Mohar and Šámal (J. Graph Theory, 2013) proved that for every 3-regular graph $G$, the line graph of $G$ is 4-star colourable if and only if $G$ admits a locally bijective homomorphism to the cube $Q_3$. We generalise this result as follows: for $p\geq 2$, a $K_{1,p+1}$-free $2p$-regular graph $G$ admits a $(p + 2)$-star colouring if and only if $G$ admits a locally bijective homomorphism… ▽ More

    Submitted 30 November, 2023; originally announced December 2023.

  6. arXiv:2309.11221  [pdf, ps, other

    math.CO cs.CC

    Hardness Transitions of Star Colouring and Restricted Star Colouring

    Authors: Shalu M. A., Cyriac Antony

    Abstract: We study how the complexity of the graph colouring problems star colouring and restricted star colouring vary with the maximum degree of the graph. Restricted star colouring (in short, rs colouring) is a variant of star colouring. For $k\in \mathbb{N}$, a $k$-colouring of a graph $G$ is a function $f\colon V(G)\to \mathbb{Z}_k$ such that $f(u)\neq f(v)$ for every edge $uv$ of $G$. A $k$-colouring… ▽ More

    Submitted 20 September, 2023; originally announced September 2023.

  7. arXiv:2309.09807  [pdf

    cs.CR cs.AI cs.LG

    Efficient Concept Drift Handling for Batch Android Malware Detection Models

    Authors: Molina-Coronado B., Mori U., Mendiburu A., Miguel-Alonso J

    Abstract: The rapidly evolving nature of Android apps poses a significant challenge to static batch machine learning algorithms employed in malware detection systems, as they quickly become obsolete. Despite this challenge, the existing literature pays limited attention to addressing this issue, with many advanced Android malware detection approaches, such as Drebin, DroidDet and MaMaDroid, relying on stati… ▽ More

    Submitted 18 September, 2023; originally announced September 2023.

    Comments: 18 pages

  8. arXiv:2307.13473  [pdf, other

    cs.SE cs.LG

    Exploring MLOps Dynamics: An Experimental Analysis in a Real-World Machine Learning Project

    Authors: Awadelrahman M. A. Ahmed

    Abstract: This article presents an experiment focused on optimizing the MLOps (Machine Learning Operations) process, a crucial aspect of efficiently implementing machine learning projects. The objective is to identify patterns and insights to enhance the MLOps workflow, considering its iterative and interdependent nature in real-world model development scenarios. The experiment involves a comprehensive ML… ▽ More

    Submitted 22 July, 2023; originally announced July 2023.

    Comments: 9 figures

  9. arXiv:2307.13470  [pdf, other

    cs.LG cs.GT

    Combinatorial Auctions and Graph Neural Networks for Local Energy Flexibility Markets

    Authors: Awadelrahman M. A. Ahmed, Frank Eliassen, Yan Zhang

    Abstract: This paper proposes a new combinatorial auction framework for local energy flexibility markets, which addresses the issue of prosumers' inability to bundle multiple flexibility time intervals. To solve the underlying NP-complete winner determination problems, we present a simple yet powerful heterogeneous tri-partite graph representation and design graph neural network-based models. Our models ach… ▽ More

    Submitted 25 July, 2023; originally announced July 2023.

    Comments: Accepted in The IEEE PES ISGT Europe 2023 (ISGT Europe 2023), Grenoble, France, on October, 2023

  10. arXiv:2307.12708  [pdf, other

    cs.HC

    Human-vehicle interaction for autonomous vehicles in crosswalk scenarios: Field experiments with pedestrians and passengers

    Authors: R. Izquierdo, S. Martín, J. Alonso, I. Parra, M. A., D. Fernández-Llorca

    Abstract: This paper presents the results of real-world testing of human-vehicle interactions with an autonomous vehicle equipped with internal and external Human Machine Interfaces (HMIs) in a crosswalk scenario. The internal and external HMIs were combined with implicit communication techniques using gentle and aggressive braking maneuvers in the crosswalk. Results have been collected in the form of quest… ▽ More

    Submitted 24 July, 2023; originally announced July 2023.

    Comments: 6 pages, 7 figures, 4 tables, conferecence paper

  11. arXiv:2304.00005  [pdf, ps, other

    cs.AI math.LO math.RA

    Rough Randomness and its Application

    Authors: Mani A

    Abstract: A number of generalizations of stochastic and information-theoretic randomness are known in the literature. However, they are not compatible with handling meaning in vague and dynamic contexts of rough reasoning (and therefore explainable artificial intelligence and machine learning). In this research, new concepts of rough randomness that are neither stochastic nor based on properties of strings… ▽ More

    Submitted 21 March, 2023; originally announced April 2023.

    Comments: 14 Pages. To Appear

    MSC Class: Primary 68T37; 68W30; 68W99; 06B99; Secondary 08A70; 03B060

  12. arXiv:2302.12074  [pdf, other

    cs.LG cs.AI stat.AP stat.CO

    Active learning for structural reliability analysis with multiple limit state functions through variance-enhanced PC-Kriging surrogate models

    Authors: J. Moran A., P. G. Morato, P. Rigo

    Abstract: Existing active strategies for training surrogate models yield accurate structural reliability estimates by aiming at design space regions in the vicinity of a specified limit state function. In many practical engineering applications, various damage conditions, e.g. repair, failure, should be probabilistically characterized, thus demanding the estimation of multiple performance functions. In this… ▽ More

    Submitted 23 February, 2023; originally announced February 2023.

  13. arXiv:2208.06623  [pdf, ps, other

    cs.AI cs.DM cs.LO math.LO math.RA

    Granular Directed Rough Sets, Concept Organization and Soft Clustering

    Authors: Mani A

    Abstract: Up-directed rough sets are introduced and studied by the present author in earlier papers. This is extended by her in two different granular directions in this research, with a surprising algebraic semantics. The granules are based on ideas of generalized closure under up-directedness that may be read as a form of weak consequence. This yields approximation operators that satisfy cautious monotony… ▽ More

    Submitted 13 August, 2022; originally announced August 2022.

    Comments: 32 pages

    MSC Class: 03G25; 03B52; 03B42; 68T37

  14. arXiv:2207.13333  [pdf, other

    eess.AS cs.SD

    Knowledge-driven Subword Grammar Modeling for Automatic Speech Recognition in Tamil and Kannada

    Authors: Madhavaraj A, Bharathi Pilar, Ramakrishnan A G

    Abstract: In this paper, we present specially designed automatic speech recognition (ASR) systems for the highly agglutinative and inflective languages of Tamil and Kannada that can recognize unlimited vocabulary of words. We use subwords as the basic lexical units for recognition and construct subword grammar weighted finite state transducer (SG-WFST) graphs for word segmentation that captures most of the… ▽ More

    Submitted 27 July, 2022; originally announced July 2022.

  15. arXiv:2207.13331  [pdf, other

    eess.AS cs.SD

    Subword Dictionary Learning and Segmentation Techniques for Automatic Speech Recognition in Tamil and Kannada

    Authors: Madhavaraj A, Bharathi Pilar, Ramakrishnan A G

    Abstract: We present automatic speech recognition (ASR) systems for Tamil and Kannada based on subword modeling to effectively handle unlimited vocabulary due to the highly agglutinative nature of the languages. We explore byte pair encoding (BPE), and proposed a variant of this algorithm named extended-BPE, and Morfessor tool to segment each word as subwords. We have effectively incorporated maximum likeli… ▽ More

    Submitted 27 July, 2022; originally announced July 2022.

  16. arXiv:2206.06117  [pdf

    cs.SD eess.AS

    Optimizing musical chord inversions using the cartesian coordinate system

    Authors: Steve Mathew D A

    Abstract: In classical music and in any genre of contemporary music, the tonal elements or notes used for playing are the same. The numerous possibilities of chords for a given instance in a piece make the playing, in general, very intricate, and advanced. The theory sounds quite trivial, yet the application has vast options, each leading to inarguably different outcomes, characterized by scientific and mus… ▽ More

    Submitted 10 June, 2022; originally announced June 2022.

    Comments: 9 pages, 5 tables

  17. arXiv:2205.07575  [pdf, other

    cs.CV q-bio.QM

    An automatic pipeline for atlas-based fetal and neonatal brain segmentation and analysis

    Authors: Urru, Andrea, Nakaki, Ayako, Benkarim, Oualid, Crovetto, Francesca, Segales, Laura, Comte, Valentin, Hahner, Nadine, Eixarch, Elisenda, Gratacós, Eduard, Crispi, Fàtima, Piella, Gemma, González Ballester, Miguel A

    Abstract: The automatic segmentation of perinatal brain structures in magnetic resonance imaging (MRI) is of utmost importance for the study of brain growth and related complications. While different methods exist for adult and pediatric MRI data, there is a lack for automatic tools for the analysis of perinatal imaging. In this work, a new pipeline for fetal and neonatal segmentation has been developed. We… ▽ More

    Submitted 16 May, 2022; originally announced May 2022.

  18. arXiv:2202.06452  [pdf, other

    cs.IT eess.SP

    Multi-user Beam Alignment in Presence of Multi-path

    Authors: Nariman Torkzaban, Mohammad A., Khojastepour, John S. Baras

    Abstract: To overcome the high path-loss and the intense shadowing in millimeter-wave (mmWave) communications, effective beamforming schemes are required which incorporate narrow beams with high beamforming gains. The mmWave channel consists of a few spatial clusters each associated with an angle of departure (AoD). The narrow beams must be aligned with the channel AoDs to increase the beamforming gain. Thi… ▽ More

    Submitted 13 February, 2022; originally announced February 2022.

    Comments: Accepted IEEE CISS 2022

  19. arXiv:2202.03610  [pdf, other

    cs.IT eess.SP

    Codebook Design for Composite Beamforming in Next-generation mmWave Systems

    Authors: Nariman Torkzaban, Mohamamd A., Khojastepour, John S. Baras

    Abstract: In pursuance of the unused spectrum in higher frequencies, millimeter wave (mmWave) bands have a pivotal role. However, the high path-loss and poor scattering associated with mmWave communications highlight the necessity of employing effective beamforming techniques. In order to efficiently search for the beam to serve a user and to jointly serve multiple users it is often required to use a compos… ▽ More

    Submitted 7 February, 2022; originally announced February 2022.

    Comments: Accepted at IEEE WCNC 2022

  20. arXiv:2111.01665  [pdf, other

    eess.IV cs.CV cs.LG

    Explainable Medical Image Segmentation via Generative Adversarial Networks and Layer-wise Relevance Propagation

    Authors: Awadelrahman M. A. Ahmed, Leen A. M. Ali

    Abstract: This paper contributes to automating medical image segmentation by proposing generative adversarial network-based models to segment both polyps and instruments in endoscopy images. A major contribution of this work is to provide explanations for the predictions using a layer-wise relevance propagation approach designating which input image pixels are relevant to the predictions and to what extent.… ▽ More

    Submitted 2 November, 2021; originally announced November 2021.

    Comments: Nordic Machine Intelligence

  21. Complexity of Restricted Star Colouring

    Authors: Shalu M. A., Cyriac Antony

    Abstract: Restricted star colouring is a variant of star colouring introduced to design heuristic algorithms to estimate sparse Hessian matrices. For $k\in\mathbb{N}$, a $k$-restricted star colouring ($k$-rs colouring) of a graph $G$ is a function $f:V(G)\to{0,1,\dots,k-1}$ such that (i)$f(x)\neq f(y)$ for every edge $xy$ of G, and (ii) there is no bicoloured 3-vertex path ($P_3$) in $G$ with the higher col… ▽ More

    Submitted 6 August, 2021; originally announced August 2021.

    Comments: Discrete Applied Mathematics (2021)

  22. arXiv:2107.06782  [pdf

    q-fin.ST cs.LG

    Clustering and attention model based for intelligent trading

    Authors: Mimansa Rana, Nanxiang Mao, Ming Ao, Xiaohui Wu, Poning Liang, Matloob Khushi

    Abstract: The foreign exchange market has taken an important role in the global financial market. While foreign exchange trading brings high-yield opportunities to investors, it also brings certain risks. Since the establishment of the foreign exchange market in the 20th century, foreign exchange rate forecasting has become a hot issue studied by scholars from all over the world. Due to the complexity and n… ▽ More

    Submitted 6 August, 2021; v1 submitted 6 July, 2021; originally announced July 2021.

  23. arXiv:2105.14333  [pdf

    eess.IV cs.CV cs.LG

    Covid-19 diagnosis from x-ray using neural networks

    Authors: Dinesh J, Mohammed Rhithick A

    Abstract: Corona virus or COVID-19 is a pandemic illness, which has influenced more than million of causalities worldwide and infected a few large number of individuals .Innovative instrument empowering quick screening of the COVID-19 contamination with high precision can be critically useful to the medical care experts. The primary clinical device presently being used for the analysis of COVID-19 is the Re… ▽ More

    Submitted 29 May, 2021; originally announced May 2021.

    Comments: 3 Graphs, 1 Figures

  24. arXiv:2104.09064  [pdf, other

    eess.AS cs.SD

    Automatic Stroke Classification of Tabla Accompaniment in Hindustani Vocal Concert Audio

    Authors: Rohit M. A., Preeti Rao

    Abstract: The tabla is a unique percussion instrument due to the combined harmonic and percussive nature of its timbre, and the contrasting harmonic frequency ranges of its two drums. This allows a tabla player to uniquely emphasize parts of the rhythmic cycle (theka) in order to mark the salient positions. An analysis of the loudness dynamics and timing deviations at various cycle positions is an important… ▽ More

    Submitted 19 April, 2021; originally announced April 2021.

    Comments: To appear in the JOURNAL OF ACOUSTICAL SOCIETY OF INDIA, April 2021

  25. arXiv:2012.06771  [pdf, other

    eess.IV cs.CV cs.LG

    Generative Adversarial Networks for Automatic Polyp Segmentation

    Authors: Awadelrahman M. A. Ali Ahmed

    Abstract: This paper aims to contribute in bench-marking the automatic polyp segmentation problem using generative adversarial networks framework. Perceiving the problem as an image-to-image translation task, conditional generative adversarial networks are utilized to generate masks conditioned by the images as inputs. Both generator and discriminator are convolution neural networks based. The model achieve… ▽ More

    Submitted 12 December, 2020; originally announced December 2020.

    Comments: MediaEval20, Multimedia Evaluation Workshop, December 14-15 2020, Online

  26. Analysing Long Short Term Memory Models for Cricket Match Outcome Prediction

    Authors: Rahul Chakwate, Madhan R A

    Abstract: As the technology advances, an ample amount of data is collected in sports with the help of advanced sensors. Sports Analytics is the study of this data to provide a constructive advantage to the team and its players. The game of international cricket is popular all across the globe. Recently, various machine learning techniques have been used to analyse the cricket match data and predict the matc… ▽ More

    Submitted 3 November, 2020; originally announced November 2020.

  27. arXiv:2009.06630  [pdf

    cs.CR

    Advanced Virus Monitoring and Analysis System

    Authors: Fauzi Adi Rafrastara, Faizal M. A

    Abstract: This research proposed an architecture and a system which able to monitor the virus behavior and classify them as a traditional or polymorphic virus. Preliminary research was conducted to get the current virus behavior and to find the certain parameters which usually used by virus to attack the computer target. Finally, test bed environment is used to test our system by releasing the virus in a re… ▽ More

    Submitted 14 September, 2020; originally announced September 2020.

    Comments: 4 pages, 3 figures, International Journal of Computer Science and Information Security

  28. arXiv:2008.00756  [pdf, other

    eess.AS cs.IR cs.LG

    Structure and Automatic Segmentation of Dhrupad Vocal Bandish Audio

    Authors: Rohit M. A., Preeti Rao

    Abstract: A Dhrupad vocal concert comprises a composition section that is interspersed with improvised episodes of increased rhythmic activity involving the interaction between the vocals and the percussion. Tracking the changing rhythmic density, in relation to the underlying metric tempo of the piece, thus facilitates the detection and labeling of the improvised sections in the concert structure. This wor… ▽ More

    Submitted 3 August, 2020; originally announced August 2020.

    Comments: Part of this work published in ISMIR 2020

  29. arXiv:2005.10634  [pdf, other

    cs.CR cs.CY

    A Note on Cryptographic Algorithms for Private Data Analysis in Contact Tracing Applications

    Authors: Rajan M A, Manish Shukla, Sachin Lodha

    Abstract: Contact tracing is an important measure to counter the COVID-19 pandemic. In the early phase, many countries employed manual contact tracing to contain the rate of disease spread, however it has many issues. The manual approach is cumbersome, time consuming and also requires active participation of a large number of people to realize it. In order to overcome these drawbacks, digital contact tracin… ▽ More

    Submitted 19 May, 2020; originally announced May 2020.

    Comments: 12 Pages, 3 Figures

  30. arXiv:2005.09258  [pdf, ps, other

    cs.CR

    Cryptanalysis of ITRU

    Authors: Hashim H. R., Molnár A., Tengely Sz

    Abstract: ITRU cryptosystem is a public key cryptosystem and one of the known variants of NTRU cryptosystem. Instead of working in a truncated polynomial ring, ITRU cryptosystem is based on the ring of integers. The authors claimed that ITRU has better features comparing to the classical NTRU, such as having a simple parameter selection algorithm, invertibility, and successful message decryption, and better… ▽ More

    Submitted 19 May, 2020; originally announced May 2020.

  31. arXiv:2004.13328  [pdf, other

    cs.LG cs.CR cs.CY cs.DC

    Privacy Guidelines for Contact Tracing Applications

    Authors: Manish Shukla, Rajan M A, Sachin Lodha, Gautam Shroff, Ramesh Raskar

    Abstract: Contact tracing is a very powerful method to implement and enforce social distancing to avoid spreading of infectious diseases. The traditional approach of contact tracing is time consuming, manpower intensive, dangerous and prone to error due to fatigue or lack of skill. Due to this there is an emergence of mobile based applications for contact tracing. These applications primarily utilize a comb… ▽ More

    Submitted 28 April, 2020; originally announced April 2020.

    Comments: 10 pages, 0 images

  32. arXiv:2004.12171  [pdf, ps, other

    cs.LO cs.AI math.LO math.RA

    Algebraic Approach to Directed Rough Sets

    Authors: Mani A, Sandor Radeleczki

    Abstract: In relational approach to general rough sets, ideas of directed relations are supplemented with additional conditions for multiple algebraic approaches in this research paper. The relations are also specialized to representations of general parthood that are upper-directed, reflexive and antisymmetric for a better behaved groupoidal semantics over the set of roughly equivalent objects by the first… ▽ More

    Submitted 25 April, 2020; originally announced April 2020.

    Comments: 37 pages, Forthcoming

    MSC Class: 08A70; 08A55; 08A99; 06A75; 06D10

  33. arXiv:2004.09843  [pdf, ps, other

    cs.PL

    Egel -- Graph Rewriting with a Twist

    Authors: M. C. A., Devillers

    Abstract: Egel is an untyped eager combinator toy language. Its primary purpose is to showcase an abstract graph-rewriting semantics allowing a robust memory-safe construction in C++. Though graph rewriters are normally implemented by elaborate machines, this can mostly be avoided with a change in the representation of term graphs. With an informal inductive argument, that representation is shown to always… ▽ More

    Submitted 21 April, 2020; originally announced April 2020.

    Comments: 3 pages, 5 figures

    ACM Class: D.3; F.1; I.1

  34. arXiv:1912.01916  [pdf

    cs.CV

    A Method of Fluorescent Fibers Detection on Identity Documents under Ultraviolet Light

    Authors: Kunina I. A., Aliev M. A., Arlazarov N. V., Polevoy D. V

    Abstract: In this work we consider the problem of the fluorescent security fibers detection on the images of identity documents captured under ultraviolet light. As an example we use images of the second and third pages of the Russian passport and show features that render known methods and approaches based on image binarization non applicable. We propose a solution based on ridge detection in the gray-scal… ▽ More

    Submitted 4 December, 2019; originally announced December 2019.

    Comments: 8 pages, 5 figures

  35. arXiv:1904.05014  [pdf, other

    eess.SP cs.IT

    Analysis of Beam Swee** Techniques for Cell-Discovery in mm Wave Systems

    Authors: Rashmi P, Manoj A, Arun Pachai Kannu

    Abstract: Cell discovery is the procedure in which a user equipment (UE) finds a suitable base station (BS) to establish a communication link. When beamforming with antenna arrays is done at both transmitter and receiver, cell discovery in mm wave systems also involves finding the correct angle of arrival - angle of departure alignment between the UE and the detected BS. First, we consider the single BS sce… ▽ More

    Submitted 30 November, 2021; v1 submitted 10 April, 2019; originally announced April 2019.

  36. Routing in Networks on Chip with Multiplicative Circulant Topology

    Authors: Shchegoleva M. A., Romanov A. Yu., Lezhnev E. V., Amerikanov A. A

    Abstract: The development of multi-core processor systems is a demanded branch of science and technology. The appearance of processors with dozens and hundreds of cores poses to the developers the question of choosing the optimal topology capable to provide efficient routing in a network with a large number of nodes. In this paper, we consider the possibility of using multiplicative circulants as a topology… ▽ More

    Submitted 8 February, 2019; originally announced February 2019.

    Comments: 7 p., 4 fig., International Conference on Computer Simulation in Physics and beyond

  37. arXiv:1804.10651  [pdf

    cs.HC

    5PEN TECHNOLOGY: A New Dawn in Homogeneous and Heterogeneous Computing

    Authors: Osagie Scale Uwadia Maxwell, K. O. Obahiagbon, Osagie Joy Amenze, John-Otumu M. A

    Abstract: This research work is a pair review into the conceptual frame work and innovation into Pen-style Personal Network Gadget Package (P-ISM) as inevitable tool to easy, fast and convenient access to the internet. Computing activities have increased the degree of people using personal computers (PCs), complicated packages and all form of social media applications (Apps.) have emerged within this short… ▽ More

    Submitted 5 April, 2018; originally announced April 2018.

  38. arXiv:1712.00917  [pdf

    cs.SD eess.AS

    A text-independent speaker verification model: A comparative analysis

    Authors: Rishi Charan, Manisha. A, Karthik. R, Rajesh Kumar M

    Abstract: The most pressing challenge in the field of voice biometrics is selecting the most efficient technique of speaker recognition. Every individual's voice is peculiar, factors like physical differences in vocal organs, accent and pronunciation contributes to the problem's complexity. In this paper, we explore the various methods available in each block in the process of speaker recognition with the o… ▽ More

    Submitted 4 December, 2017; originally announced December 2017.

    Comments: presented and accepted by 2017 International Conference on Intelligent Computing and Control (I2C2)

  39. The Sky Is Not the Limit: LTE for Unmanned Aerial Vehicles

    Authors: Xingqin Lin, Vijaya Yajnanarayana, Siva D. Muruganathan, Shiwei Gao, Henrik Asplund, Helka-Liina Maattanen, Mattias Bergström A, Sebastian Euler, Y. -P. Eric Wang

    Abstract: Many use cases of unmanned aerial vehicles (UAVs) require beyond visual line-of-sight (LOS) communications. Mobile networks offer wide area, high speed, and secure wireless connectivity, which can enhance control and safety of UAV operations and enable beyond visual LOS use cases. In this article, we share some of our experience in Long-Term Evolution (LTE) connectivity for low altitude small UAVs… ▽ More

    Submitted 10 January, 2019; v1 submitted 4 July, 2017; originally announced July 2017.

    Comments: 8 pages, 6 figures

    Journal ref: IEEE Communications Magazine, vol. 56, no. 4, pp. 204-210, April 2018

  40. arXiv:1703.05474  [pdf, ps, other

    cs.IT

    Multi-User Millimeter Wave Channel Estimation Using Generalized Block OMP Algorithm

    Authors: Manoj A, Arun Pachai Kannu

    Abstract: In a multi-user millimeter (mm) wave communication system, we consider the problem of estimating the channel response between the central node (base station) and each of the user equipments (UE). We propose three different strategies: 1) Each UE estimates its channel separately, 2) Base station estimates all the UEs channels jointly, and 3) Two stage process with estimation done at both UE and bas… ▽ More

    Submitted 16 March, 2017; originally announced March 2017.

    Comments: 5 page, 3 figures

  41. arXiv:1701.08302  [pdf, other

    cs.AI cs.CY cs.SE stat.ML

    A Study of FOSS'2013 Survey Data Using Clustering Techniques

    Authors: Mani A, Rebeka Mukherjee

    Abstract: FOSS is an acronym for Free and Open Source Software. The FOSS 2013 survey primarily targets FOSS contributors and relevant anonymized dataset is publicly available under CC by SA license. In this study, the dataset is analyzed from a critical perspective using statistical and clustering techniques (especially multiple correspondence analysis) with a strong focus on women contributors towards disc… ▽ More

    Submitted 31 January, 2017; v1 submitted 28 January, 2017; originally announced January 2017.

    Comments: IEEE Women in Engineering Conference Paper: WIECON-ECE'2016 (Scheduled to appear in IEEE Xplore )

  42. arXiv:1410.1087  [pdf

    cs.HC

    Computer-mediated communication in adults with high-functioning Autism Spectrum Conditions

    Authors: Christine P. D. M. van der Aa, Monique M. H. Pollmann, Aske Plaat, Rutger Jan van der Gaag

    Abstract: It has been suggested that people with Autism Spectrum Conditions (ASC) are attracted to computer-mediated communication (CMC). In this study, several open questions regarding CMC use in people with ASC which are investigated. We compare CMC use in adults with high-functioning ASC (N = 113) and a control group (N = 72). We find that people with ASC (1) spend more time on CMC than controls, (2) are… ▽ More

    Submitted 4 October, 2014; originally announced October 2014.

  43. arXiv:1408.4067  [pdf, ps, other

    cs.HC

    Challenges and Issues in Adapting Web Contents on Small Screen Devices

    Authors: Krishna Murthy A., Suresha, Anil Kumar K. M

    Abstract: In general, Web pages are intended for large screen devices using HTML technology. Admittance of such Web pages on Small Screen Devices (SSDs) like mobile phones, palmtops, tablets, PDA etc., is increasing with the support of the current wireless technologies. However, SSDs have limited screen size, memory capacity and bandwidth, which makes accessing the Website on SSDs extremely difficult. There… ▽ More

    Submitted 15 August, 2014; originally announced August 2014.

    Journal ref: International Journal of Information Processing Year 2014 Volume 8 Issue 1

  44. arXiv:1402.2551  [pdf

    cs.CE

    Modeling European Options

    Authors: Aishwarya B U, Mohammed Saaqib A, Rajashree H R, Vigasini B

    Abstract: Option contracts can be valued by using the Black-Scholes equation, a partial differential equation with initial conditions. An exact solution for European style options is known. The computation time and the error need to be minimized simultaneously. In this paper, the authors have solved the Black-Scholes equation by employing a reasonably accurate implicit method. Options with known analytic so… ▽ More

    Submitted 11 February, 2014; originally announced February 2014.

    Comments: arXiv admin note: substantial text overlap with arXiv:1311.0438 by other authors

  45. arXiv:1402.1925  [pdf

    cs.SE

    Survey on software testing techniques in cloud computing

    Authors: Priyadharshini. V, Malathi. A

    Abstract: Cloud computing is the next stage of the internet evolution. It relies on sharing of resources to achieve coherence on a network. It is emerged as new computing standard that impacts several different research fields, including software testing. There are various software techniques used for testing application. It not only changes the way of obtaining computing resources but also changes the way… ▽ More

    Submitted 9 February, 2014; originally announced February 2014.

    Comments: 5 pages, 2 figures. volume 4 issue 8 august 2013

  46. arXiv:1312.2323  [pdf

    cs.SE cs.CY

    Architectural Pattern of Health Care System Using GSM Networks

    Authors: Meiappane. A, Dr. V. Prasanna Venkatesan, Selva Murugan. S, Arun. A, Ramachandran. A

    Abstract: Large-scale networked environments, such as the Internet, possess the characteristics of centralised data, centralised access and centralised control; this gives the user a powerful mechanism for building and integrating large repositories of centralised information from diverse resources set. However, a centralised network system with GSM Networks development for a hospital information systems or… ▽ More

    Submitted 9 December, 2013; originally announced December 2013.

    Comments: 7 pages

    Journal ref: (IJCTE), ISSN: 1793-8201. vol. 3, no. 1, pp. 64-70, February 2011

  47. arXiv:1304.4677  [pdf

    cs.CG

    Develo** a General algorithm for Ball Curve with GC2

    Authors: Gobithasan, R., Norziah, O., Jamaludin, M. A

    Abstract: This paper dwells in develo** a general algorithm for constructing a piecewise Ball Curve with curvature continuity (GC2). The proposed algorithm requires GC2 data in which the designer must define unit tangent vectors and signed curvatures at each interpolating points. As a numerical example, a vase is constructed using GC2 piecewise Ball Curve

    Submitted 16 April, 2013; originally announced April 2013.

    Journal ref: 2005 Proceedings of the 2nd International Conference on Research and Education in Mathematics (ICREM 2), May 25th- 26th 2005, Serdang, Malaysia, Pg. 526-531

  48. arXiv:0908.3587  [pdf

    cs.CR

    Tracing Technique for Blaster Attack

    Authors: Siti Rahayu S., Robiah Y., Shahrin S., Faizal M. A., Mohd Zaki M, Irda R

    Abstract: Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in differen… ▽ More

    Submitted 25 August, 2009; originally announced August 2009.

    Comments: 8 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423 http://sites.google.com/site/ijcsis/

    Report number: ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Volume 4, No. 1, August 2009, USA

  49. arXiv:0803.3099  [pdf

    cs.LO cs.PL

    Concurrent Composition and Algebras of Events, Actions, and Processes

    Authors: Mark Burgin a, Marc L. Smith

    Abstract: There are many different models of concurrent processes. The goal of this work is to introduce a common formalized framework for current research in this area and to eliminate shortcomings of existing models of concurrency. Following up the previous research of the authors and other researchers on concurrency, here we build a high-level metamodel EAP (event-action-process) for concurrent process… ▽ More

    Submitted 20 March, 2008; originally announced March 2008.

    ACM Class: D.4.1