Skip to main content

Showing 1–22 of 22 results for author: B., M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.19548  [pdf

    cs.ET cs.CR

    An Extensive Survey of Digital Image Steganography: State of the Art

    Authors: Idakwo M. A., Muazu M. B., Adedokun A. E., Sadiq B. O

    Abstract: The need to protect sensitive information privacy duringinformation exchange over the internet/intranet has led towider adoption of cryptography and steganography. The cryptography approaches convert the information into an unreadable format however draws the attention of cryptanalyst owing to the uncommon random nature flow of the bytes when viewing the flowing structured bytes on a computer. Whi… ▽ More

    Submitted 30 April, 2024; originally announced April 2024.

  2. arXiv:2404.06340  [pdf, other

    cs.RO

    Experimental System Design of an Active Fault-Tolerant Quadrotor

    Authors: Jennifer Yeom, Roshan Balu T M B, Guanrui Li, Giuseppe Loianno

    Abstract: Quadrotors have gained popularity over the last decade, aiding humans in complex tasks such as search and rescue, map** and exploration. Despite their mechanical simplicity and versatility compared to other types of aerial vehicles, they remain vulnerable to rotor failures. In this paper, we propose an algorithmic and mechanical approach to addressing the quadrotor fault-tolerant problem in case… ▽ More

    Submitted 9 April, 2024; originally announced April 2024.

    Comments: Accepted to ICUAS 2024

  3. arXiv:2402.19450  [pdf, other

    cs.AI cs.CL

    Functional Benchmarks for Robust Evaluation of Reasoning Performance, and the Reasoning Gap

    Authors: Saurabh Srivastava, Annarose M B, Anto P V, Shashank Menon, Ajay Sukumar, Adwaith Samod T, Alan Philipose, Stevin Prince, Sooraj Thomas

    Abstract: We propose a framework for robust evaluation of reasoning capabilities of language models, using functional variants of benchmarks. Models that solve a reasoning test should exhibit no difference in performance over the static version of a problem compared to a snapshot of the functional variant. We have rewritten the relevant fragment of the MATH benchmark into its functional variant MATH(), with… ▽ More

    Submitted 29 February, 2024; originally announced February 2024.

    Comments: 37 pages, 10 figures

  4. arXiv:2312.05609  [pdf, other

    quant-ph cs.CR cs.CY cs.ET cs.NI

    Comprehensive Analysis of BB84, A Quantum Key Distribution Protocol

    Authors: SujayKumar Reddy M, Chandra Mohan B

    Abstract: Quantum Key Distribution (QKD) is a technique that enables secure communication between two parties by sharing a secret key. One of the most well-known QKD protocols is the BB84 protocol, proposed by Charles Bennett and Gilles Brassard in 1984. In this protocol, Alice and Bob use a quantum channel to exchange qubits, allowing them to generate a shared key that is resistant to eavesdrop**. This p… ▽ More

    Submitted 9 December, 2023; originally announced December 2023.

    Comments: 16 pages, 17 figures

  5. Comparative Analysis of Imbalanced Malware Byteplot Image Classification using Transfer Learning

    Authors: Jayasudha M, Ayesha Shaik, Gaurav Pendharkar, Soham Kumar, Muhesh Kumar B, Sudharshanan Balaji

    Abstract: Cybersecurity is a major concern due to the increasing reliance on technology and interconnected systems. Malware detectors help mitigate cyber-attacks by comparing malware signatures. Machine learning can improve these detectors by automating feature extraction, identifying patterns, and enhancing dynamic analysis. In this paper, the performance of six multiclass classification models is compared… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

    Comments: accepted at PEIS2023 and will be published in Lecture Notes in Electrical Engineering

  6. arXiv:2309.09807  [pdf

    cs.CR cs.AI cs.LG

    Efficient Concept Drift Handling for Batch Android Malware Detection Models

    Authors: Molina-Coronado B., Mori U., Mendiburu A., Miguel-Alonso J

    Abstract: The rapidly evolving nature of Android apps poses a significant challenge to static batch machine learning algorithms employed in malware detection systems, as they quickly become obsolete. Despite this challenge, the existing literature pays limited attention to addressing this issue, with many advanced Android malware detection approaches, such as Drebin, DroidDet and MaMaDroid, relying on stati… ▽ More

    Submitted 18 September, 2023; originally announced September 2023.

    Comments: 18 pages

  7. arXiv:2306.05111  [pdf, other

    cs.RO

    AutoCharge: Autonomous Charging for Perpetual Quadrotor Missions

    Authors: Alessandro Saviolo, Jeffrey Mao, Roshan Balu T M B, Vivek Radhakrishnan, Giuseppe Loianno

    Abstract: Battery endurance represents a key challenge for long-term autonomy and long-range operations, especially in the case of aerial robots. In this paper, we propose AutoCharge, an autonomous charging solution for quadrotors that combines a portable ground station with a flexible, lightweight charging tether and is capable of universal, highly efficient, and robust charging. We design and manufacture… ▽ More

    Submitted 8 June, 2023; originally announced June 2023.

  8. arXiv:2305.17000  [pdf, other

    cs.SD cs.CR cs.LG eess.AS

    DistriBlock: Identifying adversarial audio samples by leveraging characteristics of the output distribution

    Authors: Matías P. Pizarro B., Dorothea Kolossa, Asja Fischer

    Abstract: Adversarial attacks can mislead automatic speech recognition (ASR) systems into predicting an arbitrary target text, thus posing a clear security threat. To prevent such attacks, we propose DistriBlock, an efficient detection strategy applicable to any ASR system that predicts a probability distribution over output tokens in each time step. We measure a set of characteristics of this distribution:… ▽ More

    Submitted 22 May, 2024; v1 submitted 26 May, 2023; originally announced May 2023.

  9. Mining Privacy-Preserving Association Rules based on Parallel Processing in Cloud Computing

    Authors: Dhinakaran D, Joe Prathap P. M, Selvaraj D, Arul Kumar D, Murugeshwari B

    Abstract: With the onset of the Information Era and the rapid growth of information technology, ample space for processing and extracting data has opened up. However, privacy concerns may stifle expansion throughout this area. The challenge of reliable mining techniques when transactions disperse across sources is addressed in this study. This work looks at the prospect of creating a new set of three algori… ▽ More

    Submitted 21 April, 2023; originally announced April 2023.

  10. arXiv:2208.01708   

    cs.RO cs.AI cs.CV

    Autonomous Agriculture Robot for Smart Farming

    Authors: Vinay Ummadi, Aravind Gundlapalle, Althaf Shaik, Shaik Mohammad Rafi B

    Abstract: This project aims to develop and demonstrate a ground robot with intelligence capable of conducting semi-autonomous farm operations for different low-heights vegetable crops referred as Agriculture Application Robot(AAR). AAR is a lightweight, solar-electric powered robot that uses intelligent perception for conducting detection and classification of plants and their characteristics. The system al… ▽ More

    Submitted 7 September, 2023; v1 submitted 2 August, 2022; originally announced August 2022.

    Comments: Due to author interest conflicts

  11. arXiv:2112.00875  [pdf

    cs.HC cs.IR

    Secure and Safety Mobile Network System for Visually Impaired People

    Authors: Shyama Kumari Arunachalam, Roopa V, Meena H B, Vijayalakshmi, T Malavika

    Abstract: The proposed system aims to be a techno-friend of visually impaired people to assist them in orientation and mobility both indoor and outdoor. Moving through an unknown environment becomes a real challenge for most of them, although they rely on their other senses. An age old mechanism used for assistance for the blind people is a white cane commonly known as walking cane a simple and purely mecha… ▽ More

    Submitted 1 December, 2021; originally announced December 2021.

    Comments: 4 pages, 3 figures, Accepted at 2012 IEEE ICECE, Bangalore

  12. arXiv:2111.07166  [pdf, other

    cs.RO

    Autonomous UAV for Building Monitoring, Detection and Localisation of Faults

    Authors: Suhas Thalanki, T Vijay Prashant, Harshith Kumar M B, Shayak Bhadraray, Aravind S, Srikrishna BR, Sameer Dhole

    Abstract: Collapsing of structural buildings has been sighted commonly and the presence of potential faults has proved to be damaging to the buildings, resulting in accidents. It is essential to continuously monitor any building for faults where human access is restricted. With UAVs (Unmanned Aerial Vehicles) emerging in the field of computer vision, monitoring any building and detecting such faults is seen… ▽ More

    Submitted 13 November, 2021; originally announced November 2021.

    Comments: Submitted, ICRA 2022

  13. arXiv:2109.11782  [pdf, other

    cs.SD eess.AS

    Causal Analysis of Carnatic Music: A Preliminary Study

    Authors: Abhsihek Nandekar, Preeth Khona, Rajani M. B., Anindya Sinha, Nithin Nagaraj

    Abstract: The musicological analysis of Carnatic music is challenging, owing to its rich structure and complexity. Automated \textit{rāga} classification, pitch detection, tonal analysis, modelling and information retrieval of this form of southern Indian classical music have, however, made significant progress in recent times. A causal analysis to investigate the musicological structure of Carnatic composi… ▽ More

    Submitted 24 September, 2021; originally announced September 2021.

    Comments: 22 pages, 12 figures

  14. arXiv:2108.10168  [pdf

    cs.AI

    CGEMs: A Metric Model for Automatic Code Generation using GPT-3

    Authors: Aishwarya Narasimhan, Krishna Prasad Agara Venkatesha Rao, Veena M B

    Abstract: Today, AI technology is showing its strengths in almost every industry and walks of life. From text generation, text summarization, chatbots, NLP is being used widely. One such paradigm is automatic code generation. An AI could be generating anything; hence the output space is unconstrained. A self-driving car is driven for 100 million miles to validate its safety, but tests cannot be written to m… ▽ More

    Submitted 23 August, 2021; originally announced August 2021.

    Comments: 11 pages, 6 figures, 2 tables

  15. arXiv:2101.07120  [pdf

    cs.CL cs.LG

    Neural Abstractive Text Summarizer for Telugu Language

    Authors: Mohan Bharath B, Aravindh Gowtham B, Akhil M

    Abstract: Abstractive Text Summarization is the process of constructing semantically relevant shorter sentences which captures the essence of the overall meaning of the source text. It is actually difficult and very time consuming for humans to summarize manually large documents of text. Much of work in abstractive text summarization is being done in English and almost no significant work has been reported… ▽ More

    Submitted 18 January, 2021; originally announced January 2021.

    Comments: 11 pages, 2 figures. Presented the paper at Third International Conference on Soft Computing and Signal Processing (ICSCSP 2020) and is currently in production. It will soon be published in springer Advances in Intelligent Systems and Computing (AISC) series

  16. arXiv:2011.04988  [pdf, other

    eess.IV cs.CV

    AIM 2020 Challenge on Rendering Realistic Bokeh

    Authors: Andrey Ignatov, Radu Timofte, Ming Qian, Congyu Qiao, Jiamin Lin, Zhenyu Guo, Chenghua Li, Cong Leng, Jian Cheng, Juewen Peng, Xianrui Luo, Ke Xian, Zi** Wu, Zhiguo Cao, Densen Puthussery, Jiji C V, Hrishikesh P S, Melvin Kuriakose, Saikat Dutta, Sourya Dipta Das, Nisarg A. Shah, Kuldeep Purohit, Praveen Kandula, Maitreya Suin, A. N. Rajagopalan , et al. (10 additional authors not shown)

    Abstract: This paper reviews the second AIM realistic bokeh effect rendering challenge and provides the description of the proposed solutions and results. The participating teams were solving a real-world bokeh simulation problem, where the goal was to learn a realistic shallow focus technique using a large-scale EBB! bokeh dataset consisting of 5K shallow / wide depth-of-field image pairs captured using th… ▽ More

    Submitted 10 November, 2020; originally announced November 2020.

    Comments: Published in ECCV 2020 Workshop (Advances in Image Manipulation), https://data.vision.ee.ethz.ch/cvl/aim20/

  17. A machine learning approach to anomaly-based detection on Android platforms

    Authors: Joshua Abah, Waziri O. V, Abdullahi M. B, Arthur U. M, Adewale O. S

    Abstract: The emergence of mobile platforms with increased storage and computing capabilities and the pervasive use of these platforms for sensitive applications such as online banking, e-commerce and the storage of sensitive information on these mobile devices have led to increasing danger associated with malware targeted at these devices. Detecting such malware presents inimitable challenges as signature-… ▽ More

    Submitted 13 December, 2015; originally announced December 2015.

    Comments: This is a 21 pages paper that reports research findings

    Journal ref: International Journal of Network Security & Its Applications, Vol.7,No.6, pp.15-35 (2015)

  18. arXiv:1209.2951  [pdf, ps, other

    cs.CG

    Unit Disk Cover Problem

    Authors: Rashmisnata Acharyya, Manjanna B., Gautam K. Das

    Abstract: Given a set ${\cal D}$ of unit disks in the Euclidean plane, we consider (i) the {\it discrete unit disk cover} (DUDC) problem and (ii) the {\it rectangular region cover} (RRC) problem. In the DUDC problem, for a given set ${\cal P}$ of points the objective is to select minimum cardinality subset ${\cal D}^* \subseteq {\cal D}$ such that each point in ${\cal P}$ is covered by at least one disk in… ▽ More

    Submitted 13 September, 2012; originally announced September 2012.

    Comments: 12 pages, 5 figures

  19. arXiv:1104.1697  [pdf, ps, other

    cs.SC cs.DS math.FA

    Computing generalized inverses using LU factorization of matrix product

    Authors: Stanimirović, P. S., Tasić, M. B

    Abstract: An algorithm for computing {2, 3}, {2, 4}, {1, 2, 3}, {1, 2, 4} -inverses and the Moore-Penrose inverse of a given rational matrix A is established. Classes A(2, 3)s and A(2, 4)s are characterized in terms of matrix products (R*A)+R* and T*(AT*)+, where R and T are rational matrices with appropriate dimensions and corresponding rank. The proposed algorithm is based on these general representations… ▽ More

    Submitted 9 April, 2011; originally announced April 2011.

    MSC Class: 15A09; 68Q40

    Journal ref: International Journal Of Computer Mathematics, Volume 85, Issue 12, 2008, Pages 1865 - 1878

  20. arXiv:1104.1696  [pdf, ps, other

    cs.SC cs.DS cs.MS math.FA

    Symbolic computation of weighted Moore-Penrose inverse using partitioning method

    Authors: Tasić, M. B., Stanimirović, P. S., Petković, M. D

    Abstract: We propose a method and algorithm for computing the weighted Moore-Penrose inverse of one-variable rational matrices. Continuing this idea, we develop an algorithm for computing the weighted Moore-Penrose inverse of one-variable polynomial matrix. These methods and algorithms are generalizations of the method for computing the weighted Moore-Penrose inverse for constant matrices, originated in Wan… ▽ More

    Submitted 9 April, 2011; originally announced April 2011.

    MSC Class: 15A09; 68Q40

    Journal ref: Applied Mathematics and Computation, Volume 189, Issue 1, 1 June 2007, Pages 615-640

  21. arXiv:1104.1690  [pdf, ps, other

    cs.SC cs.DS math.FA

    Effective partitioning method for computing weighted Moore-Penrose inverse

    Authors: Petković, M. D., Stanimirović, P. S., Tasić, M. B

    Abstract: We introduce a method and an algorithm for computing the weighted Moore-Penrose inverse of multiple-variable polynomial matrix and the related algorithm which is appropriated for sparse polynomial matrices. These methods and algorithms are generalizations of algorithms developed in [M.B. Tasic, P.S. Stanimirovic, M.D. Petkovic, Symbolic computation of weighted Moore-Penrose inverse using partition… ▽ More

    Submitted 9 April, 2011; originally announced April 2011.

    MSC Class: 15A09; 68Q40

    Journal ref: Computers & Mathematics with Applications, Volume 55, Issue 8, April 2008, Pages 1720-1734

  22. arXiv:cs/0403006  [pdf

    cs.AI

    The role of behavior modifiers in representation development

    Authors: Carlos R. de la Mora B., Carlos Gershenson, Angelica Garcia-Vega

    Abstract: We address the problem of the development of representations and their relationship to the environment. We study a software agent which develops in a network a representation of its simple environment which captures and integrates the relationships between agent and environment through a closure mechanism. The inclusion of a variable behavior modifier allows better representation development. Th… ▽ More

    Submitted 5 March, 2004; originally announced March 2004.

    Comments: 8 pages

    ACM Class: I.2.0