Skip to main content

Showing 1–16 of 16 results for author: Banerjee, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.12189  [pdf, other

    cs.DC

    Energy-aware Incremental OTA Update for Flash-based Batteryless IoT Devices

    Authors: Wei Wei, Jishnu Banerjee, Sahidul Islam, Chen Pan, Mimi Xie

    Abstract: Over-the-air (OTA) firmware updates are essential for updating and maintaining IoT devices, especially those batteryless devices reliant on energy harvesting power sources. Flash memory, favored for its low cost and high density, is extensively used for data storage in many IoT devices. However, due to its high energy demands for update operations, there is often insufficient energy for code updat… ▽ More

    Submitted 17 June, 2024; originally announced June 2024.

    Comments: 6 pages

  2. arXiv:2005.14613  [pdf, other

    cs.CL cs.IR

    Using Large Pretrained Language Models for Answering User Queries from Product Specifications

    Authors: Kalyani Roy, Smit Shah, Nithish Pai, Jaidam Ramtej, Prajit Prashant Nadkarn, Jyotirmoy Banerjee, Pawan Goyal, Surender Kumar

    Abstract: While buying a product from the e-commerce websites, customers generally have a plethora of questions. From the perspective of both the e-commerce service provider as well as the customers, there must be an effective question answering system to provide immediate answers to the user queries. While certain questions can only be answered after using the product, there are many questions which can be… ▽ More

    Submitted 29 May, 2020; originally announced May 2020.

    Comments: 5 pages

  3. A Log-Euclidean and Total Variation based Variational Framework for Computational Sonography

    Authors: Jyotirmoy Banerjee, Premal A. Patel, Fred Ushakov, Donald Peebles, Jan Deprest, Sebastien Ourselin, David Hawkes, Tom Vercauteren

    Abstract: We propose a spatial compounding technique and variational framework to improve 3D ultrasound image quality by compositing multiple ultrasound volumes acquired from different probe orientations. In the composite volume, instead of intensity values, we estimate a tensor at every voxel. The resultant tensor image encapsulates the directional information of the underlying imaging data and can be used… ▽ More

    Submitted 6 February, 2018; originally announced February 2018.

    Comments: SPIE Medical Imaging 2018

  4. arXiv:1703.06744  [pdf, other

    cs.NI

    On Auxiliary Entity Allocation Problem in Multi-layered Interdependent Critical Infrastructures

    Authors: Joydeep Banerjee, Arunabha Sen, Chenyang Zho

    Abstract: Operation of critical infrastructures are highly interdependent on each other. Such dependencies causes failure in these infrastructures to cascade on an initial failure event. Owing to this vulnerability it is imperative to incorporate efficient strategies for their protection. Modifying dependencies by adding additional dependency implications using entities (termed as \emph{auxiliary entities})… ▽ More

    Submitted 24 January, 2017; originally announced March 2017.

    Comments: CRITIS 2016

  5. arXiv:1702.01018  [pdf, ps, other

    cs.NI cs.AI

    On Robustness in Multilayer Interdependent Network

    Authors: Joydeep Banerjee, Chenyang Zhou, Arunabha Sen

    Abstract: Critical Infrastructures like power and communication networks are highly interdependent on each other for their full functionality. Many significant research have been pursued to model the interdependency and failure analysis of these interdependent networks. However, most of these models fail to capture the complex interdependencies that might actually exist between the infrastructures. The \emp… ▽ More

    Submitted 24 January, 2017; originally announced February 2017.

    Comments: CRITIS 2015

  6. arXiv:1701.07106  [pdf, other

    cs.NI

    On Hardening Problems in Critical Infrastructure Systems

    Authors: Joydeep Banerjee, Kaustav Basu, Arunabha Sen

    Abstract: The power and communication networks are highly interdependent and form a part of the critical infrastructure of a country. Similarly, dependencies exist within the networks itself. It is essential to have a model which captures these dependencies precisely. Previous research has proposed certain models but these models have certain limitations. The limitations of the aforementioned models have be… ▽ More

    Submitted 31 May, 2017; v1 submitted 24 January, 2017; originally announced January 2017.

    Comments: The previous version was made into a journal paper that contains the previous problem along with an existing problem. As the previous version is not intended to be published hence it is requested that this new version is accepted

  7. arXiv:1506.02602  [pdf, other

    cs.IR cond-mat.stat-mech physics.soc-ph q-bio.QM

    Using complex networks towards information retrieval and diagnostics in multidimensional imaging

    Authors: Soumya Jyoti Banerjee, Mohammad Azharuddin, Debanjan Sen, Smruti Savale, Himadri Datta, Anjan Kr Dasgupta, Soumen Roy

    Abstract: We present a fresh and broad yet simple approach towards information retrieval in general and diagnostics in particular by applying the theory of complex networks on multidimensional, dynamic images. We demonstrate a successful use of our method with the time series generated from high content thermal imaging videos of patients suffering from the aqueous deficient dry eye (ADDE) disease. Remarkabl… ▽ More

    Submitted 1 December, 2015; v1 submitted 8 June, 2015; originally announced June 2015.

    Comments: Replaced by published version. Detailed Supplementary Information on journal website

    Journal ref: Scientific Reports, 5: 17271 (2015)

  8. arXiv:1412.6686  [pdf, ps, other

    cs.NI cs.DS

    On the Entity Hardening Problem in Multi-layered Interdependent Networks

    Authors: Joydeep Banerjee, Arun Das, Chenyang Zhou, Anisha Mazumder, Arunabha Sen

    Abstract: The power grid and the communication network are highly interdependent on each other for their well being. In recent times the research community has shown significant interest in modeling such interdependent networks and studying the impact of failures on these networks. Although a number of models have been proposed, many of them are simplistic in nature and fail to capture the complex interdepe… ▽ More

    Submitted 20 December, 2014; originally announced December 2014.

    Comments: 7 pages, 5 figures

  9. arXiv:1409.8268  [pdf, other

    physics.soc-ph cond-mat.stat-mech cs.SI q-bio.MN

    Slow poisoning and destruction of networks: Edge proximity and its implications for biological and infrastructure networks

    Authors: Soumya Jyoti Banerjee, Saptarshi Sinha, Soumen Roy

    Abstract: We propose a network metric, edge proximity, ${\cal P}_e$, which demonstrates the importance of specific edges in a network, hitherto not captured by existing network metrics. The effects of removing edges with high ${\cal P}_e$ might initially seem inconspicuous but are eventually shown to be very harmful for networks. Compared to existing strategies, the removal of edges by ${\cal P}_e$ leads to… ▽ More

    Submitted 11 February, 2015; v1 submitted 29 September, 2014; originally announced September 2014.

    Comments: 5 Pages, 5 figures, Revtex-4.1

    Journal ref: Phys. Rev. E 91, 022807 (2015)

  10. arXiv:1404.6890  [pdf, other

    cs.DS

    Analysis of d-Hop Dominating Set Problem for Directed Graph with Indegree Bounded by One

    Authors: Joydeep Banerjee, Arun Das, Arunabha Sen

    Abstract: Efficient communication between nodes in ad-hoc networks can be established through repeated cluster formations with designated \textit{cluster-heads}. In this context minimum d-hop dominating set problem was introduced for cluster formation in ad-hoc networks and is proved to be NP-complete. Hence, an exact solution to this problem for certain subclass of graphs (representing an ad-hoc network) c… ▽ More

    Submitted 25 January, 2017; v1 submitted 28 April, 2014; originally announced April 2014.

  11. arXiv:1401.1783  [pdf, other

    cs.NI

    Identification of $\cal K$ Most Vulnerable Nodes in Multi-layered Network Using a New Model of Interdependency

    Authors: Arunabha Sen, Anisha Mazumder, Joydeep Banerjee, Arun Das, Randy Compton

    Abstract: The critical infrastructures of the nation including the power grid and the communication network are highly interdependent. Recognizing the need for a deeper understanding of the interdependency in a multi-layered network, significant efforts have been made by the research community in the last few years to achieve this goal. Accordingly a number of models have been proposed and analyzed. Unfortu… ▽ More

    Submitted 8 January, 2014; originally announced January 2014.

    Comments: 6 pages, 4 figures, submitted to NetSciCom 2014

  12. arXiv:1209.3737  [pdf, other

    physics.soc-ph cond-mat.stat-mech cs.SI q-bio.MN

    Key to Network Controllability

    Authors: Soumya Jyoti Banerjee, Soumen Roy

    Abstract: Liu et al recently proposed a minimum number of driver nodes needed to obtain full structural controllability over a directed network. Driver nodes are unmatched nodes, from which there are directed paths to all matched nodes. Their most important assertion is that a system's controllability is to a great extent encoded by the underlying network's degree distribution, $P(k_{in}, k_{out})$. Is the… ▽ More

    Submitted 17 September, 2012; originally announced September 2012.

    Comments: Arising from YY Liu, JJ Slotine and AL Barabasi, Nature 473, 167 - 173 (2011)

  13. arXiv:1110.0724  [pdf

    cs.DM nlin.CG

    Integral Value Transformations: A Class of Affine Discrete Dynamical Systems and an Application

    Authors: Sk. S. Hassan, P. Pal Choudhury, B. K. Nayak, A. Ghosh, J. Banerjee

    Abstract: In this paper, the notion of Integral Value Transformations (IVTs), a class of Discrete Dynamical Maps has been introduced. Then notion of Affine Discrete Dynamical System (ADDS) in the light of IVTs is defined and some rudimentary mathematical properties of the system are depicted. Collatz Conjecture is one of the most enigmatic problems in 20th Century. The Conjecture was posed by German Mathema… ▽ More

    Submitted 12 October, 2011; v1 submitted 21 September, 2011; originally announced October 2011.

  14. arXiv:1109.6270  [pdf

    cs.SD cs.DM

    Fractal String Generation and Its Application in Music Composition

    Authors: Avishek Ghosh, Joydeep Banerjee, Sk. S. Hassan, P. Pal Choudhury

    Abstract: Music is a string of some of the notes out of 12 notes (Sa, Komal_re, Re, Komal_ga, Ga, Ma, Kari_ma, Pa, Komal_dha, Dha, Komal_ni, Ni) and their harmonics. Each note corresponds to a particular frequency. When such strings are encoded to form discrete sequences, different frequencies present in the music corresponds to different amplitude levels (value) of the discrete sequence. Initially, a class… ▽ More

    Submitted 27 September, 2011; originally announced September 2011.

  15. Minimization of Handoff latency by co-ordinate evaluation method using GPS based map

    Authors: Debabrata Sarddar, Joydeep Banerjee, Souvik Kumar Saha, Tapas Jana, Utpal Biswas, M. K. Naskar

    Abstract: Handoff has become an essential criterion in mobile communication system, specially in urban areas, owing to the limited coverage area of Access Points (AP). Handover of calls between two Base Stations (BSs) is encountered frequently and it is essentially required to minimize the delay of the process. Many solutions attempting to improve this process have been proposed but only a few use geo-locat… ▽ More

    Submitted 10 August, 2010; originally announced August 2010.

  16. Minimization of Handoff Failure Probability for Next-Generation Wireless Systems

    Authors: Debabrata Sarddar, Tapas Jana, Souvik Kumar Saha, Joydeep Banerjee, Utpal Biswas, M. K. Naskar

    Abstract: During the past few years, advances in mobile communication theory have enabled the development and deployment of different wireless technologies, complementary to each other. Hence, their integration can realize a unified wireless system that has the best features of the individual networks. Next-Generation Wireless Systems (NGWS) integrate different wireless systems, each of which is optimized f… ▽ More

    Submitted 17 June, 2010; originally announced June 2010.

    Comments: 16 Pages

    Journal ref: International Journal of Next-Generation Networks 2.2 (2010) 36-51