Skip to main content

Showing 1–9 of 9 results for author: Bhoi, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.06783  [pdf, other

    cs.CL cs.AI cs.LG cs.SI

    MultiSiam: A Multiple Input Siamese Network For Social Media Text Classification And Duplicate Text Detection

    Authors: Sudhanshu Bhoi, Swapnil Markhedkar, Shruti Phadke, Prashant Agrawal

    Abstract: Social media accounts post increasingly similar content, creating a chaotic experience across platforms, which makes accessing desired information difficult. These posts can be organized by categorizing and grou** duplicates across social handles and accounts. There can be more than one duplicate of a post, however, a conventional Siamese neural network only considers a pair of inputs for duplic… ▽ More

    Submitted 6 January, 2024; originally announced January 2024.

  2. arXiv:2211.16096  [pdf, other

    cs.IT

    Construction of Multiple Constrained DNA Codes

    Authors: Siddhartha Siddhiprada Bhoi, Paramapalli Udaya, Abhay Kumar Singh

    Abstract: DNA sequences are prone to creating secondary structures by folding back on themselves by non-specific hybridization among its nucleotides. The formation of secondary structures makes the sequences chemically inactive towards synthesis and sequencing processes. In this letter, our goal is to tackle the problems due to the creation of secondary structures in DNA sequences along with constraints suc… ▽ More

    Submitted 29 November, 2022; originally announced November 2022.

    Comments: 10 pages, 2 figures

  3. arXiv:2008.13569  [pdf, other

    cs.IR cs.LG

    PREMIER: Personalized REcommendation for Medical prescrIptions from Electronic Records

    Authors: Suman Bhoi, Lee Mong Li, Wynne Hsu

    Abstract: The broad adoption of Electronic Health Records (EHR) has led to vast amounts of data being accumulated on a patient's history, diagnosis, prescriptions, and lab tests. Advances in recommender technologies have the potential to utilize this information to help doctors personalize the prescribed medications. In this work, we design a two-stage attention-based personalized medication recommender sys… ▽ More

    Submitted 28 August, 2020; originally announced August 2020.

  4. arXiv:1404.6087  [pdf

    cs.OS

    Enhancing CPU Performance using Subcontrary Mean Dynamic Round Robin (SMDRR) Scheduling Algorithm

    Authors: Sourav Kumar Bhoi, Sanjaya Kumar Panda, Debashee Tarai

    Abstract: Round Robin (RR) Algorithm is considered as optimal in time shared environment because the static time is equally shared among the processes. If the time quantum taken is static then it undergoes degradation of the CPU performance and leads to so many context switches. In this paper, we have proposed a new effective dynamic RR algorithm SMDRR (Subcontrary Mean Dynamic Round Robin) based on dynamic… ▽ More

    Submitted 24 April, 2014; originally announced April 2014.

    Comments: 5 pages, 13 figures. Journal of Global Research in Computer Science 2011. arXiv admin note: text overlap with arXiv:1103.3832 by other authors

  5. arXiv:1404.5869  [pdf

    cs.OS

    An Effective Round Robin Algorithm using Min-Max Dispersion Measure

    Authors: Sanjaya Kumar Panda, Sourav Kumar Bhoi

    Abstract: Round Robin (RR) scheduling algorithm is a preemptive scheduling algorithm. It is designed especially for time sharing Operating System (OS). In RR scheduling algorithm the CPU switches between the processes when the static Time Quantum (TQ) expires. RR scheduling algorithm is considered as the most widely used scheduling algorithm in research because the TQ is equally shared among the processes.… ▽ More

    Submitted 23 April, 2014; originally announced April 2014.

    Comments: 9 pages, 15 figures. International Journal on Computer Science and Engineering (IJCSE), 2012

    Report number: IJCSE12-04-01-124

  6. SFTP : A Secure and Fault-Tolerant Paradigm against Blackhole Attack in MANET

    Authors: Jitendra Kumar Rout, Sourav Kumar Bhoi, Sanjaya Kumar Panda

    Abstract: Security issues in MANET are a challenging task nowadays. MANETs are vulnerable to passive attacks and active attacks because of a limited number of resources and lack of centralized authority. Blackhole attack is an attack in network layer which degrade the network performance by drop** the packets. In this paper, we have proposed a Secure Fault-Tolerant Paradigm (SFTP) which checks the Blackho… ▽ More

    Submitted 3 March, 2014; originally announced March 2014.

    Comments: 6 pages, 9 figures

    Report number: pxc3885343

    Journal ref: International Journal of Computer Applications 2013

  7. Design and Performance Evaluation of an Optimized Disk Scheduling Algorithm (ODSA)

    Authors: Sourav Kumar Bhoi, Sanjaya Kumar Panda, Imran Hossain Faruk

    Abstract: Management of disk scheduling is a very important aspect of operating system. Performance of the disk scheduling completely depends on how efficient is the scheduling algorithm to allocate services to the request in a better manner. Many algorithms (FIFO, SSTF, SCAN, C-SCAN, LOOK, etc.) are developed in the recent years in order to optimize the system disk I/O performance. By reducing the average… ▽ More

    Submitted 3 March, 2014; originally announced March 2014.

    Comments: 8 pages, 26 figures

    Report number: pxc3877329

    Journal ref: International Journal of Computer Applications 2012

  8. arXiv:1109.3076  [pdf

    cs.OS

    Comparative performance analysis of multi dynamic time quantum Round Robin(MDTQRR) algorithm with arrival time

    Authors: H. S. Behera, Rakesh Mohanty, Sabyasachi Sahu, Sourav Kumar Bhoi

    Abstract: CPU being considered a primary computer resource, its scheduling is central to operating-system design. A thorough performance evaluation of various scheduling algorithms manifests that Round Robin Algorithm is considered as optimal in time shared environment because the static time is equally shared among the processes. We have proposed an efficient technique in the process scheduling algorithm b… ▽ More

    Submitted 14 September, 2011; originally announced September 2011.

    Comments: 10 pages, 18 Figures, Indian Journal of Computer Science and Engineering vol. 2 no. 2 April-May 2011

  9. A New Proposed Cost Model for List Accessing Problem using Buffering

    Authors: Rakesh Mohanty, Seetaya Bhoi, Sasmita Tripathy

    Abstract: There are many existing well known cost models for the list accessing problem. The standard cost model developed by Sleator and Tarjan is most widely used. In this paper, we have made a comprehensive study of the existing cost models and proposed a new cost model for the list accessing problem. In our proposed cost model, for calculating the processing cost of request sequence using a singly linke… ▽ More

    Submitted 10 September, 2011; originally announced September 2011.

    Comments: 05 Pages, 2 figures

    Journal ref: International Journal of Computer Applications, Volume 22-- No.8, May 2011