Skip to main content

Showing 1–22 of 22 results for author: D, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2307.03981  [pdf

    cs.NI

    BER Analysis of Full Duplex Relay assisted BPSK-SIM based VLC System for Indoor Applications

    Authors: L Bhargava Kumar, Ramavath Prasad Naik, Datta Choudhari, Prabu Krishnan, Goutham Simha G D, Jagadeesh V K

    Abstract: This paper contemplates a relay-assisted visible light communication (VLC) system, where the light source (Table lamp) acts as a relay node and cooperates with the main light source. Following the IEEE 802.15.7r1 VLC reference channel model, we assume that there are two different light sources present in an office room. The first one is the source terminal present on the ceiling and another one is… ▽ More

    Submitted 8 July, 2023; originally announced July 2023.

  2. Mining Privacy-Preserving Association Rules based on Parallel Processing in Cloud Computing

    Authors: Dhinakaran D, Joe Prathap P. M, Selvaraj D, Arul Kumar D, Murugeshwari B

    Abstract: With the onset of the Information Era and the rapid growth of information technology, ample space for processing and extracting data has opened up. However, privacy concerns may stifle expansion throughout this area. The challenge of reliable mining techniques when transactions disperse across sources is addressed in this study. This work looks at the prospect of creating a new set of three algori… ▽ More

    Submitted 21 April, 2023; originally announced April 2023.

  3. arXiv:2301.06713  [pdf, other

    cs.NI

    Open RAN: Evolution of Architecture, Deployment Aspects, and Future Directions

    Authors: Prabhu Kaliyammal Thiruvasagam, Chandrasekar T, Vinay Venkataram, Vivek Raja Ilangovan, Maneesha Perapalla, Rajisha Payyanur, Senthilnathan M D, Vishal Kumar, Kokila J

    Abstract: The Open Radio Access Network (Open RAN) aims to enable disaggregated, virtualized, programmable, and data-driven intelligent network with open interfaces to support various real-time and non-real-time applications for different classes of users and multiple industry verticals in beyond 5G and 6G networks while providing interoperability among multi-vendor network functions and components. In this… ▽ More

    Submitted 17 January, 2023; originally announced January 2023.

  4. arXiv:2210.09348  [pdf

    cs.DL

    Use of Electronic Resources by Law Academics in India

    Authors: Mane Sunita D, Subaveerapandiyan A

    Abstract: This study investigated e-resources use, storage, the preferred format for reading, and difficulties faced while accessing e-resources. Electronic resources are playing a crucial role all over the world, and they are increasing widely in all age groups of the academic community. The main aim of the law academics' role is to know the effective use of electronic resources. For this study, we adopted… ▽ More

    Submitted 14 October, 2022; originally announced October 2022.

  5. arXiv:2204.03694  [pdf, other

    cs.LG cs.CV

    Adaptive-Gravity: A Defense Against Adversarial Samples

    Authors: Ali Mirzaeian, Zhi Tian, Sai Manoj P D, Banafsheh S. Latibari, Ioannis Savidis, Houman Homayoun, Avesta Sasan

    Abstract: This paper presents a novel model training solution, denoted as Adaptive-Gravity, for enhancing the robustness of deep neural network classifiers against adversarial examples. We conceptualize the model parameters/features associated with each class as a mass characterized by its centroid location and the spread (standard deviation of the distance) of features around the centroid. We use the centr… ▽ More

    Submitted 7 April, 2022; originally announced April 2022.

  6. arXiv:2110.04908  [pdf, other

    eess.AS cs.SD

    DITTO: Data-efficient and Fair Targeted Subset Selection for ASR Accent Adaptation

    Authors: Suraj Kothawade, Anmol Mekala, Chandra Sekhara D, Mayank Kothyari, Rishabh Iyer, Ganesh Ramakrishnan, Preethi Jyothi

    Abstract: State-of-the-art Automatic Speech Recognition (ASR) systems are known to exhibit disparate performance on varying speech accents. To improve performance on a specific target accent, a commonly adopted solution is to finetune the ASR model using accent-specific labeled speech. However, acquiring large amounts of labeled speech for specific target accents is challenging. Choosing an informative subs… ▽ More

    Submitted 5 June, 2023; v1 submitted 10 October, 2021; originally announced October 2021.

    Comments: ACL 2023

  7. arXiv:2108.07761  [pdf, other

    cs.CV

    VisBuddy -- A Smart Wearable Assistant for the Visually Challenged

    Authors: Ishwarya Sivakumar, Nishaali Meenakshisundaram, Ishwarya Ramesh, Shiloah Elizabeth D, Sunil Retmin Raj C

    Abstract: Vision plays a crucial role in comprehending the world around us. More than 85% of the external information is obtained through the vision system. It influences our mobility, cognition, information access, and interaction with the environment and other people. Blindness prevents a person from gaining knowledge of the surrounding environment and makes unassisted navigation, object recognition, obst… ▽ More

    Submitted 4 January, 2022; v1 submitted 17 August, 2021; originally announced August 2021.

    Comments: 10 pages

  8. arXiv:2104.07378  [pdf, other

    cs.CL cs.AI cs.IR

    Tracking entities in technical procedures -- a new dataset and baselines

    Authors: Saransh Goyal, Pratyush Pandey, Garima Gaur, Subhalingam D, Srikanta Bedathur, Maya Ramanath

    Abstract: We introduce TechTrack, a new dataset for tracking entities in technical procedures. The dataset, prepared by annotating open domain articles from WikiHow, consists of 1351 procedures, e.g., "How to connect a printer", identifies more than 1200 unique entities with an average of 4.7 entities per procedure. We evaluate the performance of state-of-the-art models on the entity-tracking task and find… ▽ More

    Submitted 15 April, 2021; originally announced April 2021.

  9. arXiv:2101.00877  [pdf

    cs.RO physics.app-ph

    Human machine interaction systems encounters convergence

    Authors: Josephine Selvarani Ruth D, Vishwas Navada B

    Abstract: Human machine interaction systems are those of much needed in the emerging technology to make the user aware of what is happening around. It is huge domain in which the smart material enables the factor of convergence. One such is the piezoelectric crystals, is a class of smart material and this has an incredible property of self-sensing actuation (SSA). This property of SSA has added an indescrib… ▽ More

    Submitted 4 January, 2021; originally announced January 2021.

  10. arXiv:2101.00875  [pdf

    cs.RO physics.app-ph

    Design and Development of Robots End Effector Test Rig

    Authors: Josephine Selvarani Ruth D, Saniya Zeba, Vibha M R, Rokesh Laishram, Gauthama Anand

    Abstract: A Test Rig for end-effectors of a robot is designed such that it achieves a prismatic motion in x-y-z axes for gras** an object. It is a structure, designed with a compact combination of sensors and actuators. Sensors are used for detecting presence, position and disturbance of target work piece or any object and actuators with motor driving system meant for controlling and moving the mechanism… ▽ More

    Submitted 4 January, 2021; originally announced January 2021.

  11. arXiv:2004.01388  [pdf

    physics.med-ph cs.LG eess.IV

    Predicting the risk of pancreatic cancer with a CT-based ensemble AI algorithm

    Authors: Chenjie Zhou MD, Jianhua Ma Ph. D, ** Xu MD, Lei Feng MD, Adilijiang Yimamu MD, Xianlong Wang MD, Zhiming Li MD, Jianhua Mo MS, Chengyan Huang MS, Dexia Kong MS, Yi Gao MD, Shulong Li Ph. D

    Abstract: Objectives: Pancreatic cancer is a lethal disease, hard to diagnose and usually results in poor prognosis and high mortality. Develo** an artificial intelligence (AI) algorithm to accurately and universally predict the early cancer risk of all kinds of pancreatic cancer is extremely important. We propose an ensemble AI algorithm to predict universally cancer risk of all kinds of pancreatic lesio… ▽ More

    Submitted 3 April, 2020; originally announced April 2020.

    Comments: 14 pages, 4 figures, 5 tables

  12. arXiv:2001.00575  [pdf

    cs.HC cs.CL

    Smart Summarizer for Blind People

    Authors: Mona teja K, Mohan Sai. S, H S S S Raviteja D, Sai Kushagra P V

    Abstract: In today's world, time is a very important resource. In our busy lives, most of us hardly have time to read the complete news so what we have to do is just go through the headlines and satisfy ourselves with that. As a result, we might miss a part of the news or misinterpret the complete thing. The situation is even worse for the people who are visually impaired or have lost their ability to see.… ▽ More

    Submitted 1 January, 2020; originally announced January 2020.

    Comments: 4 pages, 4 figures

  13. arXiv:1907.07861  [pdf, other

    cs.HC

    Jo: The Smart Journal

    Authors: Vivian Li, Alon Halevy, Adi Zief-Balteriski Ph. D, Wang-Chiew Tan, George Mihaila, John Morales, Natalie Nuno, Huining Liu, Chen Chen, Xiaojuan Ma, Shani Robins Ph. D., Jessica Johnson

    Abstract: We introduce Jo, a mobile application that attempts to improve user's well-being. Jo is a journaling application--users log their important moments via short texts and optionally an attached photo. Unlike a static journal, Jo analyzes these moments and helps users take action towards increased well-being. For example, Jo annotates each moment with a set of values (e.g., family, socialization, mind… ▽ More

    Submitted 17 July, 2019; originally announced July 2019.

    Comments: 7 pages, 3 figures

  14. arXiv:1903.08847  [pdf

    cs.CV

    Parametic Classification of Handvein Patterns Based on Texture Features

    Authors: Harbi AlMahafzah, Mohammad Imranand, Supreetha Gowda H. D.

    Abstract: In this paper, we have developed Biometric recognition system adopting hand based modality Handvein, which has the unique pattern for each individual and it is impossible to counterfeit and fabricate as it is an internal feature. We have opted in choosing feature extraction algorithms such as LBP-visual descriptor ,LPQ-blur insensitive texture operator, Log-Gabor-Texture descriptor. We have chosen… ▽ More

    Submitted 21 March, 2019; originally announced March 2019.

    Comments: 8 pages, International Conference on Electrical, Electronics, Materials and Applied Science (ICEEMAS). AIP: Proceedings International Conference on Electrical, Electronics, Materials and Applied Science (ICEEMAS),22nd and 23rd December 2017

  15. arXiv:1902.05357  [pdf, other

    cs.CR cs.AI cs.CG cs.LG

    Estimating the Circuit Deobfuscating Runtime based on Graph Deep Learning

    Authors: Zhiqian Chen, Gaurav Kolhe, Setareh Rafatirad, Sai Manoj P. D., Houman Homayoun, Liang Zhao, Chang-Tien Lu

    Abstract: Circuit obfuscation is a recently proposed defense mechanism to protect digital integrated circuits (ICs) from reverse engineering by using camouflaged gates i.e., logic gates whose functionality cannot be precisely determined by the attacker. There have been effective schemes such as satisfiability-checking (SAT)-based attacks that can potentially decrypt obfuscated circuits, called deobfuscation… ▽ More

    Submitted 21 March, 2020; v1 submitted 14 February, 2019; originally announced February 2019.

    Comments: Design, Automation and Test in Europe (DATE) 2020

  16. arXiv:1809.01678  [pdf

    cs.IR

    Measures of Cluster Informativeness for Medical Evidence Aggregation and Dissemination

    Authors: Michael Segundo Ortiz, Sam Bubnovich, Mengqian Wang, Kazuhiro Seki Ph. D., Javed Mostafa Ph. D

    Abstract: The largest collection of medical evidence in the world is PubMed. However, the significant barrier in accessing and extracting information is information organization. A factor that contributes towards this barrier is managing medical controlled vocabularies that allow us to systematically and consistently organize, index, and search biomedical literature. Additionally, from users' perspective, t… ▽ More

    Submitted 5 September, 2018; originally announced September 2018.

    Comments: This article is currently under consideration for the 9th workshop on Visual Analytics in Healthcare. AMIA 2018, November 3rd, San Francisco, CA

  17. arXiv:1410.7654  [pdf

    cs.IR

    XML Information Retrieval:An overview

    Authors: Suma D., U. Dinesh Acharya, Geetha M., Raviraja Holla M

    Abstract: Locating and distilling the valuable relevant information continued to be the major challenges of Information Retrieval (IR) Systems owing to the explosive growth of online web information. These challenges can be considered the XML Information Retrieval challenges as XML has become a de facto standard over the Web. The research on XML IR starts with the classical IR strategies customized to XML I… ▽ More

    Submitted 27 October, 2014; originally announced October 2014.

    Comments: 7 pages, 0 figures

    Journal ref: International Global Journal For Engineering Research, Volume 10 Issue 1, 2014 pg. 26-32

  18. A Survey on an Effective Defense Mechanism against Reactive Jamming Attacks in WSN

    Authors: Manojkumar. M. K, Sathya. D

    Abstract: A Wireless Sensor Network (WSN) is a self-configure network of sensor nodes communicate among themselves using radio signals and deployed in quantity to sense, monitor and to understand the physical world. A jammer is an entity which interferes with the physical transmission and reception of wireless communications. Reactive jamming attack is a major security problem in the wireless sensor network… ▽ More

    Submitted 6 February, 2014; originally announced February 2014.

    Comments: 4 pages,3 figures,"Published with International Journal of Computer Trends and Technology (IJCTT)"

    Journal ref: IJCTT 7(3):143-146, January 2014. Published by Seventh Sense Research Group

  19. arXiv:1102.2608  [pdf, other

    cs.DC

    Power Efficient Resource Allocation for Clouds Using Ant Colony Framework

    Authors: Lskrao Chimakurthi, Madhu Kumar S D

    Abstract: Cloud computing is one of the rapidly improving technologies. It provides scalable resources needed for the ap- plications hosted on it. As cloud-based services become more dynamic, resource provisioning becomes more challenging. The QoS constrained resource allocation problem is considered in this paper, in which customers are willing to host their applications on the provider's cloud with a give… ▽ More

    Submitted 13 February, 2011; originally announced February 2011.

    Comments: 6 pages, 1 figure, 6 algorithms

  20. arXiv:1011.5326  [pdf, other

    cs.NI

    Energy Efficient Clustering and Routing in Mobile Wireless Sensor Network

    Authors: Getsy S. Sara, Kalaiarasi. R, Neelavathy Pari. S, Sridharan . D

    Abstract: A critical need in Mobile Wireless Sensor Network (MWSN) is to achieve energy efficiency during routing as the sensor nodes have scarce energy resource. The nodes' mobility in MWSN poses a challenge to design an energy efficient routing protocol. Clustering helps to achieve energy efficiency by reducing the organization complexity overhead of the network which is proportional to the number of node… ▽ More

    Submitted 24 November, 2010; originally announced November 2010.

    Comments: 9 pages, 4 figures

  21. arXiv:1005.4020  [pdf

    cs.CV

    Image Segmentation by Using Threshold Techniques

    Authors: Salem Saleh Al-amri, N. V. Kalyankar, Khamitkar S. D.

    Abstract: This paper attempts to undertake the study of segmentation image techniques by using five threshold methods as Mean method, P-tile method, Histogram Dependent Technique (HDT), Edge Maximization Technique (EMT) and visual Technique and they are compared with one another so as to choose the best technique for threshold segmentation techniques image. These techniques applied on three satellite images… ▽ More

    Submitted 21 May, 2010; originally announced May 2010.

    Comments: http://www.journalofcomputing.org

    Journal ref: Journal of Computing, Volume 2, Issue 5, May 2010

  22. arXiv:1004.4448  [pdf

    cs.CV

    Deblured Gaussian Blurred Images

    Authors: Salem Saleh Al-amri, N. V. Kalyankar, Khamitkar S. D

    Abstract: This paper attempts to undertake the study of Restored Gaussian Blurred Images. by using four types of techniques of deblurring image as Wiener filter, Regularized filter, Lucy Richardson deconvlutin algorithm and Blind deconvlution algorithm with an information of the Point Spread Function (PSF) corrupted blurred image with Different values of Size and Alfa and then corrupted by Gaussian noise. T… ▽ More

    Submitted 26 April, 2010; originally announced April 2010.

    Comments: Journal of Computing online at https://sites.google.com/site/journalofcomputing/

    Journal ref: Journal of Computing, Volume 2, Issue 4, April 2010