Skip to main content

Showing 1–15 of 15 results for author: Dave, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.10912  [pdf

    cs.CV cs.LG

    Automatic location detection based on deep learning

    Authors: Anjali Karangiya, Anirudh Sharma, Divax Shah, Kartavya Badgujar, Dr. Chintan Thacker, Dainik Dave

    Abstract: The proliferation of digital images and the advancements in deep learning have paved the way for innovative solutions in various domains, especially in the field of image classification. Our project presents an in-depth study and implementation of an image classification system specifically tailored to identify and classify images of Indian cities. Drawing from an extensive dataset, our model clas… ▽ More

    Submitted 16 March, 2024; originally announced March 2024.

  2. arXiv:2311.16588  [pdf

    cs.CL

    Ascle: A Python Natural Language Processing Toolkit for Medical Text Generation

    Authors: Rui Yang, Qingcheng Zeng, Keen You, Yujie Qiao, Lucas Huang, Chia-Chun Hsieh, Benjamin Rosand, Jeremy Goldwasser, Amisha D Dave, Tiarnan D. L. Keenan, Emily Y Chew, Dragomir Radev, Zhiyong Lu, Hua Xu, Qingyu Chen, Irene Li

    Abstract: This study introduces Ascle, a pioneering natural language processing (NLP) toolkit designed for medical text generation. Ascle is tailored for biomedical researchers and healthcare professionals with an easy-to-use, all-in-one solution that requires minimal programming expertise. For the first time, Ascle evaluates and provides interfaces for the latest pre-trained language models, encompassing f… ▽ More

    Submitted 9 December, 2023; v1 submitted 28 November, 2023; originally announced November 2023.

    Comments: 5 figures, 4 tables

  3. arXiv:2311.12944  [pdf, other

    cs.NI cs.AI cs.LG cs.NE

    SkyCharge: Deploying Unmanned Aerial Vehicles for Dynamic Load Optimization in Solar Small Cell 5G Networks

    Authors: Daksh Dave, Vinay Chamola, Sandeep Joshi, Sherali Zeadally

    Abstract: The power requirements posed by the fifth-generation and beyond cellular networks are an important constraint in network deployment and require energy-efficient solutions. In this work, we propose a novel user load transfer approach using airborne base stations (BS) mounted on drones for reliable and secure power redistribution across the micro-grid network comprising green small cell BSs. Dependi… ▽ More

    Submitted 9 February, 2024; v1 submitted 21 November, 2023; originally announced November 2023.

  4. arXiv:2311.12589   

    cs.CV cs.AI cs.LG

    Improving Source-Free Target Adaptation with Vision Transformers Leveraging Domain Representation Images

    Authors: Gauransh Sawhney, Daksh Dave, Adeel Ahmed, Jiechao Gao, Khalid Saleem

    Abstract: Unsupervised Domain Adaptation (UDA) methods facilitate knowledge transfer from a labeled source domain to an unlabeled target domain, navigating the obstacle of domain shift. While Convolutional Neural Networks (CNNs) are a staple in UDA, the rise of Vision Transformers (ViTs) provides new avenues for domain generalization. This paper presents an innovative method to bolster ViT performance in so… ▽ More

    Submitted 2 December, 2023; v1 submitted 21 November, 2023; originally announced November 2023.

    Comments: Requesting withdrawal due to significant overlap with prior research that wasn't appropriately acknowledged in our manuscript. The decision is made to uphold academic integrity

  5. Drone-Enabled Load Management for Solar Small Cell Networks in Next-Gen Communications Optimization for Solar Small Cells

    Authors: Daksh Dave, Dhruv Khut, Sahil Nawale, Pushkar Aggrawal, Disha Rastogi, Kailas Devadkar

    Abstract: In recent years, the cellular industry has witnessed a major evolution in communication technologies. It is evident that the Next Generation of cellular networks(NGN) will play a pivotal role in the acceptance of emerging IoT applications supporting high data rates, better Quality of Service(QoS), and reduced latency. However, the deployment of NGN will introduce a power overhead on the communicat… ▽ More

    Submitted 5 November, 2023; originally announced November 2023.

    Comments: 5 pages, 3 figures, 1 table, 1 algorithm

  6. PotholeGuard: A Pothole Detection Approach by Point Cloud Semantic Segmentation

    Authors: Sahil Nawale, Dhruv Khut, Daksh Dave, Gauransh Sawhney, Pushkar Aggrawal, Dr. Kailas Devadakar

    Abstract: Pothole detection is crucial for road safety and maintenance, traditionally relying on 2D image segmentation. However, existing 3D Semantic Pothole Segmentation research often overlooks point cloud sparsity, leading to suboptimal local feature capture and segmentation accuracy. Our research presents an innovative point cloud-based pothole segmentation architecture. Our model efficiently identifies… ▽ More

    Submitted 5 November, 2023; originally announced November 2023.

    Comments: 6 pages, 6 figures, 3 tables

  7. arXiv:2311.02630  [pdf

    cs.CR cs.AI cs.CY cs.LG

    The New Frontier of Cybersecurity: Emerging Threats and Innovations

    Authors: Daksh Dave, Gauransh Sawhney, Pushkar Aggarwal, Nitish Silswal, Dhruv Khut

    Abstract: In today's digitally interconnected world, cybersecurity threats have reached unprecedented levels, presenting a pressing concern for individuals, organizations, and governments. This study employs a qualitative research approach to comprehensively examine the diverse threats of cybersecurity and their impacts across various sectors. Four primary categories of threats are identified and analyzed,… ▽ More

    Submitted 5 November, 2023; originally announced November 2023.

    Comments: 6 pages, 2 Tables

    Journal ref: 2023 29th International Conference on Telecommunications (ICT), pp. 1-6, 2023

  8. arXiv:2311.02621  [pdf, other

    cs.LG cs.AI cs.IR cs.IT

    AIOps-Driven Enhancement of Log Anomaly Detection in Unsupervised Scenarios

    Authors: Daksh Dave, Gauransh Sawhney, Dhruv Khut, Sahil Nawale, Pushkar Aggrawal, Prasenjit Bhavathankar

    Abstract: Artificial intelligence operations (AIOps) play a pivotal role in identifying, mitigating, and analyzing anomalous system behaviors and alerts. However, the research landscape in this field remains limited, leaving significant gaps unexplored. This study introduces a novel hybrid framework through an innovative algorithm that incorporates an unsupervised strategy. This strategy integrates Principa… ▽ More

    Submitted 5 November, 2023; originally announced November 2023.

    Comments: 6 pages, 1 figure, 1 table

  9. SAppKG: Mobile App Recommendation Using Knowledge Graph and Side Information-A Secure Framework

    Authors: Daksh Dave, Aditya Sharma, Shafii Muhammad Abdulhamid, Adeel Ahmed, Adnan Akhunzada, Rashid Amin

    Abstract: Due to the rapid development of technology and the widespread usage of smartphones, the number of mobile applications is exponentially growing. Finding a suitable collection of apps that aligns with users needs and preferences can be challenging. However, mobile app recommender systems have emerged as a helpful tool in simplifying this process. But there is a drawback to employing app recommender… ▽ More

    Submitted 29 September, 2023; originally announced September 2023.

    Journal ref: IEEE Access, vol. 11, pp. 76751-76767, 2023

  10. arXiv:2308.05563  [pdf

    cs.AI cs.CY

    Recent Advancements In The Field Of Deepfake Detection

    Authors: Natalie Krueger, Dr. Mounika Vanamala, Dr. Rushit Dave

    Abstract: A deepfake is a photo or video of a person whose image has been digitally altered or partially replaced with an image of someone else. Deepfakes have the potential to cause a variety of problems and are often used maliciously. A common usage is altering videos of prominent political figures and celebrities. These deepfakes can portray them making offensive, problematic, and/or untrue statements. C… ▽ More

    Submitted 10 August, 2023; originally announced August 2023.

  11. arXiv:2203.14277  [pdf, ps, other

    cs.HC

    UAST: Unicode Aware Sanskrit Transliteration

    Authors: Aneri Dalwadi, Dhruvil Dave

    Abstract: Devanāgarī is the writing system that is adapted by various languages like Sanskrit. International Alphabet of Sanskrit Transliteration (IAST) is a transliteration scheme for romanisation of Sanskrit language. IAST makes use of diacritics to represent various characters. On a computer, these are represented using Unicode standard which differs from how the Sanskrit language behaves at a very funda… ▽ More

    Submitted 29 December, 2023; v1 submitted 27 March, 2022; originally announced March 2022.

    Comments: 9 pages. Source code and implementation are available on GitHub at https://github.com/dhruvildave/uast and https://github.com/aneri0x4f/uast-cli

    ACM Class: H.5.2

  12. arXiv:2110.07826  [pdf

    cs.CR cs.AI

    Machine Learning Algorithms In User Authentication Schemes

    Authors: Laura Pryor, Dr. Rushit Dave, Dr. Naeem Seliya, Dr. Evelyn R Sowells Boone

    Abstract: In the past two decades, the number of mobile products being created by companies has grown exponentially. However, although these devices are constantly being upgraded with the newest features, the security measures used to protect these devices has stayed relatively the same over the past two decades. The vast difference in growth patterns between devices and their security is opening up the ris… ▽ More

    Submitted 14 October, 2021; originally announced October 2021.

  13. arXiv:2103.03096  [pdf, other

    cs.CV cs.AI

    Towards Designing Computer Vision-based Explainable-AI Solution: A Use Case of Livestock Mart Industry

    Authors: Devam Dave, Het Naik, Smiti Singhal, Rudresh Dwivedi, Pankesh Patel

    Abstract: The objective of an online Mart is to match buyers and sellers, to weigh animals and to oversee their sale. A reliable pricing method can be developed by ML models that can read through historical sales data. However, when AI models suggest or recommend a price, that in itself does not reveal too much (i.e., it acts like a black box) about the qualities and the abilities of an animal. An intereste… ▽ More

    Submitted 8 February, 2021; originally announced March 2021.

    Comments: 8 pages, 5 figures

  14. arXiv:2011.03195  [pdf, other

    cs.LG cs.AI

    Explainable AI meets Healthcare: A Study on Heart Disease Dataset

    Authors: Devam Dave, Het Naik, Smiti Singhal, Pankesh Patel

    Abstract: With the increasing availability of structured and unstructured data and the swift progress of analytical techniques, Artificial Intelligence (AI) is bringing a revolution to the healthcare industry. With the increasingly indispensable role of AI in healthcare, there are growing concerns over the lack of transparency and explainability in addition to potential bias encountered by predictions of th… ▽ More

    Submitted 6 November, 2020; originally announced November 2020.

    Comments: 23

  15. arXiv:1408.3537  [pdf

    cs.NI

    An Effective Black Hole Attack Detection Mechanism using Permutation Based Acknowledgement in MANET

    Authors: Dhaval Dave, Pranav Dave

    Abstract: With the evolution of wireless technology and use of mobile devices, Mobile Ad-hoc Network has become popular among researchers to explore. A mobile ad-hoc network (MANET) is a self-configuring network of mobile routers (and associated hosts) connected by wireless links. The routers and hosts are free to move randomly and organize themselves arbitrarily. It allows mobile nodes to communicate direc… ▽ More

    Submitted 15 August, 2014; originally announced August 2014.

    Comments: MANET, Black Hole, Permutation, Security, Ad-hoc network