Skip to main content

Showing 1–11 of 11 results for author: G, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.02541  [pdf

    cs.RO cond-mat.mtrl-sci

    Autonomous Multi-Rotor UAVs: A Holistic Approach to Design, Optimization, and Fabrication

    Authors: Aniruth A, Chirag Satpathy, Jothika K, Nitteesh M, Gokulraj M, Venkatram K, Harshith G, Shristi S, Anushka Vani, Jonathan Spurgeon

    Abstract: Unmanned Aerial Vehicles (UAVs) have become pivotal in domains spanning military, agriculture, surveillance, and logistics, revolutionizing data collection and environmental interaction. With the advancement in drone technology, there is a compelling need to develop a holistic methodology for designing UAVs. This research focuses on establishing a procedure encompassing conceptual design, use of c… ▽ More

    Submitted 4 January, 2024; originally announced January 2024.

  2. arXiv:2308.14493  [pdf, other

    cs.DS cs.DB

    Efficient Batch Dynamic Graphlet Counting

    Authors: Hriday G, Pranav Saikiran Sista, Apurba Das

    Abstract: Graphlet counting is an important problem as it has numerous applications in several fields, including social network analysis, biological network analysis, transaction network analysis, etc. Most of the practical networks are dynamic. A graphlet is a subgraph with a fixed number of vertices and can be induced or non-induced. There are several works for counting graphlets in a static network where… ▽ More

    Submitted 28 August, 2023; originally announced August 2023.

  3. arXiv:2305.16837  [pdf, other

    cs.SE cs.AI cs.LG

    ChatGPT: A Study on its Utility for Ubiquitous Software Engineering Tasks

    Authors: Giriprasad Sridhara, Ranjani H. G., Sourav Mazumdar

    Abstract: ChatGPT (Chat Generative Pre-trained Transformer) is a chatbot launched by OpenAI on November 30, 2022. OpenAI's GPT-3 family of large language models serve as the foundation for ChatGPT. ChatGPT is fine-tuned with both supervised and reinforcement learning techniques and has received widespread attention for its articulate responses across diverse domains of knowledge. In this study, we explore h… ▽ More

    Submitted 26 May, 2023; originally announced May 2023.

  4. arXiv:2305.13102  [pdf, other

    cs.HC cs.AI cs.CL cs.LG

    Observations on LLMs for Telecom Domain: Capabilities and Limitations

    Authors: Sumit Soman, Ranjani H G

    Abstract: The landscape for building conversational interfaces (chatbots) has witnessed a paradigm shift with recent developments in generative Artificial Intelligence (AI) based Large Language Models (LLMs), such as ChatGPT by OpenAI (GPT3.5 and GPT4), Google's Bard, Large Language Model Meta AI (LLaMA), among others. In this paper, we analyze capabilities and limitations of incorporating such models in co… ▽ More

    Submitted 22 May, 2023; originally announced May 2023.

    Comments: 11 pages, 2 figures, 8 tables

    MSC Class: 68T50

  5. arXiv:2302.05082  [pdf, other

    cs.RO cs.MA eess.SY

    Reinforcement Learning Aided Sequential Optimization for Unsignalized Intersection Management of Robot Traffic

    Authors: Nishchal Hoysal G., Pavankumar Tallapragada

    Abstract: We consider the problem of optimal unsignalized intersection management for continual streams of randomly arriving robots. This problem involves repeatedly solving different instances of a mixed integer program, for which the computation time using a naive optimization algorithm scales exponentially with the number of robots and lanes. Hence, such an approach is not suitable for real-time implemen… ▽ More

    Submitted 1 September, 2023; v1 submitted 10 February, 2023; originally announced February 2023.

    Comments: 13 pages, 27 figures

  6. arXiv:2109.04440  [pdf, other

    cs.MM

    '1e0a': A Computational Approach to Rhythm Training

    Authors: Noel Alben, Ranjani H. G

    Abstract: We present a computational assessment system that promotes the learning of basic rhythmic patterns. The system is capable of generating multiple rhythmic patterns with increasing complexity within various cycle lengths. For a generated rhythm pattern the performance assessment of the learner is carried out through the statistical deviations calculated from the onset detection and temporal assessme… ▽ More

    Submitted 9 September, 2021; originally announced September 2021.

  7. arXiv:2009.08322  [pdf, other

    cs.SI

    Moving with the Times: Investigating the Alt-Right Network Gab with Temporal Interaction Graphs

    Authors: Naomi A. Arnold, Benjamin A. Steer, Imane Hafnaoui, Hugo A. Parada G., Raul J. Mondragon, Felix Cuadrado, Richard G. Clegg

    Abstract: Gab is an online social network often associated with the alt-right political movement and users barred from other networks. It presents an interesting opportunity for research because near-complete data is available from day one of the network's creation. In this paper, we investigate the evolution of the user interaction graph, that is the graph where a link represents a user interacting with an… ▽ More

    Submitted 17 September, 2020; originally announced September 2020.

    Comments: 10 pages, 9 figures

  8. Performance Analysis of Parallel Pollard's Rho Algorithm

    Authors: Anjan K. Koundinya, Harish G., Srinath N. K., Raghavendra G. E., Pramod Y. V., Sandeep R., Punith Kumar G

    Abstract: Integer factorization is one of the vital algorithms discussed as a part of analysis of any black-box cipher suites where the cipher algorithm is based on number theory. The origin of the problem is from Discrete Logarithmic Problem which appears under the analysis of the crypto-graphic algorithms as seen by a crypt-analyst. The integer factorization algorithm poses a potential in computational sc… ▽ More

    Submitted 19 May, 2013; originally announced May 2013.

    Comments: 8 pages, 4 figures, Journal

  9. A Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks

    Authors: Jaydip Sen, M. Girish Chandra, Harihara S. G., Harish Reddy, P. Balamuralidhar

    Abstract: Protecting the network layer from malicious attacks is an important and challenging security issue in mobile ad hoc networks (MANETs). In this paper, a security mechanism is proposed to defend against a cooperative gray hole attack on the well known AODV routing protocol in MANETs. A gray hole is a node that selectively drops and forwards data packets after it advertises itself as having the short… ▽ More

    Submitted 2 November, 2011; originally announced November 2011.

    Comments: 5 pages, 5 figures, 3 tables. In Proceedings of the 6th International Conference on Information, Communications and Signal Processing (ICICS '07), Singapore, December 10-13, 2007, Paper ID: 0458, Track: Th2.5- Network Security. ISBN: 1-4244-0983-7

  10. arXiv:1111.0385  [pdf

    cs.CR cs.NI

    A Distributed Protocol for Detection of Packet Drop** Attack in Mobile Ad Hoc Networks

    Authors: Jaydip Sen, M. Girish Chandra, P. Balamuralidhar, Harihara S. G., Harish Reddy

    Abstract: In multi-hop mobile ad hoc networks (MANETs),mobile nodes cooperate with each other without using any infrastructure such as access points or base stations. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of clear lines of defense. Amon… ▽ More

    Submitted 2 November, 2011; originally announced November 2011.

    Comments: 7 pages, 9 figures, 1 table. In Proceedings of the International Conference on Telecommunications and Malaysian International Conference on Communications (ICT-MICC'07), May 14-17, Penang, Malaysia. Paper ID: 74, Track: 3: Ad Hoc Routing and Protocols. ISBN: 1-4244-1094-0

  11. Context Aware End-to-End Connectivity Management

    Authors: Jaydip Sen, P. Balamuralidhar, M. Girish Chandra, Harihara S. G., Harish Reddy

    Abstract: In a dynamic heterogeneous environment, such as pervasive and ubiquitous computing, context-aware adaptation is a key concept to meet the varying requirements of different users. Connectivity is an important context source that can be utilized for optimal management of diverse networking resources. Application QoS (Quality of service) is another important issue that should be taken into considerat… ▽ More

    Submitted 12 December, 2010; originally announced December 2010.

    Comments: 8 pages, 3 figures. Second International Conference on Embedded Systems, Mobile Communication and Computing (ICEMCC), pp. 85 - 95, Bangalore, August 2007, India

    Report number: ISSN: 0973-208X