Skip to main content

Showing 1–42 of 42 results for author: Gowri

Searching in archive cs. Search in all archives.
.
  1. arXiv:2401.17538  [pdf, other

    cs.CR

    Post-Quantum Cryptography for Internet of Things: A Survey on Performance and Optimization

    Authors: Tao Liu, Gowri Ramachandran, Raja Jurdak

    Abstract: Due to recent development in quantum computing, the invention of a large quantum computer is no longer a distant future. Quantum computing severely threatens modern cryptography, as the hard mathematical problems beneath classic public-key cryptosystems can be solved easily by a sufficiently large quantum computer. As such, researchers have proposed PQC based on problems that even quantum computer… ▽ More

    Submitted 30 January, 2024; originally announced January 2024.

    Comments: 13 pages, 3 figures and 7 tables. Formatted version submitted to ACM Computer Surveys

  2. arXiv:2401.07084  [pdf, other

    cs.MM cs.SD eess.AS

    ScripTONES: Sentiment-Conditioned Music Generation for Movie Scripts

    Authors: Vishruth Veerendranath, Vibha Masti, Utkarsh Gupta, Hrishit Chaudhuri, Gowri Srinivasa

    Abstract: Film scores are considered an essential part of the film cinematic experience, but the process of film score generation is often expensive and infeasible for small-scale creators. Automating the process of film score composition would provide useful starting points for music in small projects. In this paper, we propose a two-stage pipeline for generating music from a movie script. The first phase… ▽ More

    Submitted 13 January, 2024; originally announced January 2024.

    Comments: Presented at NeurIPS 2023 - ML For Audio workshop. To appear in proceedings of AIML Systems 2023 - Generative AI

  3. arXiv:2312.13451  [pdf, other

    cs.CE cs.LG physics.geo-ph

    Learning the Factors Controlling Mineralization for Geologic Carbon Sequestration

    Authors: Aleksandra Pachalieva, Jeffrey D. Hyman, Daniel O'Malley, Hari Viswanathan, Gowri Srinivasan

    Abstract: We perform a set of flow and reactive transport simulations within three-dimensional fracture networks to learn the factors controlling mineral reactions. CO$_2$ mineralization requires CO$_2$-laden water, dissolution of a mineral that then leads to precipitation of a CO$_2$-bearing mineral. Our discrete fracture networks (DFN) are partially filled with quartz that gradually dissolves until it rea… ▽ More

    Submitted 20 December, 2023; originally announced December 2023.

    Comments: 23 pages, 5 figures, 2 tables

  4. arXiv:2311.14499  [pdf, ps, other

    cs.CR

    Comment on "Improved RSA Technique with Efficient Data Integrity Verification for Outsourcing Database in Cloud"

    Authors: Chebrolu Deepak Kumar, Lilly Kumari Biswas, Srijanee Mookherji, Gowri Raghavendra Narayan Kurmala, Vanga Odelu

    Abstract: In 2022, Neela and Kavitha proposed an improved RSA encryption algorithm (IREA) for cloud environment. In this paper, we review and comment on the correctness of the IREA technique. We prove that the private key generation in the proposed IREA is mathematical incorrect. That is, decryption of the cipher generated by the public key is not possible with the private key. Further, we discuss the possi… ▽ More

    Submitted 24 November, 2023; originally announced November 2023.

  5. arXiv:2310.07782  [pdf, other

    cs.CV

    An automated approach for improving the inference latency and energy efficiency of pretrained CNNs by removing irrelevant pixels with focused convolutions

    Authors: Caleb Tung, Nicholas Eliopoulos, Purvish Jajal, Gowri Ramshankar, Chen-Yun Yang, Nicholas Synovic, Xuecen Zhang, Vipin Chaudhary, George K. Thiruvathukal, Yung-Hsiang Lu

    Abstract: Computer vision often uses highly accurate Convolutional Neural Networks (CNNs), but these deep learning models are associated with ever-increasing energy and computation requirements. Producing more energy-efficient CNNs often requires model training which can be cost-prohibitive. We propose a novel, automated method to make a pretrained CNN more energy-efficient without re-training. Given a pret… ▽ More

    Submitted 11 October, 2023; originally announced October 2023.

  6. A Zigbee Based Cost-Effective Home Monitoring System Using WSN

    Authors: Garapati Venkata Krishna Rayalu, Paleti Nikhil Chowdary, Manish Nadella, Dabbara Harsha, **ali Sathvika, B. Ganga Gowri

    Abstract: WSNs are vital in a variety of applications, including environmental monitoring, industrial process control, and healthcare. WSNs are a network of spatially scattered and dedicated sensors that monitor and record the physical conditions of the environment.Significant obstacles to WSN efficiency include the restricted power and processing capabilities of individual sensor nodes and the issues with… ▽ More

    Submitted 17 September, 2023; originally announced September 2023.

    Comments: Paper has been presented at ICCCNT 2023 and the final version will be published in IEEE Digital Library Xplore

  7. arXiv:2308.02778  [pdf, other

    eess.SP cs.LG

    Unveiling Emotions from EEG: A GRU-Based Approach

    Authors: Sarthak Johari, Gowri Namratha Meedinti, Radhakrishnan Delhibabu, Deepak Joshi

    Abstract: One of the most important study areas in affective computing is emotion identification using EEG data. In this study, the Gated Recurrent Unit (GRU) algorithm, which is a type of Recurrent Neural Networks (RNNs), is tested to see if it can use EEG signals to predict emotional states. Our publicly accessible dataset consists of resting neutral data as well as EEG recordings from people who were exp… ▽ More

    Submitted 20 July, 2023; originally announced August 2023.

    Comments: arXiv admin note: substantial text overlap with arXiv:2308.02437

  8. arXiv:2308.02437  [pdf, other

    eess.SP cs.LG

    Noise removal methods on ambulatory EEG: A Survey

    Authors: Sarthak Johari, Gowri Namratha Meedinti, Radhakrishnan Delhibabu, Deepak Joshi

    Abstract: Over many decades, research is being attempted for the removal of noise in the ambulatory EEG. In this respect, an enormous number of research papers is published for identification of noise removal, It is difficult to present a detailed review of all these literature. Therefore, in this paper, an attempt has been made to review the detection and removal of an noise. More than 100 research papers… ▽ More

    Submitted 16 July, 2023; originally announced August 2023.

  9. arXiv:2307.08204  [pdf, other

    quant-ph cs.LG

    A Quantum Convolutional Neural Network Approach for Object Detection and Classification

    Authors: Gowri Namratha Meedinti, Kandukuri Sai Srirekha, Radhakrishnan Delhibabu

    Abstract: This paper presents a comprehensive evaluation of the potential of Quantum Convolutional Neural Networks (QCNNs) in comparison to classical Convolutional Neural Networks (CNNs) and Artificial / Classical Neural Network (ANN) models. With the increasing amount of data, utilizing computing methods like CNN in real-time has become challenging. QCNNs overcome this challenge by utilizing qubits to repr… ▽ More

    Submitted 16 July, 2023; originally announced July 2023.

    Journal ref: APIN-D-23-03499/2023

  10. arXiv:2210.09004  [pdf, other

    cs.CY cs.AI cs.CL

    Real-Time Automated Answer Scoring

    Authors: Akash Nagaraj, Mukund Sood, Gowri Srinivasa

    Abstract: In recent years, the role of big data analytics has exponentially grown and is now slowly making its way into the education industry. Several attempts are being made in this sphere in order to improve the quality of education being provided to students and while many collaborations have been carried out before, automated scoring of answers has been explored to a rather limited extent. One of the b… ▽ More

    Submitted 13 October, 2022; originally announced October 2022.

    Comments: This paper was originally written in mid 2018

    Journal ref: In 2018 IEEE 18th International Conference on Advanced Learning Technologies (ICALT), pp.231-232. IEEE, 2018

  11. arXiv:2210.07400  [pdf, other

    cs.CV cs.AI cs.CY

    Real-time Action Recognition for Fine-Grained Actions and The Hand Wash Dataset

    Authors: Akash Nagaraj, Mukund Sood, Chetna Sureka, Gowri Srinivasa

    Abstract: In this paper we present a three-stream algorithm for real-time action recognition and a new dataset of handwash videos, with the intent of aligning action recognition with real-world constraints to yield effective conclusions. A three-stream fusion algorithm is proposed, which runs both accurately and efficiently, in real-time even on low-powered systems such as a Raspberry Pi. The cornerstone of… ▽ More

    Submitted 13 October, 2022; originally announced October 2022.

    Comments: This paper was originally written in early 2020

  12. arXiv:2202.04137  [pdf, other

    cs.LG cond-mat.mtrl-sci

    Machine Learning in Heterogeneous Porous Materials

    Authors: Marta D'Elia, Hang Deng, Cedric Fraces, Krishna Garikipati, Lori Graham-Brady, Amanda Howard, George Karniadakis, Vahid Keshavarzzadeh, Robert M. Kirby, Nathan Kutz, Chunhui Li, Xing Liu, Hannah Lu, Pania Newell, Daniel O'Malley, Masa Prodanovic, Gowri Srinivasan, Alexandre Tartakovsky, Daniel M. Tartakovsky, Hamdi Tchelepi, Bozo Vazic, Hari Viswanathan, Hongkyu Yoon, Piotr Zarzycki

    Abstract: The "Workshop on Machine learning in heterogeneous porous materials" brought together international scientific communities of applied mathematics, porous media, and material sciences with experts in the areas of heterogeneous materials, machine learning (ML) and applied mathematics to identify how ML can advance materials research. Within the scope of ML and materials research, the goal of the wor… ▽ More

    Submitted 4 February, 2022; originally announced February 2022.

    Comments: The workshop link is: https://amerimech.mech.utah.edu

  13. arXiv:2112.13956  [pdf, other

    cs.CR

    A Blockchain-based Data Governance Framework with Privacy Protection and Provenance for e-Prescription

    Authors: Rodrigo Dutra Garcia, Gowri Sankar Ramachandran, Raja Jurdak, Jo Ueyama

    Abstract: Real-world applications in healthcare and supply chain domains produce, exchange, and share data in a multi-stakeholder environment. Data owners want to control their data and privacy in such settings. On the other hand, data consumers demand methods to understand when, how, and who produced the data. These requirements necessitate data governance frameworks that guarantee data provenance, privacy… ▽ More

    Submitted 27 December, 2021; originally announced December 2021.

  14. arXiv:2108.12032  [pdf, other

    cs.CR

    Blockchain in Supply Chain: Opportunities and Design Considerations

    Authors: Gowri Sankar Ramachandran, Sidra Malik, Shantanu Pal, Ali Dorri, Volkan Dedeoglu, Salil Kanhere, Raja Jurdak

    Abstract: Supply chain applications operate in a multi-stakeholder setting, demanding trust, provenance, and transparency. Blockchain technology provides mechanisms to establish a decentralized infrastructure involving multiple stakeholders. Such mechanisms make the blockchain technology ideal for multi-stakeholder supply chain applications. This chapter introduces the characteristics and requirements of th… ▽ More

    Submitted 26 August, 2021; originally announced August 2021.

  15. arXiv:2104.12878  [pdf

    cs.CR cs.NI

    Security, Privacy and Trust: Cognitive Internet of Vehicles

    Authors: Khondokar Fida Hasan, Anthony Overall, Keyvan Ansari, Gowri Ramachandran, Raja Jurdak

    Abstract: The recent advancement of cloud technology offers unparallel strength to support intelligent computations and advanced services to assist with automated decisions to improve road transportation safety and comfort. Besides, the rise of machine intelligence propels the technological evolution of transportation systems one step further and leads to a new framework known as Cognitive Internet of Vehic… ▽ More

    Submitted 26 April, 2021; originally announced April 2021.

    Comments: 19 pages, book chapter

  16. arXiv:2011.10687  [pdf, other

    cs.CV cs.AI cs.GR cs.LG

    HDR Environment Map Estimation for Real-Time Augmented Reality

    Authors: Gowri Somanath, Daniel Kurz

    Abstract: We present a method to estimate an HDR environment map from a narrow field-of-view LDR camera image in real-time. This enables perceptually appealing reflections and shading on virtual objects of any material finish, from mirror to diffuse, rendered into a real physical environment using augmented reality. Our method is based on our efficient convolutional neural network architecture, EnvMapNet, t… ▽ More

    Submitted 27 July, 2021; v1 submitted 20 November, 2020; originally announced November 2020.

    Comments: Supplementary video at https://docs-assets.developer.apple.com/ml-research/papers/hdr-environment-map.mp4 Code at https://github.com/apple/ml-envmapnet Accepted to CVPR 2021

    ACM Class: I.2.10; I.4.8

  17. arXiv:2011.10227  [pdf, other

    cs.LG cond-mat.mtrl-sci

    StressNet: Deep Learning to Predict Stress With Fracture Propagation in Brittle Materials

    Authors: Yinan Wang, Diane Oyen, Weihong, Guo, Anishi Mehta, Cory Braker Scott, Nishant Panda, M. Giselle Fernández-Godino, Gowri Srinivasan, Xiaowei Yue

    Abstract: Catastrophic failure in brittle materials is often due to the rapid growth and coalescence of cracks aided by high internal stresses. Hence, accurate prediction of maximum internal stress is critical to predicting time to failure and improving the fracture resistance and reliability of materials. Existing high-fidelity methods, such as the Finite-Discrete Element Model (FDEM), are limited by their… ▽ More

    Submitted 20 November, 2020; originally announced November 2020.

    Comments: 13 pages

    ACM Class: J.2

  18. arXiv:2010.15208  [pdf, other

    physics.plasm-ph cs.LG stat.ML

    Identifying Entangled Physics Relationships through Sparse Matrix Decomposition to Inform Plasma Fusion Design

    Authors: M. Giselle Fernández-Godino, Michael J. Grosskopf, Julia B. Nakhleh, Brandon M. Wilson, John Kline, Gowri Srinivasan

    Abstract: A sustainable burn platform through inertial confinement fusion (ICF) has been an ongoing challenge for over 50 years. Mitigating engineering limitations and improving the current design involves an understanding of the complex coupling of physical processes. While sophisticated simulations codes are used to model ICF implosions, these tools contain necessary numerical approximation but miss physi… ▽ More

    Submitted 28 October, 2020; originally announced October 2020.

    Comments: 8 pages, 7 figures

    Report number: LA-UR-20-28715

  19. arXiv:2010.04254  [pdf, other

    physics.plasm-ph cs.LG

    Exploring Sensitivity of ICF Outputs to Design Parameters in Experiments Using Machine Learning

    Authors: Julia B. Nakhleh, M. Giselle Fernández-Godino, Michael J. Grosskopf, Brandon M. Wilson, John Kline, Gowri Srinivasan

    Abstract: Building a sustainable burn platform in inertial confinement fusion (ICF) requires an understanding of the complex coupling of physical processes and the effects that key experimental design changes have on implosion performance. While simulation codes are used to model ICF implosions, incomplete physics and the need for approximations deteriorate their predictive capability. Identification of rel… ▽ More

    Submitted 1 September, 2021; v1 submitted 8 October, 2020; originally announced October 2020.

    Comments: 10 pages, 9 figures. Published in IEEE Transactions on Plasma Science, July 2021 (see Journal Reference info)

    Report number: LA-UR-20-27991

    Journal ref: IEEE Transactions on Plasma Science, vol. 49, no. 7, pp. 2238-2246, July 2021

  20. The ASHRAE Great Energy Predictor III competition: Overview and results

    Authors: Clayton Miller, Pandarasamy Arjunan, Anjukan Kathirgamanathan, Chun Fu, Jonathan Roth, June Young Park, Chris Balbach, Krishnan Gowri, Zoltan Nagy, Anthony Fontanini, Jeff Haberl

    Abstract: In late 2019, ASHRAE hosted the Great Energy Predictor III (GEPIII) machine learning competition on the Kaggle platform. This launch marked the third energy prediction competition from ASHRAE and the first since the mid-1990s. In this updated version, the competitors were provided with over 20 million points of training data from 2,380 energy meters collected for 1,448 buildings from 16 sources. T… ▽ More

    Submitted 14 July, 2020; originally announced July 2020.

    Journal ref: Science and Technology for the Built Environment, 26:10, 1427-1447, (2020)

  21. arXiv:2005.05026  [pdf

    cs.HC

    Delightful Companions: Supporting Well-Being Through Design Delight

    Authors: Omar Sosa-Tzec, Gowri Balasubramaniam, Sylvia Sinsabaugh, Evan Sobetski, Rogerio Pinto, Shervin Assari

    Abstract: This paper presents three design products referred to as delightful companions that are intended to help people engage in well-being practices. It also introduces the approach utilized to guide the design decisions during their creation. Design delight is the name of this approach, which comprises six experiential qualities that are regarded as antecedents of delight. The objective of this paper i… ▽ More

    Submitted 24 April, 2020; originally announced May 2020.

    Comments: 5 pages, 9 Figures

    ACM Class: H.5.m

  22. arXiv:2004.05251  [pdf, other

    cs.CR

    CONTAIN: Privacy-oriented Contact Tracing Protocols for Epidemics

    Authors: Arvin Hekmati, Gowri Ramachandran, Bhaskar Krishnamachari

    Abstract: Pandemic and epidemic diseases such as CoVID-19, SARS-CoV2, and Ebola have spread to multiple countries and infected thousands of people. Such diseases spread mainly through person-to-person contacts. Health care authorities recommend contact tracing procedures to prevent the spread to a vast population. Although several mobile applications have been developed to trace contacts, they typically req… ▽ More

    Submitted 10 April, 2020; originally announced April 2020.

  23. arXiv:1911.02095  [pdf, other

    q-bio.QM cs.DB

    IBM Functional Genomics Platform, A Cloud-Based Platform for Studying Microbial Life at Scale

    Authors: Edward E. Seabolt, Gowri Nayar, Harsha Krishnareddy, Akshay Agarwal, Kristen L. Beck, Ignacio Terrizzano, Eser Kandogan, Mary Roth, Vandana Mukherjee, James H. Kaufman

    Abstract: The rapid growth in biological sequence data is revolutionizing our understanding of genotypic diversity and challenging conventional approaches to informatics. With the increasing availability of genomic data, traditional bioinformatic tools require substantial computational time and the creation of ever-larger indices each time a researcher seeks to gain insight from the data. To address these c… ▽ More

    Submitted 30 March, 2020; v1 submitted 5 November, 2019; originally announced November 2019.

  24. arXiv:1909.10888  [pdf, other

    cs.DC

    BlendSM-DDM: BLockchain-ENabled Secure Microservices for Decentralized Data Marketplaces

    Authors: Ronghua Xu, Gowri Sankar Ramachandran, Yu Chen, Bhaskar Krishnamachari

    Abstract: To promote the benefits of the Internet of Things (IoT) in smart communities and smart cities, a real-time data marketplace middleware platform, called the Intelligent IoT Integrator (I3), has been recently proposed. While facilitating the easy exchanges of real-time IoT data streams between device owners and third-party applications through the marketplace, I3 is presently a monolithic, centraliz… ▽ More

    Submitted 21 September, 2019; originally announced September 2019.

    Comments: Accepted and to be presented at the 2nd International Workshop on CLockchain Enabled Sustainable Smart Cities (BLESS 2019), held in conjunction with the 5th IEEE International Smart Cities Conference (ISC2 2019), Casablanca, Morocco, October 14 - 17, 2019. arXiv admin note: text overlap with arXiv:1902.10567

  25. arXiv:1905.10643  [pdf

    cs.SE

    A Reference Architecture for Blockchain-based Peer-to-Peer IoT Applications

    Authors: Gowri Sankar Ramachandran, Bhaskar Krishnamachari

    Abstract: The advent of Blockchain and Distributed Ledger Technologies enable IoT and smart city application developers to conceive new types of applications and solutions for identity management, trust, and data monetization. However, architecting blockchain-based IoT applications remain challenging due to the heterogeneous nature of blockchain platforms and lack of guidelines on how to interface existing… ▽ More

    Submitted 25 May, 2019; originally announced May 2019.

  26. arXiv:1904.01630  [pdf, other

    cs.DC cs.NI

    MOTIVE: Micropayments for trusted vehicular services

    Authors: Gowri Sankar Ramachandran, Xiang Ji, Pavas Navaney, Licheng Zheng, Martin Martinez, Bhaskar Krishnamachari

    Abstract: Increasingly, connected cars are becoming a decentralized data platform. With greater autonomy, they have growing needs for computation and perceiving the world around them through sensors. While todays generation of vehicles carry all the necessary sensor data and computation on board, we envision a future where vehicles can cooperate to increase their perception of the world beyond their immedia… ▽ More

    Submitted 28 February, 2019; originally announced April 2019.

  27. arXiv:1902.08029  [pdf, other

    physics.comp-ph cs.DC

    Multilevel Graph Partitioning for Three-Dimensional Discrete Fracture Network Flow Simulations

    Authors: Hayato Ushijima-Mwesigwa, Jeffrey D. Hyman, Aric Hagberg, Ilya Safro, Satish Karra, Carl W. Gable, Matthew R. Sweeney, Gowri Srinivasan

    Abstract: We present a topology-based method for mesh-partitioning in three-dimensional discrete fracture network (DFN) simulations that take advantage of the intrinsic multi-level nature of a DFN. DFN models are used to simulate flow and transport through low-permeability fractured media in the subsurface by explicitly representing fractures as discrete entities. The governing equations for flow and transp… ▽ More

    Submitted 1 April, 2021; v1 submitted 18 February, 2019; originally announced February 2019.

  28. arXiv:1811.07367  [pdf, other

    cs.CR

    slimIoT: Scalable Lightweight Attestation Protocol For the Internet of Things

    Authors: Mahmoud Ammar, Mahdi Washha, Gowri Sankar Ramachandran, Bruno Crispo

    Abstract: The Internet of Things (IoT) is increasingly intertwined with critical industrial processes, yet contemporary IoT devices offer limited security features, creating a large new attack surface. Remote attestation is a well-known technique to detect cyber threats by remotely verifying the internal state of a networked embedded device through a trusted entity. Multi-device attestation has received lit… ▽ More

    Submitted 18 November, 2018; originally announced November 2018.

    Comments: This paper has been accepted at the 2018 IEEE Conference on Dependable and Secure Computing (DSC)

  29. arXiv:1810.06118  [pdf, other

    cond-mat.mtrl-sci cs.LG physics.data-an stat.ML

    Learning to fail: Predicting fracture evolution in brittle material models using recurrent graph convolutional neural networks

    Authors: Max Schwarzer, Bryce Rogan, Yadong Ruan, Zhengming Song, Diana Y. Lee, Allon G. Percus, Viet T. Chau, Bryan A. Moore, Esteban Rougier, Hari S. Viswanathan, Gowri Srinivasan

    Abstract: We propose a machine learning approach to address a key challenge in materials science: predicting how fractures propagate in brittle materials under stress, and how these materials ultimately fail. Our methods use deep learning and train on simulation data from high-fidelity models, emulating the results of these models while avoiding the overwhelming computational demands associated with running… ▽ More

    Submitted 15 March, 2019; v1 submitted 14 October, 2018; originally announced October 2018.

    Report number: LA-UR-18-29693

    Journal ref: Computational Materials Science 162, 322-332 (2019)

  30. arXiv:1807.03110  [pdf, other

    cs.DC

    Trinity: A Distributed Publish/Subscribe Broker with Blockchain-based Immutability

    Authors: Gowri Sankar Ramachandran, Kwame-Lante Wright, Bhaskar Krishnamachari

    Abstract: Internet-of-Things (IoT) and Supply Chain monitoring applications rely on messaging protocols for exchanging data. Contemporary IoT deployments widely use the publish-subscribe messaging model because of its resource-efficiency. However, the systems with publish-subscribe messaging model employ a centralized architecture, wherein the data from all the devices in the application network flows via a… ▽ More

    Submitted 12 June, 2018; originally announced July 2018.

  31. arXiv:1805.02818  [pdf, other

    cs.DC cs.CR cs.CY

    Blockchain for the IoT: Opportunities and Challenges

    Authors: Gowri Sankar Ramachandran, Bhaskar Krishnamachari

    Abstract: Blockchain technology has been transforming the financial industry and has created a new crypto-economy in the last decade. The foundational concepts such as decentralized trust and distributed ledger are promising for distributed, and large-scale Internet of Things (IoT) applications. However, the applications of Blockchain beyond cryptocurrencies in this domain are few and far between because of… ▽ More

    Submitted 7 May, 2018; originally announced May 2018.

  32. Selective Jamming of LoRaWAN using Commodity Hardware

    Authors: Emekcan Aras, Nicolas Small, Gowri Sankar Ramachandran, Stéphane Delbruel, Wouter Joosen, Danny Hughes

    Abstract: Long range, low power networks are rapidly gaining acceptance in the Internet of Things (IoT) due to their ability to economically support long-range sensing and control applications while providing multi-year battery life. LoRa is a key example of this new class of network and is being deployed at large scale in several countries worldwide. As these networks move out of the lab and into the real… ▽ More

    Submitted 6 December, 2017; originally announced December 2017.

    Comments: Mobiquitous 2017, November 7-10, 2017, Melbourne, VIC, Australia

  33. arXiv:1705.09866  [pdf, other

    physics.geo-ph cs.SI physics.data-an stat.ML

    Machine learning for graph-based representations of three-dimensional discrete fracture networks

    Authors: Manuel Valera, Zhengyang Guo, Priscilla Kelly, Sean Matz, Vito Adrian Cantu, Allon G. Percus, Jeffrey D. Hyman, Gowri Srinivasan, Hari S. Viswanathan

    Abstract: Structural and topological information play a key role in modeling flow and transport through fractured rock in the subsurface. Discrete fracture network (DFN) computational suites such as dfnWorks are designed to simulate flow and transport in such porous media. Flow and transport calculations reveal that a small backbone of fractures exists, where most flow and transport occurs. Restricting the… ▽ More

    Submitted 29 January, 2018; v1 submitted 27 May, 2017; originally announced May 2017.

    Comments: Computational Geosciences (2018)

    Report number: LA-UR-17-24300

    Journal ref: Computational Geosciences 22, 695-710 (2018)

  34. arXiv:1504.02235  [pdf

    cs.CV

    Extraction of Protein Sequence Motif Information using PSO K-Means

    Authors: R. Gowri, R. Rathipriya

    Abstract: The main objective of the paper is to find the motif information.The functionalities of the proteins are ideally found from their motif information which is extracted using various techniques like clustering with k-means, hybrid k-means, self-organising maps, etc., in the literature. In this work protein sequence information is extracted using optimised k-means algorithm. The particle swarm optimi… ▽ More

    Submitted 9 April, 2015; originally announced April 2015.

  35. Towards a Consistent, Sound and Complete Conceptual Knowledge

    Authors: Gowri Shankar Ramaswamy, F Sagayaraj Francis

    Abstract: Knowledge is only good if it is sound, consistent and complete. The same holds true for conceptual knowledge, which holds knowledge about concepts and its association. Conceptual knowledge no matter what format they are represented in, must be consistent, sound and complete in order to realise its practical use. This paper discusses consistency, soundness and completeness in the ambit of conceptua… ▽ More

    Submitted 24 November, 2014; originally announced December 2014.

    Journal ref: International Journal of Computer Trends and Technology (IJCTT) V17(2):61-63, Nov 2014

  36. arXiv:1208.4016  [pdf

    cs.DB

    Concept driven framework for Latent Table Discovery

    Authors: Gowri Shankar Ramaswamy, F Sagayaraj Francis

    Abstract: Database systems have to cater to the growing demands of the information age. The growth of the new age information retrieval powerhouses like search engines has thrown a challenge to the data management community to come up with novel mechanisms for feeding information to end users. The burgeoning use of natural language query interfaces compels system designers to present meaningful and customis… ▽ More

    Submitted 20 August, 2012; originally announced August 2012.

    Journal ref: JOURNAL OF COMPUTING, VOLUME 4, ISSUE 7, JULY 2012, ISSN (Online) 2151-9617

  37. arXiv:1208.0569  [pdf

    cs.NI

    Simulation Study For Performance Comparison in Hierarchical Network With CHG Approach in MANET

    Authors: Anzar Ahmad, Prof. R. Gowri, Prof. SC Gupta

    Abstract: The implementation of MANET for commercial purposes is not an easy task. Unlike other wireless technologies such as cellular networks, MANET face more difficult problems concerning management functions, routing and scalability . As a solution to these complications, clustering schemes are proposed for MANET in order to organize the network topology in a hierarchical manner. Many clustering techniq… ▽ More

    Submitted 23 July, 2012; originally announced August 2012.

    Comments: 14 pages,8 figures, International journal of computer engineering science(IJCES)

  38. arXiv:1108.6113  [pdf, ps, other

    physics.soc-ph cs.DM cs.SI math.DS q-bio.MN

    A New Computationally Efficient Measure of Topological Redundancy of Biological and Social Networks

    Authors: Reka Albert, Bhaskar DasGupta, Anthony Gitter, Gamze Gursoy, Rashmi Hegde, Pradyut Paul, Gowri Sangeetha Sivanathan, Eduardo Sontag

    Abstract: It is well-known that biological and social interaction networks have a varying degree of redundancy, though a consensus of the precise cause of this is so far lacking. In this paper, we introduce a topological redundancy measure for labeled directed networks that is formal, computationally efficient and applicable to a variety of directed networks such as cellular signaling, metabolic and social… ▽ More

    Submitted 5 November, 2011; v1 submitted 30 August, 2011; originally announced August 2011.

    Comments: 18 pages

    MSC Class: 68R10; 05C85; 05C82; 05C20; 05C40; 91D30; 92C42; 93C15; 37N25 ACM Class: J.3; J.4; F.2.2; G.2.1; G.2.2; G.2.3

    Journal ref: Physical Review E, 84 (3), 036117, 2011

  39. arXiv:1104.1311  [pdf

    cs.DB

    Latent table discovery by semantic relationship extraction between unrelated sets of entity sets of structured data sources

    Authors: Gowri Shankar Ramaswamy, F Sagayaraj Francis

    Abstract: Querying is one of the basic functionality expected from a database system. Query efficiency is adversely affected by increase in the number of participating tables. Also, querying based on syntax largely limits the gamut of queries a database system can process. Syntactic queries rely on the database table structure, which is a cause of concern for large organisations due to incompatibility betwe… ▽ More

    Submitted 7 April, 2011; originally announced April 2011.

    Journal ref: IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 2, March 2011

  40. arXiv:1102.2615  [pdf, ps, other

    math.FA cs.CV nlin.CG

    Guaranteeing Convergence of Iterative Skewed Voting Algorithms for Image Segmentation

    Authors: Doru C. Balcan, Gowri Srinivasa, Matthew Fickus, Jelena Kovacevic

    Abstract: In this paper we provide rigorous proof for the convergence of an iterative voting-based image segmentation algorithm called Active Masks. Active Masks (AM) was proposed to solve the challenging task of delineating punctate patterns of cells from fluorescence microscope images. Each iteration of AM consists of a linear convolution composed with a nonlinear thresholding; what makes this process spe… ▽ More

    Submitted 20 February, 2011; v1 submitted 13 February, 2011; originally announced February 2011.

  41. arXiv:1002.2182  [pdf

    cs.CV

    Detection of Microcalcification in Mammograms Using Wavelet Transform and Fuzzy Shell Clustering

    Authors: T. Balakumaran, I. L. A. Vennila, C. Gowri Shankar

    Abstract: Microcalcifications in mammogram have been mainly targeted as a reliable earliest sign of breast cancer and their early detection is vital to improve its prognosis. Since their size is very small and may be easily overlooked by the examining radiologist, computer-based detection output can assist the radiologist to improve the diagnostic accuracy. In this paper, we have proposed an algorithm for… ▽ More

    Submitted 10 February, 2010; originally announced February 2010.

    Comments: IEEE format, International Journal of Computer Science and Information Security, IJCSIS January 2010, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: Journal of Computer Science, ISSN 19475500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 7, No. 1, pp. 121-125, January 2010, USA

  42. arXiv:1001.2272  [pdf

    cs.NI

    Call Admission Control performance model for Beyond 3G Wireless Networks

    Authors: H. S. Ramesh Babu, Gowri Shankar, P. S. Satyanarayana

    Abstract: The Next Generation Wireless Networks (NGWN) will be heterogeneous in nature where the different Radio Access Technologies (RATs) operate together .The mobile terminals operating in this heterogeneous environment will have different QoS requirements to be handled by the system. These QoS requirements are determined by a set of QoS parameters. The radio resource management is one of the key chall… ▽ More

    Submitted 13 January, 2010; originally announced January 2010.

    Comments: 6 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS December 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: Volume 6, No. 3, ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 3, pp. 224-229, December 2009, USA