Skip to main content

Showing 1–29 of 29 results for author: K, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.00887  [pdf, other

    eess.AS cs.AI cs.CL cs.LG cs.SD

    SEGAA: A Unified Approach to Predicting Age, Gender, and Emotion in Speech

    Authors: Aron R, Indra Sigicharla, Chirag Periwal, Mohanaprasad K, Nithya Darisini P S, Sourabh Tiwari, Shivani Arora

    Abstract: The interpretation of human voices holds importance across various applications. This study ventures into predicting age, gender, and emotion from vocal cues, a field with vast applications. Voice analysis tech advancements span domains, from improving customer interactions to enhancing healthcare and retail experiences. Discerning emotions aids mental health, while age and gender detection are vi… ▽ More

    Submitted 1 March, 2024; originally announced March 2024.

  2. arXiv:2307.16033  [pdf, other

    eess.IV cs.CV

    CoVid-19 Detection leveraging Vision Transformers and Explainable AI

    Authors: Pangoth Santhosh Kumar, Kundrapu Supriya, Mallikharjuna Rao K, Taraka Satya Krishna Teja Malisetti

    Abstract: Lung disease is a common health problem in many parts of the world. It is a significant risk to people health and quality of life all across the globe since it is responsible for five of the top thirty leading causes of death. Among them are COVID 19, pneumonia, and tuberculosis, to name just a few. It is critical to diagnose lung diseases in their early stages. Several different models including… ▽ More

    Submitted 6 May, 2024; v1 submitted 29 July, 2023; originally announced July 2023.

  3. arXiv:2307.10005  [pdf, other

    eess.AS cs.SD

    Alzheimer's Disease Detection from Spontaneous Speech and Text: A review

    Authors: Vrindha M. K., Geethu V., Anurenjan P. R., Deepak S., Sreeni K. G.

    Abstract: In the past decade, there has been a surge in research examining the use of voice and speech analysis as a means of detecting neurodegenerative diseases such as Alzheimer's. Many studies have shown that certain acoustic features can be used to differentiate between normal aging and Alzheimer's disease, and speech analysis has been found to be a cost-effective method of detecting Alzheimer's dement… ▽ More

    Submitted 19 July, 2023; originally announced July 2023.

  4. arXiv:2305.12756  [pdf, ps, other

    cs.GT

    Fair Allocation in Crowd-Sourced Systems

    Authors: Mishal Assif P K, William Kennedy, Iraj Saniee

    Abstract: In this paper, we address the problem of fair sharing of the total value of a crowd-sourced network system between major participants (founders) and minor participants (crowd) using cooperative game theory. Shapley allocation is regarded as a fair way for computing the shares of all participants in a cooperative game when the values of all possible coalitions could be quantified. We define a class… ▽ More

    Submitted 22 May, 2023; originally announced May 2023.

    Comments: 21 pages, 2 figures

  5. arXiv:2304.14710  [pdf

    cs.CV cs.AI

    Image-based Indian Sign Language Recognition: A Practical Review using Deep Neural Networks

    Authors: Mallikharjuna Rao K, Harleen Kaur, Sanjam Kaur Bedi, M A Lekhana

    Abstract: People with vocal and hearing disabilities use sign language to express themselves using visual gestures and signs. Although sign language is a solution for communication difficulties faced by deaf people, there are still problems as most of the general population cannot understand this language, creating a communication barrier, especially in places such as banks, airports, supermarkets, etc. [1]… ▽ More

    Submitted 28 April, 2023; originally announced April 2023.

    Comments: 14 pages, 20 figures, 1 table

  6. Light Weight Cryptographic Address Generation Using System State Entropy Gathering for IPv6 Based MANETs

    Authors: Reshmi TR, Murugan K

    Abstract: In IPv6 based MANETs, the neighbor discovery enables nodes to self-configure and communicate with neighbor nodes through autoconfiguration. The Stateless address autoconfiguration (SLAAC) has proven to face several security issues. Even though the Secure Neighbor Discovery (SeND) uses Cryptographically Generated Addresses (CGA) to address these issues, it creates other concerns such as need for CA… ▽ More

    Submitted 31 March, 2023; originally announced March 2023.

    Comments: 13 Pages

    MSC Class: 68 ACM Class: C.2.2; B.6; B.7; F.1.3

    Journal ref: China Communications, vol. 14, no. 9, pp. 114-126, Sept. 2017

  7. arXiv:2302.01104  [pdf

    cs.CV cs.AI

    LesionAid: Vision Transformers-based Skin Lesion Generation and Classification

    Authors: Ghanta Sai Krishna, Kundrapu Supriya, Mallikharjuna Rao K, Meetiksha Sorgile

    Abstract: Skin cancer is one of the most prevalent forms of human cancer. It is recognized mainly visually, beginning with clinical screening and continuing with the dermoscopic examination, histological assessment, and specimen collection. Deep convolutional neural networks (CNNs) perform highly segregated and potentially universal tasks against a classified finegrained object. This research proposes a nov… ▽ More

    Submitted 2 February, 2023; originally announced February 2023.

  8. arXiv:2212.07155  [pdf

    cs.RO eess.SY

    Autonomous Vehicle Navigation with LIDAR using Path Planning

    Authors: Rahul M K, Sumukh B, Praveen L Uppunda, Vinayaka Raju, C Gururaj

    Abstract: In this paper, a complete framework for Autonomous Self Driving is implemented. LIDAR, Camera and IMU sensors are used together. The entire data communication is managed using Robot Operating System which provides a robust platform for implementation of Robotics Projects. Jetson Nano is used to provide powerful on-board processing capabilities. Sensor fusion is performed on the data received from… ▽ More

    Submitted 14 December, 2022; originally announced December 2022.

  9. arXiv:2209.01401  [pdf, other

    cs.CV

    Vision Transformers and YoloV5 based Driver Drowsiness Detection Framework

    Authors: Ghanta Sai Krishna, Kundrapu Supriya, Jai Vardhan, Mallikharjuna Rao K

    Abstract: Human drivers have distinct driving techniques, knowledge, and sentiments due to unique driving traits. Driver drowsiness has been a serious issue endangering road safety; therefore, it is essential to design an effective drowsiness detection algorithm to bypass road accidents. Miscellaneous research efforts have been approached the problem of detecting anomalous human driver behaviour to examine… ▽ More

    Submitted 3 September, 2022; originally announced September 2022.

  10. arXiv:2208.00264  [pdf

    cs.SE

    Mining unit test cases to synthesize API usage examples

    Authors: Mohammad Ghafari, Konstantin Rubinov, Mohammad Mehdi Pourhashem K

    Abstract: Software developers study and reuse existing source code to understand how to properly use application programming interfaces (APIs). However, manually finding sufficient and adequate code examples for a given API is a difficult and a time-consuming activity. Existing approaches to find or generate examples assume availability of a reasonable set of client code that uses the API. This assumption d… ▽ More

    Submitted 30 July, 2022; originally announced August 2022.

    Comments: Journal of Software: Evolution and Process

  11. arXiv:2109.05329  [pdf, other

    cs.DC

    MODC: Resilience for disaggregated memory architectures using task-based programming

    Authors: Kimberly Keeton, Sharad Singhal, Haris Volos, Yupu Zhang, Ramesh Chandra Chaurasiya, Clarete Riana Crasta, Sherin T George, Nagaraju K N, Mashood Abdulla K, Kavitha Natarajan, Porno Shome, Sanish Suresh

    Abstract: Disaggregated memory architectures provide benefits to applications beyond traditional scale out environments, such as independent scaling of compute and memory resources. They also provide an independent failure model, where computations or the compute nodes they run on may fail independently of the disaggregated memory; thus, data that's resident in the disaggregated memory is unaffected by the… ▽ More

    Submitted 11 September, 2021; originally announced September 2021.

    Comments: 9 pages, 4 figures

    ACM Class: D.4.1; D.4.5; D.4.7; C.1.4; E.1

    Journal ref: Proceedings of 2nd Workshop on Resource Disaggregation and Serverless (WORDS'21), Co-located with ASPLOS'21, April 2021

  12. arXiv:2105.04773  [pdf, other

    cs.CR

    An Innovative Security Strategy using Reactive Web Application Honeypot

    Authors: Rajat Gupta, Madhu Viswanatham V., Manikandan K

    Abstract: Nowadays, web applications have become most prevalent in the industry, and the critical data of most organizations stored using web apps. Hence, web applications a much bigger target for diverse cyber-attacks, which varies from database injections-SQL injection, PHP object injection, template injection, XML external entity injection, unsanitized input attacks- Cross-Site Scripting(XSS), and many m… ▽ More

    Submitted 10 May, 2021; originally announced May 2021.

  13. arXiv:2105.00788  [pdf, other

    cs.RO

    DeepMPCVS: Deep Model Predictive Control for Visual Servoing

    Authors: Pushkal Katara, Y V S Harish, Harit Pandya, Abhinav Gupta, Aadil Mehdi Sanchawala, Gourav Kumar, Brojeshwar Bhowmick, Madhava Krishna K

    Abstract: The simplicity of the visual servoing approach makes it an attractive option for tasks dealing with vision-based control of robots in many real-world applications. However, attaining precise alignment for unseen environments pose a challenge to existing visual servoing approaches. While classical approaches assume a perfect world, the recent data-driven approaches face issues when generalizing to… ▽ More

    Submitted 3 May, 2021; originally announced May 2021.

    Comments: Accepted at 4th Annual Conference on Robot Learning, CoRL 2020, Cambridge, MA, USA, November 16 - November 18, 2020

    Journal ref: 4th Annual Conference on Robot Learning, CoRL 2020, Cambridge, MA, USA, November 16 - November 18, 2020

  14. arXiv:2102.05450  [pdf, other

    eess.IV cs.CV cs.LG

    Reference-based Texture transfer for Single Image Super-resolution of Magnetic Resonance images

    Authors: Madhu Mithra K K, Sriprabha Ramanarayanan, Keerthi Ram, Mohanasankar Sivaprakasam

    Abstract: Magnetic Resonance Imaging (MRI) is a valuable clinical diagnostic modality for spine pathologies with excellent characterization for infection, tumor, degenerations, fractures and herniations. However in surgery, image-guided spinal procedures continue to rely on CT and fluoroscopy, as MRI slice resolutions are typically insufficient. Building upon state-of-the-art single image super-resolution,… ▽ More

    Submitted 10 February, 2021; originally announced February 2021.

    Comments: Accepted at ISBI 2021

  15. Blockchain based Attack Detection on Machine Learning Algorithms for IoT based E-Health Applications

    Authors: Thippa Reddy Gadekallu, Manoj M K, Sivarama Krishnan S, Neeraj Kumar, Saqib Hakak, Sweta Bhattacharya

    Abstract: The application of machine learning (ML) algorithms are massively scaling-up due to rapid digitization and emergence of new tecnologies like Internet of Things (IoT). In today's digital era, we can find ML algorithms being applied in the areas of healthcare, IoT, engineering, finance and so on. However, all these algorithms need to be trained in order to predict/solve a particular problem. There i… ▽ More

    Submitted 2 October, 2021; v1 submitted 2 November, 2020; originally announced November 2020.

    Comments: Accepted in IEEE IoT Magazine

    Journal ref: IEEE Internet of Things Magazine 4, 30-33 (2021)

  16. arXiv:2001.01040  [pdf, other

    stat.AP cs.DL

    Causal Impact of Web Browsing and Other Factors on Research Publications

    Authors: Bharathi Manjula . K, Sourish Das, Jehadeesan . R

    Abstract: In this paper, we study the causal impact of the web-search activity on the research publication. We considered observational prospective study design, where research activity of 267 scientists is being studied. We considered the Poisson and negative binomial regression model for our analysis. Based on the Akaike's Model selection criterion, we found the negative binomial regression performs bette… ▽ More

    Submitted 4 January, 2020; originally announced January 2020.

  17. arXiv:2001.00575  [pdf

    cs.HC cs.CL

    Smart Summarizer for Blind People

    Authors: Mona teja K, Mohan Sai. S, H S S S Raviteja D, Sai Kushagra P V

    Abstract: In today's world, time is a very important resource. In our busy lives, most of us hardly have time to read the complete news so what we have to do is just go through the headlines and satisfy ourselves with that. As a result, we might miss a part of the news or misinterpret the complete thing. The situation is even worse for the people who are visually impaired or have lost their ability to see.… ▽ More

    Submitted 1 January, 2020; originally announced January 2020.

    Comments: 4 pages, 4 figures

  18. arXiv:1903.10641  [pdf, other

    cs.CV cs.RO

    INFER: INtermediate representations for FuturE pRediction

    Authors: Shashank Srikanth, Junaid Ahmed Ansari, Karnik Ram R, Sarthak Sharma, Krishna Murthy J., Madhava Krishna K

    Abstract: In urban driving scenarios, forecasting future trajectories of surrounding vehicles is of paramount importance. While several approaches for the problem have been proposed, the best-performing ones tend to require extremely detailed input representations (eg. image sequences). But, such methods do not generalize to datasets they have not been trained on. We propose intermediate representations tha… ▽ More

    Submitted 25 March, 2019; originally announced March 2019.

    Comments: Manuscript under review. Submitted to IROS 2019

  19. arXiv:1707.06391  [pdf, other

    cs.DC cs.DS

    Deterministic Dispersion of Mobile Robots in Dynamic Rings

    Authors: Ankush Agarwalla, John Augustine, William K. Moses Jr., Madhav Sankar K., Arvind Krishna Sridhar

    Abstract: In this work, we study the problem of dispersion of mobile robots on dynamic rings. The problem of dispersion of $n$ robots on an $n$ node graph, introduced by Augustine and Moses Jr. [1], requires robots to coordinate with each other and reach a configuration where exactly one robot is present on each node. This problem has real world applications and applies whenever we want to minimize the tota… ▽ More

    Submitted 16 October, 2017; v1 submitted 20 July, 2017; originally announced July 2017.

    Comments: 21 pages, 10 figures, concise version of paper to appear in ICDCN 2018

    ACM Class: F.2.2; G.2.2

  20. arXiv:1604.07519  [pdf, other

    cs.MM

    Subjective Assessment of H.264 Compressed Stereoscopic Video

    Authors: Manasa K, Balasubramanyam Appina, Sumohana S. Channappayya

    Abstract: The tremendous growth in 3D (stereo) imaging and display technologies has led to stereoscopic content (video and image) becoming increasingly popular. However, both the subjective and the objective evaluation of stereoscopic video content has not kept pace with the rapid growth of the content. Further, the availability of standard stereoscopic video databases is also quite limited. In this work, w… ▽ More

    Submitted 26 April, 2016; originally announced April 2016.

    Comments: 5 pages, 4 figures

  21. arXiv:1510.01234  [pdf, other

    physics.comp-ph cs.CR physics.ins-det

    Hardware Random number Generator for cryptography

    Authors: Ram Soorat, Madhuri K., Ashok Vudayagiri

    Abstract: One of the key requirement of many schemes is that of random numbers. Sequence of random numbers are used at several stages of a standard cryptographic protocol. A simple example is of a Vernam cipher, where a string of random numbers is added to massage string to generate the encrypted code. It is represented as $C=M \oplus K $ where $M$ is the message, $K$ is the key and $C$ is the ciphertext. I… ▽ More

    Submitted 5 October, 2015; originally announced October 2015.

  22. arXiv:1501.01364  [pdf

    cs.CV

    Leader Follower Formation Control of Ground Vehicles Using Camshift Based Guidance

    Authors: S. M. Vaitheeswaran, Bharath M. K., Gokul M

    Abstract: Autonomous ground vehicles have been designed for the purpose of that relies on ranging and bearing information received from forward looking camera on the Formation control . A visual guidance control algorithm is designed where real time image processing is used to provide feedback signals. The vision subsystem and control subsystem work in parallel to accomplish formation control. A proportiona… ▽ More

    Submitted 6 January, 2015; originally announced January 2015.

  23. arXiv:1407.1106  [pdf, ps, other

    cs.IT

    Performance Analysis of Two-Way AF MIMO Relaying of OSTBCs with Imperfect Channel Gains

    Authors: Arti M. K., Manav R. Bhatnagar

    Abstract: In this paper, we consider the relaying of orthogonal space time block codes (OSTBCs) in a two-way amplify-and-forward (AF) multiple-input multiple-output (MIMO) relay system with estimated channel state information (CSI). A simple four phase protocol is used for training and OSTBC data transmission. Decoding of OSTBC data at a user terminal is performed by replacing the exact CSI by the estimated… ▽ More

    Submitted 3 July, 2014; originally announced July 2014.

  24. A Survey on an Effective Defense Mechanism against Reactive Jamming Attacks in WSN

    Authors: Manojkumar. M. K, Sathya. D

    Abstract: A Wireless Sensor Network (WSN) is a self-configure network of sensor nodes communicate among themselves using radio signals and deployed in quantity to sense, monitor and to understand the physical world. A jammer is an entity which interferes with the physical transmission and reception of wireless communications. Reactive jamming attack is a major security problem in the wireless sensor network… ▽ More

    Submitted 6 February, 2014; originally announced February 2014.

    Comments: 4 pages,3 figures,"Published with International Journal of Computer Trends and Technology (IJCTT)"

    Journal ref: IJCTT 7(3):143-146, January 2014. Published by Seventh Sense Research Group

  25. arXiv:1401.6130  [pdf

    cs.CY cs.CV

    smart application for AMS using Face Recognition

    Authors: MuthuKalyani. K, VeeraMuthu. A

    Abstract: Attendance Management System (AMS) can be made into smarter way by using face recognition technique, where we use a CCTV camera to be fixed at the entry point of a classroom, which automatically captures the image of the person and checks the observed image with the face database using android enhanced smart phone. It is typically used for two purposes. Firstly, marking attendance for student by c… ▽ More

    Submitted 13 November, 2013; originally announced January 2014.

    Comments: 20 pages,4 figures

    Journal ref: Computer Science & Engineering: An International Journal (CSEIJ), Vol. 3, No. 5, October 2013

  26. arXiv:1211.4709  [pdf

    cs.AI cs.IR

    A New Similarity Measure for Taxonomy Based on Edge Counting

    Authors: Manjula Shenoy. K, K. C. Shet, U. Dinesh Acharya

    Abstract: This paper introduces a new similarity measure based on edge counting in a taxonomy like WorldNet or Ontology. Measurement of similarity between text segments or concepts is very useful for many applications like information retrieval, ontology matching, text mining, and question answering and so on. Several measures have been developed for measuring similarity between two concepts: out of these w… ▽ More

    Submitted 20 November, 2012; originally announced November 2012.

  27. arXiv:1211.4705  [pdf

    cs.OH

    Secured Ontology Map**

    Authors: Manjula Shenoy. K, K. C. Shet, U. Dinesh Acharya

    Abstract: Todays market evolution and high volatility of business requirements put an increasing emphasis on the ability for systems to accommodate the changes required by new organizational needs while maintaining security objectives satisfiability. This is all the more true in case of collaboration and interoperability between different organizations and thus between their information systems. Ontology ma… ▽ More

    Submitted 20 November, 2012; originally announced November 2012.

    Comments: arXiv admin note: substantial text overlap with arXiv:cs/0407061 by other authors

  28. arXiv:1209.5695  [pdf

    cs.IT

    Hybrid Approaches to Image Coding: A Review

    Authors: Rehna. V. J, Jeyakumar. M. K

    Abstract: Nowadays, the digital world is most focused on storage space and speed. With the growing demand for better bandwidth utilization, efficient image data compression techniques have emerged as an important factor for image data transmission and storage. To date, different approaches to image compression have been developed like the classical predictive coding, popular transform coding and vector quan… ▽ More

    Submitted 12 September, 2012; originally announced September 2012.

    Comments: 7 pages, 3 figures

    Journal ref: (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 2, No. 7, 2011

  29. arXiv:1010.4007  [pdf

    cs.MM

    Colour Guided Colour Image Steganography

    Authors: R. Amirtharajan, Sandeep Kumar Behera, Motamarri Abhilash Swarup, Mohamed Ashfaaq K, John Bosco Balaguru Rayappan

    Abstract: Information security has become a cause of concern because of the electronic eavesdrop**. Capacity, robustness and invisibility are important parameters in information hiding and are quite difficult to achieve in a single algorithm. This paper proposes a novel steganography technique for digital color image which achieves the purported targets. The professed methodology employs a complete random… ▽ More

    Submitted 19 October, 2010; originally announced October 2010.

    Comments: Universal Journal of Computer Science and Engineering Technology (UniCSE)

    Journal ref: 1 (1), 16-23, Oct. 2010