-
Malayalam Sign Language Identification using Finetuned YOLOv8 and Computer Vision Techniques
Authors:
Abhinand K.,
Abhiram B. Nair,
Dhananjay C.,
Hanan Hamza,
Mohammed Fawaz J.,
Rahma Fahim K.,
Anoop V. S
Abstract:
Technological advancements and innovations are advancing our daily life in all the ways possible but there is a larger section of society who are deprived of accessing the benefits due to their physical inabilities. To reap the real benefits and make it accessible to society, these talented and gifted people should also use such innovations without any hurdles. Many applications developed these da…
▽ More
Technological advancements and innovations are advancing our daily life in all the ways possible but there is a larger section of society who are deprived of accessing the benefits due to their physical inabilities. To reap the real benefits and make it accessible to society, these talented and gifted people should also use such innovations without any hurdles. Many applications developed these days address these challenges, but localized communities and other constrained linguistic groups may find it difficult to use them. Malayalam, a Dravidian language spoken in the Indian state of Kerala is one of the twenty-two scheduled languages in India. Recent years have witnessed a surge in the development of systems and tools in Malayalam, addressing the needs of Kerala, but many of them are not empathetically designed to cater to the needs of hearing-impaired people. One of the major challenges is the limited or no availability of sign language data for the Malayalam language and sufficient efforts are not made in this direction. In this connection, this paper proposes an approach for sign language identification for the Malayalam language using advanced deep learning and computer vision techniques. We start by develo** a labeled dataset for Malayalam letters and for the identification we use advanced deep learning techniques such as YOLOv8 and computer vision. Experimental results show that the identification accuracy is comparable to other sign language identification systems and other researchers in sign language identification can use the model as a baseline to develop advanced models.
△ Less
Submitted 8 May, 2024;
originally announced May 2024.
-
A Simple Robot Selection Criteria After Path Planning Using Wavefront Algorithm
Authors:
Rajashekhar V S,
Dhaya C,
Dinakar Raj C K,
Dharshan P,
Mukesh Kumar S,
Harish B,
Ajith R,
Kamaleshwaran K
Abstract:
In this work we present a technique to select the best robot for accomplishing a task assuming that the map of the environment is known in advance. To do so, capabilities of the robots are listed and the environments where they can be used are mapped. There are five robots that included for doing the tasks. They are the robotic lizard, half-humanoid, robotic snake, biped and quadruped. Each of the…
▽ More
In this work we present a technique to select the best robot for accomplishing a task assuming that the map of the environment is known in advance. To do so, capabilities of the robots are listed and the environments where they can be used are mapped. There are five robots that included for doing the tasks. They are the robotic lizard, half-humanoid, robotic snake, biped and quadruped. Each of these robots are capable of performing certain activities and also they have their own limitations. The process of considering the robot performances and acting based on their limitations is the focus of this work. The wavefront algorithm is used to find the nature of terrain. Based on the terrain a suitable robot is selected from the list of five robots by the wavefront algorithm. Using this robot the mission is accomplished.
△ Less
Submitted 30 July, 2023;
originally announced July 2023.
-
CoVid-19 Detection leveraging Vision Transformers and Explainable AI
Authors:
Pangoth Santhosh Kumar,
Kundrapu Supriya,
Mallikharjuna Rao K,
Taraka Satya Krishna Teja Malisetti
Abstract:
Lung disease is a common health problem in many parts of the world. It is a significant risk to people health and quality of life all across the globe since it is responsible for five of the top thirty leading causes of death. Among them are COVID 19, pneumonia, and tuberculosis, to name just a few. It is critical to diagnose lung diseases in their early stages. Several different models including…
▽ More
Lung disease is a common health problem in many parts of the world. It is a significant risk to people health and quality of life all across the globe since it is responsible for five of the top thirty leading causes of death. Among them are COVID 19, pneumonia, and tuberculosis, to name just a few. It is critical to diagnose lung diseases in their early stages. Several different models including machine learning and image processing have been developed for this purpose. The earlier a condition is diagnosed, the better the patient chances of making a full recovery and surviving into the long term. Thanks to deep learning algorithms, there is significant promise for the autonomous, rapid, and accurate identification of lung diseases based on medical imaging. Several different deep learning strategies, including convolutional neural networks (CNN), vanilla neural networks, visual geometry group based networks (VGG), and capsule networks , are used for the goal of making lung disease forecasts. The standard CNN has a poor performance when dealing with rotated, tilted, or other aberrant picture orientations. As a result of this, within the scope of this study, we have suggested a vision transformer based approach end to end framework for the diagnosis of lung disorders. In the architecture, data augmentation, training of the suggested models, and evaluation of the models are all included. For the purpose of detecting lung diseases such as pneumonia, Covid 19, lung opacity, and others, a specialised Compact Convolution Transformers (CCT) model have been tested and evaluated on datasets such as the Covid 19 Radiography Database. The model has achieved a better accuracy for both its training and validation purposes on the Covid 19 Radiography Database.
△ Less
Submitted 6 May, 2024; v1 submitted 29 July, 2023;
originally announced July 2023.
-
LowDINO -- A Low Parameter Self Supervised Learning Model
Authors:
Sai Krishna Prathapaneni,
Shvejan Shashank,
Srikar Reddy K
Abstract:
This research aims to explore the possibility of designing a neural network architecture that allows for small networks to adopt the properties of huge networks, which have shown success in self-supervised learning (SSL), for all the downstream tasks like image classification, segmentation, etc. Previous studies have shown that using convolutional neural networks (ConvNets) can provide inherent in…
▽ More
This research aims to explore the possibility of designing a neural network architecture that allows for small networks to adopt the properties of huge networks, which have shown success in self-supervised learning (SSL), for all the downstream tasks like image classification, segmentation, etc. Previous studies have shown that using convolutional neural networks (ConvNets) can provide inherent inductive bias, which is crucial for learning representations in deep learning models. To reduce the number of parameters, attention mechanisms are utilized through the usage of MobileViT blocks, resulting in a model with less than 5 million parameters. The model is trained using self-distillation with momentum encoder and a student-teacher architecture is also employed, where the teacher weights use vision transformers (ViTs) from recent SOTA SSL models. The model is trained on the ImageNet1k dataset. This research provides an approach for designing smaller, more efficient neural network architectures that can perform SSL tasks comparable to heavy models
△ Less
Submitted 28 May, 2023;
originally announced May 2023.
-
Image-based Indian Sign Language Recognition: A Practical Review using Deep Neural Networks
Authors:
Mallikharjuna Rao K,
Harleen Kaur,
Sanjam Kaur Bedi,
M A Lekhana
Abstract:
People with vocal and hearing disabilities use sign language to express themselves using visual gestures and signs. Although sign language is a solution for communication difficulties faced by deaf people, there are still problems as most of the general population cannot understand this language, creating a communication barrier, especially in places such as banks, airports, supermarkets, etc. [1]…
▽ More
People with vocal and hearing disabilities use sign language to express themselves using visual gestures and signs. Although sign language is a solution for communication difficulties faced by deaf people, there are still problems as most of the general population cannot understand this language, creating a communication barrier, especially in places such as banks, airports, supermarkets, etc. [1]. A sign language recognition(SLR) system is a must to solve this problem. The main focus of this model is to develop a real-time word-level sign language recognition system that would translate sign language to text. Much research has been done on ASL(American sign language). Thus, we have worked on ISL(Indian sign language) to cater to the needs of the deaf and hard-of-hearing community of India[2]. In this research, we provide an Indian Sign Language-based Sign Language recognition system. For this analysis, the user must be able to take pictures of hand movements using a web camera, and the system must anticipate and display the name of the taken picture. The acquired image goes through several processing phases, some of which use computer vision techniques, including grayscale conversion, dilatation, and masking. Our model is trained using a convolutional neural network (CNN), which is then utilized to recognize the images. Our best model has a 99% accuracy rate[3].
△ Less
Submitted 28 April, 2023;
originally announced April 2023.
-
LesionAid: Vision Transformers-based Skin Lesion Generation and Classification
Authors:
Ghanta Sai Krishna,
Kundrapu Supriya,
Mallikharjuna Rao K,
Meetiksha Sorgile
Abstract:
Skin cancer is one of the most prevalent forms of human cancer. It is recognized mainly visually, beginning with clinical screening and continuing with the dermoscopic examination, histological assessment, and specimen collection. Deep convolutional neural networks (CNNs) perform highly segregated and potentially universal tasks against a classified finegrained object. This research proposes a nov…
▽ More
Skin cancer is one of the most prevalent forms of human cancer. It is recognized mainly visually, beginning with clinical screening and continuing with the dermoscopic examination, histological assessment, and specimen collection. Deep convolutional neural networks (CNNs) perform highly segregated and potentially universal tasks against a classified finegrained object. This research proposes a novel multi-class prediction framework that classifies skin lesions based on ViT and ViTGAN. Vision transformers-based GANs (Generative Adversarial Networks) are utilized to tackle the class imbalance. The framework consists of four main phases: ViTGANs, Image processing, and explainable AI. Phase 1 consists of generating synthetic images to balance all the classes in the dataset. Phase 2 consists of applying different data augmentation techniques and morphological operations to increase the size of the data. Phases 3 & 4 involve develo** a ViT model for edge computing systems that can identify patterns and categorize skin lesions from the user's skin visible in the image. In phase 3, after classifying the lesions into the desired class with ViT, we will use explainable AI (XAI) that leads to more explainable results (using activation maps, etc.) while ensuring high predictive accuracy. Real-time images of skin diseases can capture by a doctor or a patient using the camera of a mobile application to perform an early examination and determine the cause of the skin lesion. The whole framework is compared with the existing frameworks for skin lesion detection.
△ Less
Submitted 2 February, 2023;
originally announced February 2023.
-
Autonomous Vehicle Navigation with LIDAR using Path Planning
Authors:
Rahul M K,
Sumukh B,
Praveen L Uppunda,
Vinayaka Raju,
C Gururaj
Abstract:
In this paper, a complete framework for Autonomous Self Driving is implemented. LIDAR, Camera and IMU sensors are used together. The entire data communication is managed using Robot Operating System which provides a robust platform for implementation of Robotics Projects. Jetson Nano is used to provide powerful on-board processing capabilities. Sensor fusion is performed on the data received from…
▽ More
In this paper, a complete framework for Autonomous Self Driving is implemented. LIDAR, Camera and IMU sensors are used together. The entire data communication is managed using Robot Operating System which provides a robust platform for implementation of Robotics Projects. Jetson Nano is used to provide powerful on-board processing capabilities. Sensor fusion is performed on the data received from the different sensors to improve the accuracy of the decision making and inferences that we derive from the data. This data is then used to create a localized map of the environment. In this step, the position of the vehicle is obtained with respect to the Map** done using the sensor data.The different SLAM techniques used for this purpose are Hector Map** and GMap** which are widely used map** techniques in ROS. Apart from SLAM that primarily uses LIDAR data, Visual Odometry is implemented using a Monocular Camera. The sensor fused data is then used by Adaptive Monte Carlo Localization for car localization. Using the localized map developed, Path Planning techniques like "TEB planner" and "Dynamic Window Approach" are implemented for autonomous navigation of the vehicle. The last step in the Project is the implantation of Control which is the final decision making block in the pipeline that gives speed and steering data for the navigation that is compatible with Ackermann Kinematics. The implementation of such a control block under a ROS framework using the three sensors, viz, LIDAR, Camera and IMU is a novel approach that is undertaken in this project.
△ Less
Submitted 14 December, 2022;
originally announced December 2022.
-
Vision Transformers and YoloV5 based Driver Drowsiness Detection Framework
Authors:
Ghanta Sai Krishna,
Kundrapu Supriya,
Jai Vardhan,
Mallikharjuna Rao K
Abstract:
Human drivers have distinct driving techniques, knowledge, and sentiments due to unique driving traits. Driver drowsiness has been a serious issue endangering road safety; therefore, it is essential to design an effective drowsiness detection algorithm to bypass road accidents. Miscellaneous research efforts have been approached the problem of detecting anomalous human driver behaviour to examine…
▽ More
Human drivers have distinct driving techniques, knowledge, and sentiments due to unique driving traits. Driver drowsiness has been a serious issue endangering road safety; therefore, it is essential to design an effective drowsiness detection algorithm to bypass road accidents. Miscellaneous research efforts have been approached the problem of detecting anomalous human driver behaviour to examine the frontal face of the driver and automobile dynamics via computer vision techniques. Still, the conventional methods cannot capture complicated driver behaviour features. However, with the origin of deep learning architectures, a substantial amount of research has also been executed to analyze and recognize driver's drowsiness using neural network algorithms. This paper introduces a novel framework based on vision transformers and YoloV5 architectures for driver drowsiness recognition. A custom YoloV5 pre-trained architecture is proposed for face extraction with the aim of extracting Region of Interest (ROI). Owing to the limitations of previous architectures, this paper introduces vision transformers for binary image classification which is trained and validated on a public dataset UTA-RLDD. The model had achieved 96.2\% and 97.4\% as it's training and validation accuracies respectively. For the further evaluation, proposed framework is tested on a custom dataset of 39 participants in various light circumstances and achieved 95.5\% accuracy. The conducted experimentations revealed the significant potential of our framework for practical applications in smart transportation systems.
△ Less
Submitted 3 September, 2022;
originally announced September 2022.
-
Blockchain based digital vaccine passport
Authors:
Ms. Megha Rani R,
Roshan R Acharya,
Ramkishan,
Ranjith K,
Rakshith Ay Gowda
Abstract:
Travel has been challenging recently since different nations have implemented varied immigration and travel policies. For the time being, immigration officials want proof of each person's immunity to the virus. A vaccine passport serves as evidence that a person has tested negative for or is immune to a particular virus. In terms of COVID-19, those who hold a vaccine passport will be permitted ent…
▽ More
Travel has been challenging recently since different nations have implemented varied immigration and travel policies. For the time being, immigration officials want proof of each person's immunity to the virus. A vaccine passport serves as evidence that a person has tested negative for or is immune to a particular virus. In terms of COVID-19, those who hold a vaccine passport will be permitted entry into other nations as long as they can provide proof that they have COVID-19 antibodies from prior infections or from full COVID-19 immunizations. To reduce time and effort spent managing data, the vaccination passport system has been digitalized. The process of contact tracing may be facilitated by digitization. The "Blockchain technology" system, which is currently in use, has demonstrated its security and privacy in systems for data exchange among bitcoin users. The Digital Vaccination Passport scheme can use Blockchain technology. The end result would be a decentralized, traceable, transparent, reliable, auditable, secure, and trustworthy solution based on the Ethereum block-chain that would allow tracking of vaccines given and the history of diseases.
△ Less
Submitted 18 August, 2022;
originally announced August 2022.
-
Real Time Object Detection System with YOLO and CNN Models: A Review
Authors:
Viswanatha V,
Chandana R K,
Ramachandra A. C.
Abstract:
The field of artificial intelligence is built on object detection techniques. YOU ONLY LOOK ONCE (YOLO) algorithm and it's more evolved versions are briefly described in this research survey. This survey is all about YOLO and convolution neural networks (CNN)in the direction of real time object detection.YOLO does generalized object representation more effectively without precision losses than oth…
▽ More
The field of artificial intelligence is built on object detection techniques. YOU ONLY LOOK ONCE (YOLO) algorithm and it's more evolved versions are briefly described in this research survey. This survey is all about YOLO and convolution neural networks (CNN)in the direction of real time object detection.YOLO does generalized object representation more effectively without precision losses than other object detection models.CNN architecture models have the ability to eliminate highlights and identify objects in any given image. When implemented appropriately, CNN models can address issues like deformity diagnosis, creating educational or instructive application, etc. This article reached atnumber of observations and perspective findings through the analysis.Also it provides support for the focused visual information and feature extraction in the financial and other industries, highlights the method of target detection and feature selection, and briefly describe the development process of YOLO algorithm.
△ Less
Submitted 23 July, 2022;
originally announced August 2022.
-
Bi-Sampling Approach to Classify Music Mood leveraging Raga-Rasa Association in Indian Classical Music
Authors:
Mohan Rao B C,
Vinayak Arkachaari,
Harsha M N,
Sushmitha M N,
Gayathri Ramesh K K,
Ullas M S,
Pathi Mohan Rao,
Sudha G,
Narayana Darapaneni
Abstract:
The impact of Music on the mood or emotion of the listener is a well-researched area in human psychology and behavioral science. In Indian classical music, ragas are the melodic structure that defines the various styles and forms of the music. Each raga has been found to evoke a specific emotion in the listener. With the advent of advanced capabilities of audio signal processing and the applicatio…
▽ More
The impact of Music on the mood or emotion of the listener is a well-researched area in human psychology and behavioral science. In Indian classical music, ragas are the melodic structure that defines the various styles and forms of the music. Each raga has been found to evoke a specific emotion in the listener. With the advent of advanced capabilities of audio signal processing and the application of machine learning, the demand for intelligent music classifiers and recommenders has received increased attention, especially in the 'Music as a service' cloud applications. This paper explores a novel framework to leverage the raga-rasa association in Indian classical Music to build an intelligent classifier and its application in music recommendation system based on user's current mood and the mood they aspire to be in.
△ Less
Submitted 13 March, 2022;
originally announced March 2022.
-
BP-Net: Efficient Deep Learning for Continuous Arterial Blood Pressure Estimation using Photoplethysmogram
Authors:
Rishi Vardhan K,
Vedanth S,
Poojah G,
Abhishek K,
Nitish Kumar M,
Vineeth Vijayaraghavan
Abstract:
Blood pressure (BP) is one of the most influential bio-markers for cardiovascular diseases and stroke; therefore, it needs to be regularly monitored to diagnose and prevent any advent of medical complications. Current cuffless approaches to continuous BP monitoring, though non-invasive and unobtrusive, involve explicit feature engineering surrounding fingertip Photoplethysmogram (PPG) signals. To…
▽ More
Blood pressure (BP) is one of the most influential bio-markers for cardiovascular diseases and stroke; therefore, it needs to be regularly monitored to diagnose and prevent any advent of medical complications. Current cuffless approaches to continuous BP monitoring, though non-invasive and unobtrusive, involve explicit feature engineering surrounding fingertip Photoplethysmogram (PPG) signals. To circumvent this, we present an end-to-end deep learning solution, BP-Net, that uses PPG waveform to estimate Systolic BP (SBP), Mean Average Pressure (MAP), and Diastolic BP (DBP) through intermediate continuous Arterial BP (ABP) waveform. Under the terms of the British Hypertension Society (BHS) standard, BP-Net achieves Grade A for DBP and MAP estimation and Grade B for SBP estimation. BP-Net also satisfies Advancement of Medical Instrumentation (AAMI) criteria for DBP and MAP estimation and achieves Mean Absolute Error (MAE) of 5.16 mmHg and 2.89 mmHg for SBP and DBP, respectively. Further, we establish the ubiquitous potential of our approach by deploying BP-Net on a Raspberry Pi 4 device and achieve 4.25 ms inference time for our model to translate the PPG waveform to ABP waveform.
△ Less
Submitted 29 November, 2021;
originally announced November 2021.
-
Collation of Feasible Solutions for Domain Based Problems: An Analysis of Sentiments Based on Codeathon Activity
Authors:
Rajeshwari K,
Preetha S,
Anitha C,
Lakshmi Shree K,
Pronoy Roy
Abstract:
Codeathon activity is a practical approach for enduring the principles of Software Engineering and Object Oriented Modelling. Real world domain problem's solution was accomplished through team work. Analysing the problem and designing a feasible solution through a one day activity was achieved through virtual connection. There are three different sections in a semester, 13 teams were framed and as…
▽ More
Codeathon activity is a practical approach for enduring the principles of Software Engineering and Object Oriented Modelling. Real world domain problem's solution was accomplished through team work. Analysing the problem and designing a feasible solution through a one day activity was achieved through virtual connection. There are three different sections in a semester, 13 teams were framed and assigned one problem statement. Individual team were supposed to prototype a solution which was further used to build one feasible solution. The feedback from students showed different sentiments associated with day long activity. Vivid emotions and expressions of students were analysed.
△ Less
Submitted 23 August, 2021;
originally announced August 2021.
-
Decision Making in Project Groups Formation: Students' Perception and Reconciliation
Authors:
Rajeshwari K,
Apurva Rohit Hegde,
Drishika Patil
Abstract:
Academics is a huge repository of research avenue. Students tend to behave and adapt to the classroom based on their peer influences. Peers help in the increase of communication skills. Research shows group study is more effective than individual study. Group formation is influenced by several factors, like friends, demographic and linguistically similar. Toppers are more considerate but again bas…
▽ More
Academics is a huge repository of research avenue. Students tend to behave and adapt to the classroom based on their peer influences. Peers help in the increase of communication skills. Research shows group study is more effective than individual study. Group formation is influenced by several factors, like friends, demographic and linguistically similar. Toppers are more considerate but again based on comfort level friends are chosen. In this paper we analyze the change in preferences of group mates, and inferences are drawn over their reconciliations.
△ Less
Submitted 16 August, 2021;
originally announced August 2021.
-
Impact of Dietary Habits and Opinionated Lifestyle during COVID-19 Pandemic : A Case Study on Engineering Students
Authors:
Arpitha A Deshpande,
Aadrika A,
Rajeshwari K,
Preetha S
Abstract:
COVID-19 pandemic has introduced a new lifestyle due to lockdown. The impact was on food habits, working hours, and slee** patterns. The goal of this study is to detect lifestyle changes caused by confinement during the COVID-19 pandemic, such as dietary habits, physical activities, and to explore changes in the body weight. A structured questionnaire was used in the study to collect anthropomet…
▽ More
COVID-19 pandemic has introduced a new lifestyle due to lockdown. The impact was on food habits, working hours, and slee** patterns. The goal of this study is to detect lifestyle changes caused by confinement during the COVID-19 pandemic, such as dietary habits, physical activities, and to explore changes in the body weight. A structured questionnaire was used in the study to collect anthropometric data; daily consumption of particular foods, water intake, food frequency, and number of meals/day. The data is presented in a graph illustration to show health , lifestyle trends and the friendship among engineering students.
△ Less
Submitted 30 July, 2021;
originally announced August 2021.
-
Design and Analysis of a Robotic Lizard using Five-Bar Mechanism
Authors:
Rajashekhar V S,
Dinakar Raj C K,
Vishwesh S,
Selva Perumal E,
Nirmal Kumar M
Abstract:
Legged robots are being used to explore rough terrains as they are capable of traversing gaps and obstacles. In this paper, a new mechanism is designed to replicate a robotic lizard using integrated five-bar mechanisms. There are two five bar mechanisms from which two more are formed by connecting the links in a particular order. The legs are attached to the links of the five bar mechanism such th…
▽ More
Legged robots are being used to explore rough terrains as they are capable of traversing gaps and obstacles. In this paper, a new mechanism is designed to replicate a robotic lizard using integrated five-bar mechanisms. There are two five bar mechanisms from which two more are formed by connecting the links in a particular order. The legs are attached to the links of the five bar mechanism such that, when the mechanism is actuated, they move the robot forward. Position analysis using vector loop approach has been done for the mechanism. A prototype has been built and controlled using servo motors to verify the robotic lizard mechanism.
△ Less
Submitted 27 July, 2021;
originally announced July 2021.
-
Codeathon Activity: A Design Prototype for Real World Problems
Authors:
Preetha S,
Rajeshwari K,
Anitha C,
Kausthub Narayan
Abstract:
Activity-based learning helps students to learn through participation. A virtual codeathon activity, as part of this learning scheme, was conducted for 180 undergraduate students to focus on analysis and design of solutions to crucial real-world problems in the existing Covid-19 pandemic situation. In this paper, an analysis is made to know the problem solving skills of students given a single pro…
▽ More
Activity-based learning helps students to learn through participation. A virtual codeathon activity, as part of this learning scheme, was conducted for 180 undergraduate students to focus on analysis and design of solutions to crucial real-world problems in the existing Covid-19 pandemic situation. In this paper, an analysis is made to know the problem solving skills of students given a single problem statement. Evaluators can further collate these multiple solutions into one optimal solution. This Codeathon activity impacts their practical approach towards the analysis and design.
△ Less
Submitted 22 July, 2021;
originally announced July 2021.
-
Reimagining GNN Explanations with ideas from Tabular Data
Authors:
Anjali Singh,
Shamanth R Nayak K,
Balaji Ganesan
Abstract:
Explainability techniques for Graph Neural Networks still have a long way to go compared to explanations available for both neural and decision decision tree-based models trained on tabular data. Using a task that straddles both graphs and tabular data, namely Entity Matching, we comment on key aspects of explainability that are missing in GNN model explanations.
Explainability techniques for Graph Neural Networks still have a long way to go compared to explanations available for both neural and decision decision tree-based models trained on tabular data. Using a task that straddles both graphs and tabular data, namely Entity Matching, we comment on key aspects of explainability that are missing in GNN model explanations.
△ Less
Submitted 23 June, 2021;
originally announced June 2021.
-
IS-CAM: Integrated Score-CAM for axiomatic-based explanations
Authors:
Rakshit Naidu,
Ankita Ghosh,
Yash Maurya,
Shamanth R Nayak K,
Soumya Snigdha Kundu
Abstract:
Convolutional Neural Networks have been known as black-box models as humans cannot interpret their inner functionalities. With an attempt to make CNNs more interpretable and trustworthy, we propose IS-CAM (Integrated Score-CAM), where we introduce the integration operation within the Score-CAM pipeline to achieve visually sharper attribution maps quantitatively. Our method is evaluated on 2000 ran…
▽ More
Convolutional Neural Networks have been known as black-box models as humans cannot interpret their inner functionalities. With an attempt to make CNNs more interpretable and trustworthy, we propose IS-CAM (Integrated Score-CAM), where we introduce the integration operation within the Score-CAM pipeline to achieve visually sharper attribution maps quantitatively. Our method is evaluated on 2000 randomly selected images from the ILSVRC 2012 Validation dataset, which proves the versatility of IS-CAM to account for different models and methods.
△ Less
Submitted 6 October, 2020;
originally announced October 2020.
-
Deepfake Forensics Using Recurrent Neural Networks
Authors:
Rahul U,
Ragul M,
Raja Vignesh K,
Tejeswinee K
Abstract:
As of late an AI based free programming device has made it simple to make authentic face swaps in recordings that leaves barely any hints of control, in what are known as "deepfake" recordings. Situations where these genuine istic counterfeit recordings are utilized to make political pain, extort somebody or phony fear based oppression occasions are effectively imagined. This paper proposes a tran…
▽ More
As of late an AI based free programming device has made it simple to make authentic face swaps in recordings that leaves barely any hints of control, in what are known as "deepfake" recordings. Situations where these genuine istic counterfeit recordings are utilized to make political pain, extort somebody or phony fear based oppression occasions are effectively imagined. This paper proposes a transient mindful pipeline to automat-ically recognize deepfake recordings. Our framework utilizes a convolutional neural system (CNN) to remove outline level highlights. These highlights are then used to prepare a repetitive neural net-work (RNN) that figures out how to characterize if a video has been sub-ject to control or not. We assess our technique against a huge arrangement of deepfake recordings gathered from different video sites. We show how our framework can accomplish aggressive outcomes in this assignment while utilizing a basic design.
△ Less
Submitted 1 May, 2020;
originally announced May 2020.
-
Deepfake Video Forensics based on Transfer Learning
Authors:
Rahul U,
Ragul M,
Raja Vignesh K,
Tejeswinee K
Abstract:
Deeplearning has been used to solve complex problems in various domains. As it advances, it also creates applications which become a major threat to our privacy, security and even to our Democracy. Such an application which is being developed recently is the "Deepfake". Deepfake models can create fake images and videos that humans cannot differentiate them from the genuine ones. Therefore, the cou…
▽ More
Deeplearning has been used to solve complex problems in various domains. As it advances, it also creates applications which become a major threat to our privacy, security and even to our Democracy. Such an application which is being developed recently is the "Deepfake". Deepfake models can create fake images and videos that humans cannot differentiate them from the genuine ones. Therefore, the counter application to automatically detect and analyze the digital visual media is necessary in today world. This paper details retraining the image classification models to apprehend the features from each deepfake video frames. After feeding different sets of deepfake clips of video fringes through a pretrained layer of bottleneck in the neural network is made for every video frame, already stated layer contains condense data for all images and exposes artificial manipulations in Deepfake videos. When checking Deepfake videos, this technique received more than 87 per cent accuracy. This technique has been tested on the Face Forensics dataset and obtained good accuracy in detection.
△ Less
Submitted 29 April, 2020;
originally announced April 2020.
-
Dynamic Mode Decomposition based feature for Image Classification
Authors:
Rahul-Vigneswaran K,
Sachin-Kumar S,
Neethu Mohan,
Soman KP
Abstract:
Irrespective of the fact that Machine learning has produced groundbreaking results, it demands an enormous amount of data in order to perform so. Even though data production has been in its all-time high, almost all the data is unlabelled, hence making them unsuitable for training the algorithms. This paper proposes a novel method of extracting the features using Dynamic Mode Decomposition (DMD).…
▽ More
Irrespective of the fact that Machine learning has produced groundbreaking results, it demands an enormous amount of data in order to perform so. Even though data production has been in its all-time high, almost all the data is unlabelled, hence making them unsuitable for training the algorithms. This paper proposes a novel method of extracting the features using Dynamic Mode Decomposition (DMD). The experiment is performed using data samples from Imagenet. The learning is done using SVM-linear, SVM-RBF, Random Kitchen Sink approach (RKS). The results have shown that DMD features with RKS give competing results.
△ Less
Submitted 7 October, 2019;
originally announced October 2019.
-
Data-driven Computing in Elasticity via Chebyshev Approximation
Authors:
Rahul-Vigneswaran K,
Neethu Mohan,
Soman KP
Abstract:
This paper proposes a data-driven approach for computing elasticity by means of a non-parametric regression approach rather than an optimization approach. The Chebyshev approximation is utilized for tackling the material data-sets non-linearity of the elasticity. Also, additional efforts have been taken to compare the results with several other state-of-the-art methodologies.
This paper proposes a data-driven approach for computing elasticity by means of a non-parametric regression approach rather than an optimization approach. The Chebyshev approximation is utilized for tackling the material data-sets non-linearity of the elasticity. Also, additional efforts have been taken to compare the results with several other state-of-the-art methodologies.
△ Less
Submitted 23 April, 2019;
originally announced April 2019.
-
A Compendium on Network and Host based Intrusion Detection Systems
Authors:
Rahul-Vigneswaran K,
Prabaharan Poornachandran,
Soman KP
Abstract:
The techniques of deep learning have become the state of the art methodology for executing complicated tasks from various domains of computer vision, natural language processing, and several other areas. Due to its rapid development and promising benchmarks in those fields, researchers started experimenting with this technique to perform in the area of, especially in intrusion detection related ta…
▽ More
The techniques of deep learning have become the state of the art methodology for executing complicated tasks from various domains of computer vision, natural language processing, and several other areas. Due to its rapid development and promising benchmarks in those fields, researchers started experimenting with this technique to perform in the area of, especially in intrusion detection related tasks. Deep learning is a subset and a natural extension of classical Machine learning and an evolved model of neural networks. This paper contemplates and discusses all the methodologies related to the leading edge Deep learning and Neural network models purposing to the arena of Intrusion Detection Systems.
△ Less
Submitted 6 April, 2019;
originally announced April 2019.
-
An Insight into the Dynamics and State Space Modelling of a 3-D Quadrotor
Authors:
Rahul Vigneswaran K,
Soman KP
Abstract:
Drones have gained popularity in a wide range of field ranging from aerial photography, aerial map**, and investigation of electric power lines. Every drone that we know today is carrying out some kind of control algorithm at the low level in order to manoeuvre itself around. For the quadrotor to either control itself autonomously or to develop a high-level user interface for us to control it, w…
▽ More
Drones have gained popularity in a wide range of field ranging from aerial photography, aerial map**, and investigation of electric power lines. Every drone that we know today is carrying out some kind of control algorithm at the low level in order to manoeuvre itself around. For the quadrotor to either control itself autonomously or to develop a high-level user interface for us to control it, we need to understand the basic mathematics behind how it functions. This paper aims to explain the mathematical modelling of the dynamics of a 3 Dimensional quadrotor. As it may seem like a trivial task, it plays a vital role in how we control the drone. Also, additional effort has been taken to explain the transformations of the drone's frame of reference to the inertial frame of reference.
△ Less
Submitted 4 January, 2019;
originally announced January 2019.
-
A Proactive Flow Admission and Re-Routing Scheme for Load Balancing and Mitigation of Congestion Propagation in SDN Data Plane
Authors:
Sminesh C. N.,
Grace Mary Kanaga E.,
Ranjitha K
Abstract:
The centralized architecture in software-defined network (SDN) provides a global view of the underlying network, paving the way for enormous research in the area of SDN traffic engineering (SDN TE). This research focuses on the load balancing aspects of SDN TE, given that the existing reactive methods for data-plane load balancing eventually result in packet loss and proactive schemes for data pla…
▽ More
The centralized architecture in software-defined network (SDN) provides a global view of the underlying network, paving the way for enormous research in the area of SDN traffic engineering (SDN TE). This research focuses on the load balancing aspects of SDN TE, given that the existing reactive methods for data-plane load balancing eventually result in packet loss and proactive schemes for data plane load balancing do not address congestion propagation. In the proposed work, the SDN controller periodically monitors flow level statistics and utilization on each link in the network and over-utilized links that cause network congestion and packet loss are identified as bottleneck links. For load balancing the identified largest flow and further traffic through these bottleneck links are rerouted through the lightly-loaded alternate path. The proposed scheme models a Bayesian Network using the observed port utilization and residual bandwidth to decide whether the newly computed alternate path can handle the new flow load before flow admission which in turn reduces congestion propagation. The simulation results show that when the network traffic increases the proposed method efficiently re-routes the flows and balance the network load which substantially improves the network efficiency and the quality of service (QoS) parameters.
△ Less
Submitted 6 December, 2018;
originally announced December 2018.
-
Beam Search Decoding using Manner of Articulation Detection Knowledge Derived from Connectionist Temporal Classification
Authors:
Pradeep Rangan,
Sreenivasa Rao K
Abstract:
Manner of articulation detection using deep neural networks require a priori knowledge of the attribute discriminative features or the decent phoneme alignments. However generating an appropriate phoneme alignment is complex and its performance depends on the choice of optimal number of senones, Gaussians, etc. In the first part of our work, we exploit the manner of articulation detection using co…
▽ More
Manner of articulation detection using deep neural networks require a priori knowledge of the attribute discriminative features or the decent phoneme alignments. However generating an appropriate phoneme alignment is complex and its performance depends on the choice of optimal number of senones, Gaussians, etc. In the first part of our work, we exploit the manner of articulation detection using connectionist temporal classification (CTC) which doesn't need any phoneme alignment. Later we modify the state-of-the-art character based posteriors generated by CTC using the manner of articulation CTC detector. Beam search decoding is performed on the modified posteriors and it's impact on open source datasets such as AN4 and LibriSpeech is observed.
△ Less
Submitted 15 November, 2018;
originally announced November 2018.
-
Manner of Articulation Detection using Connectionist Temporal Classification to Improve Automatic Speech Recognition Performance
Authors:
Pradeep R,
Sreenivasa Rao K
Abstract:
Conventionally, the manner of articulations in speech signal are derived using discriminative signal processing techniques or deep learning approaches. However, training such complex systems involves feature extraction, phoneme force alignment and deep neural network training. In our work, we initially detect the manner of articulations without phoneme alignment using an end-to-end manner of artic…
▽ More
Conventionally, the manner of articulations in speech signal are derived using discriminative signal processing techniques or deep learning approaches. However, training such complex systems involves feature extraction, phoneme force alignment and deep neural network training. In our work, we initially detect the manner of articulations without phoneme alignment using an end-to-end manner of articulation modeling based on connectionist temporal classification (CTC). The manner of articulation knowledge is deployed in the conventional character CTC path to regenerate the new character CTC path. The modified manner based character CTC is evaluated on open source speech datasets such as AN4, LibriSpeech and TEDLIUM-2 and it outperforms over the baseline character CTC.
△ Less
Submitted 5 November, 2018;
originally announced November 2018.
-
PHI Scrubber: A Deep Learning Approach
Authors:
Abhai Kollara Dilip,
Kamal Raj K,
Malaikannan Sankarasubbu
Abstract:
Confidentiality of patient information is an essential part of Electronic Health Record System. Patient information, if exposed, can cause a serious damage to the privacy of individuals receiving healthcare. Hence it is important to remove such details from physician notes. A system is proposed which consists of a deep learning model where a de-convolutional neural network and bi-directional LSTM-…
▽ More
Confidentiality of patient information is an essential part of Electronic Health Record System. Patient information, if exposed, can cause a serious damage to the privacy of individuals receiving healthcare. Hence it is important to remove such details from physician notes. A system is proposed which consists of a deep learning model where a de-convolutional neural network and bi-directional LSTM-CNN is used along with regular expressions to recognize and eliminate the individually identifiable information. This information is then removed from a medical practitioner's data which further allows the fair usage of such information among researchers and in clinical trials.
△ Less
Submitted 3 August, 2018;
originally announced August 2018.
-
Efficient Licence Plate Detection By Unique Edge Detection Algorithm and Smarter Interpretation Through IoT
Authors:
Tejas K,
Ashok Reddy K,
Pradeep Reddy D,
Rajesh Kumar M
Abstract:
Vehicles play a vital role in modern day transportation systems. Number plate provides a standard means of identification for any vehicle. To serve this purpose, automatic licence plate recognition system was developed. This consisted of four major steps: Pre-processing of the obtained image, extraction of licence plate region, segmentation and character recognition. In earlier research, direct ap…
▽ More
Vehicles play a vital role in modern day transportation systems. Number plate provides a standard means of identification for any vehicle. To serve this purpose, automatic licence plate recognition system was developed. This consisted of four major steps: Pre-processing of the obtained image, extraction of licence plate region, segmentation and character recognition. In earlier research, direct application of Sobel edge detection algorithm or applying threshold were used as key steps to extract the licence plate region, which does not produce effective results when the captured image is subjected to the high intensity of light. The use of morphological operations causes deformity in the characters during segmentation. We propose a novel algorithm to tackle the mentioned issues through a unique edge detection algorithm. It is also a tedious task to create and update the database of required vehicles frequently. This problem is solved by the use of Internet of things(IOT) where an online database can be created and updated from any module instantly. Also, through IoT, we connect all the cameras in a geographical area to one server to create a universal eye which drastically increases the probability of tracing a vehicle over having manual database attached to each camera for identification purpose.
△ Less
Submitted 28 October, 2017;
originally announced October 2017.
-
Twin Sort Technique
Authors:
Veeresh D,
Thimmaraju S. N,
Ravish G. K
Abstract:
The objective behind the Twin Sort technique is to sort the list of unordered data elements efficiently and to allow efficient and simple arrangement of data elements within the data structure with optimization of comparisons and iterations in the sorting method. This sorting technique effectively terminates the iterations when there is no need of comparison if the elements are all sorted in betwe…
▽ More
The objective behind the Twin Sort technique is to sort the list of unordered data elements efficiently and to allow efficient and simple arrangement of data elements within the data structure with optimization of comparisons and iterations in the sorting method. This sorting technique effectively terminates the iterations when there is no need of comparison if the elements are all sorted in between the iterations. Unlike Quick sort, Merge sorting technique, this new sorting technique is based on the iterative method of sorting elements within the data structure. So it will be advantageous for optimization of iterations when there is no need for sorting elements. Finally, the Twin Sort technique is more efficient and simple method of arranging elements within a data structure and it is easy to implement when comparing to the other sorting technique. By the introduction of optimization of comparison and iterations, it will never allow the arranging task on the ordered elements.
△ Less
Submitted 22 October, 2017;
originally announced October 2017.
-
Is Stack Overflow Overflowing With Questions and Tags
Authors:
Ranjitha R. K.,
Sanjay Singh
Abstract:
Programming question and answer (Q & A) websites, such as Quora, Stack Overflow, and Yahoo! Answer etc. helps us to understand the programming concepts easily and quickly in a way that has been tested and applied by many software developers. Stack Overflow is one of the most frequently used programming Q\&A website where the questions and answers posted are presently analyzed manually, which requi…
▽ More
Programming question and answer (Q & A) websites, such as Quora, Stack Overflow, and Yahoo! Answer etc. helps us to understand the programming concepts easily and quickly in a way that has been tested and applied by many software developers. Stack Overflow is one of the most frequently used programming Q\&A website where the questions and answers posted are presently analyzed manually, which requires a huge amount of time and resource. To save the effort, we present a topic modeling based technique to analyze the words of the original texts to discover the themes that run through them. We also propose a method to automate the process of reviewing the quality of questions on Stack Overflow dataset in order to avoid ballooning the stack overflow with insignificant questions. The proposed method also recommends the appropriate tags for the new post, which averts the creation of unnecessary tags on Stack Overflow.
△ Less
Submitted 14 August, 2015;
originally announced August 2015.
-
Supertagging: Introduction, learning, and application
Authors:
Taraka Rama K
Abstract:
Supertagging is an approach originally developed by Bangalore and Joshi (1999) to improve the parsing efficiency. In the beginning, the scholars used small training datasets and somewhat naïve smoothing techniques to learn the probability distributions of supertags. Since its inception, the applicability of Supertags has been explored for TAG (tree-adjoining grammar) formalism as well as other rel…
▽ More
Supertagging is an approach originally developed by Bangalore and Joshi (1999) to improve the parsing efficiency. In the beginning, the scholars used small training datasets and somewhat naïve smoothing techniques to learn the probability distributions of supertags. Since its inception, the applicability of Supertags has been explored for TAG (tree-adjoining grammar) formalism as well as other related yet, different formalisms such as CCG. This article will try to summarize the various chapters, relevant to statistical parsing, from the most recent edited book volume (Bangalore and Joshi, 2010). The chapters were selected so as to blend the learning of supertags, its integration into full-scale parsing, and in semantic parsing.
△ Less
Submitted 19 December, 2014;
originally announced December 2014.
-
Semantic Web Search based on Ontology Modeling using Protege Reasoner
Authors:
Monica Shekhar,
Saravanaguru RA. K
Abstract:
The Semantic Web works on the existing Web which presents the meaning of information as well-defined vocabularies understood by the people. Semantic Search, at the same time, works on improving the accuracy if a search by understanding the intent of the search and providing contextually relevant results. This paper describes a semantic approach toward web search through a PHP application. The goal…
▽ More
The Semantic Web works on the existing Web which presents the meaning of information as well-defined vocabularies understood by the people. Semantic Search, at the same time, works on improving the accuracy if a search by understanding the intent of the search and providing contextually relevant results. This paper describes a semantic approach toward web search through a PHP application. The goal was to parse through a user's browsing history and return semantically relevant web pages for the search query provided.
△ Less
Submitted 24 May, 2013;
originally announced May 2013.
-
Detecting and resolving spatial ambiguity in text using named entity extraction and self learning fuzzy logic techniques
Authors:
Kanagavalli V R,
Raja. K
Abstract:
Information extraction identifies useful and relevant text in a document and converts unstructured text into a form that can be loaded into a database table. Named entity extraction is a main task in the process of information extraction and is a classification problem in which words are assigned to one or more semantic classes or to a default non-entity class. A word which can belong to one or mo…
▽ More
Information extraction identifies useful and relevant text in a document and converts unstructured text into a form that can be loaded into a database table. Named entity extraction is a main task in the process of information extraction and is a classification problem in which words are assigned to one or more semantic classes or to a default non-entity class. A word which can belong to one or more classes and which has a level of uncertainty in it can be best handled by a self learning Fuzzy Logic Technique. This paper proposes a method for detecting the presence of spatial uncertainty in the text and dealing with spatial ambiguity using named entity extraction techniques coupled with self learning fuzzy logic techniques
△ Less
Submitted 2 March, 2013;
originally announced March 2013.
-
A Fuzzy Logic based Method for Efficient Retrieval of Vague and Uncertain Spatial Expressions in Text Exploiting the Granulation of the Spatial Event Queries
Authors:
Kanagavalli. V. R,
Raja. K
Abstract:
The arrangement of things in n-dimensional space is specified as Spatial. Spatial data consists of values that denote the location and shape of objects and areas on the earths surface. Spatial information includes facts such as location of features, the relationship of geographic features and measurements of geographic features. The spatial cognition is a primal area of study in various other fiel…
▽ More
The arrangement of things in n-dimensional space is specified as Spatial. Spatial data consists of values that denote the location and shape of objects and areas on the earths surface. Spatial information includes facts such as location of features, the relationship of geographic features and measurements of geographic features. The spatial cognition is a primal area of study in various other fields such as Robotics, Psychology, Geosciences, Geography, Political Sciences, Geographic Economy, Environmental, Mining and Petroleum Engineering, Natural Resources, Epidemiology, Demography etc., Any text document which contains physical location specifications such as place names, geographic coordinates, landmarks, country names etc., are supposed to contain the spatial information. The spatial information may also be represented using vague or fuzzy descriptions involving linguistic terms such as near to, far from, to the east of, very close. Given a query involving events, the aim of this ongoing research work is to extract the relevant information from multiple text documents, resolve the uncertainty and vagueness and translate them in to locations in a map. The input to the system would be a text Corpus and a Spatial Query event. The output of the system is a map showing the most possible, disambiguated location of the event queried. The author proposes Fuzzy Logic Techniques for resolving the uncertainty in the spatial expressions.
△ Less
Submitted 26 February, 2013;
originally announced February 2013.
-
Security Enhancement With Optimal QOS Using EAP-AKA In Hybrid Coupled 3G-WLAN Convergence Network
Authors:
R. Shankar,
Timothy Rajkumar. K,
P. Dananjayan
Abstract:
The third generation partnership project (3GPP) has addressed the feasibility of interworking and specified the interworking architecture and security architecture for third generation (3G)-wireless local area network (WLAN), it is develo**, system architecture evolution (SAE)/ long term evolution (LTE) architecture, for the next generation mobile communication system. To provide a secure 3G-WLA…
▽ More
The third generation partnership project (3GPP) has addressed the feasibility of interworking and specified the interworking architecture and security architecture for third generation (3G)-wireless local area network (WLAN), it is develo**, system architecture evolution (SAE)/ long term evolution (LTE) architecture, for the next generation mobile communication system. To provide a secure 3G-WLAN interworking in the SAE/LTE architecture, Extensible authentication protocol-authentication and key agreement (EAP-AKA) is used. However, EAP-AKA have several vulnerabilities. Therefore, this paper not only analyses the threats and attacks in 3G-WLAN interworking but also proposes a new authentication and key agreement protocol based on EAP-AKA. The proposed protocol combines elliptic curve Diffie-Hellman (ECDH) with symmetric key cryptosystem to overcome the vulnerabilities. The proposed protocol is used in hybrid coupled 3G-WLAN convergence network to analyse its efficiency in terms of QoS metrics, the results obtained using OPNET 14.5 shows that the proposed protocol outperforms existing interworking protocols both in security and QoS.
△ Less
Submitted 29 July, 2010;
originally announced July 2010.