Skip to main content

Showing 1–16 of 16 results for author: K, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2403.09891  [pdf, other

    cs.CL cs.AI cs.LG

    Fisher Mask Nodes for Language Model Merging

    Authors: Thennal D K, Ganesh Nathan, Suchithra M S

    Abstract: Fine-tuning pre-trained models provides significant advantages in downstream performance. The ubiquitous nature of pre-trained models such as BERT and its derivatives in natural language processing has also led to a proliferation of task-specific fine-tuned models. As these models typically only perform one task well, additional training or ensembling is required in multi-task scenarios. The growi… ▽ More

    Submitted 3 May, 2024; v1 submitted 14 March, 2024; originally announced March 2024.

    Comments: Accepted at LREC-COLING 2024

  2. arXiv:2306.12027  [pdf

    cs.IR cs.LG cs.SI

    Comparative analysis of various web crawler algorithms

    Authors: Nithin T K, Chandana S, Barani G, Chavva Dharani, M S Karishma

    Abstract: This presentation focuses on the importance of web crawling and page ranking algorithms in dealing with the massive amount of data present on the World Wide Web. As the web continues to grow exponentially, efficient search and retrieval methods become crucial. Web crawling is a process that converts unstructured data into structured data, enabling effective information retrieval. Additionally, pag… ▽ More

    Submitted 21 June, 2023; originally announced June 2023.

  3. arXiv:2211.12796  [pdf, other

    cs.SD cs.CL eess.AS

    IMaSC -- ICFOSS Malayalam Speech Corpus

    Authors: Deepa P Gopinath, Thennal D K, Vrinda V Nair, Swaraj K S, Sachin G

    Abstract: Modern text-to-speech (TTS) systems use deep learning to synthesize speech increasingly approaching human quality, but they require a database of high quality audio-text sentence pairs for training. Malayalam, the official language of the Indian state of Kerala and spoken by 35+ million people, is a low resource language in terms of available corpora for TTS systems. In this paper, we present IMaS… ▽ More

    Submitted 23 November, 2022; originally announced November 2022.

    Comments: 18 pages, 8 figures

  4. arXiv:2205.13020  [pdf, other

    cs.LG cs.CV

    People counting system for retail analytics using edge AI

    Authors: Karthik Reddy Kanjula, Vishnu Vardhan Reddy, Jnanesh K P, Jeffy S Abraham, Tanuja K

    Abstract: Developments in IoT applications are playing an important role in our day-to-day life, starting from business predictions to self driving cars. One of the area, most influenced by the field of AI and IoT is retail analytics. In Retail Analytics, Conversion Rates - a metric which is most often used by retail stores to measure how many people have visited the store and how many purchases has happene… ▽ More

    Submitted 25 May, 2022; originally announced May 2022.

    Comments: 5 pages, 3 figures. We proposed a novel framework design (highlighted in abstract) instead of enhancing a DL model or openVINO. To demonstrate the importance of our framework, we have chosen a retail computer vision problem, people counting system and attempted to construct an end-to-end solution with our suggested framework

  5. Deepfake Forensics Using Recurrent Neural Networks

    Authors: Rahul U, Ragul M, Raja Vignesh K, Tejeswinee K

    Abstract: As of late an AI based free programming device has made it simple to make authentic face swaps in recordings that leaves barely any hints of control, in what are known as "deepfake" recordings. Situations where these genuine istic counterfeit recordings are utilized to make political pain, extort somebody or phony fear based oppression occasions are effectively imagined. This paper proposes a tran… ▽ More

    Submitted 1 May, 2020; originally announced May 2020.

    Comments: This submission has been removed by arXiv administrators due to copyright infringement

  6. Deepfake Video Forensics based on Transfer Learning

    Authors: Rahul U, Ragul M, Raja Vignesh K, Tejeswinee K

    Abstract: Deeplearning has been used to solve complex problems in various domains. As it advances, it also creates applications which become a major threat to our privacy, security and even to our Democracy. Such an application which is being developed recently is the "Deepfake". Deepfake models can create fake images and videos that humans cannot differentiate them from the genuine ones. Therefore, the cou… ▽ More

    Submitted 29 April, 2020; originally announced April 2020.

    Comments: This submission has been removed by arXiv administrators due to copyright infringement

    Report number: F9747038620

  7. arXiv:2001.00575  [pdf

    cs.HC cs.CL

    Smart Summarizer for Blind People

    Authors: Mona teja K, Mohan Sai. S, H S S S Raviteja D, Sai Kushagra P V

    Abstract: In today's world, time is a very important resource. In our busy lives, most of us hardly have time to read the complete news so what we have to do is just go through the headlines and satisfy ourselves with that. As a result, we might miss a part of the news or misinterpret the complete thing. The situation is even worse for the people who are visually impaired or have lost their ability to see.… ▽ More

    Submitted 1 January, 2020; originally announced January 2020.

    Comments: 4 pages, 4 figures

  8. arXiv:1810.05502  [pdf

    eess.SP cs.DC

    Asynchronous Wi-Fi Control Interface (AWCI) Using Socket IO Technology

    Authors: Devipriya T K, Jovita Franci A, Deepa R, Godwin Sam Josh

    Abstract: The Internet of Things (IoT) is a system of interrelated computing devices to the Internet that are provided with unique identifiers which has the ability to transfer data over a network without requiring human-to- human or human-to- computer interaction. Raspberry pi-3 a popular, cheap, small and powerful computer with built in Wi-Fi can be used to make any devices smart by connecting to that par… ▽ More

    Submitted 6 October, 2018; originally announced October 2018.

    Comments: 5 pages, 5 figures, published with Global Research and Development Journal for Engineering

    Journal ref: Global Research and Development Journal for Engineering, 1(3), pp.66-70, 2017

  9. arXiv:1809.04154  [pdf

    cs.CV

    Intensity and Rescale Invariant Copy Move Forgery Detection Techniques

    Authors: Tejas K, Swathi C, Rajesh Kumar M

    Abstract: In this contemporary world digital media such as videos and images behave as an active medium to carry valuable information across the globe on all fronts. However there are several techniques evolved to tamper the image which has made their authenticity untrustworthy. CopyMove Forgery CMF is one of the most common forgeries present in an image where a cluster of pixels are duplicated in the same… ▽ More

    Submitted 11 September, 2018; originally announced September 2018.

    Comments: Further research is active on this paper in VIT University. Hence, the paper is yet not published

  10. arXiv:1806.02907  [pdf

    cs.CV

    Copy Move Forgery using Hus Invariant Moments and Log Polar Transformations

    Authors: Tejas K, Swathi C, Rajesh Kumar M

    Abstract: With the increase in interchange of data, there is a growing necessity of security. Considering the volumes of digital data that is transmitted, they are in need to be secure. Among the many forms of tampering possible, one widespread technique is Copy Move Forgery CMF. This forgery occurs when parts of the image are copied and duplicated elsewhere in the same image. There exist a number of algori… ▽ More

    Submitted 7 June, 2018; originally announced June 2018.

    Comments: This paper was submitted, accepted and presented in the 3rd International Conference on RTEICT, IEEE Conference

  11. arXiv:1710.10418  [pdf

    cs.NE

    Efficient Licence Plate Detection By Unique Edge Detection Algorithm and Smarter Interpretation Through IoT

    Authors: Tejas K, Ashok Reddy K, Pradeep Reddy D, Rajesh Kumar M

    Abstract: Vehicles play a vital role in modern day transportation systems. Number plate provides a standard means of identification for any vehicle. To serve this purpose, automatic licence plate recognition system was developed. This consisted of four major steps: Pre-processing of the obtained image, extraction of licence plate region, segmentation and character recognition. In earlier research, direct ap… ▽ More

    Submitted 28 October, 2017; originally announced October 2017.

    Comments: Paper has been submitted to SocPros17, 7th international conference on soft computing and problem solving, Scopus indexed. If accepted paper will be published in AISC series SPRINGER. Some of the extended/modified selected quality papers will be published in a Special Issue of 'Swarm and Evolutionary Computation journal, Elsevier (SCI). 10 pages

  12. arXiv:1710.09550  [pdf

    cs.CR

    High Capacity, Secure (n, n/8) Multi Secret Image Sharing Scheme with Security Key

    Authors: Karthik Reddy, Tejas K, Swathi C, Ashok K, Rajesh Kumar M

    Abstract: The rising need of secret image sharing with high security has led to much advancement in lucrative exchange of important images which contain vital and confidential information. Multi secret image sharing system (MSIS) is an efficient and robust method for transmitting one or more secret images securely. In recent research, n secret images are encrypted into n or n+ 1 shared images and stored in… ▽ More

    Submitted 26 October, 2017; originally announced October 2017.

    Comments: Accepted and Presented in International Conference on Intelligent Computing and Control (I2C2) IEEE conference, June 2017

  13. arXiv:1710.09267  [pdf

    cs.CY

    Automated Region Masking Of Latent Overlapped Fingerprints

    Authors: Tejas K, Swathi C, Aravind Kumar D, Rajesh Muthu

    Abstract: Fingerprints have grown to be the most robust and efficient means of biometric identification. Latent fingerprints are commonly found at crime scenes. They are also of the overlapped kind making it harder for identification and thus the separation of overlapped fingerprints has been a conundrum to surpass. The usage of dedicated software has resulted in a manual approach to region masking of the t… ▽ More

    Submitted 25 October, 2017; originally announced October 2017.

    Comments: Accepted and presented in I-PACT international IEEE conference on 21st and 22nd April

  14. arXiv:1705.09144  [pdf

    cs.RO

    Modeling and Simulation of the Dynamics of the Quick Return Mechanism: A Bond Graph Approach

    Authors: Anand Vaz, Thommen G K

    Abstract: This paper applies the multibond graph approach for rigid multibody systems to model the dynamics of general spatial mechanisms. The commonly used quick return mechanism which comprises of revolute as well as prismatic joints has been chosen as a representative example to demonstrate the application of this technique and its resulting advantages. In this work, the links of the quick return mechani… ▽ More

    Submitted 22 May, 2017; originally announced May 2017.

    Comments: Document prepared for National Conference on Industrial Problems on Machines and Mechanisms (2010), 8 pages, 19 Figures

    Journal ref: Proceedings of 10th National Conference on Industrial Problems on Machines and Mechanisms (IPRoMM 2010), MNIT, Jaipur, Rajasthan, December 17-18,2010, paper No. IPRoMM 2010-34, p. 23-30

  15. arXiv:1412.6264  [pdf, ps, other

    cs.CL

    Supertagging: Introduction, learning, and application

    Authors: Taraka Rama K

    Abstract: Supertagging is an approach originally developed by Bangalore and Joshi (1999) to improve the parsing efficiency. In the beginning, the scholars used small training datasets and somewhat naïve smoothing techniques to learn the probability distributions of supertags. Since its inception, the applicability of Supertags has been explored for TAG (tree-adjoining grammar) formalism as well as other rel… ▽ More

    Submitted 19 December, 2014; originally announced December 2014.

  16. Security Enhancement With Optimal QOS Using EAP-AKA In Hybrid Coupled 3G-WLAN Convergence Network

    Authors: R. Shankar, Timothy Rajkumar. K, P. Dananjayan

    Abstract: The third generation partnership project (3GPP) has addressed the feasibility of interworking and specified the interworking architecture and security architecture for third generation (3G)-wireless local area network (WLAN), it is develo**, system architecture evolution (SAE)/ long term evolution (LTE) architecture, for the next generation mobile communication system. To provide a secure 3G-WLA… ▽ More

    Submitted 29 July, 2010; originally announced July 2010.

    Comments: 12 pages, 5 figures

    Journal ref: International Journal Of UbiComp 1.3 (2010) 31-42