Skip to main content

Showing 1–11 of 11 results for author: K., B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.19738  [pdf, other

    quant-ph cs.AI cs.LG

    Classical Bandit Algorithms for Entanglement Detection in Parameterized Qubit States

    Authors: Bharati. K, Vikesh Siddhu, Krishna Jagannathan

    Abstract: Entanglement is a key resource for a wide range of tasks in quantum information and computing. Thus, verifying availability of this quantum resource is essential. Extensive research on entanglement detection has led to no-go theorems (Lu et al. [Phys. Rev. Lett., 116, 230501 (2016)]) that highlight the need for full state tomography (FST) in the absence of adaptive or joint measurements. Recent ad… ▽ More

    Submitted 28 June, 2024; originally announced June 2024.

    Comments: 20 pages, 5 figures

  2. arXiv:2211.15374  [pdf, other

    cs.CV eess.IV

    Identification of Surface Defects on Solar PV Panels and Wind Turbine Blades using Attention based Deep Learning Model

    Authors: Divyanshi Dwivedi, K. Victor Sam Moses Babu, Pradeep Kumar Yemula, Pratyush Chakraborty, Mayukha Pal

    Abstract: The global generation of renewable energy has rapidly increased, primarily due to the installation of large-scale renewable energy power plants. However, monitoring renewable energy assets in these large plants remains challenging due to environmental factors that could result in reduced power generation, malfunctioning, and degradation of asset life. Therefore, the detection of surface defects on… ▽ More

    Submitted 8 January, 2024; v1 submitted 22 November, 2022; originally announced November 2022.

  3. Peer-to-Peer Sharing of Energy Storage Systems under Net Metering and Time-of-Use Pricing

    Authors: K. Victor Sam Moses Babu, Satya Surya Vinay K, Pratyush Chakraborty

    Abstract: Sharing economy has become a socio-economic trend in transportation and housing sectors. It develops business models leveraging underutilized resources. Like those sectors, power grid is also becoming smarter with many flexible resources, and researchers are investigating the impact of sharing resources here as well that can help to reduce cost and extract value. In this work, we investigate shari… ▽ More

    Submitted 1 October, 2022; v1 submitted 25 July, 2022; originally announced July 2022.

  4. arXiv:2010.15668  [pdf

    cs.CY cs.CR cs.SI

    PeopleXploit -- A hybrid tool to collect public data

    Authors: Arjun Anand V, Buvanasri A K, Meenakshi R, Dr. Karthika S, Ashok Kumar Mohan

    Abstract: This paper introduces the concept of Open Source Intelligence (OSINT) as an important application in intelligent profiling of individuals. With a variety of tools available, significant data shall be obtained on an individual as a consequence of analyzing his/her internet presence but all of this comes at the cost of low relevance. To increase the relevance score in profiling, PeopleXploit is bein… ▽ More

    Submitted 28 October, 2020; originally announced October 2020.

    Comments: 8 pages, 3 images, ICCCSP 2020

  5. arXiv:2009.01571  [pdf, other

    cs.LG stat.ML

    MixBoost: Synthetic Oversampling with Boosted Mixup for Handling Extreme Imbalance

    Authors: Anubha Kabra, Ayush Chopra, Nikaash Puri, Pinkesh Badjatiya, Sukriti Verma, Piyush Gupta, Balaji K

    Abstract: Training a classification model on a dataset where the instances of one class outnumber those of the other class is a challenging problem. Such imbalanced datasets are standard in real-world situations such as fraud detection, medical diagnosis, and computational advertising. We propose an iterative data augmentation method, MixBoost, which intelligently selects (Boost) and then combines (Mix) ins… ▽ More

    Submitted 3 September, 2020; originally announced September 2020.

    Comments: Work done as part of internship at MDSR

  6. arXiv:2007.01787  [pdf, other

    cs.CV cs.LG cs.RO

    Evaluating Uncertainty Estimation Methods on 3D Semantic Segmentation of Point Clouds

    Authors: Swaroop Bhandary K, Nico Hochgeschwender, Paul Plöger, Frank Kirchner, Matias Valdenegro-Toro

    Abstract: Deep learning models are extensively used in various safety critical applications. Hence these models along with being accurate need to be highly reliable. One way of achieving this is by quantifying uncertainty. Bayesian methods for UQ have been extensively studied for Deep Learning models applied on images but have been less explored for 3D modalities such as point clouds often used for Robots a… ▽ More

    Submitted 3 July, 2020; originally announced July 2020.

    Comments: 12 pages, 19 figures, ICML 2020 Workshop on Uncertainty and Robustness in Deep Learning

  7. A Review of Link Aggregation Control Protocol (LACP) as a Link Redundancy in SDN Based Network Using Ryu-Controller

    Authors: Ali Ibnun Nurhadi, Guntur Petrus B. K., Muhammad Firdaus, Raditya Muhammad

    Abstract: A reliable network is an absolute requirement for telecommunication networks at this time. This is in line with the growing number of users who need a reliable and uninterrupted connection to the server. Link Aggregation is one of the techniques that can be used to provide a reliable network. Link Aggregation System combines two or more links into one logical link, which is characterized by the us… ▽ More

    Submitted 23 May, 2020; originally announced May 2020.

  8. arXiv:2001.01040  [pdf, other

    stat.AP cs.DL

    Causal Impact of Web Browsing and Other Factors on Research Publications

    Authors: Bharathi Manjula . K, Sourish Das, Jehadeesan . R

    Abstract: In this paper, we study the causal impact of the web-search activity on the research publication. We considered observational prospective study design, where research activity of 267 scientists is being studied. We considered the Poisson and negative binomial regression model for our analysis. Based on the Akaike's Model selection criterion, we found the negative binomial regression performs bette… ▽ More

    Submitted 4 January, 2020; originally announced January 2020.

  9. arXiv:1911.00962  [pdf, other

    cs.CV cs.LG eess.IV

    Conservative Wasserstein Training for Pose Estimation

    Authors: Xiaofeng Liu, Yang Zou, Tong Che, Peng Ding, ** Jia, Jane You, Kumar B. V. K

    Abstract: This paper targets the task with discrete and periodic class labels ($e.g.,$ pose/orientation estimation) in the context of deep learning. The commonly used cross-entropy or regression loss is not well matched to this problem as they ignore the periodic nature of the labels and the class similarity, or assume labels are continuous value. We propose to incorporate inter-class correlations in a Wass… ▽ More

    Submitted 3 November, 2019; originally announced November 2019.

    Comments: ICCV 2019

  10. arXiv:1501.01364  [pdf

    cs.CV

    Leader Follower Formation Control of Ground Vehicles Using Camshift Based Guidance

    Authors: S. M. Vaitheeswaran, Bharath M. K., Gokul M

    Abstract: Autonomous ground vehicles have been designed for the purpose of that relies on ranging and bearing information received from forward looking camera on the Formation control . A visual guidance control algorithm is designed where real time image processing is used to provide feedback signals. The vision subsystem and control subsystem work in parallel to accomplish formation control. A proportiona… ▽ More

    Submitted 6 January, 2015; originally announced January 2015.

  11. arXiv:0803.3338  [pdf, ps, other

    cs.NI cs.DC cs.OS cs.PF

    Performance Evaluation of Multiple TCP connections in iSCSI

    Authors: Bhargava Kumar K, Ganesh M. Narayan, K. Gopinath

    Abstract: Scaling data storage is a significant concern in enterprise systems and Storage Area Networks (SANs) are deployed as a means to scale enterprise storage. SANs based on Fibre Channel have been used extensively in the last decade while iSCSI is fast becoming a serious contender due to its reduced costs and unified infrastructure. This work examines the performance of iSCSI with multiple TCP connec… ▽ More

    Submitted 23 March, 2008; originally announced March 2008.

    Comments: 10pt, 11 pages, two column, 15 figures

    ACM Class: B.3.2; D.4.2; H.3.4; C.2.2

    Journal ref: Proceedings of the 24th IEEE Conference on Mass Storage Systems and Technologies, 2007 - MSST '07