Skip to main content

Showing 1–50 of 69 results for author: Kundu, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2310.03469  [pdf, other

    cs.DS

    FPT Approximations for Packing and Covering Problems Parameterized by Elimination Distance and Even Less

    Authors: Tanmay Inamdar, Lawqueen Kanesh, Madhumita Kundu, M. S. Ramanujan, Saket Saurabh

    Abstract: For numerous graph problems in the realm of parameterized algorithms, using the size of a smallest deletion set (called a modulator) into well-understood graph families as parameterization has led to a long and successful line of research. Recently, however, there has been an extensive study of structural parameters that are potentially much smaller than the modulator size. In particular, recent p… ▽ More

    Submitted 5 October, 2023; originally announced October 2023.

    Comments: Full version of FSTTCS 2023 paper. Abstract shortened to meet the character limit

  2. arXiv:2308.10031  [pdf, ps, other

    cs.DC

    Circle Formation by Asynchronous Opaque Fat Robots on an Infinite Grid

    Authors: Pritam Goswami, Manash Kumar Kundu, Satakshi Ghosh, Buddhadeb Sau

    Abstract: This study addresses the problem of "Circle Formation on an Infinite Grid by Fat Robots" ($CF\_FAT\_GRID$). Unlike prior work focused solely on point robots in discrete domain, it introduces fat robots to circle formation on an infinite grid, aligning with practicality as even small robots inherently possess dimensions. The algorithm, named $CIRCLE\_FG$, resolves the $CF\_FAT\_GRID$ problem using… ▽ More

    Submitted 19 August, 2023; originally announced August 2023.

  3. arXiv:2307.08854  [pdf, other

    cs.DS

    Fixed-Parameter Algorithms for Fair Hitting Set Problems

    Authors: Tanmay Inamdar, Lawqueen Kanesh, Madhumita Kundu, Nidhi Purohit, Saket Saurabh

    Abstract: Selection of a group of representatives satisfying certain fairness constraints, is a commonly occurring scenario. Motivated by this, we initiate a systematic algorithmic study of a \emph{fair} version of \textsc{Hitting Set}. In the classical \textsc{Hitting Set} problem, the input is a universe $\mathcal{U}$, a family $\mathcal{F}$ of subsets of $\mathcal{U}$, and a non-negative integer $k$. The… ▽ More

    Submitted 17 July, 2023; originally announced July 2023.

  4. arXiv:2302.10257  [pdf, other

    cs.IT eess.SP

    Secrecy Outage Analysis of Energy Harvesting Relay-based Mixed UOWC-RF Network with Multiple Eavesdroppers

    Authors: Moloy Kumar Ghosh, Milton Kumar Kundu, Md Ibrahim, A. S. M. Badrudduza, Md. Shamim Anower, Imran Shafique Ansari, Ali A. Shaikhi, Mohammed A. Mohandes

    Abstract: This work deals with the physical layer security performance of a dual-hop underwater optical communication (UOWC)-radio frequency (RF) network under the intruding attempts of multiple eavesdroppers via RF links. The intermediate decode and forward relay node between the underwater source and the destination transforms the optical signal into electrical form and re-transmits it to the destination… ▽ More

    Submitted 20 February, 2023; originally announced February 2023.

    Comments: No

  5. IoT Book Bot

    Authors: Souvik Datta, Mangolik Kundu, Ratnadeep Das Choudhury, Sriramalakshmi P, Sreedevi VT

    Abstract: In order to ease the process of library management many technologies have been adopted but most of them focus on inventory management. There has hardly been any progress of automation in the field of issuing and returning books to the library on time. In colleges and schools, hostellers often forget to timely return the issued books back to the library. To solve the above issue and to ensure timel… ▽ More

    Submitted 4 September, 2022; originally announced September 2022.

    Comments: 2022 IEEE India Council International Subsections Conference (INDISCON)

  6. Arbitrary pattern formation by opaque fat robots on infinite grid

    Authors: Manash Kumar Kundu, Pritam Goswami, Satakshi Ghosh, Buddhadeb Sau

    Abstract: Arbitrary Pattern formation ($\mathcal{APF}$) by a swarm of mobile robots is a widely studied problem in the literature. Many works regarding $\mathcal{APF}$ have been proposed on plane and infinite grid by point robots. But in practical application, it is impossible to design point robots. In \cite{BoseAKS20}, the robots are assumed opaque fat robots but the environment is plane. To the best of o… ▽ More

    Submitted 3 June, 2022; originally announced June 2022.

  7. arXiv:2205.03053  [pdf, other

    cs.DC

    Arbitrary pattern formation by asynchronous opaque robots on infinite grid

    Authors: Manash Kumar Kundu, Pritam Goswami, Satakshi Ghosh, Buddhadeb Sau

    Abstract: Arbitrary pattern formation ($\mathcal{APF}$) by mobile robots is studied by many in literature under different conditions and environment. Recently it has been studied on an infinite grid network but with full visibility. In opaque robot model, circle formation on infinite grid has also been studied. In this paper, we are solving $\mathcal{APF}$ on infinite grid with asynchronous opaque robots wi… ▽ More

    Submitted 6 May, 2022; originally announced May 2022.

  8. arXiv:2112.06487  [pdf, other

    cs.IT

    On the Physical Layer Security Performance over RIS-aided Dual-hop RF-UOWC Mixed Network

    Authors: T. Hossain, S. Shabab, A. S. M. Badrudduza, M. K. Kundu, I. S. Ansari

    Abstract: Since security has been one of the crucial issues for high-yield communications such as 5G and 6G, the researchers continuously come up with newer techniques to enhance the security and performance of these progressive wireless communications. Reconfigurable intelligent surface (RIS) is one of those techniques that artificially rearrange and optimize the propagation environment of electromagnetic… ▽ More

    Submitted 13 December, 2021; originally announced December 2021.

  9. arXiv:2112.04392  [pdf, other

    cs.IT

    Opportunistic Relay Selection over Generalized Fading and Inverse Gamma Composite Fading Mixed Multicast Channels: A Secrecy Tradeoff

    Authors: MD. Shakhawat Hossen, A. S. M. Badrudduza, S. M. Riazul Islam, Abu Hanif, Milton Kumar Kundu, Kyung-Sup Kwak

    Abstract: The secrecy performance of realistic wireless multicast scenarios can be significantly deteriorated by the simultaneous occurrence of multipath and shadowing. To resolve this security threat, in this work an opportunistic relaying-based dual-hop wireless multicast framework is proposed in which the source dispatches confidential information to a bunch of receivers via intermediate relays under the… ▽ More

    Submitted 8 December, 2021; originally announced December 2021.

  10. arXiv:2111.06574  [pdf, other

    cs.IT eess.SP

    On Effective Secrecy Throughput of Underlay Spectrum Sharing $α$-$μ$/ Málaga Hybrid Model under Interference-and-Transmit Power Constraints

    Authors: Md. Ibrahim, A. S. M. Badrudduza, Md. Shakhawat Hossen, M. K. Kundu, Imran Shafique Ansari

    Abstract: The underlay cognitive radio-based hybrid radio frequency / free-space optical (RF / FSO) systems have been emerged as a promising technology due to its ability to eliminate spectrum scarcity and spectrum under-utilization problems. Consequently, this work analyzes the physical layer security aspects of a cognitive RF / FSO hybrid network that includes a primary user, a secondary source, a seconda… ▽ More

    Submitted 12 November, 2021; originally announced November 2021.

  11. arXiv:2109.05171  [pdf, other

    cs.IT eess.SP

    On the Intercept Probability and Secure Outage Analysis of Mixed ($α$-$κ$-$μ$)-shadowed and Málaga Turbulent Model

    Authors: N. A. Sarker, A. S. M. Badrudduza, S. M. R. Islam, S. H. Islam, M. K. Kundu, I. S. Ansari, K. -S. Kwak

    Abstract: This work deals with the secrecy performance analysis of a dual-hop RF-FSO DF relaying network composed of a source, a relay, a destination, and an eavesdropper. We assume the eavesdropper is located close to the destination and overhears the relay's transmitted optical signal. The RF and FSO links undergo ($α$-$κ$-$μ$)-shadowed fading and unified Málaga turbulence with pointing error. The secrecy… ▽ More

    Submitted 10 September, 2021; originally announced September 2021.

  12. arXiv:2109.01407  [pdf, other

    cs.IT

    Secrecy Performance of α-κ-μ Shadowed Fading Channel

    Authors: A. S. M. Badrudduza, S. H. Islam, M. K. Kundu, I. S. Ansari

    Abstract: In this paper, the physical layer security aspects of a wireless framework over α-\k{appa}-μ shadowed (AKMS) fading channel are examined by acquiring closed-form novel expressions of average secrecy capacity, secure outage probability (SOP), and strictly positive secrecy capacity. The lower bound of SOP is derived along with the asymptotic expression of SOP at the high signal-to-noise ratio regime… ▽ More

    Submitted 3 September, 2021; originally announced September 2021.

  13. arXiv:2106.08810  [pdf, other

    cs.IT

    Opportunistic Relay in Multicast Channels with Generalized Shadowed Fading Effects: A Physical Layer Security Perspective

    Authors: S. M. S. Shahriyer, A. S. M. Badrudduza, S. Shabab, M. K. Kundu, H. Yu

    Abstract: Through ordinary transmissions over wireless multicast networks are greatly hampered due to the simultaneous presence of fading and shadowing of wireless channels, secure transmissions can be enhanced by properly exploiting random attributes of the propagation medium. This study focuses on the utilization of those attributes to enhance the physical layer security (PLS) performance of a dual-hop wi… ▽ More

    Submitted 14 November, 2021; v1 submitted 16 June, 2021; originally announced June 2021.

  14. arXiv:2106.06951  [pdf, other

    cs.IT eess.SP

    Effects of Eavesdropper on the Performance of Mixed η-μ and DGG Cooperative Relaying System

    Authors: Noor Ahmed Sarker, A. S. M. Badrudduza, Milton Kumar Kundu, Imran Shafique Ansari

    Abstract: Free-space optical (FSO) channel offers line-of-sight wireless communication with high data rates and high secrecy utilizing unlicensed optical spectrum and also paves the way to the solution of the last-mile access problem. Since atmospheric turbulence is a hindrance to an enhanced secrecy performance, the mixed radio frequency (RF)-FSO system is gaining enormous research interest in recent days.… ▽ More

    Submitted 13 June, 2021; originally announced June 2021.

  15. arXiv:2105.12265  [pdf, other

    cs.IT eess.SP

    On Secrecy Performance of Mixed α-η-μ and Malaga RF-FSO Variable Gain Relaying Channel

    Authors: Nandita Swanan Mandira, Milton Kumar Kundu, Sheikh Habibul Islam, A. S. M. Badrudduza, Imran Shafique Ansari

    Abstract: With the completion of standardization of fifth-generation (5G) networks, the researchers have begun visioning sixth-generation (6G) networks that are predicted to be human-centric. Hence, similar to 5G networks, besides high data rate, providing secrecy and privacy will be the center of attention by the wireless research community. To support the visions beyond 5G (B5G) and 6G, in this paper we p… ▽ More

    Submitted 25 May, 2021; originally announced May 2021.

  16. arXiv:2105.12071  [pdf, other

    cs.IT

    Security Analysis in Multicasting over Shadowed Rician and α-μ Fading Channels: A Dual-hop Hybrid Satellite Terrestrial Relaying Network

    Authors: Abida Sultana Sumona, Milton Kumar Kundu, A. S. M. Badrudduza

    Abstract: In this era of 5G technology, the ever-increasing demands for high data rates lead researchers to develop hybrid satellite-terrestrial (HST) networks as a substitution to the conventional cellular terrestrial systems. Since an HST network suffers from a masking effect which can be mitigated by adopting the terrestrial relaying strategy, in this work, we focus on wireless multicasting through an HS… ▽ More

    Submitted 3 July, 2021; v1 submitted 25 May, 2021; originally announced May 2021.

  17. Enhancing Security of TAS/MRC Based Mixed RF-UOWC System with Induced Underwater Turbulence Effect

    Authors: Md. Ibrahim, A. S. M. Badrudduza, Md. Shakhawat Hossen, Milton Kumar Kundu, Imran Shafique Ansari

    Abstract: Post commercial deployment of fifth-generation (5G) technologies, the consideration of sixth-generation (6G) networks is drawing remarkable attention from research communities. Researchers suggest that similar to 5G, 6G technology must be human-centric where high secrecy together with high data rate will be the key features. These challenges can be easily overcome utilizing PHY security techniques… ▽ More

    Submitted 21 November, 2021; v1 submitted 19 May, 2021; originally announced May 2021.

  18. arXiv:2102.10335  [pdf, ps, other

    cs.CV

    Exploring Knowledge Distillation of a Deep Neural Network for Multi-Script identification

    Authors: Shuvayan Ghosh Dastidar, Kalpita Dutta, Nibaran Das, Mahantapas Kundu, Mita Nasipuri

    Abstract: Multi-lingual script identification is a difficult task consisting of different language with complex backgrounds in scene text images. According to the current research scenario, deep neural networks are employed as teacher models to train a smaller student network by utilizing the teacher model's predictions. This process is known as dark knowledge transfer. It has been quite successful in many… ▽ More

    Submitted 20 February, 2021; originally announced February 2021.

    Comments: 14 pages, 6 figures, 7 tables

  19. arXiv:2008.07953  [pdf, other

    cs.DM

    Parameterized Complexity of Maximum Edge Colorable Subgraph

    Authors: Akanksha Agrawal, Madhumita Kundu, Abhishek Sahu, Saket Saurabh, Prafullkumar Tale

    Abstract: A graph $H$ is {\em $p$-edge colorable} if there is a coloring $ψ: E(H) \rightarrow \{1,2,\dots,p\}$, such that for distinct $uv, vw \in E(H)$, we have $ψ(uv) \neq ψ(vw)$. The {\sc Maximum Edge-Colorable Subgraph} problem takes as input a graph $G$ and integers $l$ and $p$, and the objective is to find a subgraph $H$ of $G$ and a $p$-edge-coloring of $H$, such that $|E(H)| \geq l$. We study the ab… ▽ More

    Submitted 18 August, 2020; originally announced August 2020.

  20. arXiv:2008.00739  [pdf, other

    cs.DC

    Distributed Localization of Wireless Sensor Network Using Communication Wheel

    Authors: Kaustav Bose, Manash Kumar Kundu, Ranendu Adhikary, Buddhadeb Sau

    Abstract: We study the network localization problem, i.e., the problem of determining node positions of a wireless sensor network modeled as a unit disk graph. In an arbitrarily deployed network, positions of all nodes of the network may not be uniquely determined. It is known that even if the network corresponds to a unique solution, no polynomial-time algorithm can solve this problem in the worst case, un… ▽ More

    Submitted 3 August, 2020; originally announced August 2020.

  21. arXiv:2004.12769  [pdf, other

    cs.CV

    A Skip-connected Multi-column Network for Isolated Handwritten Bangla Character and Digit recognition

    Authors: Animesh Singh, Ritesh Sarkhel, Nibaran Das, Mahantapas Kundu, Mita Nasipuri

    Abstract: Finding local invariant patterns in handwrit-ten characters and/or digits for optical character recognition is a difficult task. Variations in writing styles from one person to another make this task challenging. We have proposed a non-explicit feature extraction method using a multi-scale multi-column skip convolutional neural network in this work. Local and global features extracted from differe… ▽ More

    Submitted 27 April, 2020; originally announced April 2020.

  22. arXiv:2004.01964   

    cs.IT

    Uplink and Downlink Performance Bounds for Full Duplex Cellular Networks

    Authors: Askar Mandali Kundu, Rudrashish Pal, Mayank Kumar, Sreejith T V

    Abstract: With Full Duplex (FD), wireless terminal is capable of transmitting and receiving data simultaneously in the same frequency resources, however, it introduces self interference and co-channel interference. Even though various signal processing techniques are emerged to cancel the self interference, the bottleneck for FD performance in cellular systems is the co-channel interference from the other u… ▽ More

    Submitted 31 January, 2023; v1 submitted 4 April, 2020; originally announced April 2020.

    Comments: no longer valid

  23. arXiv:1912.12405  [pdf, other

    cs.CV

    A Genetic Algorithm based Kernel-size Selection Approach for a Multi-column Convolutional Neural Network

    Authors: Animesh Singh, Sandip Saha, Ritesh Sarkhel, Mahantapas Kundu, Mita Nasipuri, Nibaran Das

    Abstract: Deep neural network-based architectures give promising results in various domains including pattern recognition. Finding the optimal combination of the hyper-parameters of such a large-sized architecture is tedious and requires a large number of laboratory experiments. But, identifying the optimal combination of a hyper-parameter or appropriate kernel size for a given architecture of deep learning… ▽ More

    Submitted 16 March, 2020; v1 submitted 28 December, 2019; originally announced December 2019.

  24. arXiv:1910.02706  [pdf, other

    cs.DC

    Arbitrary Pattern Formation by Opaque Fat Robots with Lights

    Authors: Kaustav Bose, Ranendu Adhikary, Manash Kumar Kundu, Buddhadeb Sau

    Abstract: Arbitrary Pattern Formation is a widely studied problem in autonomous robot systems. The problem asks to design a distributed algorithm that moves a team of autonomous, anonymous and identical mobile robots to form any arbitrary pattern given as input. The majority of the existing literature investigates this problem for robots with unobstructed visibility. In a few recent works, the problem has b… ▽ More

    Submitted 7 October, 2019; originally announced October 2019.

  25. arXiv:1905.09786  [pdf, ps, other

    cs.DC

    Positional Encoding by Robots with Non-Rigid Movements

    Authors: Kaustav Bose, Ranendu Adhikary, Manash Kumar Kundu, Buddhadeb Sau

    Abstract: Consider a set of autonomous computational entities, called \emph{robots}, operating inside a polygonal enclosure (possibly with holes), that have to perform some collaborative tasks. The boundary of the polygon obstructs both visibility and mobility of a robot. Since the polygon is initially unknown to the robots, the natural approach is to first explore and construct a map of the polygon. For th… ▽ More

    Submitted 23 May, 2019; originally announced May 2019.

  26. arXiv:1902.04950  [pdf, other

    cs.DC

    Arbitrary Pattern Formation by Asynchronous Opaque Robots with Lights

    Authors: Kaustav Bose, Manash Kumar Kundu, Ranendu Adhikary, Buddhadeb Sau

    Abstract: The Arbitrary Pattern Formation problem asks for a distributed algorithm that moves a set of autonomous mobile robots to form any arbitrary pattern given as input. The robots are assumed to be autonomous, anonymous and identical. They operate in Look-Compute-Move cycles under an asynchronous scheduler. The robots do not have access to any global coordinate system. The movement of the robots is ass… ▽ More

    Submitted 7 October, 2020; v1 submitted 13 February, 2019; originally announced February 2019.

  27. arXiv:1811.00834  [pdf, other

    cs.DC

    Arbitrary Pattern Formation on Infinite Grid by Asynchronous Oblivious Robots

    Authors: Kaustav Bose, Ranendu Adhikary, Manash Kumar Kundu, Buddhadeb Sau

    Abstract: The Arbitrary Pattern Formation problem asks to design a distributed algorithm that allows a set of autonomous mobile robots to form any specific but arbitrary geometric pattern given as input. The problem has been extensively studied in literature in continuous domains. This paper investigates a discrete version of the problem where the robots are operating on a two dimensional infinite grid. The… ▽ More

    Submitted 2 November, 2018; originally announced November 2018.

    Comments: This is the full version of the paper, with the same title and authors, that was accepted in the 13th International Conference and Workshops on Algorithms and Computation (WALCOM 2019), February 27 - March 02, 2019, Guwahati, India

  28. Handwritten Isolated Bangla Compound Character Recognition: a new benchmark using a novel deep learning approach

    Authors: Saikat Roy, Nibaran Das, Mahantapas Kundu, Mita Nasipuri

    Abstract: In this work, a novel deep learning technique for the recognition of handwritten Bangla isolated compound character is presented and a new benchmark of recognition accuracy on the CMATERdb 3.1.3.3 dataset is reported. Greedy layer wise training of Deep Neural Network has helped to make significant strides in various pattern recognition problems. We employ layerwise training to Deep Convolutional N… ▽ More

    Submitted 2 February, 2018; originally announced February 2018.

    Journal ref: Pattern Recognition Letters, Elsevier, Vol. 90, Pages 15-21, 2017

  29. Tracking Direction of Human Movement - An Efficient Implementation using Skeleton

    Authors: Merina Kundu, Dhriti Sengupta, Jayati Ghosh Dastidar

    Abstract: Sometimes a simple and fast algorithm is required to detect human presence and movement with a low error rate in a controlled environment for security purposes. Here a light weight algorithm has been presented that generates alert on detection of human presence and its movement towards a certain direction. The algorithm uses fixed angle CCTV camera images taken over time and relies upon skeleton t… ▽ More

    Submitted 29 June, 2015; originally announced June 2015.

    Comments: arXiv admin note: text overlap with arXiv:1506.08682

    Journal ref: International Journal of Computer Applications 96(13):27-33, June 2014

  30. arXiv:1506.08682  [pdf

    cs.CV

    Human Shape Variation - An Efficient Implementation using Skeleton

    Authors: Dhriti Sengupta, Merina Kundu, Jayati Ghosh Dastidar

    Abstract: It is at times important to detect human presence automatically in secure environments. This needs a shape recognition algorithm that is robust, fast and has low error rates. The algorithm needs to process camera images quickly to detect any human in the range of vision, and generate alerts, especially if the object under scrutiny is moving in certain directions. We present here a simple, efficien… ▽ More

    Submitted 29 June, 2015; originally announced June 2015.

    Journal ref: IJACR, Volume 4, Issue 14, March 2014, pp. 145-150

  31. arXiv:1501.05497  [pdf

    cs.CV

    An Improved Feature Descriptor for Recognition of Handwritten Bangla Alphabet

    Authors: Nibaran Das, Subhadip Basu, Ram Sarkar, Mahantapas Kundu, Mita Nasipuri, Dipak kumar Basu

    Abstract: Appropriate feature set for representation of pattern classes is one of the most important aspects of handwritten character recognition. The effectiveness of features depends on the discriminating power of the features chosen to represent patterns of different classes. However, discriminatory features are not easily measurable. Investigative experimentation is necessary for identifying discriminat… ▽ More

    Submitted 22 January, 2015; originally announced January 2015.

    Comments: In proceedings of ICSIP 2009, pp. 451 to 454, August 2009, Mysore, India. arXiv admin note: substantial text overlap with arXiv:1203.0882, arXiv:1002.4040, arXiv:1410.0478

  32. arXiv:1501.05495  [pdf

    cs.CV

    A GA Based approach for selection of local features for recognition of handwritten Bangla numerals

    Authors: Nibaran Das, Subhadip Basu, Punam Kumar Saha, Ram Sarkar, Mahantapas Kundu, Mita Nasipuri

    Abstract: Soft computing approaches are mainly designed to address the real world ill-defined, imprecisely formulated problems, combining different kind of novel models of computation, such as neural networks, genetic algorithms (GAs. Handwritten digit recognition is a typical example of one such problem. In the current work we have developed a two-pass approach where the first pass classifier performs a co… ▽ More

    Submitted 22 January, 2015; originally announced January 2015.

    Comments: In proceedings of UB NE ASEE 2009 conference, University of Bridgeport, USA

  33. arXiv:1501.05494  [pdf

    cs.CV

    Design of a novel convex hull based feature set for recognition of isolated handwritten Roman numerals

    Authors: Nibaran Das, Sandip Pramanik, Subhadip Basu, Punam Kumar Saha, Ram Sarkar, Mahantapas Kundu

    Abstract: In this paper, convex hull based features are used for recognition of isolated Roman numerals using a Multi Layer Perceptron (MLP) based classifier. Experiments of convex hull based features for handwritten character recognition are few in numbers. Convex hull of a pattern and the centroid of the convex hull both are affine invariant attributes. In this work, 25 features are extracted based on dif… ▽ More

    Submitted 22 January, 2015; originally announced January 2015.

    Comments: In proceedings of UB NE ASEE 2009 conference, University of Bridgeport, USA. arXiv admin note: substantial text overlap with arXiv:1410.0478

  34. arXiv:1410.4013  [pdf

    cs.CV

    A two-pass fuzzy-geno approach to pattern classification

    Authors: Subhadip Basu, Mahantapas Kundu, Mita Nasipuri, Dipak Kumar Basu

    Abstract: The work presents an extension of the fuzzy approach to 2-D shape recognition [1] through refinement of initial or coarse classification decisions under a two pass approach. In this approach, an unknown pattern is classified by refining possible classification decisions obtained through coarse classification of the same. To build a fuzzy model of a pattern class horizontal and vertical fuzzy parti… ▽ More

    Submitted 15 October, 2014; originally announced October 2014.

    Journal ref: Proc. of International Conference on Computer Processing of Bangla, pp. 130-134, Feb-2006, Dhaka

  35. Recognition of Handwritten Bangla Basic Characters and Digits using Convex Hull based Feature Set

    Authors: Nibaran Das, Sandip Pramanik, Subhadip Basu, Punam Kumar Saha, Ram Sarkar, Mahantapas Kundu, Mita Nasipuri

    Abstract: In dealing with the problem of recognition of handwritten character patterns of varying shapes and sizes, selection of a proper feature set is important to achieve high recognition performance. The current research aims to evaluate the performance of the convex hull based feature set, i.e. 125 features in all computed over different bays attributes of the convex hull of a pattern, for effective re… ▽ More

    Submitted 2 October, 2014; originally announced October 2014.

    Journal ref: 2009 International Conference on Artificial Intelligence and Pattern Recognition, At Orlando, Florida pp. 380-386

  36. arXiv:1312.1685  [pdf

    cs.CV

    Human Face Recognition using Gabor based Kernel Entropy Component Analysis

    Authors: Arindam Kar, Debotosh Bhattacharjee, Dipak Kumar Basu, Mita Nasipuri, Mahantapas Kundu

    Abstract: In this paper, we present a novel Gabor wavelet based Kernel Entropy Component Analysis (KECA) method by integrating the Gabor wavelet transformation (GWT) of facial images with the KECA method for enhanced face recognition performance. Firstly, from the Gabor wavelet transformed images the most important discriminative desirable facial features characterized by spatial frequency, spatial locality… ▽ More

    Submitted 5 December, 2013; originally announced December 2013.

    Comments: October, 2012. International Journal of Computer Vision and Image Processing : IGI Global(USA), 2012. arXiv admin note: substantial text overlap with arXiv:1312.1517, arXiv:1312.1520

  37. arXiv:1312.1684  [pdf

    cs.CV

    High Performance Human Face Recognition using Gabor based Pseudo Hidden Markov Model

    Authors: Arindam Kar, Debotosh Bhattacharjee, Dipak Kumar Basu, Mita Nasipuri, Mahantapas Kundu

    Abstract: This paper introduces a novel methodology that combines the multi-resolution feature of the Gabor wavelet transformation (GWT) with the local interactions of the facial structures expressed through the Pseudo Hidden Markov model (PHMM). Unlike the traditional zigzag scanning method for feature extraction a continuous scanning method from top-left corner to right then top-down and right to left and… ▽ More

    Submitted 5 December, 2013; originally announced December 2013.

    Comments: 9 pages. arXiv admin note: substantial text overlap with arXiv:1312.1517

    Journal ref: International Journal of Applied Evolutionary Computation, 2013 4(1), 81-102, January-March 2013

  38. arXiv:1312.1683  [pdf

    cs.CV

    Face Recognition using Hough Peaks extracted from the significant blocks of the Gradient Image

    Authors: Arindam Kar, Debotosh Bhattacharjee, Dipak Kumar Basu, Mita Nasipuri, Mahantapas Kundu

    Abstract: This paper proposes a new technique for automatic face recognition using integrated peaks of the Hough transformed significant blocks of the binary gradient image. In this approach firstly the gradient of an image is calculated and a threshold is set to obtain a binary gradient image, which is less sensitive to noise and illumination changes. Secondly, significant blocks are extracted from the abs… ▽ More

    Submitted 5 December, 2013; originally announced December 2013.

    Comments: 6 pages. arXiv admin note: substantial text overlap with arXiv:1312.1512

    Journal ref: International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X, Volume 2, Issue 1, January 2012

  39. A Face Recognition approach based on entropy estimate of the nonlinear DCT features in the Logarithm Domain together with Kernel Entropy Component Analysis

    Authors: Arindam Kar, Debotosh Bhattacharjee, Dipak Kumar Basu, Mita Nasipuri, Mahantapas Kundu

    Abstract: This paper exploits the feature extraction capabilities of the discrete cosine transform (DCT) together with an illumination normalization approach in the logarithm domain that increase its robustness to variations in facial geometry and illumination. Secondly in the same domain the entropy measures are applied on the DCT coefficients so that maximum entropy preserving pixels can be extracted as t… ▽ More

    Submitted 5 December, 2013; originally announced December 2013.

    Comments: 9 pages,Published Online August 2013 in MECS. International Journal of Information Technology and Computer Science, 2013. arXiv admin note: text overlap with arXiv:1112.3712 by other authors

  40. arXiv:1312.1517  [pdf

    cs.CV

    A Gabor block based Kernel Discriminative Common Vector (KDCV) approach using cosine kernels for Human Face Recognition

    Authors: Arindam Kar, Debotosh Bhattacharjee, Dipak Kumar Basu, Mita Nasipuri, Mahantapas Kundu

    Abstract: In this paper a nonlinear Gabor Wavelet Transform (GWT) discriminant feature extraction approach for enhanced face recognition is proposed. Firstly, the low-energized blocks from Gabor wavelet transformed images are extracted. Secondly, the nonlinear discriminating features are analyzed and extracted from the selected low-energized blocks by the generalized Kernel Discriminative Common Vector (KDC… ▽ More

    Submitted 5 December, 2013; originally announced December 2013.

    Comments: 9 pages,Hindawi Publishing Corporation, Received 14 March 2012; Revised 16 July 2012; Accepted 13 August 2012. International Journal of Computational Intelligence and Neuroscience,2012

  41. arXiv:1312.1512  [pdf

    cs.CV

    An adaptive block based integrated LDP,GLCM,and Morphological features for Face Recognition

    Authors: Arindam Kar, Debotosh Bhattacharjee, Dipak Kumar Basu, Mita Nasipuri, Mahantapas Kundu

    Abstract: This paper proposes a technique for automatic face recognition using integrated multiple feature sets extracted from the significant blocks of a gradient image. We discuss about the use of novel morphological, local directional pattern (LDP) and gray-level co-occurrence matrix GLCM based feature extraction technique to recognize human faces. Firstly, the new morphological features i.e., features b… ▽ More

    Submitted 5 December, 2013; originally announced December 2013.

    Comments: 7 pages, Science Academy Publisher, United Kingdom

    Journal ref: International Journal of Research and Reviews in Computer Science-IJRRCS,2011 ISSN: 2079-2557, Vol. 2, No. 5, October 2011

  42. arXiv:1203.0882  [pdf

    cs.CV cs.AI

    Handwritten Bangla Alphabet Recognition using an MLP Based Classifier

    Authors: Subhadip Basu, Nibaran Das, Ram Sarkar, Mahantapas Kundu, Mita Nasipuri, Dipak Kumar Basu

    Abstract: The work presented here involves the design of a Multi Layer Perceptron (MLP) based classifier for recognition of handwritten Bangla alphabet using a 76 element feature set Bangla is the second most popular script and language in the Indian subcontinent and the fifth most popular language in the world. The feature set developed for representing handwritten characters of Bangla alphabet includes 24… ▽ More

    Submitted 5 March, 2012; originally announced March 2012.

    Journal ref: Proc. of the 2nd National Conf. on Computer Processing of Bangla, pp. 285-291, Feb-2005, Dhaka

  43. arXiv:1203.0876  [pdf

    cs.CV cs.AI

    An MLP based Approach for Recognition of Handwritten `Bangla' Numerals

    Authors: Subhadip Basu, Nibaran Das, Ram Sarkar, Mahantapas Kundu, Mita Nasipuri, Dipak Kumar Basu

    Abstract: The work presented here involves the design of a Multi Layer Perceptron (MLP) based pattern classifier for recognition of handwritten Bangla digits using a 76 element feature vector. Bangla is the second most popular script and language in the Indian subcontinent and the fifth most popular language in the world. The feature set developed for representing handwritten Bangla numerals here includes 2… ▽ More

    Submitted 5 March, 2012; originally announced March 2012.

    Journal ref: Proc. 2nd Indian International Conference on Artificial Intelligence, pp. 407-417, Dec. 2005, Pune

  44. arXiv:1202.3046  [pdf

    cs.CV cs.AI

    Segmentation of Offline Handwritten Bengali Script

    Authors: Subhadip Basu, Chitrita Chaudhuri, Mahantapas Kundu, Mita Nasipuri, Dipak K. Basu

    Abstract: Character segmentation has long been one of the most critical areas of optical character recognition process. Through this operation, an image of a sequence of characters, which may be connected in some cases, is decomposed into sub-images of individual alphabetic symbols. In this paper, segmentation of cursive handwritten script of world's fourth popular language, Bengali, is considered. Unlike E… ▽ More

    Submitted 14 February, 2012; originally announced February 2012.

    Comments: Proceedings of 28th IEEE ACE, pp. 171-174, December 2002, Science City, Kolkata

    Journal ref: Proceedings of 28th IEEE ACE, pp. 171-174, December 2002, Science City, Kolkata

  45. arXiv:1106.3467  [pdf

    cs.CV

    High Performance Human Face Recognition using Independent High Intensity Gabor Wavelet Responses: A Statistical Approach

    Authors: Arindam Kar, Debotosh Bhattacharjee, Dipak Kumar Basu, Mita Nasipuri, Mahantapas Kundu

    Abstract: In this paper, we present a technique by which high-intensity feature vectors extracted from the Gabor wavelet transformation of frontal face images, is combined together with Independent Component Analysis (ICA) for enhanced face recognition. Firstly, the high-intensity feature vectors are automatically extracted using the local characteristics of each individual face from the Gabor transformed i… ▽ More

    Submitted 17 June, 2011; originally announced June 2011.

    Comments: Keywords: Feature extraction; Gabor Wavelets; independent high-intensity feature (IHIF); Independent Component Analysis (ICA); Specificity; Sensitivity; Cosine Similarity Measure; E-ISSN: 2044-6004

    Journal ref: International Journal of Computer Science & Emerging Technologies pp 178-187, Volume 2, Issue 1, February 2011

  46. arXiv:1007.0638  [pdf

    cs.CV

    Human Face Recognition using Line Features

    Authors: Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu

    Abstract: In this work we investigate a novel approach to handle the challenges of face recognition, which includes rotation, scale, occlusion, illumination etc. Here, we have used thermal face images as those are capable to minimize the affect of illumination changes and occlusion due to moustache, beards, adornments etc. The proposed approach registers the training and testing thermal face images in polar… ▽ More

    Submitted 5 July, 2010; originally announced July 2010.

  47. arXiv:1007.0636  [pdf

    cs.CV

    Classification of Log-Polar-Visual Eigenfaces using Multilayer Perceptron

    Authors: Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita Nasipuri, Mahantapas Kundu, Dipak Kumar Basu

    Abstract: In this paper we present a simple novel approach to tackle the challenges of scaling and rotation of face images in face recognition. The proposed approach registers the training and testing visual face images by log-polar transformation, which is capable to handle complicacies introduced by scaling and rotation. Log-polar images are projected into eigenspace and finally classified using an improv… ▽ More

    Submitted 5 July, 2010; originally announced July 2010.

  48. arXiv:1007.0633  [pdf

    cs.CV

    Classification of fused face images using multilayer perceptron neural network

    Authors: Debotosh Bhattacharjee, Mrinal Kanti Bhowmik, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu

    Abstract: This paper presents a concept of image pixel fusion of visual and thermal faces, which can significantly improve the overall performance of a face recognition system. Several factors affect face recognition performance including pose variations, facial expression changes, occlusions, and most importantly illumination changes. So, image pixel fusion of thermal and visual images is a solution to ove… ▽ More

    Submitted 5 July, 2010; originally announced July 2010.

  49. arXiv:1007.0631  [pdf

    cs.CV

    Classification of Fused Images using Radial Basis Function Neural Network for Human Face Recognition

    Authors: M. K. Bhowmik, Debotosh Bhattacharjee, M. Nasipuri, D. K. Basu, M. Kundu

    Abstract: Here an efficient fusion technique for automatic face recognition has been presented. Fusion of visual and thermal images has been done to take the advantages of thermal images as well as visual images. By employing fusion a new image can be obtained, which provides the most detailed, reliable, and discriminating information. In this method fused images are generated using visual and thermal face… ▽ More

    Submitted 5 July, 2010; originally announced July 2010.

  50. arXiv:1007.0628  [pdf

    cs.CV

    Image Pixel Fusion for Human Face Recognition

    Authors: Mrinal Kanti Bhowmik, Debotosh Bhattacharjee, Mita Nasipuri, Dipak Kumar Basu, Mahantapas Kundu

    Abstract: In this paper we present a technique for fusion of optical and thermal face images based on image pixel fusion approach. Out of several factors, which affect face recognition performance in case of visual images, illumination changes are a significant factor that needs to be addressed. Thermal images are better in handling illumination conditions but not very consistent in capturing texture detail… ▽ More

    Submitted 5 July, 2010; originally announced July 2010.