Skip to main content

Showing 1–13 of 13 results for author: Murthy, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2010.01968  [pdf

    physics.app-ph cs.CV cs.LG physics.data-an

    Machine Learning and Computer Vision Techniques to Predict Thermal Properties of Particulate Composites

    Authors: Fazlolah Mohaghegh, Jayathi Murthy

    Abstract: Accurate thermal analysis of composites and porous media requires detailed characterization of local thermal properties in small scale. For some important applications such as lithium-ion batteries, changes in the properties during the operation makes the analysis even more challenging, necessitating a rapid characterization. We propose a new method to characterize the thermal properties of partic… ▽ More

    Submitted 27 August, 2020; originally announced October 2020.

  2. arXiv:2006.08272  [pdf, ps, other

    cs.CC

    Randomized polynomial-time equivalence between determinant and trace-IMM equivalence tests

    Authors: Janaky Murthy, Vineet Nair, Chandan Saha

    Abstract: Equivalence testing for a polynomial family {g_m} over a field F is the following problem: Given black-box access to an n-variate polynomial f(x), where n is the number of variables in g_m, check if there exists an A in GL(n,F) such that f(x) = g_m(Ax). If yes, then output such an A. The complexity of equivalence testing has been studied for a number of important polynomial families, including the… ▽ More

    Submitted 15 June, 2020; originally announced June 2020.

    Comments: 36 pages, 2 figures

    ACM Class: F.1.3

  3. arXiv:1804.03789  [pdf, other

    cs.RO cs.CV

    Geometric Consistency for Self-Supervised End-to-End Visual Odometry

    Authors: Ganesh Iyer, J. Krishna Murthy, Gunshi Gupta, K. Madhava Krishna, Liam Paull

    Abstract: With the success of deep learning based approaches in tackling challenging problems in computer vision, a wide range of deep architectures have recently been proposed for the task of visual odometry (VO) estimation. Most of these proposed solutions rely on supervision, which requires the acquisition of precise ground-truth camera pose information, collected using expensive motion capture systems o… ▽ More

    Submitted 10 April, 2018; originally announced April 2018.

  4. CalibNet: Geometrically Supervised Extrinsic Calibration using 3D Spatial Transformer Networks

    Authors: Ganesh Iyer, R. Karnik Ram., J. Krishna Murthy, K. Madhava Krishna

    Abstract: 3D LiDARs and 2D cameras are increasingly being used alongside each other in sensor rigs for perception tasks. Before these sensors can be used to gather meaningful data, however, their extrinsics (and intrinsics) need to be accurately calibrated, as the performance of the sensor rig is extremely sensitive to these calibration parameters. A vast majority of existing calibration techniques require… ▽ More

    Submitted 4 August, 2019; v1 submitted 21 March, 2018; originally announced March 2018.

    Comments: Appeared in the proccedings of the IEEE International Conference on Intelligent Robots and Systems (IROS) 2018

  5. arXiv:1803.02057  [pdf, other

    cs.RO cs.CV cs.LG

    The Earth ain't Flat: Monocular Reconstruction of Vehicles on Steep and Graded Roads from a Moving Camera

    Authors: Junaid Ahmed Ansari, Sarthak Sharma, Anshuman Majumdar, J. Krishna Murthy, K. Madhava Krishna

    Abstract: Accurate localization of other traffic participants is a vital task in autonomous driving systems. State-of-the-art systems employ a combination of sensing modalities such as RGB cameras and LiDARs for localizing traffic participants, but most such demonstrations have been confined to plain roads. We demonstrate, to the best of our knowledge, the first results for monocular object localization and… ▽ More

    Submitted 6 March, 2018; originally announced March 2018.

    Comments: Submitted to IROS 2018

  6. arXiv:1802.09298  [pdf, other

    cs.RO cs.CV

    Beyond Pixels: Leveraging Geometry and Shape Cues for Online Multi-Object Tracking

    Authors: Sarthak Sharma, Junaid Ahmed Ansari, J. Krishna Murthy, K. Madhava Krishna

    Abstract: This paper introduces geometry and object shape and pose costs for multi-object tracking in urban driving scenarios. Using images from a monocular camera alone, we devise pairwise costs for object tracks, based on several 3D cues such as object pose, shape, and motion. The proposed costs are agnostic to the data association method and can be incorporated into any optimization framework to output t… ▽ More

    Submitted 27 July, 2018; v1 submitted 26 February, 2018; originally announced February 2018.

    Comments: ICRA 2018 paper. Code available at https://github.com/JunaidCS032/MOTBeyondPixels

  7. arXiv:1802.09292  [pdf, other

    cs.RO cs.CV

    Constructing Category-Specific Models for Monocular Object-SLAM

    Authors: Parv Parkhiya, Rishabh Khawad, J. Krishna Murthy, Brojeshwar Bhowmick, K. Madhava Krishna

    Abstract: We present a new paradigm for real-time object-oriented SLAM with a monocular camera. Contrary to previous approaches, that rely on object-level models, we construct category-level models from CAD collections which are now widely available. To alleviate the need for huge amounts of labeled data, we develop a rendering pipeline that enables synthesis of large datasets from a limited amount of manua… ▽ More

    Submitted 26 February, 2018; originally announced February 2018.

    Comments: Accepted to ICRA 2018

  8. arXiv:1609.09468  [pdf, other

    cs.CV cs.RO

    Reconstructing Vechicles from a Single Image: Shape Priors for Road Scene Understanding

    Authors: J. Krishna Murthy, G. V. Sai Krishna, Falak Chhaya, K. Madhava Krishna

    Abstract: We present an approach for reconstructing vehicles from a single (RGB) image, in the context of autonomous driving. Though the problem appears to be ill-posed, we demonstrate that prior knowledge about how 3D shapes of vehicles project to an image can be used to reason about the reverse process, i.e., how shapes (back-)project from 2D to 3D. We encode this knowledge in \emph{shape priors}, which a… ▽ More

    Submitted 29 September, 2016; originally announced September 2016.

  9. arXiv:1108.0747  [pdf, other

    cs.NI

    A Fault Tolerant Trajectory Clustering (FTTC) for selecting cluster heads inWireless Sensor Networks

    Authors: Hazarath Munaga, J. V. R. Murthy, N. B. Venkateswarlu

    Abstract: Wireless sensor networks (WSNs) suffers from the hot spot problem where the sensor nodes closest to the base station are need to relay more packet than the nodes farther away from the base station. Thus, lifetime of sensory network depends on these closest nodes. Clustering methods are used to extend the lifetime of a wireless sensor network. However, current clustering algorithms usually utilize… ▽ More

    Submitted 3 August, 2011; originally announced August 2011.

    Comments: arXiv admin note: substantial text overlap with arXiv:1108.0740

    Journal ref: International Journal of Computational Intelligence Research (IJCIR) Volume 6, Number 3 (2010)

  10. arXiv:1108.0743  [pdf

    cs.NI

    A Hybrid Trajectory Clustering for Predicting User Navigation

    Authors: Hazarath Munaga, J. V. R. Murthy, N. B. Venkateswarlu

    Abstract: Wireless sensor networks (WSNs) suffers from the hot spot problem where the sensor nodes closest to the base station are need to relay more packet than the nodes farther away from the base station. Thus, lifetime of sensory network depends on these closest nodes. Clustering methods are used to extend the lifetime of a wireless sensor network. However, current clustering algorithms usually utilize… ▽ More

    Submitted 3 August, 2011; originally announced August 2011.

    Journal ref: International Journal of Recent Trends in Engineering, Vol. 3, No. 1, 2010

  11. arXiv:1108.0741  [pdf

    cs.CR

    Enhanced User Authentication through Trajectory Clustering

    Authors: Hazarath Munaga, J. V. R. Murthy, N. B. Venkateswarlu

    Abstract: Password authentication is the most commonly used technique to authenticate the user validity. However, due to its simplicity, it is vulnerable to pseudo attacks. It can be enhanced using various biometric techniques such as thumb impression, finger movement, eye movement etc. In this paper, we concentrate on the most economic technique, based on the user habitual rhythm pattern i.e. not what they… ▽ More

    Submitted 3 August, 2011; originally announced August 2011.

    Comments: International Journal of Recent Trends in Engineering, Vol. 3, No. 1, 2010

  12. arXiv:1108.0740  [pdf

    cs.NI

    A Novel Trajectory Clustering technique for selecting cluster heads in Wireless Sensor Networks

    Authors: Hazarath Munaga, J. V. R. Murthy, N. B. Venkateswarlu

    Abstract: Wireless sensor networks (WSNs) suffers from the hot spot problem where the sensor nodes closest to the base station are need to relay more packet than the nodes farther away from the base station. Thus, lifetime of sensory network depends on these closest nodes. Clustering methods are used to extend the lifetime of a wireless sensor network. However, current clustering algorithms usually utilize… ▽ More

    Submitted 3 August, 2011; originally announced August 2011.

    Journal ref: International Journal of Recent Trends in Engineering, Issue. 1, Vol. 1, May 2009

  13. arXiv:1001.5348  [pdf, other

    cs.NE cs.LG

    Performance Comparisons of PSO based Clustering

    Authors: Suresh Chandra Satapathy, Gunanidhi Pradhan, Sabyasachi Pattnaik, J. V. R. Murthy, P. V. G. D. Prasad Reddy

    Abstract: In this paper we have investigated the performance of PSO Particle Swarm Optimization based clustering on few real world data sets and one artificial data set. The performances are measured by two metric namely quantization error and inter-cluster distance. The K means clustering algorithm is first implemented for all data sets, the results of which form the basis of comparison of PSO based appr… ▽ More

    Submitted 29 January, 2010; originally announced January 2010.

    Comments: 6 pages 2 figures

    Journal ref: InterJRI Computer Science and Networking, Volume 1, pp18-23, 2009