Skip to main content

Showing 1–19 of 19 results for author: N, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.00182  [pdf, other

    cs.AR

    Chiplets on Wheels: Review Paper on Holistic Chiplet Solutions for Autonomous Vehicles

    Authors: Swathi Narashiman, Venkat A, Divyaratna Joshi, Deepak Sridhar, Harish Rajesh, Sanjay Sattva, Aniruddha S, Jayanth B, Varun Manjunath, Ragavendiran N

    Abstract: On the advent of the slow death of Moore's law, the silicon industry is moving towards a new era of chiplets. The automotive industry is experiencing a profound transformation towards software-defined vehicles, fueled by the surging demand for automotive compute chips, expected to reach 20-22 billion by 2030. High-performance compute (HPC) chips become instrumental in meeting the soaring demand fo… ▽ More

    Submitted 31 May, 2024; originally announced June 2024.

  2. arXiv:2403.02833  [pdf, other

    cs.LG cs.NE

    SOFIM: Stochastic Optimization Using Regularized Fisher Information Matrix

    Authors: Mrinmay Sen, A. K. Qin, Gayathri C, Raghu Kishore N, Yen-Wei Chen, Balasubramanian Raman

    Abstract: This paper introduces a new stochastic optimization method based on the regularized Fisher information matrix (FIM), named SOFIM, which can efficiently utilize the FIM to approximate the Hessian matrix for finding Newton's gradient update in large-scale stochastic optimization of machine learning models. It can be viewed as a variant of natural gradient descent, where the challenge of storing and… ▽ More

    Submitted 1 May, 2024; v1 submitted 5 March, 2024; originally announced March 2024.

  3. arXiv:2311.13800  [pdf

    cs.CR cs.AI cs.LG

    Enhancing Intrusion Detection In Internet Of Vehicles Through Federated Learning

    Authors: Abhishek Sebastian, Pragna R, Sudhakaran G, Renjith P N, Leela Karthikeyan H

    Abstract: Federated learning is a technique of decentralized machine learning. that allows multiple parties to collaborate and learn a shared model without sharing their raw data. Our paper proposes a federated learning framework for intrusion detection in Internet of Vehicles (IOVs) using the CIC-IDS 2017 dataset. The proposed framework employs SMOTE for handling class imbalance, outlier detection for iden… ▽ More

    Submitted 22 November, 2023; originally announced November 2023.

  4. arXiv:2310.03027  [pdf, other

    physics.chem-ph cs.AI cs.LG

    Synergistic Fusion of Graph and Transformer Features for Enhanced Molecular Property Prediction

    Authors: M V Sai Prakash, Siddartha Reddy N, Ganesh Parab, Varun V, Vishal Vaddina, Saisubramaniam Gopalakrishnan

    Abstract: Molecular property prediction is a critical task in computational drug discovery. While recent advances in Graph Neural Networks (GNNs) and Transformers have shown to be effective and promising, they face the following limitations: Transformer self-attention does not explicitly consider the underlying molecule structure while GNN feature representation alone is not sufficient to capture granular a… ▽ More

    Submitted 25 August, 2023; originally announced October 2023.

  5. arXiv:2212.11653  [pdf, ps, other

    cs.DS

    Parameterizing Path Partitions

    Authors: Henning Fernau, Florent Foucaud, Kevin Mann, Utkarsh Padariya, Rajath Rao K. N

    Abstract: We study the algorithmic complexity of partitioning the vertex set of a given (di)graph into a small number of paths. The Path Partition problem (PP) has been studied extensively, as it includes Hamiltonian Path as a special case. The natural variants where the paths are required to be either \emph{induced} (Induced Path Partition, IPP) or \emph{shortest} (Shortest Path Partition, SPP), have recei… ▽ More

    Submitted 2 September, 2023; v1 submitted 22 December, 2022; originally announced December 2022.

    Comments: 27 pages, 8 figures. A short version appeared in the proceedings of the CIAC 2023 conference

  6. arXiv:2205.00880  [pdf

    cs.AI

    The Application of Energy and Laplacian Energy of Hesitancy Fuzzy Graph Based on Similarity Measures in Decision Making Problems

    Authors: Rajagopal Reddy N, Sharief Basha Shaik

    Abstract: In this article, a new hesitancy fuzzy similarity measure is defined and then used to develop the matrix of hesitancy fuzzy similarity measures, which is subsequently used to classify hesitancy fuzzy graph using the working procedure. We build a working procedure (Algorithm) for estimating the eligible reputation scores values of experts by applying hesitancy fuzzy preference relationships (HFPRs)… ▽ More

    Submitted 28 April, 2022; originally announced May 2022.

  7. arXiv:2201.09109  [pdf, other

    cs.CV

    Robust Unpaired Single Image Super-Resolution of Faces

    Authors: Saurabh Goswami, Rajagopalan A. N

    Abstract: We propose an adversarial attack for facial class-specific Single Image Super-Resolution (SISR) methods. Existing attacks, such as the Fast Gradient Sign Method (FGSM) or the Projected Gradient Descent (PGD) method, are either fast but ineffective, or effective but prohibitively slow on these networks. By closely inspecting the surface that the MSE loss, used to train such networks, traces under v… ▽ More

    Submitted 22 January, 2022; originally announced January 2022.

    Comments: 8 pages

  8. arXiv:2112.06175  [pdf, other

    cs.CV

    Unsupervised Domain-Specific Deblurring using Scale-Specific Attention

    Authors: Praveen Kandula, Rajagopalan. A. N

    Abstract: In the literature, coarse-to-fine or scale-recurrent approach i.e. progressively restoring a clean image from its low-resolution versions has been successfully employed for single image deblurring. However, a major disadvantage of existing methods is the need for paired data; i.e. sharpblur image pairs of the same scene, which is a complicated and cumbersome acquisition procedure. Additionally, du… ▽ More

    Submitted 12 December, 2021; originally announced December 2021.

  9. arXiv:2109.04138  [pdf, other

    cs.CR cs.CV

    Multilingual Audio-Visual Smartphone Dataset And Evaluation

    Authors: Hareesh Mandalapu, Aravinda Reddy P N, Raghavendra Ramachandra, K Sreenivasa Rao, Pabitra Mitra, S R Mahadeva Prasanna, Christoph Busch

    Abstract: Smartphones have been employed with biometric-based verification systems to provide security in highly sensitive applications. Audio-visual biometrics are getting popular due to their usability, and also it will be challenging to spoof because of their multimodal nature. In this work, we present an audio-visual smartphone dataset captured in five different recent smartphones. This new dataset cont… ▽ More

    Submitted 15 November, 2021; v1 submitted 9 September, 2021; originally announced September 2021.

  10. arXiv:2011.02427  [pdf, other

    eess.IV cs.CV

    Super-Resolution of Real-World Faces

    Authors: Saurabh Goswami, Aakanksha, Rajagopalan A. N

    Abstract: Real low-resolution (LR) face images contain degradations which are too varied and complex to be captured by known downsampling kernels and signal-independent noises. So, in order to successfully super-resolve real faces, a method needs to be robust to a wide range of noise, blur, compression artifacts etc. Some of the recent works attempt to model these degradations from a dataset of real images… ▽ More

    Submitted 7 February, 2022; v1 submitted 4 November, 2020; originally announced November 2020.

    Comments: 15 pages

  11. arXiv:2006.04057  [pdf

    cs.CV

    Facial Expression Recognition using Deep Learning

    Authors: Raghu Vamshi. N, Bharathi Raja S

    Abstract: Throughout the various ages, facial expressions have become one of the universal ways of non-verbal communication. The ability to recognize facial expressions would pave the path for many novel applications. Despite the success of traditional approaches in a controlled environment, these approaches fail on challenging datasets consisting of partial faces. In this paper, I take one such dataset FER… ▽ More

    Submitted 7 June, 2020; originally announced June 2020.

  12. arXiv:1811.00344  [pdf, other

    cs.CV

    Analyzing Perception-Distortion Tradeoff using Enhanced Perceptual Super-resolution Network

    Authors: Subeesh Vasu, Nimisha Thekke Madam, Rajagopalan A. N

    Abstract: Convolutional neural network (CNN) based methods have recently achieved great success for image super-resolution (SR). However, most deep CNN based SR models attempt to improve distortion measures (e.g. PSNR, SSIM, IFC, VIF) while resulting in poor quantified perceptual quality (e.g. human opinion score, no-reference quality measures such as NIQE). Few works have attempted to improve the perceptua… ▽ More

    Submitted 4 November, 2018; v1 submitted 1 November, 2018; originally announced November 2018.

  13. arXiv:1810.09479  [pdf

    cs.CV eess.IV

    Single Image Haze Removal using a Generative Adversarial Network

    Authors: Bharath Raj N., Venkateswaran N

    Abstract: Traditional methods to remove haze from images rely on estimating a transmission map. When dealing with single images, this becomes an ill-posed problem due to the lack of depth information. In this paper, we propose an end-to-end learning based approach which uses a modified conditional Generative Adversarial Network to directly remove haze from an image. We employ the usage of the Tiramisu model… ▽ More

    Submitted 29 August, 2020; v1 submitted 22 October, 2018; originally announced October 2018.

    Comments: Accepted for the WiSPNET 2020 conference. Please refer to the GitHub repository for information on updates to the paper: https://github.com/thatbrguy/Dehaze-GAN

  14. Artificial Intelligence (AI) Methods in Optical Networks: A Comprehensive Survey

    Authors: Javier Mata, Ignacio de Miguel, Ramó n J. Durá n, Noemí Merayo, Sandeep Kumar Singh, Admela Jukan, Mohit Chamania

    Abstract: Artificial intelligence (AI) is an extensive scientific discipline which enables computer systems to solve problems by emulating complex biological processes such as learning, reasoning and self-correction. This paper presents a comprehensive review of the application of AI techniques for improving performance of optical communication systems and networks. The use of AI-based techniques is first s… ▽ More

    Submitted 15 January, 2018; v1 submitted 5 January, 2018; originally announced January 2018.

    Journal ref: Optical Switching and Networking, Jan 2018

  15. arXiv:1409.4169  [pdf

    cs.CL

    An Algorithm Based on Empirical Methods, for Text-to-Tuneful-Speech Synthesis of Sanskrit Verse

    Authors: Rama N., Meenakshi Lakshmanan

    Abstract: The rendering of Sanskrit poetry from text to speech is a problem that has not been solved before. One reason may be the complications in the language itself. We present unique algorithms based on extensive empirical analysis, to synthesize speech from a given text input of Sanskrit verses. Using a pre-recorded audio units database which is itself tremendously reduced in size compared to the colos… ▽ More

    Submitted 15 September, 2014; originally announced September 2014.

    Comments: International Journal of Computer Science and Network Security, Vol.10, No. 1, January 2010

  16. Portable Camera-Based Product Label Reading For Blind People

    Authors: Rajkumar N, Anand M. G, Barathiraja N

    Abstract: We propose a camera-based assistive text reading framework to help blind persons read text labels and product packaging from hand-held objects in their daily life. To isolate the object from untidy backgrounds or other surrounding objects in the camera vision, we initially propose an efficient and effective motion based method to define a region of interest (ROI) in the video by asking the user to… ▽ More

    Submitted 16 January, 2019; v1 submitted 7 May, 2014; originally announced May 2014.

    Comments: This article has been withdrawn by arXiv administrators due to verbatim text overlap from external sources

    Journal ref: IJETT,V10(11),521-524 April 2014.ISSN:2231-5381

  17. arXiv:1401.8069  [pdf

    cs.SE

    Defect Detection Efficiency A Combined Approach

    Authors: Rashmi N, Suma V

    Abstract: Survival of IT industries depends much upon the development of high quality and customer satisfied software products. Quality however can be viewed from various perspectives such as deployment of the products within estimated resources, constrains and also being defect free. Testing is one of the promising techniques ever since the inception of software in the global market. Though there are sever… ▽ More

    Submitted 31 January, 2014; originally announced January 2014.

    Comments: 6 Pages, 2 Figures

    Journal ref: International Journal of Advanced Computer Research (ISSN (print): 2249 - 7277 ISSN (online): 2277 - 7970) Volume - 3 Number - 3 Issue - 11 September - 2013

  18. arXiv:1211.2736  [pdf

    cs.AI

    Hybrid Systems for Knowledge Representation in Artificial Intelligence

    Authors: Rajeswari P. V. N., T. V. Prasad

    Abstract: There are few knowledge representation (KR) techniques available for efficiently representing knowledge. However, with the increase in complexity, better methods are needed. Some researchers came up with hybrid mechanisms by combining two or more methods. In an effort to construct an intelligent computer system, a primary consideration is to represent large amounts of knowledge in a way that allow… ▽ More

    Submitted 12 November, 2012; originally announced November 2012.

    Comments: 6 pages

    Journal ref: International Journal of Advanced Research in Artificial Intelligence, 1 (8), 2012, 31-36

  19. arXiv:1003.1455  [pdf

    cs.CL

    A Computational Algorithm based on Empirical Analysis, that Composes Sanskrit Poetry

    Authors: Rama N., Meenakshi Lakshmanan

    Abstract: Poetry-writing in Sanskrit is riddled with problems for even those who know the language well. This is so because the rules that govern Sanskrit prosody are numerous and stringent. We propose a computational algorithm that converts prose given as E-text into poetry in accordance with the metrical rules of Sanskrit prosody, simultaneously taking care to ensure that sandhi or euphonic conjunction, w… ▽ More

    Submitted 7 March, 2010; originally announced March 2010.

    Comments: Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS February 2010, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: Computer Science ISSN 19475500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 7, No. 2, pp. 056-062, February 2010, USA