Skip to main content

Showing 1–4 of 4 results for author: Nawale, S

Searching in archive cs. Search in all archives.
.
  1. Drone-Enabled Load Management for Solar Small Cell Networks in Next-Gen Communications Optimization for Solar Small Cells

    Authors: Daksh Dave, Dhruv Khut, Sahil Nawale, Pushkar Aggrawal, Disha Rastogi, Kailas Devadkar

    Abstract: In recent years, the cellular industry has witnessed a major evolution in communication technologies. It is evident that the Next Generation of cellular networks(NGN) will play a pivotal role in the acceptance of emerging IoT applications supporting high data rates, better Quality of Service(QoS), and reduced latency. However, the deployment of NGN will introduce a power overhead on the communicat… ▽ More

    Submitted 5 November, 2023; originally announced November 2023.

    Comments: 5 pages, 3 figures, 1 table, 1 algorithm

  2. PotholeGuard: A Pothole Detection Approach by Point Cloud Semantic Segmentation

    Authors: Sahil Nawale, Dhruv Khut, Daksh Dave, Gauransh Sawhney, Pushkar Aggrawal, Dr. Kailas Devadakar

    Abstract: Pothole detection is crucial for road safety and maintenance, traditionally relying on 2D image segmentation. However, existing 3D Semantic Pothole Segmentation research often overlooks point cloud sparsity, leading to suboptimal local feature capture and segmentation accuracy. Our research presents an innovative point cloud-based pothole segmentation architecture. Our model efficiently identifies… ▽ More

    Submitted 5 November, 2023; originally announced November 2023.

    Comments: 6 pages, 6 figures, 3 tables

  3. arXiv:2311.02621  [pdf, other

    cs.LG cs.AI cs.IR cs.IT

    AIOps-Driven Enhancement of Log Anomaly Detection in Unsupervised Scenarios

    Authors: Daksh Dave, Gauransh Sawhney, Dhruv Khut, Sahil Nawale, Pushkar Aggrawal, Prasenjit Bhavathankar

    Abstract: Artificial intelligence operations (AIOps) play a pivotal role in identifying, mitigating, and analyzing anomalous system behaviors and alerts. However, the research landscape in this field remains limited, leaving significant gaps unexplored. This study introduces a novel hybrid framework through an innovative algorithm that incorporates an unsupervised strategy. This strategy integrates Principa… ▽ More

    Submitted 5 November, 2023; originally announced November 2023.

    Comments: 6 pages, 1 figure, 1 table

  4. arXiv:1207.2639  [pdf

    cs.CR

    RFID Security Using Lightweight Mutual Authentication And Ownership Transfer Protocol

    Authors: Amol Bandal, Shankar Nawale

    Abstract: In recent years, radio frequency identification technology has moved into the mainstream applications that help to speed up handling of manufactured goods and materials. RFID tags are divided into two classes: active and passive. Active tag requires a power source that's why its cost is more than passive tags. However, the low-cost RFID tags are facing new challenges to security and privacy. Some… ▽ More

    Submitted 11 July, 2012; originally announced July 2012.

    Comments: published in IJASUC journal

    Journal ref: International Journal of Ad hoc, Sensor & Ubiquitous Computing (IJASUC) Vol.3, No.3, June 2012