Skip to main content

Showing 1–19 of 19 results for author: P, B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2310.14063  [pdf, other

    cs.RO cs.CV

    Concept-based Anomaly Detection in Retail Stores for Automatic Correction using Mobile Robots

    Authors: Aditya Kapoor, Vartika Sengar, Nijil George, Vighnesh Vatsal, Jayavardhana Gubbi, Balamuralidhar P, Arpan Pal

    Abstract: Tracking of inventory and rearrangement of misplaced items are some of the most labor-intensive tasks in a retail environment. While there have been attempts at using vision-based techniques for these tasks, they mostly use planogram compliance for detection of any anomalies, a technique that has been found lacking in robustness and scalability. Moreover, existing systems rely on human interventio… ▽ More

    Submitted 21 October, 2023; originally announced October 2023.

    Comments: 8 pages, 9 figures, 2 tables, IEEE Transactions on Systems, Man and Cybernetics

  2. arXiv:2209.07582  [pdf, other

    cs.RO

    Bflier's: A Novel Butterfly Inspired Multi-robotic Model in Search of Signal Sources

    Authors: Chakravarthi J, Vinod Babu P, Pavan B, Ashok U, Marek Kolencik, Martin Ĺ ebesta, Ramakanth Illa

    Abstract: The diversified ecology in nature had various forms of swarm behaviors in many species. The butterfly species is one of the prominent and a bit insightful in their random flights and converting that into an artificial metaphor would lead to enormous possibilities. This paper considers one such metaphor known as Butterfly Mating Optimization (BMO). In BMO, the Bfly follows the patrolling mating phe… ▽ More

    Submitted 15 September, 2022; originally announced September 2022.

    Comments: 12 pages, 17 figures

  3. arXiv:2208.09020  [pdf, other

    cs.RO

    Challenges in Applying Robotics to Retail Store Management

    Authors: Vartika Sengar, Aditya Kapoor, Nijil George, Vighnesh Vatsal, Jayavardhana Gubbi, Balamuralidhar P, Arpan Pal

    Abstract: An autonomous retail store management system entails inventory tracking, store monitoring, and anomaly correction. Recent attempts at autonomous retail store management have faced challenges primarily in perception for anomaly detection, as well as new challenges arising in mobile manipulation for executing anomaly correction. Advances in each of these areas along with system integration are neces… ▽ More

    Submitted 18 August, 2022; originally announced August 2022.

    Comments: Presented at the IEEE ICRA 2022 Workshop on Challenges in Applying Academic Research to Real-World Robotics, 23 May 2022

  4. arXiv:2112.01426  [pdf, other

    cs.CV

    SCNet: A Generalized Attention-based Model for Crack Fault Segmentation

    Authors: Hrishikesh Sharma, Prakhar Pradhan, Balamuralidhar P

    Abstract: Anomaly detection and localization is an important vision problem, having multiple applications. Effective and generic semantic segmentation of anomalous regions on various different surfaces, where most anomalous regions inherently do not have any obvious pattern, is still under active research. Periodic health monitoring and fault (anomaly) detection in vast infrastructures, which is an importan… ▽ More

    Submitted 2 December, 2021; originally announced December 2021.

    Comments: Accepted at ICVGIP 2021

  5. Enabling human-like task identification from natural conversation

    Authors: Pradip Pramanick, Chayan Sarkar, Balamuralidhar P, Ajay Kattepur, Indrajit Bhattacharya, Arpan Pal

    Abstract: A robot as a coworker or a cohabitant is becoming mainstream day-by-day with the development of low-cost sophisticated hardware. However, an accompanying software stack that can aid the usability of the robotic hardware remains the bottleneck of the process, especially if the robot is not dedicated to a single job. Programming a multi-purpose robot requires an on the fly mission scheduling capabil… ▽ More

    Submitted 29 August, 2020; v1 submitted 23 August, 2020; originally announced August 2020.

    Journal ref: Published in: 2019 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)

  6. arXiv:2007.12990  [pdf, other

    cs.RO cs.NI

    Demo: Edge-centric Telepresence Avatar Robot for Geographically Distributed Environment

    Authors: Ashis Sau, Ruddra Dev Roychoudhury, Hrishav Bakul Barua, Chayan Sarkar, Sayan Paul, Brojeshwar Bhowmick, Arpan Pal, Balamuralidhar P

    Abstract: Using a robotic platform for telepresence applications has gained paramount importance in this decade. Scenarios such as remote meetings, group discussions, and presentations/talks in seminars and conferences get much attention in this regard. Though there exist some robotic platforms for such telepresence applications, they lack efficacy in communication and interaction between the remote person… ▽ More

    Submitted 25 July, 2020; originally announced July 2020.

  7. arXiv:2006.15647  [pdf, other

    cs.RO cs.AI cs.HC

    I can attend a meeting too! Towards a human-like telepresence avatar robot to attend meeting on your behalf

    Authors: Hrishav Bakul Barua, Chayan Sarkar, Achanna Anil Kumar, Arpan Pal, Balamuralidhar P

    Abstract: Telepresence robots are used in various forms in various use-cases that helps to avoid physical human presence at the scene of action. In this work, we focus on a telepresence robot that can be used to attend a meeting remotely with a group of people. Unlike a one-to-one meeting, participants in a group meeting can be located at a different part of the room, especially in an informal setup. As a r… ▽ More

    Submitted 28 June, 2020; originally announced June 2020.

  8. arXiv:2003.09293  [pdf, other

    eess.IV cs.CV cs.LG stat.ML

    U-Det: A Modified U-Net architecture with bidirectional feature network for lung nodule segmentation

    Authors: Nikhil Varma Keetha, Samson Anosh Babu P, Chandra Sekhara Rao Annavarapu

    Abstract: Early diagnosis and analysis of lung cancer involve a precise and efficient lung nodule segmentation in computed tomography (CT) images. However, the anonymous shapes, visual features, and surroundings of the nodule in the CT image pose a challenging problem to the robust segmentation of the lung nodules. This article proposes U-Det, a resource-efficient model architecture, which is an end to end… ▽ More

    Submitted 20 March, 2020; originally announced March 2020.

    Comments: 14 pages, 7 figures, 5 tables

  9. arXiv:2003.06616  [pdf

    cs.CR

    Image Encryption Decryption Using Chaotic Logistic Map** and DNA Encoding

    Authors: Sakshi Patel, Bharath K P, Rajesh Kumar Muthu

    Abstract: In this paper we have proposed a method that uses chaotic logistic map** and DNA encoding to encrypt the image. A 32 bit ASCII private key is used to diffuse the image. The results demonstrated clearly show that encryption algorithm based on chaotic logistic map** and DNA encoding gives better result than encrypting only with chaotic logistic map**. The proposed method also takes into accoun… ▽ More

    Submitted 14 March, 2020; originally announced March 2020.

  10. arXiv:2003.06615  [pdf

    cs.CV

    Medical Image Enhancement Using Histogram Processing and Feature Extraction for Cancer Classification

    Authors: Sakshi Patel, Bharath K P, Rajesh Kumar Muthu

    Abstract: MRI (Magnetic Resonance Imaging) is a technique used to analyze and diagnose the problem defined by images like cancer or tumor in a brain. Physicians require good contrast images for better treatment purpose as it contains maximum information of the disease. MRI images are low contrast images which make diagnoses difficult; hence better localization of image pixels is required. Histogram Equaliza… ▽ More

    Submitted 14 March, 2020; originally announced March 2020.

  11. arXiv:2003.00810  [pdf

    cs.CV cs.IR eess.IV

    Medicine Strip Identification using 2-D Cepstral Feature Extraction and Multiclass Classification Methods

    Authors: Anirudh Itagi, Ritam Sil, Saurav Mohapatra, Subham Rout, Bharath K P, Karthik R, Rajesh Kumar Muthu

    Abstract: Misclassification of medicine is perilous to the health of a patient, more so if the said patient is visually impaired or simply did not recognize the color, shape or type of medicine strip. This paper proposes a method for identification of medicine strips by 2-D cepstral analysis of their images followed by performing classification that has been done using the K-Nearest Neighbor (KNN), Support… ▽ More

    Submitted 3 February, 2020; originally announced March 2020.

  12. arXiv:2002.07677  [pdf

    cs.SD cs.MM eess.AS

    Performance Analysis of Adaptive Noise Cancellation for Speech Signal

    Authors: Pratibha Balaji, Shruthi Narayan, Durga Sraddha, Bharath K P, Karthik R, Rajesh Kumar Muthu

    Abstract: This paper gives a broader insight on the application of adaptive filter in noise cancellation during various processes where signal is transmitted. Adaptive filtering techniques like RLS, LMS and normalized LMS are used to filter the input signal using the concept of negative feedback to predict its nature and remove it effectively from the input. In this paper a comparative study between the eff… ▽ More

    Submitted 3 February, 2020; originally announced February 2020.

  13. arXiv:2002.07590  [pdf

    eess.AS cs.IR cs.SD

    Speech Emotion Recognition using Support Vector Machine

    Authors: Manas Jain, Shruthi Narayan, Pratibha Balaji, Bharath K P, Abhijit Bhowmick, Karthik R, Rajesh Kumar Muthu

    Abstract: In this project, we aim to classify the speech taken as one of the four emotions namely, sadness, anger, fear and happiness. The samples that have been taken to complete this project are taken from Linguistic Data Consortium (LDC) and UGA database. The important characteristics determined from the samples are energy, pitch, MFCC coefficients, LPCC coefficients and speaker rate. The classifier used… ▽ More

    Submitted 3 February, 2020; originally announced February 2020.

  14. arXiv:2002.02370  [pdf

    cs.MM

    Data hiding in speech signal using steganography and encryption

    Authors: Hanisha Chowdary N, Karan K, Bharath K P, Rajesh Kumar M

    Abstract: Data privacy and data security are always on highest priority in the world. We need a reliable method to encrypt the data so that it reaches the destination safely. Encryption is a simple yet effective way to protect our data while transmitting it to a destination. The proposed method has state of art technology of steganography and encryption. This paper puts forward a different approach for data… ▽ More

    Submitted 13 January, 2020; originally announced February 2020.

  15. arXiv:2001.10094  [pdf

    eess.AS cs.SD

    OMAP-L138 LCDK Development Kit

    Authors: Bharath K P, Sylash K, Pravina K, Rajesh Kumar M

    Abstract: Low cost and low power consumption processor play a vital role in the field of Digital Signal Processing (DSP). The OMAP-L138 development kit which is low cost, low power consumption, ease and speed, with a wide variety of applications includes Digital signal processing, Image processing and video processing. This paper represents the basic introduction to OMAP-L138 processor and quick procedural… ▽ More

    Submitted 13 January, 2020; originally announced January 2020.

  16. arXiv:2001.04215  [pdf

    cs.CV

    Radial Based Analysis of GRNN in Non-Textured Image Inpainting

    Authors: Karthik R, Anvita Dwivedi, Haripriya M, Bharath K P, Rajesh Kumar M

    Abstract: Image inpainting algorithms are used to restore some damaged or missing information region of an image based on the surrounding information. The method proposed in this paper applies the radial based analysis of image inpainting on GRNN. The damaged areas are first isolated from rest of the areas and then arranged by their size and then inpainted using GRNN. The training of the neural network is d… ▽ More

    Submitted 13 January, 2020; originally announced January 2020.

  17. arXiv:2001.04208  [pdf

    cs.CV

    Handwritten Character Recognition Using Unique Feature Extraction Technique

    Authors: Sai Abhishikth Ayyadevara, P N V Sai Ram Teja, Bharath K P, Rajesh Kumar M

    Abstract: One of the most arduous and captivating domains under image processing is handwritten character recognition. In this paper we have proposed a feature extraction technique which is a combination of unique features of geometric, zone-based hybrid, gradient features extraction approaches and three different neural networks namely the Multilayer Perceptron network using Backpropagation algorithm (MLP… ▽ More

    Submitted 13 January, 2020; originally announced January 2020.

  18. arXiv:1803.03478  [pdf, other

    cs.RO

    Model Predictive Control for Autonomous Driving considering Actuator Dynamics

    Authors: Mithun Babu, Raghu Ram Theerthala, Arun Kumar Singh, Baladhurgesh B. P., Bharath Gopalakrishnan, K. Madhava Krishna

    Abstract: In this paper, we propose a new model predictive control (MPC) formulation for autonomous driving. The novelty of our MPC stems from the following results. Firstly, we adopt an alternating minimization approach wherein linear velocities and angular accelerations are alternately optimized. We show that in contrast to the joint optimization, the alternating minimization exploits the structure of the… ▽ More

    Submitted 12 October, 2018; v1 submitted 9 March, 2018; originally announced March 2018.

    Comments: 8 Pages

  19. Privacy Shielding against Mass Surveillance

    Authors: Kashyap. V, Boominathan. P

    Abstract: Privacy Shielding against Mass Surveillance provides a step by step tactical approach to protecting the privacy of all the users of the internet from mass surveillance programs by the governments and other state agencies. Protection of privacy is of prime importance and Privacy Shielding provides the right means against mass surveillance programs and from malicious users trying to gain access to y… ▽ More

    Submitted 17 February, 2014; originally announced February 2014.

    Comments: 8 pages,8 figures,Published with International Journal of Engineering Trends and Technology (IJETT)