-
Sign Language Recognition based on YOLOv5 Algorithm for the Telugu Sign Language
Authors:
Vipul Reddy. P,
Vishnu Vardhan Reddy. B,
Sukriti
Abstract:
Sign language recognition (SLR) technology has enormous promise to improve communication and accessibility for the difficulty of hearing. This paper presents a novel approach for identifying gestures in TSL using the YOLOv5 object identification framework. The main goal is to create an accurate and successful method for identifying TSL gestures so that the deaf community can use slr. After that, a…
▽ More
Sign language recognition (SLR) technology has enormous promise to improve communication and accessibility for the difficulty of hearing. This paper presents a novel approach for identifying gestures in TSL using the YOLOv5 object identification framework. The main goal is to create an accurate and successful method for identifying TSL gestures so that the deaf community can use slr. After that, a deep learning model was created that used the YOLOv5 to recognize and classify gestures. This model benefited from the YOLOv5 architecture's high accuracy, speed, and capacity to handle complex sign language features. Utilizing transfer learning approaches, the YOLOv5 model was customized to TSL gestures. To attain the best outcomes, careful parameter and hyperparameter adjustment was carried out during training. With F1-score and mean Average Precision (mAP) ratings of 90.5% and 98.1%, the YOLOv5-medium model stands out for its outstanding performance metrics, demonstrating its efficacy in Telugu sign language identification tasks. Surprisingly, this model strikes an acceptable balance between computational complexity and training time to produce these amazing outcomes. Because it offers a convincing blend of accuracy and efficiency, the YOLOv5-medium model, trained for 200 epochs, emerges as the recommended choice for real-world deployment. The system's stability and generalizability across various TSL gestures and settings were evaluated through rigorous testing and validation, which yielded outstanding accuracy. This research lays the foundation for future advancements in accessible technology for linguistic communities by providing a cutting-edge application of deep learning and computer vision techniques to TSL gesture identification. It also offers insightful perspectives and novel approaches to the field of sign language recognition.
△ Less
Submitted 24 April, 2024;
originally announced June 2024.
-
Leveraging open-source models for legal language modeling and analysis: a case study on the Indian constitution
Authors:
Vikhyath Gupta,
Srinivasa Rao P
Abstract:
In recent years, the use of open-source models has gained immense popularity in various fields, including legal language modelling and analysis. These models have proven to be highly effective in tasks such as summarizing legal documents, extracting key information, and even predicting case outcomes. This has revolutionized the legal industry, enabling lawyers, researchers, and policymakers to qui…
▽ More
In recent years, the use of open-source models has gained immense popularity in various fields, including legal language modelling and analysis. These models have proven to be highly effective in tasks such as summarizing legal documents, extracting key information, and even predicting case outcomes. This has revolutionized the legal industry, enabling lawyers, researchers, and policymakers to quickly access and analyse vast amounts of legal text, saving time and resources. This paper presents a novel approach to legal language modeling (LLM) and analysis using open-source models from Hugging Face. We leverage Hugging Face embeddings via LangChain and Sentence Transformers to develop an LLM tailored for legal texts. We then demonstrate the application of this model by extracting insights from the official Constitution of India. Our methodology involves preprocessing the data, splitting it into chunks, using ChromaDB and LangChainVectorStores, and employing the Google/Flan-T5-XXL model for analysis. The trained model is tested on the Indian Constitution, which is available in PDF format. Our findings suggest that our approach holds promise for efficient legal language processing and analysis.
△ Less
Submitted 10 April, 2024;
originally announced April 2024.
-
Deep Learning-Based Brain Image Segmentation for Automated Tumour Detection
Authors:
Suman Sourabh,
Murugappan Valliappan,
Narayana Darapaneni,
Anwesh R P
Abstract:
Introduction: The present study on the development and evaluation of an automated brain tumor segmentation technique based on deep learning using the 3D U-Net model. Objectives: The objective is to leverage state-of-the-art convolutional neural networks (CNNs) on a large dataset of brain MRI scans for segmentation. Methods: The proposed methodology applies pre-processing techniques for enhanced pe…
▽ More
Introduction: The present study on the development and evaluation of an automated brain tumor segmentation technique based on deep learning using the 3D U-Net model. Objectives: The objective is to leverage state-of-the-art convolutional neural networks (CNNs) on a large dataset of brain MRI scans for segmentation. Methods: The proposed methodology applies pre-processing techniques for enhanced performance and generalizability. Results: Extensive validation on an independent dataset confirms the model's robustness and potential for integration into clinical workflows. The study emphasizes the importance of data pre-processing and explores various hyperparameters to optimize the model's performance. The 3D U-Net, has given IoUs for training and validation dataset have been 0.8181 and 0.66 respectively. Conclusion: Ultimately, this comprehensive framework showcases the efficacy of deep learning in automating brain tumour detection, offering valuable support in clinical practice.
△ Less
Submitted 6 April, 2024;
originally announced April 2024.
-
Music Recommendation Based on Facial Emotion Recognition
Authors:
Rajesh B,
Keerthana V,
Narayana Darapaneni,
Anwesh Reddy P
Abstract:
Introduction: Music provides an incredible avenue for individuals to express their thoughts and emotions, while also serving as a delightful mode of entertainment for enthusiasts and music lovers. Objectives: This paper presents a comprehensive approach to enhancing the user experience through the integration of emotion recognition, music recommendation, and explainable AI using GRAD-CAM. Methods:…
▽ More
Introduction: Music provides an incredible avenue for individuals to express their thoughts and emotions, while also serving as a delightful mode of entertainment for enthusiasts and music lovers. Objectives: This paper presents a comprehensive approach to enhancing the user experience through the integration of emotion recognition, music recommendation, and explainable AI using GRAD-CAM. Methods: The proposed methodology utilizes a ResNet50 model trained on the Facial Expression Recognition (FER) dataset, consisting of real images of individuals expressing various emotions. Results: The system achieves an accuracy of 82% in emotion classification. By leveraging GRAD-CAM, the model provides explanations for its predictions, allowing users to understand the reasoning behind the system's recommendations. The model is trained on both FER and real user datasets, which include labelled facial expressions, and real images of individuals expressing various emotions. The training process involves pre-processing the input images, extracting features through convolutional layers, reasoning with dense layers, and generating emotion predictions through the output layer. Conclusion: The proposed methodology, leveraging the Resnet50 model with ROI-based analysis and explainable AI techniques, offers a robust and interpretable solution for facial emotion detection paper.
△ Less
Submitted 6 April, 2024;
originally announced April 2024.
-
A Deep Look Into -- Automated Lung X-Ray Abnormality Detection System
Authors:
Nagullas KS,
Vivekanand. V,
Narayana Darapaneni,
Anwesh R P
Abstract:
Introduction: Automated Lung X-Ray Abnormality Detection System is the application which distinguish the normal x-ray images from infected x-ray images and highlight area considered for prediction, with the recent pandemic a need to have a non-conventional method and faster detecting diseases, for which X ray serves the purpose. Obectives: As of current situation any viral disease that is infectio…
▽ More
Introduction: Automated Lung X-Ray Abnormality Detection System is the application which distinguish the normal x-ray images from infected x-ray images and highlight area considered for prediction, with the recent pandemic a need to have a non-conventional method and faster detecting diseases, for which X ray serves the purpose. Obectives: As of current situation any viral disease that is infectious is potential pandemic, so there is need for cheap and early detection system. Methods: This research will help to eases the work of expert to do further analysis. Accuracy of three different preexisting models such as DenseNet, MobileNet and VGG16 were high but models over-fitted primarily due to black and white images. Results: This led to building up new method such as as V-BreathNet which gave more than 96% percent accuracy. Conclusion: Thus, it can be stated that not all state-of art CNN models can be used on B/W images. In conclusion not all state-of-art CNN models can be used on B/W images.
△ Less
Submitted 6 April, 2024;
originally announced April 2024.
-
Development of a Legal Document AI-Chatbot
Authors:
Pranav Nataraj Devaraj,
Rakesh Teja P V,
Aaryav Gangrade,
Manoj Kumar R
Abstract:
With the exponential growth of digital data and the increasing complexity of legal documentation, there is a pressing need for efficient and intelligent tools to streamline the handling of legal documents.With the recent developments in the AI field, especially in chatbots, it cannot be ignored as a very compelling solution to this problem.An insight into the process of creating a Legal Documentat…
▽ More
With the exponential growth of digital data and the increasing complexity of legal documentation, there is a pressing need for efficient and intelligent tools to streamline the handling of legal documents.With the recent developments in the AI field, especially in chatbots, it cannot be ignored as a very compelling solution to this problem.An insight into the process of creating a Legal Documentation AI Chatbot with as many relevant features as possible within the given time frame is presented.The development of each component of the chatbot is presented in detail.Each component's workings and functionality has been discussed.Starting from the build of the Android app and the Langchain query processing code till the integration of both through a Flask backend and REST API methods.
△ Less
Submitted 21 November, 2023;
originally announced November 2023.
-
Quantum Circuit Optimization of Arithmetic circuits using ZX Calculus
Authors:
Aravind Joshi,
Akshara Kairali,
Renju Raju,
Adithya Athreya,
Reena Monica P,
Sanjay Vishwakarma,
Srinjoy Ganguly
Abstract:
Quantum computing is an emerging technology in which quantum mechanical properties are suitably utilized to perform certain compute-intensive operations faster than classical computers. Quantum algorithms are designed as a combination of quantum circuits that each require a large number of quantum gates, which is a challenge considering the limited number of qubit resources available in quantum co…
▽ More
Quantum computing is an emerging technology in which quantum mechanical properties are suitably utilized to perform certain compute-intensive operations faster than classical computers. Quantum algorithms are designed as a combination of quantum circuits that each require a large number of quantum gates, which is a challenge considering the limited number of qubit resources available in quantum computing systems. Our work proposes a technique to optimize quantum arithmetic algorithms by reducing the hardware resources and the number of qubits based on ZX calculus. We have utilised ZX calculus rewrite rules for the optimization of fault-tolerant quantum multiplier circuits where we are able to achieve a significant reduction in the number of ancilla bits and T-gates as compared to the originally required numbers to achieve fault-tolerance. Our work is the first step in the series of arithmetic circuit optimization using graphical rewrite tools and it paves the way for advancing the optimization of various complex quantum circuits and establishing the potential for new applications of the same.
△ Less
Submitted 4 June, 2023;
originally announced June 2023.
-
Semi-Automatic Labeling and Semantic Segmentation of Gram-Stained Microscopic Images from DIBaS Dataset
Authors:
Chethan Reddy G. P.,
Pullagurla Abhijith Reddy,
Vidyashree R. Kanabur,
Deepu Vijayasenan,
Sumam S. David,
Sreejith Govindan
Abstract:
In this paper, a semi-automatic annotation of bacteria genera and species from DIBaS dataset is implemented using clustering and thresholding algorithms. A Deep learning model is trained to achieve the semantic segmentation and classification of the bacteria species. Classification accuracy of 95% is achieved. Deep learning models find tremendous applications in biomedical image processing. Automa…
▽ More
In this paper, a semi-automatic annotation of bacteria genera and species from DIBaS dataset is implemented using clustering and thresholding algorithms. A Deep learning model is trained to achieve the semantic segmentation and classification of the bacteria species. Classification accuracy of 95% is achieved. Deep learning models find tremendous applications in biomedical image processing. Automatic segmentation of bacteria from gram-stained microscopic images is essential to diagnose respiratory and urinary tract infections, detect cancers, etc. Deep learning will aid the biologists to get reliable results in less time. Additionally, a lot of human intervention can be reduced. This work can be helpful to detect bacteria from urinary smear images, sputum smear images, etc to diagnose urinary tract infections, tuberculosis, pneumonia, etc.
△ Less
Submitted 23 August, 2022;
originally announced August 2022.
-
Vehicle Re-identification Based on Dual Distance Center Loss
Authors:
Zhijun Hu,
Yong Xu,
Jie Wen,
Lilei Sun,
Raja S P
Abstract:
Recently, deep learning has been widely used in the field of vehicle re-identification. When training a deep model, softmax loss is usually used as a supervision tool. However, the softmax loss performs well for closed-set tasks, but not very well for open-set tasks. In this paper, we sum up five shortcomings of center loss and solved all of them by proposing a dual distance center loss (DDCL). Es…
▽ More
Recently, deep learning has been widely used in the field of vehicle re-identification. When training a deep model, softmax loss is usually used as a supervision tool. However, the softmax loss performs well for closed-set tasks, but not very well for open-set tasks. In this paper, we sum up five shortcomings of center loss and solved all of them by proposing a dual distance center loss (DDCL). Especially we solve the shortcoming that center loss must combine with the softmax loss to supervise training the model, which provides us with a new perspective to examine the center loss. In addition, we verify the inconsistency between the proposed DDCL and softmax loss in the feature space, which makes the center loss no longer be limited by the softmax loss in the feature space after removing the softmax loss. To be specifically, we add the Pearson distance on the basis of the Euclidean distance to the same center, which makes all features of the same class be confined to the intersection of a hypersphere and a hypercube in the feature space. The proposed Pearson distance strengthens the intra-class compactness of the center loss and enhances the generalization ability of center loss. Moreover, by designing a Euclidean distance threshold between all center pairs, which not only strengthens the inter-class separability of center loss, but also makes the center loss (or DDCL) works well without the combination of softmax loss. We apply DDCL in the field of vehicle re-identification named VeRi-776 dataset and VehicleID dataset. And in order to verify its good generalization ability, we also verify it in two datasets commonly used in the field of person re-identification named MSMT17 dataset and Market1501 dataset.
△ Less
Submitted 23 December, 2020;
originally announced December 2020.
-
LittleYOLO-SPP: A Delicate Real-Time Vehicle Detection Algorithm
Authors:
Sri Jamiya S,
Esther Rani P
Abstract:
Vehicle detection in real-time is a challenging and important task. The existing real-time vehicle detection lacks accuracy and speed. Real-time systems must detect and locate vehicles during criminal activities like theft of vehicle and road traffic violations with high accuracy. Detection of vehicles in complex scenes with occlusion is also extremely difficult. In this study, a lightweight model…
▽ More
Vehicle detection in real-time is a challenging and important task. The existing real-time vehicle detection lacks accuracy and speed. Real-time systems must detect and locate vehicles during criminal activities like theft of vehicle and road traffic violations with high accuracy. Detection of vehicles in complex scenes with occlusion is also extremely difficult. In this study, a lightweight model of deep neural network LittleYOLO-SPP based on the YOLOv3-tiny network is proposed to detect vehicles effectively in real-time. The YOLOv3-tiny object detection network is improved by modifying its feature extraction network to increase the speed and accuracy of vehicle detection. The proposed network incorporated Spatial pyramid pooling into the network, which consists of different scales of pooling layers for concatenation of features to enhance network learning capability. The Mean square error (MSE) and Generalized IoU (GIoU) loss function for bounding box regression is used to increase the performance of the network. The network training includes vehicle-based classes from PASCAL VOC 2007,2012 and MS COCO 2014 datasets such as car, bus, and truck. LittleYOLO-SPP network detects the vehicle in real-time with high accuracy regardless of video frame and weather conditions. The improved network achieves a higher mAP of 77.44% on PASCAL VOC and 52.95% mAP on MS COCO datasets.
△ Less
Submitted 11 November, 2020;
originally announced November 2020.
-
Audio Spoofing Verification using Deep Convolutional Neural Networks by Transfer Learning
Authors:
Rahul T P,
P R Aravind,
Ranjith C,
Usamath Nechiyil,
Nandakumar Paramparambath
Abstract:
Automatic Speaker Verification systems are gaining popularity these days; spoofing attacks are of prime concern as they make these systems vulnerable. Some spoofing attacks like Replay attacks are easier to implement but are very hard to detect thus creating the need for suitable countermeasures. In this paper, we propose a speech classifier based on deep-convolutional neural network to detect spo…
▽ More
Automatic Speaker Verification systems are gaining popularity these days; spoofing attacks are of prime concern as they make these systems vulnerable. Some spoofing attacks like Replay attacks are easier to implement but are very hard to detect thus creating the need for suitable countermeasures. In this paper, we propose a speech classifier based on deep-convolutional neural network to detect spoofing attacks. Our proposed methodology uses acoustic time-frequency representation of power spectral densities on Mel frequency scale (Mel-spectrogram), via deep residual learning (an adaptation of ResNet-34 architecture). Using a single model system, we have achieved an equal error rate (EER) of 0.9056% on the development and 5.32% on the evaluation dataset of logical access scenario and an equal error rate (EER) of 5.87% on the development and 5.74% on the evaluation dataset of physical access scenario of ASVspoof 2019.
△ Less
Submitted 8 August, 2020;
originally announced August 2020.
-
IoT Blockchain Solution for Air Quality Monitoring in SmartCities
Authors:
Shajulin Benedict,
Rumaize P.,
Jaspreet Kaur
Abstract:
IoT cloud enabled societal applications have dramatically increased in the recent past due to the thrust for innovations, notably through startup initiatives, in various sectors such as agriculture, healthcare, industry, and so forth. The existing IoT cloud solutions have led practitioners or researchers to a haphazard clutter of serious security hazards and performance inefficiencies. This paper…
▽ More
IoT cloud enabled societal applications have dramatically increased in the recent past due to the thrust for innovations, notably through startup initiatives, in various sectors such as agriculture, healthcare, industry, and so forth. The existing IoT cloud solutions have led practitioners or researchers to a haphazard clutter of serious security hazards and performance inefficiencies. This paper proposes a blockchain enabled IoT cloud implementation to tackle the existing issues in smart cities. It particularly highlights the implementation of chaincodes for air quality monitoring systems in SmartCities; the proposed architecture named as IoT enabled Blockchain for Air Quality Monitoring System (IB-AQMS) is illustrated using experiments. Experimental results were carried out and the findings were disclosed in the paper.
△ Less
Submitted 28 March, 2020;
originally announced March 2020.
-
A Hybrid Graph Coloring Algorithm for GPUs
Authors:
Shanthanu S Rai,
Rohit M P,
Sreepathi Pai
Abstract:
Graph algorithms mainly belong to two categories, topology-driven and data-driven. Data-driven approach maintains a worklist of active nodes, the nodes on which work has to be done. Topology-driven approach sweeps over the entire graph to find active nodes.
Hybridization is an optimization technique where in each iteration, the computation is done in a topology-driven or data-driven manner based…
▽ More
Graph algorithms mainly belong to two categories, topology-driven and data-driven. Data-driven approach maintains a worklist of active nodes, the nodes on which work has to be done. Topology-driven approach sweeps over the entire graph to find active nodes.
Hybridization is an optimization technique where in each iteration, the computation is done in a topology-driven or data-driven manner based on worklist size. In hybrid implementations, there is a need to switch between topology-driven and data-driven approaches. Typically, a worklist is maintained just in the data-driven part of the algorithm and discarded in the topology-driven part. We propose a variant of hybridization, wherein a worklist is maintained throughout all iterations of the algorithm and still show it to be faster than both, topology-driven and data-driven approaches.
We consider a graph coloring algorithm called IPGC (Iterative Parallel Graph Coloring) and implement a hybrid version for the same in a graph domain specific language called IrGL. We observe a mean speedup of 2.13x over a data-driven implementation of IPGC on a suite of 10 large graphs on a NVIDIA GPU.
△ Less
Submitted 3 December, 2019;
originally announced December 2019.
-
Analysis of Beam Swee** Techniques for Cell-Discovery in mm Wave Systems
Authors:
Rashmi P,
Manoj A,
Arun Pachai Kannu
Abstract:
Cell discovery is the procedure in which a user equipment (UE) finds a suitable base station (BS) to establish a communication link. When beamforming with antenna arrays is done at both transmitter and receiver, cell discovery in mm wave systems also involves finding the correct angle of arrival - angle of departure alignment between the UE and the detected BS. First, we consider the single BS sce…
▽ More
Cell discovery is the procedure in which a user equipment (UE) finds a suitable base station (BS) to establish a communication link. When beamforming with antenna arrays is done at both transmitter and receiver, cell discovery in mm wave systems also involves finding the correct angle of arrival - angle of departure alignment between the UE and the detected BS. First, we consider the single BS scenario and present the mathematical model for the cell discovery problem. We present the details of the beam swee** based techniques and explain the beam combining scheme to reduce the training overhead. We analytically characterize the performance of energy detector at the UE for both beam swee** and beam combining methods under some channel assumptions. Further, we consider the multiple BS case where BSs transmit synchronization signals along with directional beamforming. We analyze the performance of the energy detector in this case as well. We finally present simulation studies with channels generated using generic mm wave channel emulators and draw inferences on the role of various parameters on the cell discovery performance.
△ Less
Submitted 30 November, 2021; v1 submitted 10 April, 2019;
originally announced April 2019.
-
FO and MSO approach to Some Graph Problems: Approximation and Poly time Results
Authors:
Kona Harshita,
Sounaka Mishra,
Renjith. P,
N. Sadagopan
Abstract:
The focus of this paper is two fold. Firstly, we present a logical approach to graph modification problems such as minimum node deletion, edge deletion, edge augmentation problems by expressing them as an expression in first order (FO) logic. As a consequence, it follows that these problems have constant factor polynomial-time approximation algorithms. In particular, node deletion/edge deletion on…
▽ More
The focus of this paper is two fold. Firstly, we present a logical approach to graph modification problems such as minimum node deletion, edge deletion, edge augmentation problems by expressing them as an expression in first order (FO) logic. As a consequence, it follows that these problems have constant factor polynomial-time approximation algorithms. In particular, node deletion/edge deletion on a graph $G$ whose resultant is cograph, split, threshold, comparable, interval and permutation are $O(1)$ approximable. Secondly, we present a monadic second order (MSO) logic to minimum graph modification problems, minimum dominating set problem and minimum coloring problem and their variants. As a consequence, it follows that these problems have linear-time algorithms on bounded tree-width graphs. In particular, we show the existance of linear-time algorithms on bounded tree-width graphs for star coloring, cd-coloring, rainbow coloring, equitable coloring, total dominating set, connected dominating set. In a nut shell, this paper presents a unified framework and an algorithmic scheme through logical expressions for some graph problems through FO and MSO.
△ Less
Submitted 8 November, 2017;
originally announced November 2017.
-
BT-GPSR: An Integrated Trust Model for Secure Geographic Routing in Wireless Sensor Networks
Authors:
Raghu Vamsi. P,
Payal Khurana Batra,
Krishna Kant
Abstract:
Geographic routing offers guaranteed packet deliv- ery in a dense network. In this routing, packets are forwarded to a node which is nearer to the destination with an extensive use of location information. However, research studies in Mobile Adhoc Networks (MANETs) and Wireless Sensor Networks (WSNs) have shown that packet delivery percentage can degrade substantially when malicious nodes are foun…
▽ More
Geographic routing offers guaranteed packet deliv- ery in a dense network. In this routing, packets are forwarded to a node which is nearer to the destination with an extensive use of location information. However, research studies in Mobile Adhoc Networks (MANETs) and Wireless Sensor Networks (WSNs) have shown that packet delivery percentage can degrade substantially when malicious nodes are found in the network. Conventional cryptography techniques can be adopted in order to deal with ma- licious nodes, but they cannot mitigate outsider attacks. In recent years, a societal pattern called trust is used as a tool to mitigate security attacks. Numerous researchers have proposed security solutions by adopting trust in routing algorithms. However, each solution has its own strength and weakness. In this paper, an integrated approach by using reputation and weight based trust systems backed by Greedy Perimeter Stateless Routing (BT-GPSR) is presented. The proposed approach outperforms the conventional reputation and weight based methods. The effectiveness of the proposed BT-GPSR is validated through simulation.
△ Less
Submitted 23 July, 2014; v1 submitted 12 June, 2014;
originally announced June 2014.
-
Systematic Design of Trust Management Systems for Wireless Sensor Networks: A Review
Authors:
Raghu Vamsi. P,
Krishna Kant
Abstract:
Conventional cryptography methods alone are not adequate for secure routing in Wireless Sensor Networks (WSNs). These networks are more vulnerable to security attacks due to their diverse applications, lack of supervision and limitations in view of resource, processing and storage. To mitigate these problems, trust is widely used as a tool to provide better security by aiding routing protocols. In…
▽ More
Conventional cryptography methods alone are not adequate for secure routing in Wireless Sensor Networks (WSNs). These networks are more vulnerable to security attacks due to their diverse applications, lack of supervision and limitations in view of resource, processing and storage. To mitigate these problems, trust is widely used as a tool to provide better security by aiding routing protocols. In recent years, numerous researchers have proposed wide variety of solutions based on trust. However, all these solutions carry their own design. In this paper, we attempt to present steps for a systematic design of trust management systems for WSNs. In addition, we address the techniques followed by scholars in implementing trust frameworks. Furthermore, we provide discussion on state-of-the-art research in designing trust systems with summary and comparisons.
△ Less
Submitted 23 July, 2014; v1 submitted 12 June, 2014;
originally announced June 2014.
-
Power Management during Scan Based Sequential Circuit Testing
Authors:
Reshma. p
Abstract:
This paper shows that not every scan cell contributes equally to the power consumption during scan based test. The transitions at some scan cells cause more toggles at the internal signal lines of a circuit than the transitions at other scan cells. Hence the transitions at these scan cells have a larger impact on the power consumption during test application. These scan cells are called power sens…
▽ More
This paper shows that not every scan cell contributes equally to the power consumption during scan based test. The transitions at some scan cells cause more toggles at the internal signal lines of a circuit than the transitions at other scan cells. Hence the transitions at these scan cells have a larger impact on the power consumption during test application. These scan cells are called power sensitive scan cells.A verilog based approach is proposed to identify a set of power sensitive scan cells. Additional hardware is added to freeze the outputs of power sensitive scan cells during scan shifting in order to reduce the shift power consumption.when multiple scan chain is incorporated along with freezing the power sensitive scan cell,over all power during testing can be reduced to a larger extend.
△ Less
Submitted 2 June, 2011;
originally announced June 2011.
-
Modeling of Human Criminal Behavior using Probabilistic Networks
Authors:
Ramesh Kumar Gopala Pillai,
Dr. Ramakanth Kumar . P
Abstract:
Currently, criminals profile (CP) is obtained from investigators or forensic psychologists interpretation, linking crime scene characteristics and an offenders behavior to his or her characteristics and psychological profile. This paper seeks an efficient and systematic discovery of nonobvious and valuable patterns between variables from a large database of solved cases via a probabilistic netwo…
▽ More
Currently, criminals profile (CP) is obtained from investigators or forensic psychologists interpretation, linking crime scene characteristics and an offenders behavior to his or her characteristics and psychological profile. This paper seeks an efficient and systematic discovery of nonobvious and valuable patterns between variables from a large database of solved cases via a probabilistic network (PN) modeling approach. The PN structure can be used to extract behavioral patterns and to gain insight into what factors influence these behaviors. Thus, when a new case is being investigated and the profile variables are unknown because the offender has yet to be identified, the observed crime scene variables are used to infer the unknown variables based on their connections in the structure and the corresponding numerical (probabilistic) weights. The objective is to produce a more systematic and empirical approach to profiling, and to use the resulting PN model as a decision tool.
△ Less
Submitted 10 February, 2010;
originally announced February 2010.