Skip to main content

Showing 1–19 of 19 results for author: P, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.10231  [pdf

    cs.CV eess.IV

    Sign Language Recognition based on YOLOv5 Algorithm for the Telugu Sign Language

    Authors: Vipul Reddy. P, Vishnu Vardhan Reddy. B, Sukriti

    Abstract: Sign language recognition (SLR) technology has enormous promise to improve communication and accessibility for the difficulty of hearing. This paper presents a novel approach for identifying gestures in TSL using the YOLOv5 object identification framework. The main goal is to create an accurate and successful method for identifying TSL gestures so that the deaf community can use slr. After that, a… ▽ More

    Submitted 24 April, 2024; originally announced June 2024.

    Comments: 11 pages, 9 figures

  2. arXiv:2404.06751  [pdf, other

    cs.CY

    Leveraging open-source models for legal language modeling and analysis: a case study on the Indian constitution

    Authors: Vikhyath Gupta, Srinivasa Rao P

    Abstract: In recent years, the use of open-source models has gained immense popularity in various fields, including legal language modelling and analysis. These models have proven to be highly effective in tasks such as summarizing legal documents, extracting key information, and even predicting case outcomes. This has revolutionized the legal industry, enabling lawyers, researchers, and policymakers to qui… ▽ More

    Submitted 10 April, 2024; originally announced April 2024.

    Comments: 10 Pages , 3 figures

  3. arXiv:2404.05763  [pdf

    eess.IV cs.CV

    Deep Learning-Based Brain Image Segmentation for Automated Tumour Detection

    Authors: Suman Sourabh, Murugappan Valliappan, Narayana Darapaneni, Anwesh R P

    Abstract: Introduction: The present study on the development and evaluation of an automated brain tumor segmentation technique based on deep learning using the 3D U-Net model. Objectives: The objective is to leverage state-of-the-art convolutional neural networks (CNNs) on a large dataset of brain MRI scans for segmentation. Methods: The proposed methodology applies pre-processing techniques for enhanced pe… ▽ More

    Submitted 6 April, 2024; originally announced April 2024.

  4. arXiv:2404.04654  [pdf

    cs.CV cs.IR

    Music Recommendation Based on Facial Emotion Recognition

    Authors: Rajesh B, Keerthana V, Narayana Darapaneni, Anwesh Reddy P

    Abstract: Introduction: Music provides an incredible avenue for individuals to express their thoughts and emotions, while also serving as a delightful mode of entertainment for enthusiasts and music lovers. Objectives: This paper presents a comprehensive approach to enhancing the user experience through the integration of emotion recognition, music recommendation, and explainable AI using GRAD-CAM. Methods:… ▽ More

    Submitted 6 April, 2024; originally announced April 2024.

  5. arXiv:2404.04635  [pdf

    eess.IV cs.CV

    A Deep Look Into -- Automated Lung X-Ray Abnormality Detection System

    Authors: Nagullas KS, Vivekanand. V, Narayana Darapaneni, Anwesh R P

    Abstract: Introduction: Automated Lung X-Ray Abnormality Detection System is the application which distinguish the normal x-ray images from infected x-ray images and highlight area considered for prediction, with the recent pandemic a need to have a non-conventional method and faster detecting diseases, for which X ray serves the purpose. Obectives: As of current situation any viral disease that is infectio… ▽ More

    Submitted 6 April, 2024; originally announced April 2024.

  6. arXiv:2311.12719  [pdf

    cs.AI

    Development of a Legal Document AI-Chatbot

    Authors: Pranav Nataraj Devaraj, Rakesh Teja P V, Aaryav Gangrade, Manoj Kumar R

    Abstract: With the exponential growth of digital data and the increasing complexity of legal documentation, there is a pressing need for efficient and intelligent tools to streamline the handling of legal documents.With the recent developments in the AI field, especially in chatbots, it cannot be ignored as a very compelling solution to this problem.An insight into the process of creating a Legal Documentat… ▽ More

    Submitted 21 November, 2023; originally announced November 2023.

    Comments: 5 pages, 5 figures

  7. arXiv:2306.02264  [pdf, other

    cs.ET quant-ph

    Quantum Circuit Optimization of Arithmetic circuits using ZX Calculus

    Authors: Aravind Joshi, Akshara Kairali, Renju Raju, Adithya Athreya, Reena Monica P, Sanjay Vishwakarma, Srinjoy Ganguly

    Abstract: Quantum computing is an emerging technology in which quantum mechanical properties are suitably utilized to perform certain compute-intensive operations faster than classical computers. Quantum algorithms are designed as a combination of quantum circuits that each require a large number of quantum gates, which is a challenge considering the limited number of qubit resources available in quantum co… ▽ More

    Submitted 4 June, 2023; originally announced June 2023.

  8. arXiv:2208.10737  [pdf, other

    eess.IV cs.CV eess.SP

    Semi-Automatic Labeling and Semantic Segmentation of Gram-Stained Microscopic Images from DIBaS Dataset

    Authors: Chethan Reddy G. P., Pullagurla Abhijith Reddy, Vidyashree R. Kanabur, Deepu Vijayasenan, Sumam S. David, Sreejith Govindan

    Abstract: In this paper, a semi-automatic annotation of bacteria genera and species from DIBaS dataset is implemented using clustering and thresholding algorithms. A Deep learning model is trained to achieve the semantic segmentation and classification of the bacteria species. Classification accuracy of 95% is achieved. Deep learning models find tremendous applications in biomedical image processing. Automa… ▽ More

    Submitted 23 August, 2022; originally announced August 2022.

  9. arXiv:2012.12519  [pdf, other

    cs.CV

    Vehicle Re-identification Based on Dual Distance Center Loss

    Authors: Zhijun Hu, Yong Xu, Jie Wen, Lilei Sun, Raja S P

    Abstract: Recently, deep learning has been widely used in the field of vehicle re-identification. When training a deep model, softmax loss is usually used as a supervision tool. However, the softmax loss performs well for closed-set tasks, but not very well for open-set tasks. In this paper, we sum up five shortcomings of center loss and solved all of them by proposing a dual distance center loss (DDCL). Es… ▽ More

    Submitted 23 December, 2020; originally announced December 2020.

    Comments: 30 pages 13figures, 6 tables

  10. LittleYOLO-SPP: A Delicate Real-Time Vehicle Detection Algorithm

    Authors: Sri Jamiya S, Esther Rani P

    Abstract: Vehicle detection in real-time is a challenging and important task. The existing real-time vehicle detection lacks accuracy and speed. Real-time systems must detect and locate vehicles during criminal activities like theft of vehicle and road traffic violations with high accuracy. Detection of vehicles in complex scenes with occlusion is also extremely difficult. In this study, a lightweight model… ▽ More

    Submitted 11 November, 2020; originally announced November 2020.

    Comments: 18 pages, 8 Figures, 7 Tables

    Journal ref: Optik - International Journal for Light and Electron optics Volume 225, 2021, 165818, ISSN 0030-4026

  11. arXiv:2008.03464  [pdf, other

    eess.AS cs.LG

    Audio Spoofing Verification using Deep Convolutional Neural Networks by Transfer Learning

    Authors: Rahul T P, P R Aravind, Ranjith C, Usamath Nechiyil, Nandakumar Paramparambath

    Abstract: Automatic Speaker Verification systems are gaining popularity these days; spoofing attacks are of prime concern as they make these systems vulnerable. Some spoofing attacks like Replay attacks are easier to implement but are very hard to detect thus creating the need for suitable countermeasures. In this paper, we propose a speech classifier based on deep-convolutional neural network to detect spo… ▽ More

    Submitted 8 August, 2020; originally announced August 2020.

  12. arXiv:2003.12920  [pdf, other

    cs.NI cs.CR

    IoT Blockchain Solution for Air Quality Monitoring in SmartCities

    Authors: Shajulin Benedict, Rumaize P., Jaspreet Kaur

    Abstract: IoT cloud enabled societal applications have dramatically increased in the recent past due to the thrust for innovations, notably through startup initiatives, in various sectors such as agriculture, healthcare, industry, and so forth. The existing IoT cloud solutions have led practitioners or researchers to a haphazard clutter of serious security hazards and performance inefficiencies. This paper… ▽ More

    Submitted 28 March, 2020; originally announced March 2020.

    Comments: IEEE ANTS2019 Accepted Paper

  13. arXiv:1912.01478  [pdf, other

    cs.DC

    A Hybrid Graph Coloring Algorithm for GPUs

    Authors: Shanthanu S Rai, Rohit M P, Sreepathi Pai

    Abstract: Graph algorithms mainly belong to two categories, topology-driven and data-driven. Data-driven approach maintains a worklist of active nodes, the nodes on which work has to be done. Topology-driven approach sweeps over the entire graph to find active nodes. Hybridization is an optimization technique where in each iteration, the computation is done in a topology-driven or data-driven manner based… ▽ More

    Submitted 3 December, 2019; originally announced December 2019.

    Comments: 5 pages, 4 figures, 4 tables, 2 listings, accepted at 26th IEEE International Conference on High Performance Computing, Data, and Analytics (Student Research Symposium)

  14. arXiv:1904.05014  [pdf, other

    eess.SP cs.IT

    Analysis of Beam Swee** Techniques for Cell-Discovery in mm Wave Systems

    Authors: Rashmi P, Manoj A, Arun Pachai Kannu

    Abstract: Cell discovery is the procedure in which a user equipment (UE) finds a suitable base station (BS) to establish a communication link. When beamforming with antenna arrays is done at both transmitter and receiver, cell discovery in mm wave systems also involves finding the correct angle of arrival - angle of departure alignment between the UE and the detected BS. First, we consider the single BS sce… ▽ More

    Submitted 30 November, 2021; v1 submitted 10 April, 2019; originally announced April 2019.

  15. arXiv:1711.02889  [pdf, ps, other

    cs.LO

    FO and MSO approach to Some Graph Problems: Approximation and Poly time Results

    Authors: Kona Harshita, Sounaka Mishra, Renjith. P, N. Sadagopan

    Abstract: The focus of this paper is two fold. Firstly, we present a logical approach to graph modification problems such as minimum node deletion, edge deletion, edge augmentation problems by expressing them as an expression in first order (FO) logic. As a consequence, it follows that these problems have constant factor polynomial-time approximation algorithms. In particular, node deletion/edge deletion on… ▽ More

    Submitted 8 November, 2017; originally announced November 2017.

  16. arXiv:1406.3209   

    cs.NI

    BT-GPSR: An Integrated Trust Model for Secure Geographic Routing in Wireless Sensor Networks

    Authors: Raghu Vamsi. P, Payal Khurana Batra, Krishna Kant

    Abstract: Geographic routing offers guaranteed packet deliv- ery in a dense network. In this routing, packets are forwarded to a node which is nearer to the destination with an extensive use of location information. However, research studies in Mobile Adhoc Networks (MANETs) and Wireless Sensor Networks (WSNs) have shown that packet delivery percentage can degrade substantially when malicious nodes are foun… ▽ More

    Submitted 23 July, 2014; v1 submitted 12 June, 2014; originally announced June 2014.

    Comments: The paper has been withdrawn due to improper display of equations

  17. arXiv:1406.3204   

    cs.NI cs.CR

    Systematic Design of Trust Management Systems for Wireless Sensor Networks: A Review

    Authors: Raghu Vamsi. P, Krishna Kant

    Abstract: Conventional cryptography methods alone are not adequate for secure routing in Wireless Sensor Networks (WSNs). These networks are more vulnerable to security attacks due to their diverse applications, lack of supervision and limitations in view of resource, processing and storage. To mitigate these problems, trust is widely used as a tool to provide better security by aiding routing protocols. In… ▽ More

    Submitted 23 July, 2014; v1 submitted 12 June, 2014; originally announced June 2014.

    Comments: The paper has been withdrawn due to typesetting mistakes

  18. arXiv:1106.2794  [pdf, other

    cs.CE

    Power Management during Scan Based Sequential Circuit Testing

    Authors: Reshma. p

    Abstract: This paper shows that not every scan cell contributes equally to the power consumption during scan based test. The transitions at some scan cells cause more toggles at the internal signal lines of a circuit than the transitions at other scan cells. Hence the transitions at these scan cells have a larger impact on the power consumption during test application. These scan cells are called power sens… ▽ More

    Submitted 2 June, 2011; originally announced June 2011.

    Comments: ACIJ 2011

  19. arXiv:1002.2202  [pdf

    cs.AI

    Modeling of Human Criminal Behavior using Probabilistic Networks

    Authors: Ramesh Kumar Gopala Pillai, Dr. Ramakanth Kumar . P

    Abstract: Currently, criminals profile (CP) is obtained from investigators or forensic psychologists interpretation, linking crime scene characteristics and an offenders behavior to his or her characteristics and psychological profile. This paper seeks an efficient and systematic discovery of nonobvious and valuable patterns between variables from a large database of solved cases via a probabilistic netwo… ▽ More

    Submitted 10 February, 2010; originally announced February 2010.

    Comments: IEEE format, International Journal of Computer Science and Information Security, IJCSIS January 2010, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: Journal of Computer Science, ISSN 19475500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 7, No. 1, pp. 216-219, January 2010, USA