Skip to main content

Showing 1–3 of 3 results for author: Padhi, S K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.18278  [pdf, other

    cs.CV eess.IV

    Generalized Deepfake Attribution

    Authors: Sowdagar Mahammad Shahid, Sudev Kumar Padhi, Umesh Kashyap, Sk. Subidh Ali

    Abstract: The landscape of fake media creation changed with the introduction of Generative Adversarial Networks (GAN s). Fake media creation has been on the rise with the rapid advances in generation technology, leading to new challenges in Detecting fake media. A fundamental characteristic of GAN s is their sensitivity to parameter initialization, known as seeds. Each distinct seed utilized during training… ▽ More

    Submitted 26 June, 2024; originally announced June 2024.

  2. arXiv:2311.07888  [pdf, other

    cs.RO cs.AI cs.LG

    RoboSense At Edge: Detecting Slip, Crumple and Shape of the Object in Robotic Hand for Teleoprations

    Authors: Sudev Kumar Padhi, Mohit Kumar, Debanka Giri, Subidh Ali

    Abstract: Slip and crumple detection is essential for performing robust manipulation tasks with a robotic hand (RH) like remote surgery. It has been one of the challenging problems in the robotics manipulation community. In this work, we propose a technique based on machine learning (ML) based techniques to detect the slip, and crumple as well as the shape of an object that is currently held in the robotic… ▽ More

    Submitted 13 November, 2023; originally announced November 2023.

  3. arXiv:1310.1190  [pdf

    cs.DB

    Review on Fragment Allocation by using Clustering Technique in Distributed Database System

    Authors: Priyanka Dash, Ranjita Rout, Satya Bhusan Pratihari, Sanjay Kumar Padhi

    Abstract: Considerable Progress has been made in the last few years in improving the performance of the distributed database systems. The development of Fragment allocation models in Distributed database is becoming difficult due to the complexity of huge number of sites and their communication considerations. Under such conditions, simulation of clustering and data allocation is adequate tools for understa… ▽ More

    Submitted 4 October, 2013; originally announced October 2013.

    Comments: 9 pages,3 figures

    Journal ref: IJCSN,October,2013,Volume-2 Issue-5