Skip to main content

Showing 1–50 of 53 results for author: R, K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.01874  [pdf, other

    cs.SE

    Automated Control Logic Test Case Generation using Large Language Models

    Authors: Heiko Koziolek, Virendra Ashiwal, Soumyadip Bandyopadhyay, Chandrika K R

    Abstract: Testing PLC and DCS control logic in industrial automation is laborious and challenging since appropriate test cases are often complex and difficult to formulate. Researchers have previously proposed several automated test case generation approaches for PLC software applying symbolic execution and search-based techniques. Often requiring formal specifications and performing a mechanical analysis o… ▽ More

    Submitted 3 May, 2024; originally announced May 2024.

  2. arXiv:2401.04732  [pdf, other

    cs.IR cs.AI cs.LG

    A case study of Generative AI in MSX Sales Copilot: Improving seller productivity with a real-time question-answering system for content recommendation

    Authors: Manpreet Singh, Ravdeep Pasricha, Nitish Singh, Ravi Prasad Kondapalli, Manoj R, Kiran R, Laurent Boué

    Abstract: In this paper, we design a real-time question-answering system specifically targeted for hel** sellers get relevant material/documentation they can share live with their customers or refer to during a call. Taking the Seismic content repository as a relatively large scale example of a diverse dataset of sales material, we demonstrate how LLM embeddings of sellers' queries can be matched with the… ▽ More

    Submitted 4 January, 2024; originally announced January 2024.

    Journal ref: Microsoft Journal of Applied Research, Volume 20, 2024

  3. arXiv:2401.00737  [pdf, other

    cs.IR cs.AI cs.LG cs.SE

    Searching, fast and slow, through product catalogs

    Authors: Dayananda Ubrangala, Juhi Sharma, Sharath Kumar Rangappa, Kiran R, Ravi Prasad Kondapalli, Laurent Boué

    Abstract: String matching algorithms in the presence of abbreviations, such as in Stock Kee** Unit (SKU) product catalogs, remains a relatively unexplored topic. In this paper, we present a unified architecture for SKU search that provides both a real-time suggestion system (based on a Trie data structure) as well as a lower latency search system (making use of character level TF-IDF in combination with l… ▽ More

    Submitted 1 January, 2024; originally announced January 2024.

    Journal ref: Microsoft Journal of Applied Research, Volume 20, 2024

  4. arXiv:2312.08021  [pdf, other

    cs.IR cs.AI cs.LG

    Improving search relevance of Azure Cognitive Search by Bayesian optimization

    Authors: Nitin Agarwal, Ashish Kumar, Kiran R, Manish Gupta, Laurent Boué

    Abstract: Azure Cognitive Search (ACS) has emerged as a major contender in "Search as a Service" cloud products in recent years. However, one of the major challenges for ACS users is to improve the relevance of the search results for their specific usecases. In this paper, we propose a novel method to find the optimal ACS configuration that maximizes search relevance for a specific usecase (product search,… ▽ More

    Submitted 13 December, 2023; originally announced December 2023.

    Journal ref: Microsoft Journal of Applied Research, Volume 20, 2024

  5. arXiv:2311.12719  [pdf

    cs.AI

    Development of a Legal Document AI-Chatbot

    Authors: Pranav Nataraj Devaraj, Rakesh Teja P V, Aaryav Gangrade, Manoj Kumar R

    Abstract: With the exponential growth of digital data and the increasing complexity of legal documentation, there is a pressing need for efficient and intelligent tools to streamline the handling of legal documents.With the recent developments in the AI field, especially in chatbots, it cannot be ignored as a very compelling solution to this problem.An insight into the process of creating a Legal Documentat… ▽ More

    Submitted 21 November, 2023; originally announced November 2023.

    Comments: 5 pages, 5 figures

  6. arXiv:2308.06471  [pdf

    cs.LG

    Volterra Accentuated Non-Linear Dynamical Admittance (VANYA) to model Deforestation: An Exemplification from the Amazon Rainforest

    Authors: Karthik R., Ramamoorthy A.

    Abstract: Intelligent automation supports us against cyclones, droughts, and seismic events with recent technology advancements. Algorithmic learning has advanced fields like neuroscience, genetics, and human-computer interaction. Time-series data boosts progress. Challenges persist in adopting these approaches in traditional fields. Neural networks face comprehension and bias issues. AI's expansion across… ▽ More

    Submitted 12 August, 2023; originally announced August 2023.

  7. arXiv:2308.01976  [pdf, other

    cs.LG cs.AI cs.CL cs.IR

    Domain specificity and data efficiency in typo tolerant spell checkers: the case of search in online marketplaces

    Authors: Dayananda Ubrangala, Juhi Sharma, Ravi Prasad Kondapalli, Kiran R, Amit Agarwala, Laurent Boué

    Abstract: Typographical errors are a major source of frustration for visitors of online marketplaces. Because of the domain-specific nature of these marketplaces and the very short queries users tend to search for, traditional spell cheking solutions do not perform well in correcting typos. We present a data augmentation method to address the lack of annotated typo data and train a recurrent neural network… ▽ More

    Submitted 3 August, 2023; originally announced August 2023.

    Journal ref: Microsoft Journal of Applied Research, Volume 19, 2023

  8. arXiv:2307.08048  [pdf

    eess.IV cs.CV

    A Novel SLCA-UNet Architecture for Automatic MRI Brain Tumor Segmentation

    Authors: Tejashwini P S, Thriveni J, Venugopal K R

    Abstract: Brain tumor is deliberated as one of the severe health complications which lead to decrease in life expectancy of the individuals and is also considered as a prominent cause of mortality worldwide. Therefore, timely detection and prediction of brain tumors can be helpful to prevent death rates due to brain tumors. Biomedical image analysis is a widely known solution to diagnose brain tumor. Althou… ▽ More

    Submitted 16 July, 2023; originally announced July 2023.

  9. arXiv:2306.17084  [pdf

    cs.DC cs.CR

    A Framework for Securing Health Information Using Blockchain in Cloud Hosted Cyber Physical Systems

    Authors: Aisha Banu, Sharon Priya S, Poojitha K, Kiruthiga R, Ruby Annette, Subash Chandran

    Abstract: Electronic Health Records (EHRs) have undergone numerous technical improvements in recent years, including the incorporation of mobile devices with the cloud computing technologies to facilitate medical data exchanges between patients and the healthcare professionals. This cutting-edge architecture enables cyber physical systems housed in the cloud to provide healthcare services with minimal opera… ▽ More

    Submitted 25 June, 2023; originally announced June 2023.

  10. arXiv:2301.12943  [pdf, other

    cs.CV

    Factors that affect Camera based Self-Monitoring of Vitals in the Wild

    Authors: Nikhil S. Narayan, Shashanka B. R., Rohit Damodaran, Dr. Chandrashekhar Jayaram, Dr. M. A. Kareem, Dr. Mamta P., Dr. Saravanan K. R., Dr. Monu Krishnan, Dr. Raja Indana

    Abstract: The reliability of the results of self monitoring of the vitals in the wild using medical devices or wearables or camera based smart phone solutions is subject to variabilities such as position of placement, hardware of the device and environmental factors. In this first of its kind study, we demonstrate that this variability in self monitoring of Blood Pressure (BP), Blood oxygen saturation level… ▽ More

    Submitted 30 January, 2023; originally announced January 2023.

    Comments: 10 pages, 9 figures

  11. arXiv:2301.06080  [pdf

    cs.CV cs.LG

    Comprehensive Literature Survey on Deep Learning used in Image Memorability Prediction and Modification

    Authors: Ananya Sadana, Nikita Thakur, Nikita Poria, Astika Anand, Seeja K. R

    Abstract: As humans, we can remember certain visuals in great detail, and sometimes even after viewing them once. What is even more interesting is that humans tend to remember and forget the same things, suggesting that there might be some general internal characteristics of an image to encode and discard similar types of information. Research suggests that some pictures tend to be memorized more than other… ▽ More

    Submitted 17 January, 2023; v1 submitted 14 December, 2022; originally announced January 2023.

  12. arXiv:2203.10194  [pdf, other

    cs.CV cs.AI cs.LG cs.RO

    Analysis and Adaptation of YOLOv4 for Object Detection in Aerial Images

    Authors: Aryaman Singh Samyal, Akshatha K R, Soham Hans, Karunakar A K, Satish Shenoy B

    Abstract: The recent and rapid growth in Unmanned Aerial Vehicles (UAVs) deployment for various computer vision tasks has paved the path for numerous opportunities to make them more effective and valuable. Object detection in aerial images is challenging due to variations in appearance, pose, and scale. Autonomous aerial flight systems with their inherited limited memory and computational power demand accur… ▽ More

    Submitted 18 March, 2022; originally announced March 2022.

  13. arXiv:2112.14983  [pdf

    cs.CV cs.AI cs.LG cs.NE

    Exploring the pattern of Emotion in children with ASD as an early biomarker through Recurring-Convolution Neural Network (R-CNN)

    Authors: Abirami S P, Kousalya G, Karthick R

    Abstract: Autism Spectrum Disorder (ASD) is found to be a major concern among various occupational therapists. The foremost challenge of this neurodevelopmental disorder lies in the fact of analyzing and exploring various symptoms of the children at their early stage of development. Such early identification could prop up the therapists and clinicians to provide proper assistive support to make the children… ▽ More

    Submitted 30 December, 2021; originally announced December 2021.

    Comments: 8 figures and 2 tables. totally 18 pages

  14. arXiv:2112.03704  [pdf

    cs.CR cs.AI cs.LG

    Two-stage Deep Stacked Autoencoder with Shallow Learning for Network Intrusion Detection System

    Authors: Nasreen Fathima, Akshara Pramod, Yash Srivastava, Anusha Maria Thomas, Syed Ibrahim S P, Chandran K R

    Abstract: Sparse events, such as malign attacks in real-time network traffic, have caused big organisations an immense hike in revenue loss. This is due to the excessive growth of the network and its exposure to a plethora of people. The standard methods used to detect intrusions are not promising and have significant failure to identify new malware. Moreover, the challenges in handling high volume data wit… ▽ More

    Submitted 3 December, 2021; originally announced December 2021.

    Comments: 8 pages, 3 figures

  15. arXiv:2108.02490  [pdf, other

    cs.SE cs.PL

    HIPPODROME: Data Race Repair using Static Analysis Summaries

    Authors: Andreea Costea, Abhishek Tiwari, Sigmund Chianasta, Kishore R, Abhik Roychoudhury, Ilya Sergey

    Abstract: Implementing bug-free concurrent programs is a challenging task in modern software development. State-of-the-art static analyses find hundreds of concurrency bugs in production code, scaling to large codebases. Yet, fixing these bugs in constantly changing codebases represents a daunting effort for programmers, particularly because a fix in the concurrent code can introduce other bugs in a subtle… ▽ More

    Submitted 6 August, 2021; v1 submitted 5 August, 2021; originally announced August 2021.

  16. arXiv:2012.00866  [pdf, other

    cs.DS

    Huskysort

    Authors: R. C. Hillyard, Yunlu Liaozheng, Sai Vineeth K. R

    Abstract: Much of the copious literature on the subject of sorting has concentrated on minimizing the number of comparisons and/or exchanges/copies. However, a more appropriate yardstick for the performance of sorting algorithms is based on the total number of array accesses that are required (the "work"). For a sort that is based on divide-and-conquer (including iterative variations on that theme), we can… ▽ More

    Submitted 1 December, 2020; originally announced December 2020.

    Comments: 9 pages, Github repo for the algorithm included

  17. arXiv:2004.11460  [pdf, other

    q-bio.QM cs.CY cs.LG stat.ML

    Development of a Machine Learning Model and Mobile Application to Aid in Predicting Dosage of Vitamin K Antagonists Among Indian Patients

    Authors: Amruthlal M, Devika S, Ameer Suhail P A, Aravind K Menon, Vignesh Krishnan, Alan Thomas, Manu Thomas, Sanjay G, Lakshmi Kanth L R, Jimmy Jose, Harikrishnan S

    Abstract: Patients who undergo mechanical heart valve replacements or have conditions like Atrial Fibrillation have to take Vitamin K Antagonists (VKA) drugs to prevent coagulation of blood. These drugs have narrow therapeutic range and need to be very closely monitored due to life threatening side effects. The dosage of VKA drug is determined and revised by a physician based on Prothrombin Time - Internati… ▽ More

    Submitted 19 April, 2020; originally announced April 2020.

  18. arXiv:2004.05811  [pdf, other

    eess.SP cs.LG eess.SY

    Gait Recovery System for Parkinson's Disease using Machine Learning on Embedded Platforms

    Authors: Gokul H., Prithvi Suresh, Hari Vignesh B, Pravin Kumaar R, Vineeth Vijayaraghavan

    Abstract: Freezing of Gait (FoG) is a common gait deficit among patients diagnosed with Parkinson's Disease (PD). In order to help these patients recover from FoG episodes, Rhythmic Auditory Stimulation (RAS) is needed. The authors propose a ubiquitous embedded system that detects FOG events with a Machine Learning (ML) subsystem from accelerometer signals . By making inferences on-device, we avoid issues p… ▽ More

    Submitted 13 April, 2020; originally announced April 2020.

  19. arXiv:2003.00810  [pdf

    cs.CV cs.IR eess.IV

    Medicine Strip Identification using 2-D Cepstral Feature Extraction and Multiclass Classification Methods

    Authors: Anirudh Itagi, Ritam Sil, Saurav Mohapatra, Subham Rout, Bharath K P, Karthik R, Rajesh Kumar Muthu

    Abstract: Misclassification of medicine is perilous to the health of a patient, more so if the said patient is visually impaired or simply did not recognize the color, shape or type of medicine strip. This paper proposes a method for identification of medicine strips by 2-D cepstral analysis of their images followed by performing classification that has been done using the K-Nearest Neighbor (KNN), Support… ▽ More

    Submitted 3 February, 2020; originally announced March 2020.

  20. arXiv:2003.00418  [pdf, other

    cs.CV cs.AI cs.LG cs.MM cs.SD

    Towards Automatic Face-to-Face Translation

    Authors: Prajwal K R, Rudrabha Mukhopadhyay, Jerin Philip, Abhishek Jha, Vinay Namboodiri, C. V. Jawahar

    Abstract: In light of the recent breakthroughs in automatic machine translation systems, we propose a novel approach that we term as "Face-to-Face Translation". As today's digital communication becomes increasingly visual, we argue that there is a need for systems that can automatically translate a video of a person speaking in language A into a target language B with realistic lip synchronization. In this… ▽ More

    Submitted 1 March, 2020; originally announced March 2020.

    Comments: 9 pages (including references), 5 figures, Published in ACM Multimedia, 2019

    Journal ref: MM '19: Proceedings of the 27th ACM International Conference on Multimedia; October 2019; Pages 1428-1436

  21. arXiv:2002.07677  [pdf

    cs.SD cs.MM eess.AS

    Performance Analysis of Adaptive Noise Cancellation for Speech Signal

    Authors: Pratibha Balaji, Shruthi Narayan, Durga Sraddha, Bharath K P, Karthik R, Rajesh Kumar Muthu

    Abstract: This paper gives a broader insight on the application of adaptive filter in noise cancellation during various processes where signal is transmitted. Adaptive filtering techniques like RLS, LMS and normalized LMS are used to filter the input signal using the concept of negative feedback to predict its nature and remove it effectively from the input. In this paper a comparative study between the eff… ▽ More

    Submitted 3 February, 2020; originally announced February 2020.

  22. arXiv:2002.07590  [pdf

    eess.AS cs.IR cs.SD

    Speech Emotion Recognition using Support Vector Machine

    Authors: Manas Jain, Shruthi Narayan, Pratibha Balaji, Bharath K P, Abhijit Bhowmick, Karthik R, Rajesh Kumar Muthu

    Abstract: In this project, we aim to classify the speech taken as one of the four emotions namely, sadness, anger, fear and happiness. The samples that have been taken to complete this project are taken from Linguistic Data Consortium (LDC) and UGA database. The important characteristics determined from the samples are energy, pitch, MFCC coefficients, LPCC coefficients and speaker rate. The classifier used… ▽ More

    Submitted 3 February, 2020; originally announced February 2020.

  23. arXiv:2001.04215  [pdf

    cs.CV

    Radial Based Analysis of GRNN in Non-Textured Image Inpainting

    Authors: Karthik R, Anvita Dwivedi, Haripriya M, Bharath K P, Rajesh Kumar M

    Abstract: Image inpainting algorithms are used to restore some damaged or missing information region of an image based on the surrounding information. The method proposed in this paper applies the radial based analysis of image inpainting on GRNN. The damaged areas are first isolated from rest of the areas and then arranged by their size and then inpainted using GRNN. The training of the neural network is d… ▽ More

    Submitted 13 January, 2020; originally announced January 2020.

  24. ElfStore: A Resilient Data Storage Service for Federated Edge and Fog Resources

    Authors: Sumit Kumar Monga, Sheshadri K R, Yogesh Simmhan

    Abstract: Edge and fog computing have grown popular as IoT deployments become wide-spread. While application composition and scheduling on such resources are being explored, there exists a gap in a distributed data storage service on the edge and fog layer, instead depending solely on the cloud for data persistence. Such a service should reliably store and manage data on fog and edge devices, even in the pr… ▽ More

    Submitted 21 May, 2019; originally announced May 2019.

    Comments: 24 pages, 14 figures, To appear in IEEE International Conference on Web Services (ICWS), Milan, Italy, 2019

    Journal ref: Proceedings of the 2019 IEEE International Conference on Web Services (ICWS) Conference

  25. arXiv:1903.10641  [pdf, other

    cs.CV cs.RO

    INFER: INtermediate representations for FuturE pRediction

    Authors: Shashank Srikanth, Junaid Ahmed Ansari, Karnik Ram R, Sarthak Sharma, Krishna Murthy J., Madhava Krishna K

    Abstract: In urban driving scenarios, forecasting future trajectories of surrounding vehicles is of paramount importance. While several approaches for the problem have been proposed, the best-performing ones tend to require extremely detailed input representations (eg. image sequences). But, such methods do not generalize to datasets they have not been trained on. We propose intermediate representations tha… ▽ More

    Submitted 25 March, 2019; originally announced March 2019.

    Comments: Manuscript under review. Submitted to IROS 2019

  26. arXiv:1901.02033  [pdf, ps, other

    cs.IT

    The Effect of Introducing Redundancy in a Probabilistic Forwarding Protocol

    Authors: Vinay Kumar B. R., Roshan Antony, Navin Kashyap

    Abstract: This paper is concerned with the problem of broadcasting information from a source node to every node in an ad-hoc network. Flooding, as a broadcast mechanism, involves each node forwarding any packet it receives to all its neighbours. This results in excessive transmissions and thus a high energy expenditure overall. Probabilistic forwarding or gossi** involves each node forwarding a received p… ▽ More

    Submitted 10 January, 2019; v1 submitted 7 January, 2019; originally announced January 2019.

    Comments: Appears in the Proceedings of the 2018 National Conference on Communications (NCC 2018)

  27. arXiv:1901.00413  [pdf

    cs.CV

    Lipi Gnani - A Versatile OCR for Documents in any Language Printed in Kannada Script

    Authors: Shiva Kumar H R, Ramakrishnan A G

    Abstract: A Kannada OCR, named Lipi Gnani, has been designed and developed from scratch, with the motivation of it being able to convert printed text or poetry in Kannada script, without any restriction on vocabulary. The training and test sets have been collected from over 35 books published between the period 1970 to 2002, and this includes books written in Halegannada and pages containing Sanskrit slokas… ▽ More

    Submitted 2 January, 2019; originally announced January 2019.

    Comments: 21 pages, 16 figures, 12 tables, submitted to ACM Transactions on Asian and Low-Resource Language Information Processing

    Report number: mile_shr_agr_01_2019

  28. arXiv:1804.10711  [pdf

    cs.AI cs.DB

    Modified Apriori Graph Algorithm for Frequent Pattern Mining

    Authors: Pritish Yuvraj, Suneetha K. R

    Abstract: Web Usage Mining is an application of Data Mining Techniques to discover interesting usage patterns from web data in order to understand and better serve the needs of web-based applications. The paper proposes an algorithm for finding these usage patterns using a modified version of Apriori Algorithm called Apriori-Graph. These rules will help service providers to predict, which web pages, the use… ▽ More

    Submitted 27 April, 2018; originally announced April 2018.

  29. arXiv:1803.04620  [pdf

    eess.IV cs.CV

    Image Segmentation and Processing for Efficient Parking Space Analysis

    Authors: Chetan Sai Tutika, Charan Vallapaneni, Karthik R, Bharath KP, N Ruban Rajesh Kumar Muthu

    Abstract: In this paper, we develop a method to detect vacant parking spaces in an environment with unclear segments and contours with the help of MATLAB image processing capabilities. Due to the anomalies present in the parking spaces, such as uneven illumination, distorted slot lines and overlap** of cars. The present-day conventional algorithms have difficulties processing the image for accurate result… ▽ More

    Submitted 13 March, 2018; originally announced March 2018.

    Comments: 6 pages, 2018 International Conference on Informatics Computing in Engineering Systems (ICICES)

  30. arXiv:1802.04252  [pdf

    cs.CY

    Automatic Phone Slip Detection System

    Authors: Karthik R, Preetam Satapath, Srivatsa Patnaik, Saurabh Priyadarshi, Rajesh Kumar M

    Abstract: Mobile phones are becoming increasingly advanced and the latest ones are equipped with many diverse and powerful sensors. These sensors can be used to study different position and orientation of the phone which can help smartphone manufacture to track about their customers handling from the recorded log. The inbuilt sensors such as the accelerometer and gyroscope present in our phones are used to… ▽ More

    Submitted 10 February, 2018; originally announced February 2018.

    Comments: Accepted for publication in Springer LNEE

  31. arXiv:1712.00917  [pdf

    cs.SD eess.AS

    A text-independent speaker verification model: A comparative analysis

    Authors: Rishi Charan, Manisha. A, Karthik. R, Rajesh Kumar M

    Abstract: The most pressing challenge in the field of voice biometrics is selecting the most efficient technique of speaker recognition. Every individual's voice is peculiar, factors like physical differences in vocal organs, accent and pronunciation contributes to the problem's complexity. In this paper, we explore the various methods available in each block in the process of speaker recognition with the o… ▽ More

    Submitted 4 December, 2017; originally announced December 2017.

    Comments: presented and accepted by 2017 International Conference on Intelligent Computing and Control (I2C2)

  32. arXiv:1510.02956  [pdf, ps, other

    cs.IT

    On The Number of Optimal Linear Index Codes For Unicast Index Coding Problems

    Authors: Kavitha R., Niranjana Ambadi, B. Sundar Rajan

    Abstract: An index coding problem arises when there is a single source with a number of messages and multiple receivers each wanting a subset of messages and knowing a different set of messages a priori. The noiseless Index Coding Problem is to identify the minimum number of transmissions (optimal length) to be made by the source through noiseless channels so that all receivers can decode their wanted messa… ▽ More

    Submitted 10 October, 2015; originally announced October 2015.

    Comments: Part of the content appears in Proceedings of IEEE International Symposium on Information Theory, (ISIT 2015), Hong Kong, 14-19 June 2015, pp.1044-1048

  33. arXiv:1508.00354  [pdf, ps, other

    cs.SD cs.CL

    Significance of Maximum Spectral Amplitude in Sub-bands for Spectral Envelope Estimation and Its Application to Statistical Parametric Speech Synthesis

    Authors: Sivanand Achanta, Anandaswarup Vadapalli, Sai Krishna R., Suryakanth V. Gangashetty

    Abstract: In this paper we propose a technique for spectral envelope estimation using maximum values in the sub-bands of Fourier magnitude spectrum (MSASB). Most other methods in the literature parametrize spectral envelope in cepstral domain such as Mel-generalized cepstrum etc. Such cepstral domain representations, although compact, are not readily interpretable. This difficulty is overcome by our method… ▽ More

    Submitted 3 August, 2015; originally announced August 2015.

  34. arXiv:1504.05008  [pdf, other

    cs.IT

    On the Number of Optimal Index Codes

    Authors: Kavitha. R, B. Sundar Rajan

    Abstract: In Index coding there is a single sender with multiple messages and multiple receivers each wanting a different set of messages and knowing a different set of messages a priori. The Index Coding problem is to identify the minimum number of transmissions (optimal length) to be made so that all receivers can decode their wanted messages using the transmitted symbols and their respective prior inform… ▽ More

    Submitted 20 April, 2015; originally announced April 2015.

  35. arXiv:1410.6038  [pdf, other

    cs.IT

    Optimal Index Coding with Min-Max Probability of Error over Fading Channels

    Authors: Anoop Thomas, Kavitha R., Chandramouli A., B. Sundar Rajan

    Abstract: An index coding scheme in which the source (transmitter) transmits binary symbols over a wireless fading channel is considered. Index codes with the transmitter using minimum number of transmissions are known as optimal index codes. Different optimal index codes give different performances in terms of probability of error in a fading environment and this also varies from receiver to receiver. In t… ▽ More

    Submitted 13 April, 2015; v1 submitted 22 October, 2014; originally announced October 2014.

  36. arXiv:1410.4074  [pdf, ps, other

    cs.IT

    Distributed Nonparametric Sequential Spectrum Sensing under Electromagnetic Interference

    Authors: Sahasranand K. R., Vinod Sharma

    Abstract: A nonparametric distributed sequential algorithm for quick detection of spectral holes in a Cognitive Radio set up is proposed. Two or more local nodes make decisions and inform the fusion centre (FC) over a reporting Multiple Access Channel (MAC), which then makes the final decision. The local nodes use energy detection and the FC uses mean detection in the presence of fading, heavy-tailed electr… ▽ More

    Submitted 30 April, 2015; v1 submitted 14 October, 2014; originally announced October 2014.

    Comments: 8 pages; 6 figures; Version 2 has the proofs for the theorems. Version 3 contains a new section on approximation analysis

  37. arXiv:1407.8377  [pdf

    cs.SE

    SLI, a New Metric to determine Success of a Software Project

    Authors: Shashi Kumar N. R., T. R. Gopalakrishnan Nair, Suma V

    Abstract: Project Management process plays a critical role in managing factors such as cost, time, technology and personnel towards achieving the success of a project and henceforth the sustainability of the company in the industrial market. This paper emphasizes empirical study of several projects developed over a period of time in a product and service based CMMI Level 5 Software Company. The investigatio… ▽ More

    Submitted 31 July, 2014; originally announced July 2014.

    Comments: 5 pages, 4 tables, IEEE International Conference on Electronics and Communication Systems (ICECS)2014

  38. arXiv:1407.5319  [pdf

    cs.SE

    Impact Analysis of Allocation of Resources by Project Manager on Success of Software Projects

    Authors: T. R. Gopalakrishnan Nair, Suma V, Shashi Kumar N. R

    Abstract: Generation Production of successful software project is one of the prime considerations of software industry. Engineering high quality software products is further influenced by several factors such as budget, schedule, resource constraints etc. A project manager is responsible for estimation and allocation of these resources in a project. Hence, role of project manager has a vital influence on su… ▽ More

    Submitted 20 July, 2014; originally announced July 2014.

    Comments: 5 pages,5 figures, 1 tables, International Conference on Data Mining and Computer Engineering (ICDMCE'2012) December 21-22, 2012 Bangkok (Thailand)

  39. arXiv:1407.2082  [pdf

    cs.AR

    FPGA Based Efficient Multiplier for Image Processing Applications Using Recursive Error Free Mitchell Log Multiplier and KOM Architecture

    Authors: Satish S Bhairannawar, Rathan R, Raja K B, Venugopal K R, L M Patnaik

    Abstract: The Digital Image processing applications like medical imaging, satellite imaging, Biometric trait images etc., rely on multipliers to improve the quality of image. However, existing multiplication techniques introduce errors in the output with consumption of more time, hence error free high speed multipliers has to be designed. In this paper we propose FPGA based Recursive Error Free Mitchell Log… ▽ More

    Submitted 8 July, 2014; originally announced July 2014.

  40. QoS group based optimal retransmission medium access protocol for wireless sensor networks

    Authors: Kumaraswamy M, Shaila K, Tejaswi V, Venugopal K R, S S Iyengar, L M Patnaik

    Abstract: This paper presents, a Group Based Optimal Retransmission Medium Access (GORMA) Protocol is designed that combines protocol of Collision Avoidance (CA) and energy management for low-cost, short-range, low-data rate and low-energy sensor nodes applications in environment monitoring, agriculture, industrial plants etc. In this paper, the GORMA protocol focuses on efficient MAC protocol to provide au… ▽ More

    Submitted 11 April, 2014; originally announced April 2014.

    Comments: 9 pages in IEEE format and 6 figures

    Journal ref: IJCNC, Vol.6, No.2, March 2014

  41. arXiv:1312.3182  [pdf, ps, other

    cs.DM math.CO

    On The Center Sets and Center Numbers of Some Graph Classes

    Authors: Ram Kumar. R, Kannan Balakrishnan, Manoj Changat, A. Sreekumar, Prasanth G. Narasimha-Shenoi

    Abstract: For a set $S$ of vertices and the vertex $v$ in a connected graph $G$, $\displaystyle\max_{x \in S}d(x,v)$ is called the $S$-eccentricity of $v$ in $G$. The set of vertices with minimum $S$-eccentricity is called the $S$-center of $G$. Any set $A$ of vertices of $G$ such that $A$ is an $S$-center for some set $S$ of vertices of $G$ is called a center set. We identify the center sets of certain cla… ▽ More

    Submitted 11 December, 2013; originally announced December 2013.

  42. arXiv:1309.5601  [pdf, ps, other

    cs.CR cs.NI

    Multiple Domain Secure Routing for Wireless Sensor Networks

    Authors: Lata B T, Jansi P K R, Shaila K, D N Sujatha, Venugopal K R, L M Patnaik

    Abstract: Secure Transmission of data packets in Wireless Sensor Networks is an important area of Research. There is a possibility of an attacker creating security holes in the network. Hence, network security and reliability can be achieved by discovering random multiple paths using multiple domains, and forwarding data packets from the source node to the destination node. We have designed, Multiple Domain… ▽ More

    Submitted 22 September, 2013; originally announced September 2013.

    Comments: 10 pages

    Journal ref: International Journal of Information Processing, 7(2), 59-68, 2013

  43. arXiv:1306.6839  [pdf

    cs.CR

    W3-Scrape - A Windows based Reconnaissance Tool for Web Application Fingerprinting

    Authors: Karthik R, Raghavendra Karthik, Pramod S, Sowmya Kamath

    Abstract: Web Application finger printing is a quintessential part of the Information Gathering phase of (ethical) hacking. It allows narrowing down the specifics instead of looking for all clues. Also an application that has been correctly recognized can help in quickly analyzing known weaknesses and then moving ahead with remaining aspects. This step is also essential to allow a pen tester to customize it… ▽ More

    Submitted 24 June, 2013; originally announced June 2013.

    Comments: International Conference on Emerging Trends in Electrical, Communication and Information Technologies (ICECIT 2012), 6 pages; Organised by SRIT, Ananthpur, India during Dec 21 - 23, 2012. (Publisher - Elsevier Science & Technology; ISBN 8131234118, 9788131234112)

    ACM Class: D.4.6; E.3

  44. arXiv:1303.5867  [pdf

    cs.IR cs.DB

    Similarity based Dynamic Web Data Extraction and Integration System from Search Engine Result Pages for Web Content Mining

    Authors: Srikantaiah K C, Suraj M, Venugopal K R, L M Patnaik

    Abstract: There is an explosive growth of information in the World Wide Web thus posing a challenge to Web users to extract essential knowledge from the Web. Search engines help us to narrow down the search in the form of Search Engine Result Pages (SERP). Web Content Mining is one of the techniques that help users to extract useful information from these SERPs. In this paper, we propose two similarity base… ▽ More

    Submitted 23 March, 2013; originally announced March 2013.

    Comments: 8 pages

    Journal ref: ACEEE International Journal on Information Technology, Volume 3, Issue 1, 2013

  45. arXiv:1303.0445  [pdf

    cs.IR cs.CL

    Detecting and resolving spatial ambiguity in text using named entity extraction and self learning fuzzy logic techniques

    Authors: Kanagavalli V R, Raja. K

    Abstract: Information extraction identifies useful and relevant text in a document and converts unstructured text into a form that can be loaded into a database table. Named entity extraction is a main task in the process of information extraction and is a classification problem in which words are assigned to one or more semantic classes or to a default non-entity class. A word which can belong to one or mo… ▽ More

    Submitted 2 March, 2013; originally announced March 2013.

    Comments: National Conference on Recent Trends in Data Mining and Distributed Systems September 2011

    Report number: ISBN 978-81-909042-5-4 P.no.71-76

  46. arXiv:1302.6340  [pdf

    cs.IR

    A Fuzzy Logic based Method for Efficient Retrieval of Vague and Uncertain Spatial Expressions in Text Exploiting the Granulation of the Spatial Event Queries

    Authors: Kanagavalli. V. R, Raja. K

    Abstract: The arrangement of things in n-dimensional space is specified as Spatial. Spatial data consists of values that denote the location and shape of objects and areas on the earths surface. Spatial information includes facts such as location of features, the relationship of geographic features and measurements of geographic features. The spatial cognition is a primal area of study in various other fiel… ▽ More

    Submitted 26 February, 2013; originally announced February 2013.

    Comments: National Conference on Future Computing,0975 8887,IJCA,February2013

  47. arXiv:1208.1448  [pdf, other

    cs.IR cs.SI

    The Best Answers? Think Twice: Online Detection of Commercial Campaigns in the CQA Forums

    Authors: Cheng Chen, Kui Wu, Venkatesh Srinivasan, Kesav Bharadwaj R

    Abstract: In an emerging trend, more and more Internet users search for information from Community Question and Answer (CQA) websites, as interactive communication in such websites provides users with a rare feeling of trust. More often than not, end users look for instant help when they browse the CQA websites for the best answers. Hence, it is imperative that they should be warned of any potential commerc… ▽ More

    Submitted 5 January, 2013; v1 submitted 7 August, 2012; originally announced August 2012.

    Comments: 9 pages, 10 figures

  48. arXiv:1106.3517  [pdf

    cs.CV

    DWT Based Fingerprint Recognition using Non Minutiae Features

    Authors: Shashi Kumar D. R., K. B. Raja, R. K. Chhootaray, Sabyasachi Pattanaik

    Abstract: Forensic applications like criminal investigations, terrorist identification and National security issues require a strong fingerprint data base and efficient identification system. In this paper we propose DWT based Fingerprint Recognition using Non Minutiae (DWTFR) algorithm. Fingerprint image is decomposed into multi resolution sub bands of LL, LH, HL and HH by applying 3 level DWT. The Dominan… ▽ More

    Submitted 17 June, 2011; originally announced June 2011.

    Comments: 9 pages

    Journal ref: IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 2, March 2011, 257-265

  49. arXiv:1011.5326  [pdf, other

    cs.NI

    Energy Efficient Clustering and Routing in Mobile Wireless Sensor Network

    Authors: Getsy S. Sara, Kalaiarasi. R, Neelavathy Pari. S, Sridharan . D

    Abstract: A critical need in Mobile Wireless Sensor Network (MWSN) is to achieve energy efficiency during routing as the sensor nodes have scarce energy resource. The nodes' mobility in MWSN poses a challenge to design an energy efficient routing protocol. Clustering helps to achieve energy efficiency by reducing the organization complexity overhead of the network which is proportional to the number of node… ▽ More

    Submitted 24 November, 2010; originally announced November 2010.

    Comments: 9 pages, 4 figures

  50. arXiv:1002.3015  [pdf, other

    cs.SE

    GPRS Based Intranet Remote Administration GIRA

    Authors: Shashi Kumar N. R., R. Selvarani, Pushpavathi T. P

    Abstract: In a world of increasing mobility, there is a growing need for people to communicate with each other and have timely access to information regardless of the location of the individuals or the information. With the advent of moblle technology, the way of communication has changed. The gira system is basically a mobile phone technology service. In this paper we discuss about a novel local area net… ▽ More

    Submitted 16 February, 2010; originally announced February 2010.

    Comments: 4 pages, 2 figures

    Journal ref: Journal of Research and Industry, Volume 1, pp 36-39, 2008