Skip to main content

Showing 1–50 of 50 results for author: R, V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2405.17059  [pdf

    cs.LG

    Comparative Study of Machine Learning Algorithms in Detecting Cardiovascular Diseases

    Authors: Dayana K, S. Nandini, Sanjjushri Varshini R

    Abstract: The detection of cardiovascular diseases (CVD) using machine learning techniques represents a significant advancement in medical diagnostics, aiming to enhance early detection, accuracy, and efficiency. This study explores a comparative analysis of various machine learning algorithms, including Logistic Regression, Decision Tree, Random Forest, Gradient Boosting, Support Vector Machine (SVM), K-Ne… ▽ More

    Submitted 27 May, 2024; originally announced May 2024.

  2. arXiv:2404.10678  [pdf

    cs.SE cs.LG

    Automating REST API Postman Test Cases Using LLM

    Authors: S Deepika Sri, Mohammed Aadil S, Sanjjushri Varshini R, Raja CSP Raman, Gopinath Rajagopal, S Taranath Chan

    Abstract: In the contemporary landscape of technological advancements, the automation of manual processes is crucial, compelling the demand for huge datasets to effectively train and test machines. This research paper is dedicated to the exploration and implementation of an automated approach to generate test cases specifically using Large Language Models. The methodology integrates the use of Open AI to en… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

  3. arXiv:2401.11771  [pdf

    eess.AS cs.SD

    Empowering Communication: Speech Technology for Indian and Western Accents through AI-powered Speech Synthesis

    Authors: Vinotha R, Hepsiba D, L. D. Vijay Anand, Deepak John Reji

    Abstract: Neural Text-to-speech (TTS) synthesis is a powerful technology that can generate speech using neural networks. One of the most remarkable features of TTS synthesis is its capability to produce speech in the voice of different speakers. This paper introduces voice cloning and speech synthesis https://pypi.org/project/voice-cloning/ an open-source python package for hel** speech disorders to commu… ▽ More

    Submitted 16 February, 2024; v1 submitted 22 January, 2024; originally announced January 2024.

  4. arXiv:2312.04275  [pdf

    cs.LG cs.CY

    Estimating Countries with Similar Maternal Mortality Rate using Cluster Analysis and Pairing Countries with Identical MMR

    Authors: S. Nandini, Sanjjushri Varshini R

    Abstract: In the evolving world, we require more additionally the young era to flourish and evolve into developed land. Most of the population all around the world are unaware of the complications involved in the routine they follow while they are pregnant and how hospital facilities affect maternal health. Maternal Mortality is the death of a pregnant woman due to intricacies correlated to pregnancy, under… ▽ More

    Submitted 7 December, 2023; originally announced December 2023.

    Comments: 14 pages, 6 figures

  5. arXiv:2310.02759  [pdf

    cs.LG cs.CL

    Comparative Study and Framework for Automated Summariser Evaluation: LangChain and Hybrid Algorithms

    Authors: Bagiya Lakshmi S, Sanjjushri Varshini R, Rohith Mahadevan, Raja CSP Raman

    Abstract: Automated Essay Score (AES) is proven to be one of the cutting-edge technologies. Scoring techniques are used for various purposes. Reliable scores are calculated based on influential variables. Such variables can be computed by different methods based on the domain. The research is concentrated on the user's understanding of a given topic. The analysis is based on a scoring index by using Large L… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

  6. arXiv:2309.16654  [pdf, other

    cs.CV

    Novel Deep Learning Pipeline for Automatic Weapon Detection

    Authors: Haribharathi Sivakumar, Vijay Arvind. R, Pawan Ragavendhar V, G. Balamurugan

    Abstract: Weapon and gun violence have recently become a pressing issue today. The degree of these crimes and activities has risen to the point of being termed as an epidemic. This prevalent misuse of weapons calls for an automatic system that detects weapons in real-time. Real-time surveillance video is captured and recorded in almost all public forums and places. These videos contain abundant raw data whi… ▽ More

    Submitted 28 September, 2023; originally announced September 2023.

    Comments: Accepted for presentation at the IEEE 2nd International Conference on Automation, Robotics and Computer Engineering

  7. arXiv:2309.09191  [pdf, other

    cs.LG q-bio.BM

    End-to-End Optimized Pipeline for Prediction of Protein Folding Kinetics

    Authors: Vijay Arvind. R, Haribharathi Sivakumar, Brindha. R

    Abstract: Protein folding is the intricate process by which a linear sequence of amino acids self-assembles into a unique three-dimensional structure. Protein folding kinetics is the study of pathways and time-dependent mechanisms a protein undergoes when it folds. Understanding protein kinetics is essential as a protein needs to fold correctly for it to perform its biological functions optimally, and a mis… ▽ More

    Submitted 17 September, 2023; originally announced September 2023.

    Comments: Accepted for presentation at the 22nd International Conference on Machine Learning and Applications

  8. arXiv:2309.09175   

    cs.LG cs.AI

    Imbalanced Data Stream Classification using Dynamic Ensemble Selection

    Authors: Priya. S, Haribharathi Sivakumar, Vijay Arvind. R

    Abstract: Modern streaming data categorization faces significant challenges from concept drift and class imbalanced data. This negatively impacts the output of the classifier, leading to improper classification. Furthermore, other factors such as the overlap** of multiple classes limit the extent of the correctness of the output. This work proposes a novel framework for integrating data pre-processing and… ▽ More

    Submitted 28 September, 2023; v1 submitted 17 September, 2023; originally announced September 2023.

    Comments: Made an error in the research and need to rectify it

  9. arXiv:2308.03842  [pdf, other

    cs.LG cs.IR

    Search Engine and Recommendation System for the Music Industry built with **aAI

    Authors: Ishita Gopalakrishnan, Sanjjushri Varshini R, Ponshriharini V

    Abstract: One of the most intriguing debates regarding a novel task is the development of search engines and recommendation-based systems in the music industry. Studies have shown a drastic depression in the search engine fields, due to concerning factors such as speed, accuracy and the format of data given for querying. Often people face difficulty in searching for a song solely based on the title, hence a… ▽ More

    Submitted 7 August, 2023; originally announced August 2023.

  10. arXiv:2307.08048  [pdf

    eess.IV cs.CV

    A Novel SLCA-UNet Architecture for Automatic MRI Brain Tumor Segmentation

    Authors: Tejashwini P S, Thriveni J, Venugopal K R

    Abstract: Brain tumor is deliberated as one of the severe health complications which lead to decrease in life expectancy of the individuals and is also considered as a prominent cause of mortality worldwide. Therefore, timely detection and prediction of brain tumors can be helpful to prevent death rates due to brain tumors. Biomedical image analysis is a widely known solution to diagnose brain tumor. Althou… ▽ More

    Submitted 16 July, 2023; originally announced July 2023.

  11. arXiv:2106.15917  [pdf, other

    econ.GN cs.CY

    Explaining Caste-based Digital Divide in India

    Authors: R Vaidehi, A Bheemeshwar Reddy, Sudatta Banerjee

    Abstract: With the increasing importance of information and communication technologies in access to basic services like education and health, the question of the digital divide based on caste assumes importance in India where large socioeconomic disparities persist between different caste groups. Studies on caste-based digital inequality are still scanty in India. Using nationally representative survey data… ▽ More

    Submitted 30 June, 2021; originally announced June 2021.

  12. arXiv:2103.05437  [pdf, other

    cs.CV

    The MICCAI Hackathon on reproducibility, diversity, and selection of papers at the MICCAI conference

    Authors: Fabian Balsiger, Alain Jungo, Naren Akash R J, Jianan Chen, Ivan Ezhov, Shengnan Liu, Jun Ma, Johannes C. Paetzold, Vishva Saravanan R, Anjany Sekuboyina, Suprosanna Shit, Yannick Suter, Moshood Yekini, Guodong Zeng, Markus Rempfler

    Abstract: The MICCAI conference has encountered tremendous growth over the last years in terms of the size of the community, as well as the number of contributions and their technical success. With this growth, however, come new challenges for the community. Methods are more difficult to reproduce and the ever-increasing number of paper submissions to the MICCAI conference poses new questions regarding the… ▽ More

    Submitted 28 April, 2021; v1 submitted 4 March, 2021; originally announced March 2021.

    Comments: Revision of discussion; update e-mail address of one author

  13. arXiv:2101.00875  [pdf

    cs.RO physics.app-ph

    Design and Development of Robots End Effector Test Rig

    Authors: Josephine Selvarani Ruth D, Saniya Zeba, Vibha M R, Rokesh Laishram, Gauthama Anand

    Abstract: A Test Rig for end-effectors of a robot is designed such that it achieves a prismatic motion in x-y-z axes for gras** an object. It is a structure, designed with a compact combination of sensors and actuators. Sensors are used for detecting presence, position and disturbance of target work piece or any object and actuators with motor driving system meant for controlling and moving the mechanism… ▽ More

    Submitted 4 January, 2021; originally announced January 2021.

  14. arXiv:2012.00866  [pdf, other

    cs.DS

    Huskysort

    Authors: R. C. Hillyard, Yunlu Liaozheng, Sai Vineeth K. R

    Abstract: Much of the copious literature on the subject of sorting has concentrated on minimizing the number of comparisons and/or exchanges/copies. However, a more appropriate yardstick for the performance of sorting algorithms is based on the total number of array accesses that are required (the "work"). For a sort that is based on divide-and-conquer (including iterative variations on that theme), we can… ▽ More

    Submitted 1 December, 2020; originally announced December 2020.

    Comments: 9 pages, Github repo for the algorithm included

  15. arXiv:2011.13556  [pdf, other

    cs.NI cs.IR

    Eco-Routing Using Open Street Maps

    Authors: R K Ghosh, Vinay R, Arnab Bhattacharyya

    Abstract: A vehicle's fuel consumption depends on its type, the speed, the condition, and the gradients of the road on which it is moving. We developed a Routing Engine for finding an eco-route (one with low fuel consumption) between a source and a destination. Open Street Maps has data on road conditions. We used CGIAR-CSI road elevation data 16[4] to integrate the road gradients into the proposed route-fi… ▽ More

    Submitted 26 November, 2020; originally announced November 2020.

    Comments: 16 pages, 17 figures, 41 references

  16. arXiv:2006.13843  [pdf, other

    cs.AI cs.LG

    Turbocharging Treewidth-Bounded Bayesian Network Structure Learning

    Authors: Vaidyanathan P. R., Stefan Szeider

    Abstract: We present a new approach for learning the structure of a treewidth-bounded Bayesian Network (BN). The key to our approach is applying an exact method (based on MaxSAT) locally, to improve the score of a heuristically computed BN. This approach allows us to scale the power of exact methods -- so far only applicable to BNs with several dozens of random variables -- to large BNs with several thousan… ▽ More

    Submitted 5 February, 2021; v1 submitted 24 June, 2020; originally announced June 2020.

    Comments: 15 pages, 4 figures, 3 tables. To be published in AAAI 2021. Updated: synced with AAAI version. Source code available at http://github.com/aditya95sriram/bn-slim

    ACM Class: I.2.6

  17. arXiv:2004.10174  [pdf

    eess.SY cs.CY

    Internet of Things(IoT) Based Multilevel Drunken Driving Detection and Prevention System Using Raspberry Pi 3

    Authors: Viswanatha V, Venkata Siva Reddy R, Ashwini Kumari P, Pradeep Kumar S

    Abstract: In this paper, the proposed system has demonstrated three ways of detecting alcohol level in the body of the car driver and prevent car driver from driving the vehicle by turning off the ignition system. It also sends messages to concerned people. In order to detect breath alcohol level MQ-3 sensor is included in this module along with a heartbeat sensor which can detect the heart beat rate of dri… ▽ More

    Submitted 21 April, 2020; originally announced April 2020.

  18. arXiv:2004.08103  [pdf, other

    eess.SP cs.LG

    RPnet: A Deep Learning approach for robust R Peak detection in noisy ECG

    Authors: Sricharan Vijayarangan, Vignesh R, Balamurali Murugesan, Preejith SP, Jayaraj Joseph, Mohansankar Sivaprakasam

    Abstract: Automatic detection of R-peaks in an Electrocardiogram signal is crucial in a multitude of applications including Heart Rate Variability (HRV) analysis and Cardio Vascular Disease(CVD) diagnosis. Although there have been numerous approaches that have successfully addressed the problem, there has been a notable dip in the performance of these existing detectors on ECG episodes that contain noise an… ▽ More

    Submitted 17 April, 2020; originally announced April 2020.

    Comments: Accepted in EMBC 2020

  19. arXiv:2004.05399  [pdf, other

    eess.SP cs.LG

    Interpreting Deep Neural Networks for Single-Lead ECG Arrhythmia Classification

    Authors: Sricharan Vijayarangan, Balamurali Murugesan, Vignesh R, Preejith SP, Jayaraj Joseph, Mohansankar Sivaprakasam

    Abstract: Cardiac arrhythmia is a prevalent and significant cause of morbidity and mortality among cardiac ailments. Early diagnosis is crucial in providing intervention for patients suffering from cardiac arrhythmia. Traditionally, diagnosis is performed by examination of the Electrocardiogram (ECG) by a cardiologist. This method of diagnosis is hampered by the lack of accessibility to expert cardiologists… ▽ More

    Submitted 11 April, 2020; originally announced April 2020.

    Comments: Accepted in EMBC 2020(EMBS)

  20. arXiv:2004.00503  [pdf, other

    cs.CL cs.CR cs.LG cs.NE cs.SI

    Deep Learning Approach for Enhanced Cyber Threat Indicators in Twitter Stream

    Authors: Simran K, Prathiksha Balakrishna, Vinayakumar R, Soman KP

    Abstract: In recent days, the amount of Cyber Security text data shared via social media resources mainly Twitter has increased. An accurate analysis of this data can help to develop cyber threat situational awareness framework for a cyber threat. This work proposes a deep learning based approach for tweet data analysis. To convert the tweets into numerical representations, various text representations are… ▽ More

    Submitted 30 March, 2020; originally announced April 2020.

    Comments: 11 pages

  21. arXiv:2004.00502  [pdf, other

    cs.CL cs.CR cs.LG cs.NE

    Deep Learning Approach for Intelligent Named Entity Recognition of Cyber Security

    Authors: Simran K, Sriram S, Vinayakumar R, Soman KP

    Abstract: In recent years, the amount of Cyber Security data generated in the form of unstructured texts, for example, social media resources, blogs, articles, and so on has exceptionally increased. Named Entity Recognition (NER) is an initial step towards converting this unstructured data into structured data which can be used by a lot of applications. The existing methods on NER for Cyber Security data ar… ▽ More

    Submitted 30 March, 2020; originally announced April 2020.

    Comments: 10 pages

  22. arXiv:1910.12206  [pdf, other

    cs.CV eess.IV

    Segmenting Ships in Satellite Imagery With Squeeze and Excitation U-Net

    Authors: Venkatesh R, Anand Metha

    Abstract: The ship-detection task in satellite imagery presents significant obstacles to even the most state of the art segmentation models due to lack of labelled dataset or approaches which are not able to generalize to unseen images. The most common methods for semantic segmentation involve complex two-stage networks or networks which make use of a multi-scale scene parsing module. In this paper, we prop… ▽ More

    Submitted 27 October, 2019; originally announced October 2019.

  23. arXiv:1910.01114  [pdf

    cs.CR cs.LG cs.NI

    Intrusion detection systems using classical machine learning techniques versus integrated unsupervised feature learning and deep neural network

    Authors: Shisrut Rawat, Aishwarya Srinivasan, Vinayakumar R

    Abstract: Security analysts and administrators face a lot of challenges to detect and prevent network intrusions in their organizations, and to prevent network breaches, detecting the breach on time is crucial. Challenges arise while detecting unforeseen attacks. This work includes a performance comparison of classical machine learning approaches that require vast feature engineering, versus integrated unsu… ▽ More

    Submitted 1 October, 2019; originally announced October 2019.

    Comments: 9 pages

  24. arXiv:1909.10471  [pdf, ps, other

    cs.IT

    Subpacketization in Coded Caching with Demand Privacy

    Authors: Aravind V R, Pradeep Sarvepalli, Andrew Thangaraj

    Abstract: Coded caching is a technique where we utilize multi-casting opportunities to reduce rate in cached networks. One limitation of coded caching schemes is that they reveal the demands of all users to their peers. In this work, we consider coded caching schemes that assure privacy for user demands with a particular focus on reducing subpacketization. For the 2-user, 2-file case, we present a new linea… ▽ More

    Submitted 23 September, 2019; originally announced September 2019.

    Comments: 13 pages, 5 figures

  25. arXiv:1906.08771  [pdf, other

    cs.LG stat.ML

    Submodular Batch Selection for Training Deep Neural Networks

    Authors: K J Joseph, Vamshi Teja R, Krishnakant Singh, Vineeth N Balasubramanian

    Abstract: Mini-batch gradient descent based methods are the de facto algorithms for training neural network architectures today. We introduce a mini-batch selection strategy based on submodular function maximization. Our novel submodular formulation captures the informativeness of each sample and diversity of the whole subset. We design an efficient, greedy algorithm which can give high-quality solutions to… ▽ More

    Submitted 20 June, 2019; originally announced June 2019.

    Comments: IJCAI 2019

  26. RNNSecureNet: Recurrent neural networks for Cyber security use-cases

    Authors: Mohammed Harun Babu R, Vinayakumar R, Soman KP

    Abstract: Recurrent neural network (RNN) is an effective neural network in solving very complex supervised and unsupervised tasks. There has been a significant improvement in RNN field such as natural language processing, speech processing, computer vision and other multiple domains. This paper deals with RNN application on different use cases like Incident Detection, Fraud Detection, and Android Malware Cl… ▽ More

    Submitted 5 January, 2019; originally announced January 2019.

    Comments: 12 pages. arXiv admin note: text overlap with arXiv:1812.03519

  27. arXiv:1901.03141  [pdf

    cs.CL cs.LG

    Emotion Detection using Data Driven Models

    Authors: Naveenkumar K S, Vinayakumar R, Soman KP

    Abstract: Text is the major method that is used for communication now a days, each and every day lots of text are created. In this paper the text data is used for the classification of the emotions. Emotions are the way of expression of the persons feelings which has an high influence on the decision making tasks. Datasets are collected which are available publically and combined together based on the three… ▽ More

    Submitted 10 January, 2019; originally announced January 2019.

    Comments: 11 pages

  28. arXiv:1901.02033  [pdf, ps, other

    cs.IT

    The Effect of Introducing Redundancy in a Probabilistic Forwarding Protocol

    Authors: Vinay Kumar B. R., Roshan Antony, Navin Kashyap

    Abstract: This paper is concerned with the problem of broadcasting information from a source node to every node in an ad-hoc network. Flooding, as a broadcast mechanism, involves each node forwarding any packet it receives to all its neighbours. This results in excessive transmissions and thus a high energy expenditure overall. Probabilistic forwarding or gossi** involves each node forwarding a received p… ▽ More

    Submitted 10 January, 2019; v1 submitted 7 January, 2019; originally announced January 2019.

    Comments: Appears in the Proceedings of the 2018 National Conference on Communications (NCC 2018)

  29. arXiv:1901.00297  [pdf

    cs.CL

    A Deep Learning Approach for Similar Languages, Varieties and Dialects

    Authors: Vidya Prasad K, Akarsh S, Vinayakumar R, Soman KP

    Abstract: Deep learning mechanisms are prevailing approaches in recent days for the various tasks in natural language processing, speech recognition, image processing and many others. To leverage this we use deep learning based mechanism specifically Bidirectional- Long Short-Term Memory (B-LSTM) for the task of dialectic identification in Arabic and German broadcast speech and Long Short-Term Memory (LSTM)… ▽ More

    Submitted 2 January, 2019; originally announced January 2019.

    Comments: 17 pages

  30. arXiv:1812.06292  [pdf

    cs.CR cs.AI cs.LG

    A short review on Applications of Deep learning for Cyber security

    Authors: Mohammed Harun Babu R, Vinayakumar R, Soman KP

    Abstract: Deep learning is an advanced model of traditional machine learning. This has the capability to extract optimal feature representation from raw input samples. This has been applied towards various use cases in cyber security such as intrusion detection, malware classification, android malware detection, spam and phishing detection and binary analysis. This paper outlines the survey of all the works… ▽ More

    Submitted 29 January, 2019; v1 submitted 15 December, 2018; originally announced December 2018.

    Comments: 15 pages

  31. arXiv:1812.03519  [pdf

    cs.LG cs.CL cs.CR

    Deep-Net: Deep Neural Network for Cyber Security Use Cases

    Authors: Vinayakumar R, Barathi Ganesh HB, Prabaharan Poornachandran, Anand Kumar M, Soman KP

    Abstract: Deep neural networks (DNNs) have witnessed as a powerful approach in this year by solving long-standing Artificial intelligence (AI) supervised and unsupervised tasks exists in natural language processing, speech processing, computer vision and others. In this paper, we attempt to apply DNNs on three different cyber security use cases: Android malware classification, incident detection and fraud d… ▽ More

    Submitted 9 December, 2018; originally announced December 2018.

    MSC Class: 68T50

  32. arXiv:1810.04144  [pdf, other

    cs.HC cs.CV cs.RO

    A Brief Survey on Autonomous Vehicle Possible Attacks, Exploits and Vulnerabilities

    Authors: Amara Dinesh Kumar, Koti Naga Renu Chebrolu, Vinayakumar R, Soman KP

    Abstract: Advanced driver assistance systems are advancing at a rapid pace and all major companies started investing in develo** the autonomous vehicles. But the security and reliability is still uncertain and debatable. Imagine that a vehicle is compromised by the attackers and then what they can do. An attacker can control brake, accelerate and even steering which can lead to catastrophic consequences.… ▽ More

    Submitted 3 October, 2018; originally announced October 2018.

    Comments: 5 Pages,1 Figure

  33. arXiv:1810.03977  [pdf, other

    cs.CV cs.CR

    DeepImageSpam: Deep Learning based Image Spam Detection

    Authors: Amara Dinesh Kumar, Vinayakumar R, Soman KP

    Abstract: Hackers and spammers are employing innovative and novel techniques to deceive novice and even knowledgeable internet users. Image spam is one of such technique where the spammer varies and changes some portion of the image such that it is indistinguishable from the original image fooling the users. This paper proposes a deep learning based approach for image spam detection using the convolutional… ▽ More

    Submitted 3 October, 2018; originally announced October 2018.

    Comments: 4 pages

  34. arXiv:1809.04461  [pdf

    q-bio.QM cs.LG cs.NE stat.ML

    DeepProteomics: Protein family classification using Shallow and Deep Networks

    Authors: Anu Vazhayil, Vinayakumar R, Soman KP

    Abstract: The knowledge regarding the function of proteins is necessary as it gives a clear picture of biological processes. Nevertheless, there are many protein sequences found and added to the databases but lacks functional annotation. The laboratory experiments take a considerable amount of time for annotation of the sequences. This arises the need to use computational techniques to classify proteins bas… ▽ More

    Submitted 11 September, 2018; originally announced September 2018.

  35. arXiv:1802.06185  [pdf, other

    cs.CL cs.IR

    Building a Word Segmenter for Sanskrit Overnight

    Authors: Vikas Reddy, Amrith Krishna, Vishnu Dutt Sharma, Prateek Gupta, Vineeth M R, Pawan Goyal

    Abstract: There is an abundance of digitised texts available in Sanskrit. However, the word segmentation task in such texts are challenging due to the issue of 'Sandhi'. In Sandhi, words in a sentence often fuse together to form a single chunk of text, where the word delimiter vanishes and sounds at the word boundaries undergo transformations, which is also reflected in the written text. Here, we propose an… ▽ More

    Submitted 16 February, 2018; originally announced February 2018.

    Comments: The work is accepted at LREC 2018, Miyazaki, Japan

  36. arXiv:1711.00231  [pdf, other

    cs.DC

    Dynamic Load Balancing Strategies for Graph Applications on GPUs

    Authors: Ananya Raval, Rupesh Nasre, Vivek Kumar, Vasudevan R, Sathish Vadhiyar, Keshav **ali

    Abstract: Acceleration of graph applications on GPUs has found large interest due to the ubiquitous use of graph processing in various domains. The inherent \textit{irregularity} in graph applications leads to several challenges for parallelization. A key challenge, which we address in this paper, is that of load-imbalance. If the work-assignment to threads uses node-based graph partitioning, it can result… ▽ More

    Submitted 1 November, 2017; originally announced November 2017.

  37. arXiv:1710.08396  [pdf, ps, other

    cs.CL cs.AI

    Deep Health Care Text Classification

    Authors: Vinayakumar R, Barathi Ganesh HB, Anand Kumar M, Soman KP

    Abstract: Health related social media mining is a valuable apparatus for the early recognition of the diverse antagonistic medicinal conditions. Mostly, the existing methods are based on machine learning with knowledge-based learning. This working note presents the Recurrent neural network (RNN) and Long short-term memory (LSTM) based embedding for automatic health text classification in the social media mi… ▽ More

    Submitted 23 October, 2017; originally announced October 2017.

    Comments: 4 pages

    MSC Class: 68T50

  38. Multi Model Data mining approach for Heart failure prediction

    Authors: Priyanka H U, Vivek R

    Abstract: Develo** predictive modelling solutions for risk estimation is extremely challenging in health-care informatics. Risk estimation involves integration of heterogeneous clinical sources having different representation from different health-care provider making the task increasingly complex. Such sources are typically voluminous, diverse, and significantly change over the time. Therefore, distribut… ▽ More

    Submitted 28 September, 2016; originally announced September 2016.

  39. arXiv:1607.08764  [pdf, other

    cs.CV

    SwiDeN : Convolutional Neural Networks For Depiction Invariant Object Recognition

    Authors: Ravi Kiran Sarvadevabhatla, Shiv Surya, Srinivas S S Kruthiventi, Venkatesh Babu R

    Abstract: Current state of the art object recognition architectures achieve impressive performance but are typically specialized for a single depictive style (e.g. photos only, sketches only). In this paper, we present SwiDeN : our Convolutional Neural Network (CNN) architecture which recognizes objects regardless of how they are visually depicted (line drawing, realistic shaded drawing, photograph etc.). I… ▽ More

    Submitted 29 July, 2016; originally announced July 2016.

    Comments: Accepted at ACMMM 2016. The first two authors contributed equally. Code and models at https://github.com/val-iisc/swiden

  40. arXiv:1605.08857  [pdf

    cs.CV

    Video Key Frame Extraction using Entropy value as Global and Local Feature

    Authors: Siddu P Algur, Vivek R

    Abstract: Key frames play an important role in video annotation. It is one of the widely used methods for video abstraction as this will help us for processing a large set of video data with sufficient content representation in faster way. In this paper a novel approach for key-frame extraction using entropy value is proposed. The proposed approach classifies frames based on entropy values as global feature… ▽ More

    Submitted 28 May, 2016; originally announced May 2016.

    Comments: Key Frame Extraction, Entropy value

  41. arXiv:1605.08856  [pdf

    cs.CV

    A Channelized Binning Method for Extraction of Dominant Color Pixel Value

    Authors: Siddu P Algur, N H Ayachit, Vivek R

    Abstract: The Color is one of the most important and easily identifiable features for describing the visual content. The MPEG standard has developed a number of descriptors that covers different aspects of the visual content. The Dominant color descriptor is one of them. This paper proposes a channelized binning approach a novel method for extraction of the dominant color pixel value which is a variant of t… ▽ More

    Submitted 28 May, 2016; originally announced May 2016.

  42. arXiv:1509.04399  [pdf, other

    cs.CV

    Analyzing structural characteristics of object category representations from their semantic-part distributions

    Authors: Ravi Kiran Sarvadevabhatla, Venkatesh Babu R

    Abstract: Studies from neuroscience show that part-map** computations are employed by human visual system in the process of object recognition. In this work, we present an approach for analyzing semantic-part characteristics of object category representations. For our experiments, we use category-epitome, a recently proposed sketch-based spatial representation for objects. To enable part-importance analys… ▽ More

    Submitted 15 September, 2015; originally announced September 2015.

  43. arXiv:1509.02876  [pdf

    cs.RO

    Low Cost Swarm Based Diligent Cargo Transit System

    Authors: Harish Karunakaran, Varadhan R, Anurag R M, Harmanpreet S

    Abstract: The goal of this paper is to present the design and development of a low cost cargo transit system which can be adapted in develo** countries like India where there is abundant and cheap human labour which makes the process of automation in any industry a challenge to innovators. The need of the hour is an automation system that can diligently transfer cargo from one place to another and minimiz… ▽ More

    Submitted 3 April, 2023; v1 submitted 9 September, 2015; originally announced September 2015.

    Comments: 6 pages, 9 figures, 1 block diagram

  44. arXiv:1407.2082  [pdf

    cs.AR

    FPGA Based Efficient Multiplier for Image Processing Applications Using Recursive Error Free Mitchell Log Multiplier and KOM Architecture

    Authors: Satish S Bhairannawar, Rathan R, Raja K B, Venugopal K R, L M Patnaik

    Abstract: The Digital Image processing applications like medical imaging, satellite imaging, Biometric trait images etc., rely on multipliers to improve the quality of image. However, existing multiplication techniques introduce errors in the output with consumption of more time, hence error free high speed multipliers has to be designed. In this paper we propose FPGA based Recursive Error Free Mitchell Log… ▽ More

    Submitted 8 July, 2014; originally announced July 2014.

  45. QoS group based optimal retransmission medium access protocol for wireless sensor networks

    Authors: Kumaraswamy M, Shaila K, Tejaswi V, Venugopal K R, S S Iyengar, L M Patnaik

    Abstract: This paper presents, a Group Based Optimal Retransmission Medium Access (GORMA) Protocol is designed that combines protocol of Collision Avoidance (CA) and energy management for low-cost, short-range, low-data rate and low-energy sensor nodes applications in environment monitoring, agriculture, industrial plants etc. In this paper, the GORMA protocol focuses on efficient MAC protocol to provide au… ▽ More

    Submitted 11 April, 2014; originally announced April 2014.

    Comments: 9 pages in IEEE format and 6 figures

    Journal ref: IJCNC, Vol.6, No.2, March 2014

  46. arXiv:1309.5601  [pdf, ps, other

    cs.CR cs.NI

    Multiple Domain Secure Routing for Wireless Sensor Networks

    Authors: Lata B T, Jansi P K R, Shaila K, D N Sujatha, Venugopal K R, L M Patnaik

    Abstract: Secure Transmission of data packets in Wireless Sensor Networks is an important area of Research. There is a possibility of an attacker creating security holes in the network. Hence, network security and reliability can be achieved by discovering random multiple paths using multiple domains, and forwarding data packets from the source node to the destination node. We have designed, Multiple Domain… ▽ More

    Submitted 22 September, 2013; originally announced September 2013.

    Comments: 10 pages

    Journal ref: International Journal of Information Processing, 7(2), 59-68, 2013

  47. arXiv:1303.5867  [pdf

    cs.IR cs.DB

    Similarity based Dynamic Web Data Extraction and Integration System from Search Engine Result Pages for Web Content Mining

    Authors: Srikantaiah K C, Suraj M, Venugopal K R, L M Patnaik

    Abstract: There is an explosive growth of information in the World Wide Web thus posing a challenge to Web users to extract essential knowledge from the Web. Search engines help us to narrow down the search in the form of Search Engine Result Pages (SERP). Web Content Mining is one of the techniques that help users to extract useful information from these SERPs. In this paper, we propose two similarity base… ▽ More

    Submitted 23 March, 2013; originally announced March 2013.

    Comments: 8 pages

    Journal ref: ACEEE International Journal on Information Technology, Volume 3, Issue 1, 2013

  48. arXiv:1303.0445  [pdf

    cs.IR cs.CL

    Detecting and resolving spatial ambiguity in text using named entity extraction and self learning fuzzy logic techniques

    Authors: Kanagavalli V R, Raja. K

    Abstract: Information extraction identifies useful and relevant text in a document and converts unstructured text into a form that can be loaded into a database table. Named entity extraction is a main task in the process of information extraction and is a classification problem in which words are assigned to one or more semantic classes or to a default non-entity class. A word which can belong to one or mo… ▽ More

    Submitted 2 March, 2013; originally announced March 2013.

    Comments: National Conference on Recent Trends in Data Mining and Distributed Systems September 2011

    Report number: ISBN 978-81-909042-5-4 P.no.71-76

  49. arXiv:1302.6340  [pdf

    cs.IR

    A Fuzzy Logic based Method for Efficient Retrieval of Vague and Uncertain Spatial Expressions in Text Exploiting the Granulation of the Spatial Event Queries

    Authors: Kanagavalli. V. R, Raja. K

    Abstract: The arrangement of things in n-dimensional space is specified as Spatial. Spatial data consists of values that denote the location and shape of objects and areas on the earths surface. Spatial information includes facts such as location of features, the relationship of geographic features and measurements of geographic features. The spatial cognition is a primal area of study in various other fiel… ▽ More

    Submitted 26 February, 2013; originally announced February 2013.

    Comments: National Conference on Future Computing,0975 8887,IJCA,February2013

  50. arXiv:1001.4186  [pdf

    cs.CR

    Fingerprint Recognition Using Minutia Score Matching

    Authors: Ravi. J, K. B. Raja, Venugopal. K. R

    Abstract: The popular Biometric used to authenticate a person is Fingerprint which is unique and permanent throughout a person's life. A minutia matching is widely used for fingerprint recognition and can be classified as ridge ending and ridge bifurcation. In this paper we projected Fingerprint Recognition using Minutia Score Matching method (FRMSM). For Fingerprint thinning, the Block Filter is used, wh… ▽ More

    Submitted 23 January, 2010; originally announced January 2010.

    Comments: 8 Pages

    Journal ref: IJEST Volume 1 Issue 2 2009 35-42