Skip to main content

Showing 1–38 of 38 results for author: R., A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.11858  [pdf, other

    cs.CY

    Student Perspectives on Using a Large Language Model (LLM) for an Assignment on Professional Ethics

    Authors: Virginia Grande, Natalie Kiesler, Maria Andreina Francisco R

    Abstract: The advent of Large Language Models (LLMs) started a serious discussion among educators on how LLMs would affect, e.g., curricula, assessments, and students' competencies. Generative AI and LLMs also raised ethical questions and concerns for computing educators and professionals. This experience report presents an assignment within a course on professional competencies, including some related to e… ▽ More

    Submitted 9 April, 2024; originally announced June 2024.

    Comments: accepted at ITiCSE 2024, Milan, Italy

  2. arXiv:2405.03537  [pdf, other

    cs.LG cs.AI

    Exploring the Efficacy of Federated-Continual Learning Nodes with Attention-Based Classifier for Robust Web Phishing Detection: An Empirical Investigation

    Authors: Jesher Joshua M, Adhithya R, Sree Dananjay S, M Revathi

    Abstract: Web phishing poses a dynamic threat, requiring detection systems to quickly adapt to the latest tactics. Traditional approaches of accumulating data and periodically retraining models are outpaced. We propose a novel paradigm combining federated learning and continual learning, enabling distributed nodes to continually update models on streams of new phishing data, without accumulating data. These… ▽ More

    Submitted 16 June, 2024; v1 submitted 6 May, 2024; originally announced May 2024.

  3. arXiv:2404.05765  [pdf

    cs.SD cs.AI eess.AS

    A Novel Bi-LSTM And Transformer Architecture For Generating Tabla Music

    Authors: Roopa Mayya, Vivekanand Venkataraman, Anwesh P R, Narayana Darapaneni

    Abstract: Introduction: Music generation is a complex task that has received significant attention in recent years, and deep learning techniques have shown promising results in this field. Objectives: While extensive work has been carried out on generating Piano and other Western music, there is limited research on generating classical Indian music due to the scarcity of Indian music in machine-encoded form… ▽ More

    Submitted 6 April, 2024; originally announced April 2024.

  4. arXiv:2404.05764  [pdf

    eess.IV cs.CV

    Study of the effect of Sharpness on Blind Video Quality Assessment

    Authors: Anantha Prabhu, David Pratap, Narayana Darapeni, Anwesh P R

    Abstract: Introduction: Video Quality Assessment (VQA) is one of the important areas of study in this modern era, where video is a crucial component of communication with applications in every field. Rapid technology developments in mobile technology enabled anyone to create videos resulting in a varied range of video quality scenarios. Objectives: Though VQA was present for some time with the classical met… ▽ More

    Submitted 6 April, 2024; originally announced April 2024.

  5. arXiv:2403.01926  [pdf, other

    cs.CL

    IndicVoices: Towards building an Inclusive Multilingual Speech Dataset for Indian Languages

    Authors: Tahir Javed, Janki Atul Nawale, Eldho Ittan George, Sakshi Joshi, Kaushal Santosh Bhogale, Deovrat Mehendale, Ishvinder Virender Sethi, Aparna Ananthanarayanan, Hafsah Faquih, Pratiti Palit, Sneha Ravishankar, Saranya Sukumaran, Tripura Panchagnula, Sunjay Murali, Kunal Sharad Gandhi, Ambujavalli R, Manickam K M, C Venkata Vaijayanthi, Krishnan Srinivasa Raghavan Karunganni, Pratyush Kumar, Mitesh M Khapra

    Abstract: We present INDICVOICES, a dataset of natural and spontaneous speech containing a total of 7348 hours of read (9%), extempore (74%) and conversational (17%) audio from 16237 speakers covering 145 Indian districts and 22 languages. Of these 7348 hours, 1639 hours have already been transcribed, with a median of 73 hours per language. Through this paper, we share our journey of capturing the cultural,… ▽ More

    Submitted 4 March, 2024; originally announced March 2024.

  6. arXiv:2403.01186  [pdf

    cs.CR cs.CY

    Evault for legal records

    Authors: Jeba N, Anas S, Anuragav S, Abhishek R, Sachin K

    Abstract: Innovative solution for addressing the challenges in the legal records management system through a blockchain-based eVault platform. Our objective is to create a secure, transparent, and accessible ecosystem that caters to the needs of all stakeholders, including lawyers, judges, clients, and registrars. First and foremost, our solution is built on a robust blockchain platform like Ethereum harnes… ▽ More

    Submitted 8 March, 2024; v1 submitted 2 March, 2024; originally announced March 2024.

    Comments: Blockchain, evault, legal records

  7. arXiv:2403.00887  [pdf, other

    eess.AS cs.AI cs.CL cs.LG cs.SD

    SEGAA: A Unified Approach to Predicting Age, Gender, and Emotion in Speech

    Authors: Aron R, Indra Sigicharla, Chirag Periwal, Mohanaprasad K, Nithya Darisini P S, Sourabh Tiwari, Shivani Arora

    Abstract: The interpretation of human voices holds importance across various applications. This study ventures into predicting age, gender, and emotion from vocal cues, a field with vast applications. Voice analysis tech advancements span domains, from improving customer interactions to enhancing healthcare and retail experiences. Discerning emotions aids mental health, while age and gender detection are vi… ▽ More

    Submitted 1 March, 2024; originally announced March 2024.

  8. arXiv:2402.02811  [pdf, other

    cs.CV q-bio.QM

    Multi-scale fMRI time series analysis for understanding neurodegeneration in MCI

    Authors: Ammu R., Debanjali Bhattacharya, Ameiy Acharya, Ninad Aithal, Neelam Sinha

    Abstract: In this study, we present a technique that spans multi-scale views (global scale -- meaning brain network-level and local scale -- examining each individual ROI that constitutes the network) applied to resting-state fMRI volumes. Deep learning based classification is utilized in understanding neurodegeneration. The novelty of the proposed approach lies in utilizing two extreme scales of analysis.… ▽ More

    Submitted 5 February, 2024; originally announced February 2024.

    Comments: 12 pages, 3 figures and 4 tables

  9. arXiv:2312.05797  [pdf, other

    cs.CV

    Multimodality in Online Education: A Comparative Study

    Authors: Praneeta Immadisetty, Pooja Rajesh, Akshita Gupta, Anala M R, Soumya A, K. N. Subramanya

    Abstract: The commencement of the decade brought along with it a grave pandemic and in response the movement of education forums predominantly into the online world. With a surge in the usage of online video conferencing platforms and tools to better gauge student understanding, there needs to be a mechanism to assess whether instructors can grasp the extent to which students understand the subject and thei… ▽ More

    Submitted 17 December, 2023; v1 submitted 10 December, 2023; originally announced December 2023.

  10. arXiv:2310.06841  [pdf

    cs.CR cs.LG

    Malware Classification using Deep Neural Networks: Performance Evaluation and Applications in Edge Devices

    Authors: Akhil M R, Adithya Krishna V Sharma, Harivardhan Swamy, Pavan A, Ashray Shetty, Anirudh B Sathyanarayana

    Abstract: With the increasing extent of malware attacks in the present day along with the difficulty in detecting modern malware, it is necessary to evaluate the effectiveness and performance of Deep Neural Networks (DNNs) for malware classification. Multiple DNN architectures can be designed and trained to detect and classify malware binaries. Results demonstrate the potential of DNNs in accurately classif… ▽ More

    Submitted 21 August, 2023; originally announced October 2023.

  11. arXiv:2309.16654  [pdf, other

    cs.CV

    Novel Deep Learning Pipeline for Automatic Weapon Detection

    Authors: Haribharathi Sivakumar, Vijay Arvind. R, Pawan Ragavendhar V, G. Balamurugan

    Abstract: Weapon and gun violence have recently become a pressing issue today. The degree of these crimes and activities has risen to the point of being termed as an epidemic. This prevalent misuse of weapons calls for an automatic system that detects weapons in real-time. Real-time surveillance video is captured and recorded in almost all public forums and places. These videos contain abundant raw data whi… ▽ More

    Submitted 28 September, 2023; originally announced September 2023.

    Comments: Accepted for presentation at the IEEE 2nd International Conference on Automation, Robotics and Computer Engineering

  12. arXiv:2309.09191  [pdf, other

    cs.LG q-bio.BM

    End-to-End Optimized Pipeline for Prediction of Protein Folding Kinetics

    Authors: Vijay Arvind. R, Haribharathi Sivakumar, Brindha. R

    Abstract: Protein folding is the intricate process by which a linear sequence of amino acids self-assembles into a unique three-dimensional structure. Protein folding kinetics is the study of pathways and time-dependent mechanisms a protein undergoes when it folds. Understanding protein kinetics is essential as a protein needs to fold correctly for it to perform its biological functions optimally, and a mis… ▽ More

    Submitted 17 September, 2023; originally announced September 2023.

    Comments: Accepted for presentation at the 22nd International Conference on Machine Learning and Applications

  13. arXiv:2309.09175   

    cs.LG cs.AI

    Imbalanced Data Stream Classification using Dynamic Ensemble Selection

    Authors: Priya. S, Haribharathi Sivakumar, Vijay Arvind. R

    Abstract: Modern streaming data categorization faces significant challenges from concept drift and class imbalanced data. This negatively impacts the output of the classifier, leading to improper classification. Furthermore, other factors such as the overlap** of multiple classes limit the extent of the correctness of the output. This work proposes a novel framework for integrating data pre-processing and… ▽ More

    Submitted 28 September, 2023; v1 submitted 17 September, 2023; originally announced September 2023.

    Comments: Made an error in the research and need to rectify it

  14. arXiv:2307.16157  [pdf, other

    cs.RO

    A Simple Robot Selection Criteria After Path Planning Using Wavefront Algorithm

    Authors: Rajashekhar V S, Dhaya C, Dinakar Raj C K, Dharshan P, Mukesh Kumar S, Harish B, Ajith R, Kamaleshwaran K

    Abstract: In this work we present a technique to select the best robot for accomplishing a task assuming that the map of the environment is known in advance. To do so, capabilities of the robots are listed and the environments where they can be used are mapped. There are five robots that included for doing the tasks. They are the robotic lizard, half-humanoid, robotic snake, biped and quadruped. Each of the… ▽ More

    Submitted 30 July, 2023; originally announced July 2023.

    Comments: 8 pages, 4 figures

  15. arXiv:2307.14343  [pdf

    cs.CV cs.AI cs.LG

    Pruning Distorted Images in MNIST Handwritten Digits

    Authors: Amarnath R, Vinay Kumar V

    Abstract: Recognizing handwritten digits is a challenging task primarily due to the diversity of writing styles and the presence of noisy images. The widely used MNIST dataset, which is commonly employed as a benchmark for this task, includes distorted digits with irregular shapes, incomplete strokes, and varying skew in both the training and testing datasets. Consequently, these factors contribute to reduc… ▽ More

    Submitted 26 May, 2023; originally announced July 2023.

    Comments: 26 pages, 10 figures, 14 tables, 54 references

  16. arXiv:2307.10005  [pdf, other

    eess.AS cs.SD

    Alzheimer's Disease Detection from Spontaneous Speech and Text: A review

    Authors: Vrindha M. K., Geethu V., Anurenjan P. R., Deepak S., Sreeni K. G.

    Abstract: In the past decade, there has been a surge in research examining the use of voice and speech analysis as a means of detecting neurodegenerative diseases such as Alzheimer's. Many studies have shown that certain acoustic features can be used to differentiate between normal aging and Alzheimer's disease, and speech analysis has been found to be a cost-effective method of detecting Alzheimer's dement… ▽ More

    Submitted 19 July, 2023; originally announced July 2023.

  17. arXiv:2210.04218  [pdf, other

    cs.CV cs.LG

    Transformer-based Flood Scene Segmentation for Develo** Countries

    Authors: Ahan M R, Roshan Roy, Shreyas Sunil Kulkarni, Vaibhav Soni, Ashish Chittora

    Abstract: Floods are large-scale natural disasters that often induce a massive number of deaths, extensive material damage, and economic turmoil. The effects are more extensive and longer-lasting in high-population and low-resource develo** countries. Early Warning Systems (EWS) constantly assess water levels and other factors to forecast floods, to help minimize damage. Post-disaster, disaster response t… ▽ More

    Submitted 9 October, 2022; originally announced October 2022.

    Comments: Presented at NeurIPS 2021 Workshop on Machine Learning for the Develo** World

  18. arXiv:2203.10194  [pdf, other

    cs.CV cs.AI cs.LG cs.RO

    Analysis and Adaptation of YOLOv4 for Object Detection in Aerial Images

    Authors: Aryaman Singh Samyal, Akshatha K R, Soham Hans, Karunakar A K, Satish Shenoy B

    Abstract: The recent and rapid growth in Unmanned Aerial Vehicles (UAVs) deployment for various computer vision tasks has paved the path for numerous opportunities to make them more effective and valuable. Object detection in aerial images is challenging due to variations in appearance, pose, and scale. Autonomous aerial flight systems with their inherited limited memory and computational power demand accur… ▽ More

    Submitted 18 March, 2022; originally announced March 2022.

  19. arXiv:2112.06712  [pdf, other

    quant-ph cs.LG

    A Case For Noisy Shallow Gate-Based Circuits In Quantum Machine Learning

    Authors: Patrick Selig, Niall Murphy, Ashwin Sundareswaran R, David Redmond, Simon Caton

    Abstract: There is increasing interest in the development of gate-based quantum circuits for the training of machine learning models. Yet, little is understood concerning the parameters of circuit design, and the effects of noise and other measurement errors on the performance of quantum machine learning models. In this paper, we explore the practical implications of key circuit design parameters (number of… ▽ More

    Submitted 13 December, 2021; originally announced December 2021.

    Comments: 15 pages, 11 figures, Published in the proceedings of International Conference on Rebooting Computing (ICRC). IEEE, 2021

  20. arXiv:2109.03435  [pdf, other

    eess.IV cs.CV

    SSEGEP: Small SEGment Emphasized Performance evaluation metric for medical image segmentation

    Authors: Ammu R, Neelam Sinha

    Abstract: Automatic image segmentation is a critical component of medical image analysis, and hence quantifying segmentation performance is crucial. Challenges in medical image segmentation are mainly due to spatial variations of regions to be segmented and imbalance in distribution of classes. Commonly used metrics treat all detected pixels, indiscriminately. However, pixels in smaller segments must be tre… ▽ More

    Submitted 8 September, 2021; originally announced September 2021.

  21. arXiv:2109.01467  [pdf, other

    math.NA cs.LG

    Semi-Implicit Neural Solver for Time-dependent Partial Differential Equations

    Authors: Suprosanna Shit, Ivan Ezhov, Leon Mächler, Abinav R., Jana Lipkova, Johannes C. Paetzold, Florian Kofler, Marie Piraud, Bjoern H. Menze

    Abstract: Fast and accurate solutions of time-dependent partial differential equations (PDEs) are of pivotal interest to many research fields, including physics, engineering, and biology. Generally, implicit/semi-implicit schemes are preferred over explicit ones to improve stability and correctness. However, existing semi-implicit methods are usually iterative and employ a general-purpose solver, which may… ▽ More

    Submitted 3 September, 2021; originally announced September 2021.

  22. arXiv:2012.13380  [pdf, other

    cs.LG cs.AI

    A Regret bound for Non-stationary Multi-Armed Bandits with Fairness Constraints

    Authors: Shaarad A. R, Ambedkar Dukkipati

    Abstract: The multi-armed bandits' framework is the most common platform to study strategies for sequential decision-making problems. Recently, the notion of fairness has attracted a lot of attention in the machine learning community. One can impose the fairness condition that at any given point of time, even during the learning phase, a poorly performing candidate should not be preferred over a better cand… ▽ More

    Submitted 24 December, 2020; originally announced December 2020.

  23. arXiv:2011.04988  [pdf, other

    eess.IV cs.CV

    AIM 2020 Challenge on Rendering Realistic Bokeh

    Authors: Andrey Ignatov, Radu Timofte, Ming Qian, Congyu Qiao, Jiamin Lin, Zhenyu Guo, Chenghua Li, Cong Leng, Jian Cheng, Juewen Peng, Xianrui Luo, Ke Xian, Zi** Wu, Zhiguo Cao, Densen Puthussery, Jiji C V, Hrishikesh P S, Melvin Kuriakose, Saikat Dutta, Sourya Dipta Das, Nisarg A. Shah, Kuldeep Purohit, Praveen Kandula, Maitreya Suin, A. N. Rajagopalan , et al. (10 additional authors not shown)

    Abstract: This paper reviews the second AIM realistic bokeh effect rendering challenge and provides the description of the proposed solutions and results. The participating teams were solving a real-world bokeh simulation problem, where the goal was to learn a realistic shallow focus technique using a large-scale EBB! bokeh dataset consisting of 5K shallow / wide depth-of-field image pairs captured using th… ▽ More

    Submitted 10 November, 2020; originally announced November 2020.

    Comments: Published in ECCV 2020 Workshop (Advances in Image Manipulation), https://data.vision.ee.ethz.ch/cvl/aim20/

  24. arXiv:2010.13187  [pdf, other

    stat.ML cs.CV cs.LG

    Improving the Reconstruction of Disentangled Representation Learners via Multi-Stage Modeling

    Authors: Akash Srivastava, Yamini Bansal, Yukun Ding, Cole Lincoln Hurwitz, Kai Xu, Bernhard Egger, Prasanna Sattigeri, Joshua B. Tenenbaum, Phuong Le, Arun Prakash R, Nengfeng Zhou, Joel Vaughan, Yaquan Wang, Anwesha Bhattacharyya, Kristjan Greenewald, David D. Cox, Dan Gutfreund

    Abstract: Current autoencoder-based disentangled representation learning methods achieve disentanglement by penalizing the (aggregate) posterior to encourage statistical independence of the latent factors. This approach introduces a trade-off between disentangled representation learning and reconstruction quality since the model does not have enough capacity to learn correlated latent variables that capture… ▽ More

    Submitted 3 April, 2024; v1 submitted 25 October, 2020; originally announced October 2020.

  25. arXiv:2006.08870  [pdf, other

    cs.CL cs.SD eess.AS

    End-to-End Code Switching Language Models for Automatic Speech Recognition

    Authors: Ahan M. R., Shreyas Sunil Kulkarni

    Abstract: In this paper, we particularly work on the code-switched text, one of the most common occurrences in the bilingual communities across the world. Due to the discrepancies in the extraction of code-switched text from an Automated Speech Recognition(ASR) module, and thereby extracting the monolingual text from the code-switched text, we propose an approach for extracting monolingual text using Deep B… ▽ More

    Submitted 15 June, 2020; originally announced June 2020.

    Comments: 5 pages, 2 figures, To appear in the proceedings of First Workshop on Speech Technologies for Code-switching in Multilingual Communities 2020

  26. arXiv:1909.10471  [pdf, ps, other

    cs.IT

    Subpacketization in Coded Caching with Demand Privacy

    Authors: Aravind V R, Pradeep Sarvepalli, Andrew Thangaraj

    Abstract: Coded caching is a technique where we utilize multi-casting opportunities to reduce rate in cached networks. One limitation of coded caching schemes is that they reveal the demands of all users to their peers. In this work, we consider coded caching schemes that assure privacy for user demands with a particular focus on reducing subpacketization. For the 2-user, 2-file case, we present a new linea… ▽ More

    Submitted 23 September, 2019; originally announced September 2019.

    Comments: 13 pages, 5 figures

  27. arXiv:1909.05146  [pdf

    cs.CV

    Word and character segmentation directly in run-length compressed handwritten document images

    Authors: Amarnath R, P. Nagabhushan, Mohammed Javed

    Abstract: From the literature, it is demonstrated that performing text-line segmentation directly in the run-length compressed handwritten document images significantly reduces the computational time and memory space. In this paper, we investigate the issues of word and character segmentation directly on the run-length compressed document images. Primarily, the spreads of the characters are intelligently ex… ▽ More

    Submitted 18 August, 2019; originally announced September 2019.

    Comments: 17 pages,19 figures

  28. arXiv:1907.07270  [pdf, other

    cs.CV

    Style Transfer Applied to Face Liveness Detection with User-Centered Models

    Authors: Israel A. Laurensi R., Luciana T. Menon, Manoel Camillo O. Penna N., Alessandro L. Koerich, Alceu S. Britto Jr

    Abstract: This paper proposes a face anti-spoofing user-centered model (FAS-UCM). The major difficulty, in this case, is obtaining fraudulent images from all users to train the models. To overcome this problem, the proposed method is divided in three main parts: generation of new spoof images, based on style transfer and spoof image representation models; training of a Convolutional Neural Network (CNN) for… ▽ More

    Submitted 16 July, 2019; originally announced July 2019.

  29. arXiv:1901.11477  [pdf

    cs.CV cs.AI cs.DS

    Text line Segmentation in Compressed Representation of Handwritten Document using Tunneling Algorithm

    Authors: Amarnath R, P Nagabhushan

    Abstract: In this research work, we perform text line segmentation directly in compressed representation of an unconstrained handwritten document image. In this relation, we make use of text line terminal points which is the current state-of-the-art. The terminal points spotted along both margins (left and right) of a document image for every text line are considered as source and target respectively. The t… ▽ More

    Submitted 3 January, 2019; originally announced January 2019.

    Comments: Compressed Representation, Handwritten Document Image, Text-Line Terminal Point, Text-Line Segmentation, Search Space, Grid

    Journal ref: International Journal of Intelligent Systems and Applications in Engineering, Vol 6, No 4 (2018)

  30. arXiv:1812.11135  [pdf, other

    cs.RO cs.MA

    Online Decentralized Receding Horizon Trajectory Optimization for Multi-Robot systems

    Authors: Govind Aadithya R, Shravan Krishnan, Vijay Arvindh, Sivanathan K

    Abstract: A novel decentralised trajectory generation algorithm for Multi Agent systems is presented. Multi-robot systems have the capacity to transform lives in a variety of fields. But, trajectory generation for multi-robot systems is still in its nascent stage and limited to heavily controlled environments. To overcome that, an online trajectory optimization algorithm that generates collision-free trajec… ▽ More

    Submitted 28 December, 2018; originally announced December 2018.

    Comments: Submitted to IEEE Transactions on Robotics;

  31. arXiv:1812.00868  [pdf, other

    cs.RO cs.MA

    Collision-Free Multi Robot Trajectory Optimization in Unknown Environments using Decentralized Trajectory Planning

    Authors: Vijay Arvindh, Govind Aadithya R, Shravan Krishnan, Sivanathan K

    Abstract: Multi robot systems have the potential to be utilized in a variety of applications. In most of the previous works, the trajectory generation for multi robot systems is implemented in known environments. To overcome that we present an online trajectory optimization algorithm that utilizes communication of robots' current states to account to the other robots while using local object based maps for… ▽ More

    Submitted 3 December, 2018; originally announced December 2018.

    Comments: 6 pages,6 figures. To be Presented at 2018 IEEE 4th International Symposium in Robotics and Manufacturing Automation (ROMA)

  32. Novel approach to locate region of interest in mammograms for Breast cancer

    Authors: BV Divyashree, Amarnath R, Naveen M, G Hemantha Kumar

    Abstract: Locating region of interest for breast cancer masses in the mammographic image is a challenging problem in medical image processing. In this research work, the keen idea is to efficiently extract suspected mass region for further examination. In particular to this fact breast boundary segmentation on sliced rgb image using modified intensity based approach followed by quad tree based division to s… ▽ More

    Submitted 1 November, 2018; originally announced November 2018.

    Comments: ROI, breast cancer, mammographic images, segmentation, entropy, quad tree

    Journal ref: International Journal of Intelligent Systems and Applications in Engineering.(ISSN:2147-6799) Vol 6, No 3 (2018)

  33. arXiv:1806.07834  [pdf, other

    cs.RO

    A Look at Motion Planning for Autonomous Vehicles at an Intersection

    Authors: Shravan Krishnan, Govind Aadithya R, Rahul Ramakrishnan, Vijay Arvindh, Sivanathan K

    Abstract: Autonomous Vehicles are currently being tested in a variety of scenarios. As we move towards Autonomous Vehicles, how should intersections look? To answer that question, we break down an intersection management into the different conundrums and scenarios involved in the trajectory planning and current approaches to solve them. Then, a brief analysis of current works in autonomous intersection is c… ▽ More

    Submitted 7 September, 2018; v1 submitted 20 June, 2018; originally announced June 2018.

    Comments: Accepted for presentation at ITSC 2018, Final Version

  34. arXiv:1804.00564  [pdf, other

    cs.IT

    Codes with Combined Locality and Regeneration Having Optimal Rate, $d_{\text{min}}$ and Linear Field Size

    Authors: M. Nikhil Krishnan, Anantha Narayanan R., P. Vijay Kumar

    Abstract: In this paper, we study vector codes with all-symbol locality, where the local code is either a Minimum Bandwidth Regenerating (MBR) code or a Minimum Storage Regenerating (MSR) code. In the first part, we present vector codes with all-symbol MBR locality, for all parameters, that have both optimal minimum-distance and optimal rate. These codes combine ideas from two popular codes in the distribut… ▽ More

    Submitted 2 April, 2018; originally announced April 2018.

    Comments: Accepted for publication in 2018 IEEE International Symposium on Information Theory (ISIT)

  35. Spotting Separator Points at Line Terminals in Compressed Document Images for Text-line Segmentation

    Authors: Amarnath R, P. Nagabhushan

    Abstract: Line separators are used to segregate text-lines from one another in document image analysis. Finding the separator points at every line terminal in a document image would enable text-line segmentation. In particular, identifying the separators in handwritten text could be a thrilling exercise. Obviously it would be challenging to perform this in the compressed version of a document image and that… ▽ More

    Submitted 18 August, 2017; originally announced August 2017.

    Comments: Line separators, Document image analysis, Handwritten text, Compression and decompression, RLE, CCITT. Line separator points at every line terminal in a compressed handwritten document images enabling text line segmentation

    Journal ref: International Journal of Computer Applications 172(4): 40-47 (2017)

  36. arXiv:1707.01742  [pdf, other

    cs.MM

    High Resilience Diverse Domain Multilevel Audio Watermarking with Adaptive Threshold

    Authors: Jerrin Thomas Panachakel, Anurenjan P. R

    Abstract: A novel diverse domain (DCT-SVD & DWT-SVD) watermarking scheme is proposed in this paper. Here, the watermark is embedded simultaneously onto the two domains. It is shown that an audio signal watermarked using this scheme has better subjective and objective quality when compared with other watermarking schemes. Also proposed are two novel watermark detection algorithms viz., AOT (Adaptively Optimi… ▽ More

    Submitted 5 July, 2017; originally announced July 2017.

  37. A Survey on Delay-Aware Network Structure for Wireless Sensor Networks with Consecutive Data Collection Processes

    Authors: Ms. Aruna. G. R, Mr. SivanArulSelvan

    Abstract: A Wireless Sensor Network (WSN) consists of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure,etc. In sensing applications, data packets are flowing from sensor nodes to base station. In data collection processes, bottom up approach is used. In bottom up approach, all nodes send their sensed data packets to base station d… ▽ More

    Submitted 6 February, 2014; originally announced February 2014.

    Comments: 4 pages,3 figures, "Published with International Journal of Engineering Trends and Technology (IJETT)"

    Journal ref: IJETT, 7(4),198-201, 2014 published by seventh sense research group

  38. arXiv:1109.3898  [pdf, ps, other

    cs.NI cs.ET

    Monitoring Breathing via Signal Strength in Wireless Networks

    Authors: Neal Patwari, Joey Wilson, Sai Ananthanarayanan P. R., Sneha K. Kasera, Dwayne Westenskow

    Abstract: This paper shows experimentally that standard wireless networks which measure received signal strength (RSS) can be used to reliably detect human breathing and estimate the breathing rate, an application we call "BreathTaking". We show that although an individual link cannot reliably detect breathing, the collective spectral content of a network of devices reliably indicates the presence and rate… ▽ More

    Submitted 18 September, 2011; originally announced September 2011.