Skip to main content

Showing 1–6 of 6 results for author: Raychoudhury, V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2311.02017  [pdf, other

    cs.LG cs.AI

    DeliverAI: Reinforcement Learning Based Distributed Path-Sharing Network for Food Deliveries

    Authors: Ashman Mehra, Snehanshu Saha, Vaskar Raychoudhury, Archana Mathur

    Abstract: Delivery of items from the producer to the consumer has experienced significant growth over the past decade and has been greatly fueled by the recent pandemic. Amazon Fresh, Shopify, UberEats, InstaCart, and DoorDash are rapidly growing and are sharing the same business model of consumer items or food delivery. Existing food delivery methods are sub-optimal because each delivery is individually op… ▽ More

    Submitted 11 February, 2024; v1 submitted 3 November, 2023; originally announced November 2023.

  2. arXiv:2105.13448  [pdf, other

    cs.LG cs.AI

    Open-world Machine Learning: Applications, Challenges, and Opportunities

    Authors: Jitendra Parmar, Satyendra Singh Chouhan, Vaskar Raychoudhury, Santosh Singh Rathore

    Abstract: Traditional machine learning mainly supervised learning, follows the assumptions of closed-world learning, i.e., for each testing class, a training class is available. However, such machine learning models fail to identify the classes which were not available during training time. These classes can be referred to as unseen classes. Whereas open-world machine learning (OWML) deals with unseen class… ▽ More

    Submitted 20 February, 2022; v1 submitted 27 May, 2021; originally announced May 2021.

  3. arXiv:1612.05626  [pdf

    cs.CY

    An Open, Multi-Sensor, Dataset of Water Pollution of Ganga Basin and its Application to Understand Impact of Large Religious Gathering

    Authors: Biplav Srivastava, Sandeep Sandha, Vaskar Raychoudhury, Sukanya Randhawa, Viral Kapoor, Anmol Agrawal

    Abstract: Water is a crucial pre-requisite for all human activities. Due to growing demand from population and shrinking supply of potable water, there is an urgent need to use computational methods to manage available water intelligently, and especially in develo** countries like India where even basic data to track water availability or physical infrastructure to process water are inadequate. In this co… ▽ More

    Submitted 19 November, 2016; originally announced December 2016.

    Comments: 7 pages

    ACM Class: H.2; H.2.8; H.4.2

  4. arXiv:1608.07670  [pdf, other

    cs.NI

    CISER: An Amoebiasis inspired Model for Epidemic Message Propagation in DTN

    Authors: Sobin CC, Snehanshu Saha, Vaskar Raychoudhury, Hategekimana Fidele, Sumana Sinha

    Abstract: Delay Tolerant Networks (DTNs) are sparse mobile networks, which experiences frequent disruptions in connectivity among nodes. Usually, DTN follows store-carry-and forward mechanism for message forwarding, in which a node store and carry the message until it finds an appropriate relay node to forward further in the network. So, The efficiency of DTN routing protocol relies on the intelligent selec… ▽ More

    Submitted 27 August, 2016; originally announced August 2016.

  5. arXiv:1411.1821  [pdf

    cs.CY

    Pervasive Healthcare-A Comprehensive Survey of Tools and Techniques

    Authors: Deepak Uniyal, Vaskar Raychoudhury

    Abstract: Pervasive healthcare is an emerging technology that aims to provide round-the-clock monitoring of several vital signs of patients using various health sensors, specialized communication protocols, and intelligent context-aware applications. Pervasive healthcare applications proactively contact the caregiver provided any abnormality arises in the health condition of a monitored patient. It has been… ▽ More

    Submitted 6 November, 2014; originally announced November 2014.

    Comments: 48 pages, 2 figures, 14 tables

    ACM Class: A.1; K.4.1

  6. arXiv:1305.5981  [pdf, ps, other

    cs.IR cs.HC cs.NI

    Query Representation with Global Consistency on User Click Graph

    Authors: Daqiang Zhang, Rongbo Zhu, Shuqiqiu Men, Vaskar Raychoudhury

    Abstract: Extensive research has been conducted on query log analysis. A query log is generally represented as a bipartite graph on a query set and a URL set. Most of the traditional methods used the raw click frequency to weigh the link between a query and a URL on the click graph. In order to address the disadvantages of raw click frequency, researchers proposed the entropy-biased model, which incorporate… ▽ More

    Submitted 25 May, 2013; originally announced May 2013.

    Comments: accepted by Journal of Internet Technology on Sep. 9, 2012. To appear in Vol. 4, September, 2013

    ACM Class: H.3.3