Skip to main content

Showing 1–36 of 36 results for author: S, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.02179  [pdf, other

    math.CO cs.DM

    Graceful coloring is computationally hard

    Authors: Cyriac Antony, Laavanya D., Devi Yamini S

    Abstract: Given a (proper) vertex coloring $f$ of a graph $G$, say $f\colon V(G)\to \mathbb{N}$, the difference edge labelling induced by $f$ is a function $h\colon E(G)\to \mathbb{N}$ defined as $h(uv)=|f(u)-f(v)|$ for every edge $uv$ of $G$. A graceful coloring of $G$ is a vertex coloring $f$ of $G$ such that the difference edge labelling $h$ induced by $f$ is a (proper) edge coloring of $G$. A graceful c… ▽ More

    Submitted 2 July, 2024; originally announced July 2024.

  2. arXiv:2406.08876  [pdf, other

    cs.SI

    Heuristics for Influence Maximization with Tiered Influence and Activation thresholds

    Authors: Rahul Kumar Gautam, Anjeneya Swami Kare, Durga Bhavani S

    Abstract: The information flows among the people while they communicate through social media websites. Due to the dependency on digital media, a person shares important information or regular updates with friends and family. The set of persons on social media forms a social network. Influence Maximization (IM) is a known problem in social networks. In social networks, information flows from one person to an… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

  3. arXiv:2405.03537  [pdf, other

    cs.LG cs.AI

    Exploring the Efficacy of Federated-Continual Learning Nodes with Attention-Based Classifier for Robust Web Phishing Detection: An Empirical Investigation

    Authors: Jesher Joshua M, Adhithya R, Sree Dananjay S, M Revathi

    Abstract: Web phishing poses a dynamic threat, requiring detection systems to quickly adapt to the latest tactics. Traditional approaches of accumulating data and periodically retraining models are outpaced. We propose a novel paradigm combining federated learning and continual learning, enabling distributed nodes to continually update models on streams of new phishing data, without accumulating data. These… ▽ More

    Submitted 16 June, 2024; v1 submitted 6 May, 2024; originally announced May 2024.

  4. arXiv:2405.01310  [pdf, other

    cs.IR cs.CL

    Overcoming LLM Challenges using RAG-Driven Precision in Coffee Leaf Disease Remediation

    Authors: Dr. Selva Kumar S, Afifah Khan Mohammed Ajmal Khan, Imadh Ajaz Banday, Manikantha Gada, Vibha Venkatesh Shanbhag

    Abstract: This research introduces an innovative AI-driven precision agriculture system, leveraging YOLOv8 for disease identification and Retrieval Augmented Generation (RAG) for context-aware diagnosis. Focused on addressing the challenges of diseases affecting the coffee production sector in Karnataka, The system integrates sophisticated object detection techniques with language models to address the inhe… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

    Comments: 6 pages, 3 figures

  5. arXiv:2403.00887  [pdf, other

    eess.AS cs.AI cs.CL cs.LG cs.SD

    SEGAA: A Unified Approach to Predicting Age, Gender, and Emotion in Speech

    Authors: Aron R, Indra Sigicharla, Chirag Periwal, Mohanaprasad K, Nithya Darisini P S, Sourabh Tiwari, Shivani Arora

    Abstract: The interpretation of human voices holds importance across various applications. This study ventures into predicting age, gender, and emotion from vocal cues, a field with vast applications. Voice analysis tech advancements span domains, from improving customer interactions to enhancing healthcare and retail experiences. Discerning emotions aids mental health, while age and gender detection are vi… ▽ More

    Submitted 1 March, 2024; originally announced March 2024.

  6. arXiv:2401.07669  [pdf, other

    cs.CV

    FiGCLIP: Fine-Grained CLIP Adaptation via Densely Annotated Videos

    Authors: Darshan Singh S, Zeeshan Khan, Makarand Tapaswi

    Abstract: While contrastive language image pretraining (CLIP) have exhibited impressive performance by learning highly semantic and generalized representations, recent works have exposed a fundamental drawback in its syntactic properties, that includes interpreting fine-grained attributes, actions, spatial relations, states, and details that require compositional reasoning. One reason for this is that natur… ▽ More

    Submitted 15 January, 2024; originally announced January 2024.

  7. arXiv:2312.01302  [pdf

    cs.HC cs.CY cs.RO

    Smart safety watch for elderly people and pregnant women

    Authors: Balachandra D S, Maithreyee M S, Saipavan B M, Shashank S, Dr. P Devaki, Ms. Ashwini M

    Abstract: Falls represent one of the most detrimental occurrences for the elderly. Given the continually increasing ageing demographic, there is a pressing demand for advancing fall detection systems. The swift progress in sensor networks and the Internet of Things (IoT) has made human-computer interaction through sensor fusion an acknowledged and potent approach for tackling the issue of fall detection. Ev… ▽ More

    Submitted 3 December, 2023; originally announced December 2023.

  8. arXiv:2311.17889  [pdf

    cs.DC

    Scale Ratio Tuning of Group Based Job Scheduling in HPC Systems

    Authors: Lyakhovets D. S., Baranov A. V., Telegin P. N

    Abstract: During the initialization of a supercomputer job, no useful calculations are performed. A high proportion of initialization time results in idle computing resources and less computational efficiency. Certain methods and algorithms combining jobs into groups are used to optimize scheduling of jobs with high initialization proportion. The article considers the influence of the scale ratio setting in… ▽ More

    Submitted 29 November, 2023; originally announced November 2023.

    MSC Class: 68 ACM Class: D.4.8

  9. arXiv:2311.12621  [pdf

    cs.CV

    Crowd management, crime detection, work monitoring using aiml

    Authors: P. R. Adithya, Dheepak. S, B. Akash, Harshini. V, Sai Lakshana

    Abstract: This research endeavors to harness the potential of existing Closed-Circuit Television (CCTV) networks for a comprehensive approach to crowd management, crime prevention, and workplace monitoring through the integration of Artificial Intelligence (AI) and Machine Learning (ML) technologies. The primary objective is to develop and implement advanced algorithms capable of real-time analysis of video… ▽ More

    Submitted 21 November, 2023; originally announced November 2023.

  10. arXiv:2311.03365  [pdf, other

    cs.SE cs.AI cs.CL cs.LG

    Leveraging Generative AI: Improving Software Metadata Classification with Generated Code-Comment Pairs

    Authors: Samah Syed, Angel Deborah S

    Abstract: In software development, code comments play a crucial role in enhancing code comprehension and collaboration. This research paper addresses the challenge of objectively classifying code comments as "Useful" or "Not Useful." We propose a novel solution that harnesses contextualized embeddings, particularly BERT, to automate this classification process. We address this task by incorporating generate… ▽ More

    Submitted 14 October, 2023; originally announced November 2023.

    Comments: 9 pages, 2 figures, 3 tables, Has been accepted for the Information Retrieval in Software Engineering track at Forum for Information Retrieval Evaluation 2023

    Journal ref: Information Retrieval in Software Engineering track at Forum for Information Retrieval Evaluation 2023

  11. arXiv:2310.11467  [pdf, other

    cs.SE cs.AI cs.LG

    Enhancing Binary Code Comment Quality Classification: Integrating Generative AI for Improved Accuracy

    Authors: Rohith Arumugam S, Angel Deborah S

    Abstract: This report focuses on enhancing a binary code comment quality classification model by integrating generated code and comment pairs, to improve model accuracy. The dataset comprises 9048 pairs of code and comments written in the C programming language, each annotated as "Useful" or "Not Useful." Additionally, code and comment pairs are generated using a Large Language Model Architecture, and these… ▽ More

    Submitted 14 October, 2023; originally announced October 2023.

    Comments: 11 pages, 2 figures, 2 tables, Has been accepted for the Information Retrieval in Software Engineering track at Forum for Information Retrieval Evaluation 2023

  12. arXiv:2307.10005  [pdf, other

    eess.AS cs.SD

    Alzheimer's Disease Detection from Spontaneous Speech and Text: A review

    Authors: Vrindha M. K., Geethu V., Anurenjan P. R., Deepak S., Sreeni K. G.

    Abstract: In the past decade, there has been a surge in research examining the use of voice and speech analysis as a means of detecting neurodegenerative diseases such as Alzheimer's. Many studies have shown that certain acoustic features can be used to differentiate between normal aging and Alzheimer's disease, and speech analysis has been found to be a cost-effective method of detecting Alzheimer's dement… ▽ More

    Submitted 19 July, 2023; originally announced July 2023.

  13. arXiv:2305.03739  [pdf, other

    cs.NE cs.AR cs.LG

    Neural Architecture Search for Intel Movidius VPU

    Authors: Qian Xu, Victor Li, Crews Darren S

    Abstract: Hardware-aware Neural Architecture Search (NAS) technologies have been proposed to automate and speed up model design to meet both quality and inference efficiency requirements on a given hardware. Prior arts have shown the capability of NAS on hardware specific network design. In this whitepaper, we further extend the use of NAS to Intel Movidius VPU (Vision Processor Units). To determine the har… ▽ More

    Submitted 4 May, 2023; originally announced May 2023.

    Comments: arXiv admin note: text overlap with arXiv:1812.00332 by other authors

  14. Identification of an influence network using ensemble-based filtering for Hawkes processes driven by count data

    Authors: Santitissadeekorn N., Delahaies S., Lloyd D. J. B

    Abstract: Many networks have event-driven dynamics (such as communication, social media and criminal networks), where the mean rate of the events occurring at a node in the network changes according to the occurrence of other events in the network. In particular, events associated with a node of the network could increase the rate of events at other nodes, depending on their influence relationship. Thus, it… ▽ More

    Submitted 1 February, 2023; originally announced February 2023.

    Comments: to appear in Physica D: Nonlinear Phenomena. 22 pages, 15 figures

  15. arXiv:2211.17019  [pdf, other

    cs.CR

    Real time QKD Post Processing based on Reconfigurable Hardware Acceleration

    Authors: Foram P Shingala, Natarajan Venkatachalam, Selvagangai C, Hema Priya S, Dillibabu S, Pooja Chandravanshi, Ravindra P. Singh

    Abstract: Key Distillation is an essential component of every Quantum Key Distribution system because it compensates the inherent transmission errors of quantum channel. However, throughput and interoperability aspects of post-processing engine design often neglected, and exiting solutions are not providing any guarantee. In this paper, we propose multiple protocol support high throughput key distillation f… ▽ More

    Submitted 30 November, 2022; originally announced November 2022.

  16. arXiv:2210.16644  [pdf, other

    cs.CV

    Unsupervised Audio-Visual Lecture Segmentation

    Authors: Darshan Singh S, Anchit Gupta, C. V. Jawahar, Makarand Tapaswi

    Abstract: Over the last decade, online lecture videos have become increasingly popular and have experienced a meteoric rise during the pandemic. However, video-language research has primarily focused on instructional videos or movies, and tools to help students navigate the growing online lectures are lacking. Our first contribution is to facilitate research in the educational domain, by introducing AVLectu… ▽ More

    Submitted 29 October, 2022; originally announced October 2022.

    Comments: 17 pages, 14 figures, 14 tables, Accepted to WACV 2023. Project page: https://cvit.iiit.ac.in/research/projects/cvit-projects/avlectures

  17. arXiv:2209.03069  [pdf

    cs.SE

    A Review on the Process of Automated Software Testing

    Authors: Durga Shree N, Sree Dharinya S, Dasari Vijayasree, Nadendla Sai Roopa, Anugu Arun

    Abstract: The requirements in automation, digitalization, and fast computations have loaded the IT sector with expectations of highly reliable, efficient, and cost-effective software. Given that the process of testing, verification, and validation of software products consumes 50-75% of the total revenue if the testing process is ineffective, "n" times the expenditure must be invested to mend the havoc caus… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

    Comments: 7 pages, 2 figures, 2 tables

  18. arXiv:2204.00772   

    cs.DS

    Improved Approximation Algorithm for Graph Burning on Trees

    Authors: Rahul Kumar Gautam, Anjeneya Swami Kare, Durga Bhavani S

    Abstract: Given a graph $G=(V,E)$, the problem of \gb{} is to find a sequence of nodes from $V$, called burning sequence, in order to burn the whole graph. This is a discrete-step process, in each step an unburned vertex is selected as an agent to spread fire to its neighbors by marking it as a burnt node. A node that is burnt spreads the fire to its neighbors at the next consecutive step. The goal is to fi… ▽ More

    Submitted 15 September, 2022; v1 submitted 2 April, 2022; originally announced April 2022.

    Comments: We found an issue in the proof. We will submit after rectifying the proof

  19. arXiv:2112.14940  [pdf, other

    cs.SI

    Close Friends, Popular Peers, Team formation and Leadership in Group Projects

    Authors: Deekshajyothi S, Gowrishankar G

    Abstract: The paper discusses diverse interconnected relationships formed within a seemingly unrelated group of students and a conceptually different problem statement. This study uses a Social Network Analysis (SNA) to analyze and map the connections among the individuals. SNA facilitates understanding the psychology of a group of people while performing a certain task. This could help predict further patt… ▽ More

    Submitted 30 December, 2021; originally announced December 2021.

  20. arXiv:2107.07827  [pdf, other

    cs.CV

    A Theoretical Analysis of Granulometry-based Roughness Measures on Cartosat DEMs

    Authors: Nagajothi Kannan, Sravan Danda, Aditya Challa, Daya Sagar B S

    Abstract: The study of water bodies such as rivers is an important problem in the remote sensing community. A meaningful set of quantitative features reflecting the geophysical properties help us better understand the formation and evolution of rivers. Typically, river sub-basins are analysed using Cartosat Digital Elevation Models (DEMs), obtained at regular time epochs. One of the useful geophysical featu… ▽ More

    Submitted 16 July, 2021; originally announced July 2021.

    Comments: Under review at IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing

  21. arXiv:2103.15822  [pdf

    cs.LG

    Classifying the Unstructured IT Service Desk Tickets Using Ensemble of Classifiers

    Authors: Ramya C, Paramesh S. P, Dr. Shreedhara K S

    Abstract: Manual classification of IT service desk tickets may result in routing of the tickets to the wrong resolution group. Incorrect assignment of IT service desk tickets leads to reassignment of tickets, unnecessary resource utilization and delays the resolution time. Traditional machine learning algorithms can be used to automatically classify the IT service desk tickets. Service desk ticket classifie… ▽ More

    Submitted 30 March, 2021; originally announced March 2021.

    Comments: 3rd IEEE International Conference on Computational Systems and Information Technology for Sustainable Solutions 2018

  22. arXiv:2103.14371  [pdf

    cs.IR cs.AI cs.DB

    A PSO Strategy of Finding Relevant Web Documents using a New Similarity Measure

    Authors: Dr. Ramya C, Dr. Shreedhara K S

    Abstract: In the world of the Internet and World Wide Web, which offers a tremendous amount of information, an increasing emphasis is being given to searching services and functionality. Currently, a majority of web portals offer their searching utilities, be it better or worse. These can search for the content within the sites, mainly text the textual content of documents. In this paper a novel similarity… ▽ More

    Submitted 26 March, 2021; originally announced March 2021.

  23. arXiv:2010.15668  [pdf

    cs.CY cs.CR cs.SI

    PeopleXploit -- A hybrid tool to collect public data

    Authors: Arjun Anand V, Buvanasri A K, Meenakshi R, Dr. Karthika S, Ashok Kumar Mohan

    Abstract: This paper introduces the concept of Open Source Intelligence (OSINT) as an important application in intelligent profiling of individuals. With a variety of tools available, significant data shall be obtained on an individual as a consequence of analyzing his/her internet presence but all of this comes at the cost of low relevance. To increase the relevance score in profiling, PeopleXploit is bein… ▽ More

    Submitted 28 October, 2020; originally announced October 2020.

    Comments: 8 pages, 3 images, ICCCSP 2020

  24. arXiv:2009.04983  [pdf, other

    eess.AS cs.SD

    Exploration of End-to-end Synthesisers forZero Resource Speech Challenge 2020

    Authors: Karthik Pandia D S, Anusha Prakash, Mano Ranjith Kumar, Hema A Murthy

    Abstract: A Spoken dialogue system for an unseen language is referred to as Zero resource speech. It is especially beneficial for develo** applications for languages that have low digital resources. Zero resource speech synthesis is the task of building text-to-speech (TTS) models in the absence of transcriptions. In this work, speech is modelled as a sequence of transient and steady-state acoustic units,… ▽ More

    Submitted 10 September, 2020; originally announced September 2020.

    Comments: Accepted for publication in Interspeech 2020

  25. arXiv:2008.11191  [pdf, other

    cs.SI

    Multi-team Formation using Community Based Approach in Real-World Networks

    Authors: Ramesh Bobby Addanki, Durga Bhavani S

    Abstract: In an organization, tasks called projects that require several skills, are generally assigned to teams rather than individuals. The problem of choosing a right team for a given task with minimal communication cost is known as team formation problem and many algorithms have been proposed in the literature. We propose an algorithm that exploits the community structure of the social network and forms… ▽ More

    Submitted 25 August, 2020; originally announced August 2020.

    Comments: 25 pages, 12 figures

  26. arXiv:2006.05747  [pdf, other

    eess.AS cs.SD

    Uniphore's submission to Fearless Steps Challenge Phase-2

    Authors: Karthik Pandia D S, Cosimo Spera

    Abstract: We propose supervised systems for speech activity detection (SAD) and speaker identification (SID) tasks in Fearless Steps Challenge Phase-2. The proposed systems for both the tasks share a common convolutional neural network (CNN) architecture. Mel spectrogram is used as features. For speech activity detection, the spectrogram is divided into smaller overlap** chunks. The network is trained to… ▽ More

    Submitted 10 June, 2020; originally announced June 2020.

  27. Zero resource speech synthesis using transcripts derived from perceptual acoustic units

    Authors: Karthik Pandia D S, Hema A Murthy

    Abstract: Zerospeech synthesis is the task of building vocabulary independent speech synthesis systems, where transcriptions are not available for training data. It is, therefore, necessary to convert training data into a sequence of fundamental acoustic units that can be used for synthesis during the test. This paper attempts to discover, and model perceptual acoustic units consisting of steady-state, and… ▽ More

    Submitted 8 June, 2020; originally announced June 2020.

  28. arXiv:2004.11460  [pdf, other

    q-bio.QM cs.CY cs.LG stat.ML

    Development of a Machine Learning Model and Mobile Application to Aid in Predicting Dosage of Vitamin K Antagonists Among Indian Patients

    Authors: Amruthlal M, Devika S, Ameer Suhail P A, Aravind K Menon, Vignesh Krishnan, Alan Thomas, Manu Thomas, Sanjay G, Lakshmi Kanth L R, Jimmy Jose, Harikrishnan S

    Abstract: Patients who undergo mechanical heart valve replacements or have conditions like Atrial Fibrillation have to take Vitamin K Antagonists (VKA) drugs to prevent coagulation of blood. These drugs have narrow therapeutic range and need to be very closely monitored due to life threatening side effects. The dosage of VKA drug is determined and revised by a physician based on Prothrombin Time - Internati… ▽ More

    Submitted 19 April, 2020; originally announced April 2020.

  29. A Heuristic Algorithm for Network Optimization of OTN over DWDM Network

    Authors: Govardan C., Sri Krishna Chaitanya K., Krishna Kumar Naik B., Shreesha Rao D. S., Jagadeesh C., Gowrishankar R., Siva Sankara Sai S., Prabhat Behere, Bhyri Sai Kishore

    Abstract: While the network traffic has seen exponential increase, the revenues have not maintained the same pace. New methods have to be explored to reduce this gap between traffic and revenue. One such method is convergence in networking layers. In this work, we study the convergence of OTN and DWDM layer from a network planning perspective. We compare the costs of planning networks without and with conve… ▽ More

    Submitted 31 December, 2018; originally announced January 2019.

    Comments: Pages: 1-6, Published in: 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS), Date of Conference: 15-18 Dec. 2015, Publisher: IEEE, Electronic ISBN: 978-1-5090-0293-1, USB ISBN:978-1-5090-0292-4

  30. Comparison of VCA and GAEE algorithms for Endmember Extraction

    Authors: Douglas Winston. R. S., Gustavo T. Laureano, Celso G. Camilo Jr

    Abstract: Endmember Extraction is a critical step in hyperspectral image analysis and classification. It is an useful method to decompose a mixed spectrum into a collection of spectra and their corresponding proportions. In this paper, we solve a linear endmember extraction problem as an evolutionary optimization task, maximizing the Simplex Volume in the endmember space. We propose a standard genetic algor… ▽ More

    Submitted 27 May, 2018; originally announced May 2018.

    Comments: Accepted by IEEE CEC 2018: IEEE Congress on Evolutionary Computation

    MSC Class: 68T20; 68U10

  31. arXiv:1711.09737  [pdf

    cs.CY

    Rating the online review rating system using Yelp

    Authors: Dhanasekar S, Balaji

    Abstract: The impact of ratings on a restaurant plays a major role in attracting future customers to that restaurant. The word of mouth has been systematically replaced with the online reviews. It gives a sense of satisfaction for people to know beforehand about the number of average stars the restaurant has acquired before step** into a restaurant. However, these ratings are indirectly biased based on th… ▽ More

    Submitted 10 May, 2018; v1 submitted 17 November, 2017; originally announced November 2017.

    Comments: Version 1

  32. arXiv:1703.03222  [pdf, ps, other

    cs.IT

    Maximum Likelihood Decoder for Index Coded PSK Modulation for Priority Ordered Receivers

    Authors: Divya U. S., B. Sundar Rajan

    Abstract: Index coded PSK modulation over an AWGN broadcast channel, for a given index coding problem (ICP) is studied. For a chosen index code and an arbitrary map** (of broadcast vectors to PSK signal points), we have derived a decision rule for the maximum likelihood (ML) decoder. The message error performance of a receiver at high SNR is characterized by a parameter called PSK Index Coding Gain (PSK-I… ▽ More

    Submitted 9 March, 2017; originally announced March 2017.

    Comments: 9 pages, 6 figures and 2 tables

  33. arXiv:1610.03934  [pdf

    cs.CL cs.NE cs.SD stat.ML

    A Survey of Voice Translation Methodologies - Acoustic Dialect Decoder

    Authors: Hans Krupakar, Keerthika Rajvel, Bharathi B, Angel Deborah S, Vallidevi Krishnamurthy

    Abstract: Speech Translation has always been about giving source text or audio input and waiting for system to give translated output in desired form. In this paper, we present the Acoustic Dialect Decoder (ADD) - a voice to voice ear-piece translation device. We introduce and survey the recent advances made in the field of Speech Engineering, to employ in the ADD, particularly focusing on the three major p… ▽ More

    Submitted 13 October, 2016; originally announced October 2016.

    Comments: (8 pages, 7 figures, IEEE Digital Xplore paper)

    Journal ref: 2016 International Conference on Information Communication and Embedded Systems (ICICES), Chennai, 2016, pp. 1-9

  34. Cooperating distributed context-free hexagonal array grammar systems with permitting contexts

    Authors: Sujathakumari K, Dersanambika K. S

    Abstract: In this paper we associate permitting symbols with rules of Grammars in the components of cooperating distributed context free hexagonal array grammar systems as a control mechanism and investigating the generative power of the resulting systems in the terminal mode. This feature of associating permitting symbols with rules when extended to patterns in the form of connected arrays also requires ch… ▽ More

    Submitted 22 April, 2014; originally announced April 2014.

    Comments: 16 pages, 6 figures, Published with International Journal of Mathematics Trends and Technology (IJMTT)

    Journal ref: International Journal of Mathematical Trends and Technology (IJMTT). V7:156-171 March 2014

  35. An Approach for Normalizing Fuzzy Relational Databases Based on Join Dependency

    Authors: Deepa S

    Abstract: Fuzziness in databases is used to denote uncertain or incomplete data. Relational Databases stress on the nature of the data to be certain. This certainty based data is used as the basis of the normalization approach designed for traditional relational databases. But real world data may not always be certain, thereby making it necessary to design an approach for normalization that deals with fuzzy… ▽ More

    Submitted 11 March, 2014; originally announced March 2014.

    Comments: 3 pages

    Journal ref: International Journal of Computer Trends and Technology (IJCTT) V9(1):1-3, March 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group

  36. arXiv:1312.3787  [pdf

    cs.CV

    Analysis and Understanding of Various Models for Efficient Representation and Accurate Recognition of Human Faces

    Authors: Dharini S., Guru Prasad M., Hari haran. V., Kiran Tej J. L., Kunal Ghosh

    Abstract: In this paper we have tried to compare the various face recognition models against their classical problems. We look at the methods followed by these approaches and evaluate to what extent they are able to solve the problems. All methods proposed have some drawbacks under certain conditions. To overcome these drawbacks we propose a multi-model approach

    Submitted 14 February, 2015; v1 submitted 13 December, 2013; originally announced December 2013.

    Comments: Proceedings of National Conference on "Emerging Trends in IT" - eit10, March 2010