Skip to main content

Showing 1–44 of 44 results for author: S, M

Searching in archive cs. Search in all archives.
.
  1. Stereo Vision Based Robot for Remote Monitoring with VR Support

    Authors: Mohamed Fazil M. S., Arockia Selvakumar A., Daniel Schilberg

    Abstract: The machine vision systems have been playing a significant role in visual monitoring systems. With the help of stereovision and machine learning, it will be able to mimic human-like visual system and behaviour towards the environment. In this paper, we present a stereo vision based 3-DOF robot which will be used to monitor places from remote using cloud server and internet devices. The 3-DOF robot… ▽ More

    Submitted 27 June, 2024; originally announced June 2024.

    Comments: 6 Pages, 10 Figures

    ACM Class: I.4.0

    Journal ref: International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249-8958 (Online), Volume-9 Issue-1S3, December 2019

  2. arXiv:2405.17449  [pdf

    cs.CV cs.AI cs.LG

    Image Based Character Recognition, Documentation System To Decode Inscription From Temple

    Authors: Velmathi G, Shangavelan M, Harish D, Krithikshun M S

    Abstract: This project undertakes the training and analysis of optical character recognition OCR methods applied to 10th century ancient Tamil inscriptions discovered on the walls of the Brihadeeswarar Temple.The chosen OCR methods include Tesseract,a widely used OCR engine,using modern ICR techniques to pre process the raw data and a box editing software to finetune our model.The analysis with Tesseract ai… ▽ More

    Submitted 21 May, 2024; originally announced May 2024.

    Comments: This research paper is a part of capstone project submitted to VIT Chennai, VIT University

  3. arXiv:2404.19534  [pdf, other

    cs.CV

    MIPI 2024 Challenge on Nighttime Flare Removal: Methods and Results

    Authors: Yuekun Dai, Dafeng Zhang, Xiaoming Li, Zongsheng Yue, Chongyi Li, Shangchen Zhou, Ruicheng Feng, Peiqing Yang, Zhezhu **, Guanqun Liu, Chen Change Loy, Lize Zhang, Shuai Liu, Chaoyu Feng, Luyang Wang, Shuan Chen, Guangqi Shao, Xiaotao Wang, Lei Lei, Qirui Yang, Qihua Cheng, Zhiqiang Xu, Yihao Liu, Huan**g Yue, **gyu Yang , et al. (38 additional authors not shown)

    Abstract: The increasing demand for computational photography and imaging on mobile platforms has led to the widespread development and integration of advanced image sensors with novel algorithms in camera systems. However, the scarcity of high-quality data for research and the rare opportunity for in-depth exchange of views from industry and academia constrain the development of mobile intelligent photogra… ▽ More

    Submitted 27 May, 2024; v1 submitted 30 April, 2024; originally announced April 2024.

    Comments: CVPR 2024 Mobile Intelligent Photography and Imaging (MIPI) Workshop--Nighttime Flare Removal Challenge Report. Website: https://mipi-challenge.org/MIPI2024/

  4. arXiv:2404.10678  [pdf

    cs.SE cs.LG

    Automating REST API Postman Test Cases Using LLM

    Authors: S Deepika Sri, Mohammed Aadil S, Sanjjushri Varshini R, Raja CSP Raman, Gopinath Rajagopal, S Taranath Chan

    Abstract: In the contemporary landscape of technological advancements, the automation of manual processes is crucial, compelling the demand for huge datasets to effectively train and test machines. This research paper is dedicated to the exploration and implementation of an automated approach to generate test cases specifically using Large Language Models. The methodology integrates the use of Open AI to en… ▽ More

    Submitted 16 April, 2024; originally announced April 2024.

  5. arXiv:2404.05776  [pdf

    cs.CV cs.AI eess.SY

    Forecasting Electric Vehicle Battery Output Voltage: A Predictive Modeling Approach

    Authors: Narayana Darapaneni, Ashish K, Ullas M S, Anwesh Reddy Paduri

    Abstract: The battery management system plays a vital role in ensuring the safety and dependability of electric and hybrid vehicles. It is responsible for various functions, including state evaluation, monitoring, charge control, and cell balancing, all integrated within the BMS. Nonetheless, due to the uncertainties surrounding battery performance, implementing these functionalities poses significant chall… ▽ More

    Submitted 8 April, 2024; originally announced April 2024.

  6. arXiv:2403.10171  [pdf

    cs.AI cs.CV

    AUTONODE: A Neuro-Graphic Self-Learnable Engine for Cognitive GUI Automation

    Authors: Arkajit Datta, Tushar Verma, Rajat Chawla, Mukunda N. S, Ishaan Bhola

    Abstract: In recent advancements within the domain of Large Language Models (LLMs), there has been a notable emergence of agents capable of addressing Robotic Process Automation (RPA) challenges through enhanced cognitive capabilities and sophisticated reasoning. This development heralds a new era of scalability and human-like adaptability in goal attainment. In this context, we introduce AUTONODE (Autonomo… ▽ More

    Submitted 27 May, 2024; v1 submitted 15 March, 2024; originally announced March 2024.

    Comments: Accepted in MIPR-2024

  7. arXiv:2403.09891  [pdf, other

    cs.CL cs.AI cs.LG

    Fisher Mask Nodes for Language Model Merging

    Authors: Thennal D K, Ganesh Nathan, Suchithra M S

    Abstract: Fine-tuning pre-trained models provides significant advantages in downstream performance. The ubiquitous nature of pre-trained models such as BERT and its derivatives in natural language processing has also led to a proliferation of task-specific fine-tuned models. As these models typically only perform one task well, additional training or ensembling is required in multi-task scenarios. The growi… ▽ More

    Submitted 3 May, 2024; v1 submitted 14 March, 2024; originally announced March 2024.

    Comments: Accepted at LREC-COLING 2024

  8. arXiv:2402.17424  [pdf

    cs.CV

    ViTaL: An Advanced Framework for Automated Plant Disease Identification in Leaf Images Using Vision Transformers and Linear Projection For Feature Reduction

    Authors: Abhishek Sebastian, Annis Fathima A, Pragna R, Madhan Kumar S, Yaswanth Kannan G, Vinay Murali

    Abstract: Our paper introduces a robust framework for the automated identification of diseases in plant leaf images. The framework incorporates several key stages to enhance disease recognition accuracy. In the pre-processing phase, a thumbnail resizing technique is employed to resize images, minimizing the loss of critical image details while ensuring computational efficiency. Normalization procedures are… ▽ More

    Submitted 27 February, 2024; v1 submitted 27 February, 2024; originally announced February 2024.

    Comments: Accepted and scheduled for presentation at CML 2024, this work will be published as a book chapter in Lecture Notes in Networks and Systems

  9. arXiv:2402.11750  [pdf, other

    cs.CL

    In-Context Learning Demonstration Selection via Influence Analysis

    Authors: Vinay M. S., Minh-Hao Van, Xintao Wu

    Abstract: Large Language Models (LLMs) have showcased their In-Context Learning (ICL) capabilities, enabling few-shot learning without the need for gradient updates. Despite its advantages, the effectiveness of ICL heavily depends on the choice of demonstrations. Selecting the most effective demonstrations for ICL remains a significant research challenge. To tackle this issue, we propose a demonstration sel… ▽ More

    Submitted 17 June, 2024; v1 submitted 18 February, 2024; originally announced February 2024.

    Comments: 11 pages, 1 figure, and 6 tables

  10. arXiv:2312.01302  [pdf

    cs.HC cs.CY cs.RO

    Smart safety watch for elderly people and pregnant women

    Authors: Balachandra D S, Maithreyee M S, Saipavan B M, Shashank S, Dr. P Devaki, Ms. Ashwini M

    Abstract: Falls represent one of the most detrimental occurrences for the elderly. Given the continually increasing ageing demographic, there is a pressing demand for advancing fall detection systems. The swift progress in sensor networks and the Internet of Things (IoT) has made human-computer interaction through sensor fusion an acknowledged and potent approach for tackling the issue of fall detection. Ev… ▽ More

    Submitted 3 December, 2023; originally announced December 2023.

  11. arXiv:2310.14654  [pdf, ps, other

    cs.CL eess.AS

    SPRING-INX: A Multilingual Indian Language Speech Corpus by SPRING Lab, IIT Madras

    Authors: Nithya R, Malavika S, Jordan F, Arjun Gangwar, Metilda N J, S Umesh, Rithik Sarab, Akhilesh Kumar Dubey, Govind Divakaran, Samudra Vijaya K, Suryakanth V Gangashetty

    Abstract: India is home to a multitude of languages of which 22 languages are recognised by the Indian Constitution as official. Building speech based applications for the Indian population is a difficult problem owing to limited data and the number of languages and accents to accommodate. To encourage the language technology community to build speech based applications in Indian languages, we are open sour… ▽ More

    Submitted 24 October, 2023; v1 submitted 23 October, 2023; originally announced October 2023.

    Comments: 3 pages, About SPRING-INX Data

  12. arXiv:2309.10617  [pdf, other

    cs.CV

    Intelligent Debris Mass Estimation Model for Autonomous Underwater Vehicle

    Authors: Mohana Sri S, Swethaa S, Aouthithiye Barathwaj SR Y, Sai Ganesh CS

    Abstract: Marine debris poses a significant threat to the survival of marine wildlife, often leading to entanglement and starvation, ultimately resulting in death. Therefore, removing debris from the ocean is crucial to restore the natural balance and allow marine life to thrive. Instance segmentation is an advanced form of object detection that identifies objects and precisely locates and separates them, m… ▽ More

    Submitted 1 November, 2023; v1 submitted 19 September, 2023; originally announced September 2023.

    MSC Class: 53-06 ACM Class: I.4.8

  13. arXiv:2308.10055  [pdf, other

    cs.CR cs.AI

    Robust Fraud Detection via Supervised Contrastive Learning

    Authors: Vinay M. S., Shuhan Yuan, Xintao Wu

    Abstract: Deep learning models have recently become popular for detecting malicious user activity sessions in computing platforms. In many real-world scenarios, only a few labeled malicious and a large amount of normal sessions are available. These few labeled malicious sessions usually do not cover the entire diversity of all possible malicious sessions. In many scenarios, possible malicious sessions can b… ▽ More

    Submitted 19 August, 2023; originally announced August 2023.

    Comments: 16 pages, 5 figures, and 3 tables

  14. arXiv:2307.16157  [pdf, other

    cs.RO

    A Simple Robot Selection Criteria After Path Planning Using Wavefront Algorithm

    Authors: Rajashekhar V S, Dhaya C, Dinakar Raj C K, Dharshan P, Mukesh Kumar S, Harish B, Ajith R, Kamaleshwaran K

    Abstract: In this work we present a technique to select the best robot for accomplishing a task assuming that the map of the environment is known in advance. To do so, capabilities of the robots are listed and the environments where they can be used are mapped. There are five robots that included for doing the tasks. They are the robotic lizard, half-humanoid, robotic snake, biped and quadruped. Each of the… ▽ More

    Submitted 30 July, 2023; originally announced July 2023.

    Comments: 8 pages, 4 figures

  15. arXiv:2211.04557  [pdf, other

    cs.CV cs.RO

    Estimation of Appearance and Occupancy Information in Birds Eye View from Surround Monocular Images

    Authors: Sarthak Sharma, Unnikrishnan R. Nair, Udit Singh Parihar, Midhun Menon S, Srikanth Vidapanakal

    Abstract: Autonomous driving requires efficient reasoning about the location and appearance of the different agents in the scene, which aids in downstream tasks such as object detection, object tracking, and path planning. The past few years have witnessed a surge in approaches that combine the different taskbased modules of the classic self-driving stack into an End-toEnd(E2E) trainable learning system. Th… ▽ More

    Submitted 8 November, 2022; originally announced November 2022.

  16. arXiv:2205.11117  [pdf, other

    cs.LG cs.AI

    PyRelationAL: a python library for active learning research and development

    Authors: Paul Scherer, Thomas Gaudelet, Alison Pouplin, Alice Del Vecchio, Suraj M S, Oliver Bolton, Jyothish Soman, Jake P. Taylor-King, Lindsay Edwards

    Abstract: In constrained real-world scenarios, where it may be challenging or costly to generate data, disciplined methods for acquiring informative new data points are of fundamental importance for the efficient training of machine learning (ML) models. Active learning (AL) is a sub-field of ML focused on the development of methods to iteratively and economically acquire data through strategically querying… ▽ More

    Submitted 17 February, 2023; v1 submitted 23 May, 2022; originally announced May 2022.

    Comments: Updated paper reflecting 1.0.0 release

  17. arXiv:2203.06583  [pdf

    cs.SD cs.AI eess.AS

    Bi-Sampling Approach to Classify Music Mood leveraging Raga-Rasa Association in Indian Classical Music

    Authors: Mohan Rao B C, Vinayak Arkachaari, Harsha M N, Sushmitha M N, Gayathri Ramesh K K, Ullas M S, Pathi Mohan Rao, Sudha G, Narayana Darapaneni

    Abstract: The impact of Music on the mood or emotion of the listener is a well-researched area in human psychology and behavioral science. In Indian classical music, ragas are the melodic structure that defines the various styles and forms of the music. Each raga has been found to evoke a specific emotion in the listener. With the advent of advanced capabilities of audio signal processing and the applicatio… ▽ More

    Submitted 13 March, 2022; originally announced March 2022.

  18. arXiv:2202.04202  [pdf, other

    q-bio.QM cs.LG

    RECOVER: sequential model optimization platform for combination drug repurposing identifies novel synergistic compounds in vitro

    Authors: Paul Bertin, Jarrid Rector-Brooks, Deepak Sharma, Thomas Gaudelet, Andrew Anighoro, Torsten Gross, Francisco Martinez-Pena, Eileen L. Tang, Suraj M S, Cristian Regep, Jeremy Hayter, Maksym Korablyov, Nicholas Valiante, Almer van der Sloot, Mike Tyers, Charles Roberts, Michael M. Bronstein, Luke L. Lairson, Jake P. Taylor-King, Yoshua Bengio

    Abstract: For large libraries of small molecules, exhaustive combinatorial chemical screens become infeasible to perform when considering a range of disease models, assay conditions, and dose ranges. Deep learning models have achieved state of the art results in silico for the prediction of synergy scores. However, databases of drug combinations are biased towards synergistic agents and these results do not… ▽ More

    Submitted 2 March, 2023; v1 submitted 6 February, 2022; originally announced February 2022.

  19. arXiv:2110.00791  [pdf, other

    cs.CV cs.AI

    Optimizing Neural Network for Computer Vision task in Edge Device

    Authors: Ranjith M S, S Parameshwara, Pavan Yadav A, Shriganesh Hegde

    Abstract: The field of computer vision has grown very rapidly in the past few years due to networks like convolution neural networks and their variants. The memory required to store the model and computational expense are very high for such a network limiting it to deploy on the edge device. Many times, applications rely on the cloud but that makes it hard for working in real-time due to round-trip delays.… ▽ More

    Submitted 2 October, 2021; originally announced October 2021.

  20. arXiv:2109.00481  [pdf, other

    cs.RO eess.SY

    Autonomous Cooperative Multi-Vehicle System for Interception of Aerial and Stationary Targets in Unknown Environments

    Authors: Lima Agnel Tony, Shuvrangshu Jana, Varun V. P., Aashay Anil Bhise, Aruul Mozhi Varman S., Vidyadhara B. V., Mohitvishnu S. Gadde, Raghu Krishnapuram, Debasish Ghose

    Abstract: This paper presents the design, development, and testing of hardware-software systems by the IISc-TCS team for Challenge 1 of the Mohammed Bin Zayed International Robotics Challenge 2020. The goal of Challenge 1 was to grab a ball suspended from a moving and maneuvering UAV and pop balloons anchored to the ground, using suitable manipulators. The important tasks carried out to address this challen… ▽ More

    Submitted 1 September, 2021; originally announced September 2021.

    Comments: Accepted for publication at Springer Field Robotics journal

  21. arXiv:2011.11081  [pdf

    cs.CV cs.AI cs.LG

    Deep learning model trained on mobile phone-acquired frozen section images effectively detects basal cell carcinoma

    Authors: Junli Cao, B. S., Junyan Wu, M. S., **g W. Zhang, M. D., Ph. D., Jay J. Ye, M. D., Ph. D., Limin Yu, M. D., M. S

    Abstract: Background: Margin assessment of basal cell carcinoma using the frozen section is a common task of pathology intraoperative consultation. Although frequently straight-forward, the determination of the presence or absence of basal cell carcinoma on the tissue sections can sometimes be challenging. We explore if a deep learning model trained on mobile phone-acquired frozen section images can have ad… ▽ More

    Submitted 22 November, 2020; originally announced November 2020.

  22. NIT COVID-19 at WNUT-2020 Task 2: Deep Learning Model RoBERTa for Identify Informative COVID-19 English Tweets

    Authors: Jagadeesh M S, Alphonse P J A

    Abstract: This paper presents the model submitted by the NIT_COVID-19 team for identified informative COVID-19 English tweets at WNUT-2020 Task2. This shared task addresses the problem of automatically identifying whether an English tweet related to informative (novel coronavirus) or not. These informative tweets provide information about recovered, confirmed, suspected, and death cases as well as the locat… ▽ More

    Submitted 11 November, 2020; originally announced November 2020.

    Comments: 5 pages, one figures, conference

  23. arXiv:2009.13066  [pdf, other

    cs.RO

    Vision based Target Interception using Aerial Manipulation

    Authors: Lima Agnel Tony, Shuvrangshu Jana, Aashay Bhise, Varun V P, Aruul Mozhi Varman S, Vidyadhara B V, Mohitvishnu S Gadde, Debasish Ghose, Raghu Krishnapuram

    Abstract: Selective interception of objects in unknown environment autonomously by UAVs is an interesting problem. In this work, vision based interception is carried out. This problem is a part of challenge 1 of Mohammed Bin Zayed International Robotic Challenge, 2020, where, balloons are kept at five random locations for the UAVs to autonomously explore, detect, approach and intercept. The problem requires… ▽ More

    Submitted 28 September, 2020; originally announced September 2020.

    Journal ref: 2020 MBZIRC Symposium, Abu Dhabi

  24. arXiv:2008.09333  [pdf, other

    cs.CL cs.LG

    Tweet to News Conversion: An Investigation into Unsupervised Controllable Text Generation

    Authors: Zishan Ahmad, Mukuntha N S, Asif Ekbal, Pushpak Bhattacharyya

    Abstract: Text generator systems have become extremely popular with the advent of recent deep learning models such as encoder-decoder. Controlling the information and style of the generated output without supervision is an important and challenging Natural Language Processing (NLP) task. In this paper, we define the task of constructing a coherent paragraph from a set of disaster domain tweets, without any… ▽ More

    Submitted 21 August, 2020; originally announced August 2020.

    Comments: Accepted in IJCNN-2020

  25. arXiv:2001.00575  [pdf

    cs.HC cs.CL

    Smart Summarizer for Blind People

    Authors: Mona teja K, Mohan Sai. S, H S S S Raviteja D, Sai Kushagra P V

    Abstract: In today's world, time is a very important resource. In our busy lives, most of us hardly have time to read the complete news so what we have to do is just go through the headlines and satisfy ourselves with that. As a result, we might miss a part of the news or misinterpret the complete thing. The situation is even worse for the people who are visually impaired or have lost their ability to see.… ▽ More

    Submitted 1 January, 2020; originally announced January 2020.

    Comments: 4 pages, 4 figures

  26. A Study on various state of the art of the Art Face Recognition System using Deep Learning Techniques

    Authors: Sukhada Chokkadi, Sannidhan M S, Sudeepa K B, Abhir Bhandary

    Abstract: Considering the existence of very large amount of available data repositories and reach to the very advanced system of hardware, systems meant for facial identification ave evolved enormously over the past few decades. Sketch recognition is one of the most important areas that have evolved as an integral component adopted by the agencies of law administration in current trends of forensic science.… ▽ More

    Submitted 19 November, 2019; originally announced November 2019.

    Journal ref: International Journal of Advanced Trends in Computer Science and Engineering, 8(4), July- August 2019, 1590

  27. arXiv:1910.08643  [pdf, other

    eess.IV cs.CV

    Intracranial Hemorrhage Segmentation Using Deep Convolutional Model

    Authors: Murtadha D. Hssayeni, M. S., Muayad S. Croock, Ph. D., Aymen Al-Ani, Ph. D., Hassan Falah Al-khafaji, M. D., Zakaria A. Yahya, M. D., Behnaz Ghoraani, Ph. D

    Abstract: Traumatic brain injuries could cause intracranial hemorrhage (ICH). ICH could lead to disability or death if it is not accurately diagnosed and treated in a time-sensitive procedure. The current clinical protocol to diagnose ICH is examining Computerized Tomography (CT) scans by radiologists to detect ICH and localize its regions. However, this process relies heavily on the availability of an expe… ▽ More

    Submitted 15 November, 2019; v1 submitted 18 October, 2019; originally announced October 2019.

  28. arXiv:1907.06096  [pdf

    cs.AI

    Automated Gaming Pommerman: FFA

    Authors: Ms. Navya Singh, Mr. Anshul Dhull, Mr. Barath Mohan. S, Mr. Bhavish Pahwa, Ms. Komal Sharma

    Abstract: Our game Pommerman is based on the console game Bommerman. The game starts on an 11 by 11 platform. Pommerman is a multi-agent environment and is made up of a set of different situations and contains four agents.

    Submitted 13 July, 2019; originally announced July 2019.

    Comments: 5 pages , 5 figures

  29. arXiv:1902.06676  [pdf, other

    cs.CV cs.LG

    Generative Adversarial Networks Synthesize Realistic OCT Images of the Retina

    Authors: Stephen G. Odaibo, M. D., M. S., M. S.

    Abstract: We report, to our knowledge, the first end-to-end application of Generative Adversarial Networks (GANs) towards the synthesis of Optical Coherence Tomography (OCT) images of the retina. Generative models have gained recent attention for the increasingly realistic images they can synthesize, given a sampling of a data type. In this paper, we apply GANs to a sampling distribution of OCTs of the reti… ▽ More

    Submitted 18 February, 2019; originally announced February 2019.

  30. arXiv:1811.07603  [pdf

    cs.AI

    Quantum Inspired High Dimensional Conceptual Space as KID Model for Elderly Assistance

    Authors: Ishwarya M S, Aswani Kumar Ch

    Abstract: In this paper, we propose a cognitive system that acquires knowledge on elderly daily activities to ensure their wellness in a smart home using a Knowledge-Information-Data (KID) model. The novel cognitive framework called high dimensional conceptual space is proposed and used as KID model. This KID model is built using geometrical framework of conceptual spaces and formal concept analysis (FCA) t… ▽ More

    Submitted 19 November, 2018; originally announced November 2018.

    Comments: 18th International conference on Intelligent Systems Design and Applications, (ISDA) to be held from December 6th, 2018

  31. arXiv:1806.11338  [pdf

    cs.AI

    Quantum aspects of high dimensional formal representation of conceptual spaces

    Authors: Ishwarya M S, Aswani Kumar Cherukuri

    Abstract: Human cognition is a complex process facilitated by the intricate architecture of human brain. However, human cognition is often reduced to quantum theory based events in principle because of their correlative conjectures for the purpose of analysis for reciprocal understanding. In this paper, we begin our analysis of human cognition via formal methods and proceed towards quantum theories. Human c… ▽ More

    Submitted 29 June, 2018; originally announced June 2018.

  32. arXiv:1802.06209  [pdf

    cs.CL cs.SD eess.AS

    Sentiment Analysis on Speaker Specific Speech Data

    Authors: Maghilnan S, Rajesh Kumar M

    Abstract: Sentiment analysis has evolved over past few decades, most of the work in it revolved around textual sentiment analysis with text mining techniques. But audio sentiment analysis is still in a nascent stage in the research community. In this proposed research, we perform sentiment analysis on speaker discriminated speech transcripts to detect the emotions of the individual speakers involved in the… ▽ More

    Submitted 17 February, 2018; originally announced February 2018.

    Comments: Accepted and Published in 2017 IEEE International Conference on Intelligent Computing and Control (I2C2), 23 Jun - 24 Jun 2017, India

  33. A Minimum Reconfiguration Probability Routing Algorithm for RWA in All-Optical Networks

    Authors: Mohan Kumar S, Jagadeesha SN

    Abstract: In this paper, we present a detailed study of Minimum Reconfiguration Probability Routing (MRPR) algorithm, and its performance evaluation in comparison with Adaptive unconstrained routing (AUR) and Least Loaded routing (LLR) algorithms. We have minimized the effects of failures on link and router failure in the network under changing load conditions, we assess the probability of service and numbe… ▽ More

    Submitted 21 January, 2017; originally announced January 2017.

    Comments: arXiv admin note: text overlap with arXiv:1605.05872

    ACM Class: F.2.2

    Journal ref: SIPIJ Vol 7, 2016, 39-51

  34. arXiv:1610.00024  [pdf, other

    cs.DC

    A Study of Revenue Cost Dynamics in Large Data Centers: A Factorial Design Approach

    Authors: Gambhire Swati Sampatrao, Sudeepa Roy Dey, Bidisha Goswami, Sai Prasanna M. S, Snehanshu Saha

    Abstract: Revenue optimization of large data centers is an open and challenging problem. The intricacy of the problem is due to the presence of too many parameters posing as costs or investment. This paper proposes a model to optimize the revenue in cloud data center and analyzes the model, revenue and different investment or cost commitments of organizations investing in data centers. The model uses the Co… ▽ More

    Submitted 30 September, 2016; originally announced October 2016.

  35. Routing in all optical networks using recursive state space technique

    Authors: Mohan Kumar S, Jagadeesha SN

    Abstract: In this paper, we have minimized the effects of failures on network performance, by using suitable Routing and Wavelenghth Assignment(RWA) method without disturbing other performance criteria such as blocking probability(BP) and network management(NM). The computation complexity is reduced by using Kalaman Filter(KF) techniques. The minimum reconfiguration probability routing (MRPR) algorithm must… ▽ More

    Submitted 19 May, 2016; originally announced May 2016.

    Report number: sipij.2016-4

    Journal ref: Results 1 (2016) 23-37

  36. arXiv:1603.06297  [pdf

    cs.CR

    Notes on "An Effective ECC based User Access Control Scheme with Attribute based Encryption for WSN"

    Authors: Mrudula S, ChandraMouli Reddy, Lakshmi Narayana, JayaPrakash, Chandra Sekhar Vorugunti

    Abstract: The rapid growth of networking and communication technologies results in amalgamation of 'Internet of Things' and 'Wireless sensor networks' to form WSNIT. WSNIT facilitates the WSN to connect dynamically to Internet and exchange the data with the external world. The critical data stored in sensor nodes related to patient health, environment can be accessed by attackers via insecure internet. To c… ▽ More

    Submitted 18 March, 2016; originally announced March 2016.

    Comments: AIMOC 2016 Jadavpur university

  37. Mean-Field Semantics for a Process Calculus for Spatially-Explicit Ecological Models

    Authors: Mauricio Toro, Anna Philippou, Sair Arboleda, María Puerta, Carlos M. Vélez S.

    Abstract: We define a mean-field semantics for S-PALPS, a process calculus for spatially-explicit, individual-based modeling of ecological systems. The new semantics of S-PALPS allows an interpretation of the average behavior of a system as a set of recurrence equations. Recurrence equations are a useful approximation when dealing with a large number of individuals, as it is the case in epidemiological st… ▽ More

    Submitted 3 March, 2016; originally announced March 2016.

    Comments: In Proceedings DCM 2015, arXiv:1603.00536

    ACM Class: F.4.1

    Journal ref: EPTCS 204, 2016, pp. 79-94

  38. arXiv:1312.2323  [pdf

    cs.SE cs.CY

    Architectural Pattern of Health Care System Using GSM Networks

    Authors: Meiappane. A, Dr. V. Prasanna Venkatesan, Selva Murugan. S, Arun. A, Ramachandran. A

    Abstract: Large-scale networked environments, such as the Internet, possess the characteristics of centralised data, centralised access and centralised control; this gives the user a powerful mechanism for building and integrating large repositories of centralised information from diverse resources set. However, a centralised network system with GSM Networks development for a hospital information systems or… ▽ More

    Submitted 9 December, 2013; originally announced December 2013.

    Comments: 7 pages

    Journal ref: (IJCTE), ISSN: 1793-8201. vol. 3, no. 1, pp. 64-70, February 2011

  39. Conversion of Braille to Text in English, Hindi and Tamil Languages

    Authors: S. Padmavathi, Manojna K. S. S, S. Sphoorthy Reddy, D. Meenakshy

    Abstract: The Braille system has been used by the visually impaired for reading and writing. Due to limited availability of the Braille text books an efficient usage of the books becomes a necessity. This paper proposes a method to convert a scanned Braille document to text which can be read out to many through the computer. The Braille documents are pre processed to enhance the dots and reduce the noise. T… ▽ More

    Submitted 11 July, 2013; originally announced July 2013.

    Comments: 14 pages, 20 figures, 4 tables

    Journal ref: International Journal of Computer Science, Engineering and Applications (IJCSEA) Vol.3, No.3, June 2013

  40. arXiv:1204.2616  [pdf

    cs.MM cs.CR

    Genetic Algorithm to Make Persistent Security and Quality of Image in Steganography from RS Analysis

    Authors: T. R. Gopalakrishnan Nair, Suma V, Manas S

    Abstract: Retention of secrecy is one of the significant features during communication activity. Steganography is one of the popular methods to achieve secret communication between sender and receiver by hiding message in any form of cover media such as an audio, video, text, images etc. Least significant bit encoding is the simplest encoding method used by many steganography programs to hide secret message… ▽ More

    Submitted 12 April, 2012; originally announced April 2012.

    Comments: 8 Pages, 4 Figures, Swarm Evolutionary and Memetric Computing Conference (SEMCCO), Vishakhapatnam

  41. arXiv:1201.2100  [pdf

    cs.NE

    Biologically inspired design framework for Robot in Dynamic Environments using Framsticks

    Authors: Raja Mohamed S., P. Raviraj

    Abstract: Robot design complexity is increasing day by day especially in automated industries. In this paper we propose biologically inspired design framework for robots in dynamic world on the basis of Co-Evolution, Virtual Ecology, Life time learning which are derived from biological creatures. We have created a virtual khepera robot in Framsticks and tested its operational credibility in terms hardware a… ▽ More

    Submitted 10 January, 2012; originally announced January 2012.

    Comments: presented in the conference DPPR2011 at MS University, Tirunelveli, India; International Journal on Bioinformatics & Biosciences (IJBB) Vol.1, No.1, December 2011

    MSC Class: 00A72 ACM Class: B.2.2

  42. arXiv:1002.1951  [pdf

    cs.MM cs.IR

    Image Retrieval Techniques based on Image Features, A State of Art approach for CBIR

    Authors: Mr. Kondekar V. H., Mr. Kolkure V. S., Prof. Kore S. N

    Abstract: The purpose of this Paper is to describe our research on different feature extraction and matching techniques in designing a Content Based Image Retrieval (CBIR) system. Due to the enormous increase in image database sizes, as well as its vast deployment in various applications, the need for CBIR development arose. Firstly, this paper outlines a description of the primitive feature extraction te… ▽ More

    Submitted 9 February, 2010; originally announced February 2010.

    Comments: IEEE format, International Journal of Computer Science and Information Security, IJCSIS January 2010, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: Journal of Computer Science, ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 7, No. 1, pp. 69-76, January 2010, USA

  43. arXiv:1002.1687  [pdf

    cs.NI

    Wireless Congestion Control Protocol For Multihop Ad Hoc Networks

    Authors: Mahendra kumar. S, Senthil Prakash. K

    Abstract: The traditional TCP congestion control mechanism encounters a number of new problems and suffers a poor performance when the IEEE 802.11 MAC protocol is used in multihop ad hoc networks. Many of the problems result from medium contention at the MAC layer. In this paper, I first illustrate that severe medium contention and congestion are intimately coupled, and TCP s congestion control algorithm… ▽ More

    Submitted 8 February, 2010; originally announced February 2010.

    Comments: 7 Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS January 2010, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: Computer Science Volume 7 ISSN 19475500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 7, No. 1, pp. 25-31, January 2010, USA

  44. arXiv:0912.3956  [pdf

    cs.RO

    Modeling and Application of Series Elastic Actuators for Force Control Multi Legged Robots

    Authors: Arumugom. S, Muthuraman. S, Ponselvan. V

    Abstract: Series Elastic Actuators provide many benefits in force control of robots in unconstrained environments. These benefits include high force fidelity, extremely low impedance, low friction, and good force control bandwidth. Series Elastic Actuators employ a novel mechanical design architecture which goes against the common machine design principal of "stiffer is better". A compliant element is pla… ▽ More

    Submitted 19 December, 2009; originally announced December 2009.

    Journal ref: Journal of Computing, Volume 1, Issue 1, pp 26-33, December 2009