-
Effective-LDAM: An Effective Loss Function To Mitigate Data Imbalance for Robust Chest X-Ray Disease Classification
Authors:
Sree Rama Vamsidhar S,
Bhargava Satya,
Rama Krishna Gorthi
Abstract:
Deep Learning (DL) approaches have gained prominence in medical imaging for disease diagnosis. Chest X-ray (CXR) classification has emerged as an effective method for detecting various diseases. Among these methodologies, Chest X-ray (CXR) classification has proven to be an effective approach for detecting and analyzing various diseases. However, the reliable performance of DL classification algor…
▽ More
Deep Learning (DL) approaches have gained prominence in medical imaging for disease diagnosis. Chest X-ray (CXR) classification has emerged as an effective method for detecting various diseases. Among these methodologies, Chest X-ray (CXR) classification has proven to be an effective approach for detecting and analyzing various diseases. However, the reliable performance of DL classification algorithms is dependent upon access to large and balanced datasets, which pose challenges in medical imaging due to the impracticality of acquiring sufficient data for every disease category. To tackle this problem, we propose an algorithmic-centric approach called Effective-Label Distribution Aware Margin (E-LDAM), which modifies the margin of the widely adopted Label Distribution Aware Margin (LDAM) loss function using an effective number of samples in each class. Experimental evaluations on the COVIDx CXR dataset focus on Normal, Pneumonia, and COVID-19 classification. The experimental results demonstrate the effectiveness of the proposed E-LDAM approach, achieving a remarkable recall score of 97.81% for the minority class (COVID-19) in CXR image prediction. Furthermore, the overall accuracy of the three-class classification task attains an impressive level of 95.26%.
△ Less
Submitted 6 July, 2024;
originally announced July 2024.
-
NSD-DIL: Null-Shot Deblurring Using Deep Identity Learning
Authors:
Sree Rama Vamsidhar S,
Rama Krishna Gorthi
Abstract:
In this paper, we propose to reformulate the blind image deblurring task to directly learn an inverse of the degradation model using a deep linear network. We introduce Deep Identity Learning (DIL), a novel learning strategy that includes a dedicated regularization term based on the properties of linear systems, to exploit the identity relation between the degradation and inverse degradation model…
▽ More
In this paper, we propose to reformulate the blind image deblurring task to directly learn an inverse of the degradation model using a deep linear network. We introduce Deep Identity Learning (DIL), a novel learning strategy that includes a dedicated regularization term based on the properties of linear systems, to exploit the identity relation between the degradation and inverse degradation models. The salient aspect of our proposed framework is it neither relies on a deblurring dataset nor a single input blurred image (like Polyblur, a self-supervised method). Since it is purely image-data-independent, we term our model as Null-Shot deblurring Using Deep Identity Learning (NSD-DIL). We also provide an explicit representation of the learned deep linear network in a matrix form, called Deep Restoration Kernel (DRK) for deblurring task. The proposed framework detours the typical degradation kernel estimation step involved in most of the existing blind deblurring solutions by the proposition of our Random Kernel Gallery (RKG) dataset. In this work, we focus on the restoration of mild blur images, generated by small out-of-focus, lens blur, or slight camera motion, which often occurs in real images. Our experiments show that the proposed method outperforms both traditional and deep learning based deblurring methods, with at least an order of 100 lesser computational resources. The proposed NSD-DIL method can be effortlessly extended to the Image Super-Resolution (ISR) task as well to restore the low-resolution images with fine details. The NSD-DIL model and its kernel form representation (DRK) are lightweight yet robust and restore the mild blur input in a fraction of a second. Hence, more suitable for wide real-time applications.
△ Less
Submitted 5 July, 2024;
originally announced July 2024.
-
Serpentine Synergy: Design and Fabrication of a Dual Soft Continuum Manipulator and Soft Snake Robot
Authors:
Rajashekhar V S,
Aravinth Rajesh,
Muhammad Imam Anugrahadi Athaaillah,
Gowdham Prabhakar
Abstract:
This work presents a soft continuum robot (SCR) that can be used as a soft continuum manipulator (SCM) and a soft snake robot (SSR). This is achieved using expanded polyethylene foam (EPE) modules as the soft material. In situations like post-earthquake search operations, these dual-purpose robots could play a vital role. The soft continuum manipulator with a camera attached to the tip can manuall…
▽ More
This work presents a soft continuum robot (SCR) that can be used as a soft continuum manipulator (SCM) and a soft snake robot (SSR). This is achieved using expanded polyethylene foam (EPE) modules as the soft material. In situations like post-earthquake search operations, these dual-purpose robots could play a vital role. The soft continuum manipulator with a camera attached to the tip can manually search for survivors in the debris. On the other hand, the soft snake robot can be made by attaching an active wheel to the soft continuum manipulator. This mobile robot can reach places humans cannot and gather information about survivors. This work presents the design, fabrication, and experimental validation of the dual soft continuum robot.
△ Less
Submitted 5 July, 2024;
originally announced July 2024.
-
Optimal Kinematic Design of a Robotic Lizard using Four-Bar and Five-Bar Mechanisms
Authors:
Rajashekhar V S,
Debasish Ghose,
Arockia Selvakumar Arockia Doss
Abstract:
Designing a mechanism to mimic the motion of a common house gecko is the objective of this work. The body of the robot is designed using four five-bar mechanisms (2-RRRRR and 2-RRPRR) and the leg is designed using four four-bar mechanisms. The 2-RRRRR five-bar mechanisms form the head and tail of the robotic lizard. The 2-RRPRR five-bar mechanisms form the left and right sides of the body in the r…
▽ More
Designing a mechanism to mimic the motion of a common house gecko is the objective of this work. The body of the robot is designed using four five-bar mechanisms (2-RRRRR and 2-RRPRR) and the leg is designed using four four-bar mechanisms. The 2-RRRRR five-bar mechanisms form the head and tail of the robotic lizard. The 2-RRPRR five-bar mechanisms form the left and right sides of the body in the robotic lizard. The four five-bar mechanisms are actuated by only four rotary actuators. Of these, two actuators control the head movements and the other two control the tail movements. The RRPRR five-bar mechanism is controlled by one actuator from the head five-bar mechanism and the other by the tail five-bar mechanism. A tension spring connects each active link to a link in the four bar mechanism. When the robot is actuated, the head, tail and the body moves, and simultaneously each leg moves accordingly. This kind of actuation where the motion transfer occurs from body of the robot to the leg is the novelty in our design. The dimensional synthesis of the robotic lizard is done and presented. Then the forward and inverse kinematics of the mechanism, and configuration space singularities identification for the robot are presented. The gait exhibited by the gecko is studied and then simulated. A computer aided design of the robotic lizard is created and a prototype is made by 3D printing the parts. The prototype is controlled using Arduino UNO as a micro-controller. The experimental results are finally presented based on the gait analysis that was done earlier. The forward walking, and turning motion are done and snapshots are presented.
△ Less
Submitted 16 August, 2023;
originally announced August 2023.
-
An Autonomous Hybrid Drone-Rover Vehicle for Weed Removal and Spraying Applications in Agriculture
Authors:
J Krishna Kant,
Mahankali Sripaad,
Anand Bharadwaj,
Rajashekhar V S,
Suresh Sundaram
Abstract:
The usage of drones and rovers helps to overcome the limitations of traditional agriculture which has been predominantly human-intensive, for carrying out tasks such as removal of weeds and spraying of fertilizers and pesticides. Drones and rovers are hel** to realize precision agriculture and farmers with improved monitoring and surveying at affordable costs. Major benefits have come for vertic…
▽ More
The usage of drones and rovers helps to overcome the limitations of traditional agriculture which has been predominantly human-intensive, for carrying out tasks such as removal of weeds and spraying of fertilizers and pesticides. Drones and rovers are hel** to realize precision agriculture and farmers with improved monitoring and surveying at affordable costs. Major benefits have come for vertical farming and fields with irrigation canals. However, drones have a limitation of flight time due to payload constraints. Rovers have limitations in vertical farming and obstacles like canals in agricultural fields. To meet the different requirements of multiple terrains and vertical farming in agriculture, we propose an autonomous hybrid drone-rover vehicle that combines the advantages of both rovers and drones. The prototype is described along with experimental results regarding its ability to avoid obstacles, pluck weeds and spray pesticides.
△ Less
Submitted 9 August, 2023;
originally announced August 2023.
-
A Simple Robot Selection Criteria After Path Planning Using Wavefront Algorithm
Authors:
Rajashekhar V S,
Dhaya C,
Dinakar Raj C K,
Dharshan P,
Mukesh Kumar S,
Harish B,
Ajith R,
Kamaleshwaran K
Abstract:
In this work we present a technique to select the best robot for accomplishing a task assuming that the map of the environment is known in advance. To do so, capabilities of the robots are listed and the environments where they can be used are mapped. There are five robots that included for doing the tasks. They are the robotic lizard, half-humanoid, robotic snake, biped and quadruped. Each of the…
▽ More
In this work we present a technique to select the best robot for accomplishing a task assuming that the map of the environment is known in advance. To do so, capabilities of the robots are listed and the environments where they can be used are mapped. There are five robots that included for doing the tasks. They are the robotic lizard, half-humanoid, robotic snake, biped and quadruped. Each of these robots are capable of performing certain activities and also they have their own limitations. The process of considering the robot performances and acting based on their limitations is the focus of this work. The wavefront algorithm is used to find the nature of terrain. Based on the terrain a suitable robot is selected from the list of five robots by the wavefront algorithm. Using this robot the mission is accomplished.
△ Less
Submitted 30 July, 2023;
originally announced July 2023.
-
Degrees of Freedom Analysis of Mechanisms using the New Zebra Crossing Method
Authors:
Rajashekhar V S,
Debasish Ghose
Abstract:
Mobility, which is a basic property for a mechanism has to be analyzed to find the degrees of freedom. A quick method for calculation of degrees of freedom in a mechanism is proposed in this work. The mechanism is represented in a way that resembles a zebra crossing. An algorithm is proposed which is used to determine the mobility from the zebra crossing diagram. This algorithm takes into account…
▽ More
Mobility, which is a basic property for a mechanism has to be analyzed to find the degrees of freedom. A quick method for calculation of degrees of freedom in a mechanism is proposed in this work. The mechanism is represented in a way that resembles a zebra crossing. An algorithm is proposed which is used to determine the mobility from the zebra crossing diagram. This algorithm takes into account the number of patches between the black patches, the number of joints attached to the fixed link and the number of loops in the mechanism. A number of cases have been discussed which fail to give the desired results using the widely used classical Kutzbach-Grubler formula.
△ Less
Submitted 7 January, 2022;
originally announced January 2022.
-
Design and Analysis of a Robotic Lizard using Five-Bar Mechanism
Authors:
Rajashekhar V S,
Dinakar Raj C K,
Vishwesh S,
Selva Perumal E,
Nirmal Kumar M
Abstract:
Legged robots are being used to explore rough terrains as they are capable of traversing gaps and obstacles. In this paper, a new mechanism is designed to replicate a robotic lizard using integrated five-bar mechanisms. There are two five bar mechanisms from which two more are formed by connecting the links in a particular order. The legs are attached to the links of the five bar mechanism such th…
▽ More
Legged robots are being used to explore rough terrains as they are capable of traversing gaps and obstacles. In this paper, a new mechanism is designed to replicate a robotic lizard using integrated five-bar mechanisms. There are two five bar mechanisms from which two more are formed by connecting the links in a particular order. The legs are attached to the links of the five bar mechanism such that, when the mechanism is actuated, they move the robot forward. Position analysis using vector loop approach has been done for the mechanism. A prototype has been built and controlled using servo motors to verify the robotic lizard mechanism.
△ Less
Submitted 27 July, 2021;
originally announced July 2021.
-
Prevention Of Attack In Vehicular Adhoc Network Using Trust Model
Authors:
Revanth V S,
Suthan L
Abstract:
Vehicular ad hoc networks is a modern technology that holds an important aspect in the transportation domain due to its abilities to increase traffic efficiency and safety. It is a another variant of Mobile ad-hoc networks that provides Vehicles to Vehicles (V2V), Rode-side Unit to Road-side Unit(R2R) and Vehicles to road-side Unit (V2R) communication.VANET is a multidimensional network in which t…
▽ More
Vehicular ad hoc networks is a modern technology that holds an important aspect in the transportation domain due to its abilities to increase traffic efficiency and safety. It is a another variant of Mobile ad-hoc networks that provides Vehicles to Vehicles (V2V), Rode-side Unit to Road-side Unit(R2R) and Vehicles to road-side Unit (V2R) communication.VANET is a multidimensional network in which the vehicles ceaselessly alter their locations. Connected vehicles broadcast sensitive information which must be communicated with the neighbors in a safe and established environment. VANET may also contain dishonest nodes such as man in -the-middle attackers that aim to distribute and share malicious content with the vehicles, thus contaminating the network with secure information. In this situation implementing a trust among connected vehicles can raise security as every participating vehicle will create and propagate authentic, accurate,and trusted content within the network.In this paper we used a trust model to determine the trust level and eliminate the malicious nodes.We created a simulation for calculating the trust level and eliminating the malicious node in the wireless ad hoc networks using ns2 simulator and network animator(nam).The simulation results showed a better bandwidth in communication between the nodes after the trust level is updated
△ Less
Submitted 19 May, 2021; v1 submitted 12 May, 2021;
originally announced May 2021.
-
Synthesis of a Six-Bar Gripper Mechanism for Aerial Gras**
Authors:
Rajashekhar V S,
Rokesh Laishram,
Kaushik Das,
Debasish Ghose
Abstract:
In this paper, a 1-DoF gripper mechanism has been synthesized for the type of mechanism, number of links and joints, and the dimensions of length, width and thickness of links. The type synthesis is done by selecting the proper class of mechanism from Reuleaux's six classes of mechanisms. The number synthesis is done by using an algebraic method. The dimensions of the linkages are found using the…
▽ More
In this paper, a 1-DoF gripper mechanism has been synthesized for the type of mechanism, number of links and joints, and the dimensions of length, width and thickness of links. The type synthesis is done by selecting the proper class of mechanism from Reuleaux's six classes of mechanisms. The number synthesis is done by using an algebraic method. The dimensions of the linkages are found using the geometric programming method. The gripper is then modeled in a computer aided design software and then fabricated using an additive manufacturing technique. Finally the gripper mechanism with DC motor as an actuator is mounted on an Unmanned Aerial Vehicle (UAV) to grip a spherical object moving in space. This work is related to a task in challenge 1 of Mohamed Bin Zayed International Robotics Challenge (MBZIRC)-2020.
△ Less
Submitted 11 December, 2020;
originally announced December 2020.
-
Global Image Segmentation Process using Machine Learning algorithm & Convolution Neural Network method for Self- Driving Vehicles
Authors:
Tirumalapudi Raviteja,
Rajay Vedaraj . I. S
Abstract:
In autonomous Vehicles technology Image segmentation was a major problem in visual perception. This image segmentation process is mainly used in medical applications. Here we adopted an image segmentation process to visual perception tasks for predicting the agents on the surrounding environment, identifying the road boundaries and tracking the line markings. Main objective of the paper is to divi…
▽ More
In autonomous Vehicles technology Image segmentation was a major problem in visual perception. This image segmentation process is mainly used in medical applications. Here we adopted an image segmentation process to visual perception tasks for predicting the agents on the surrounding environment, identifying the road boundaries and tracking the line markings. Main objective of the paper is to divide the input images using the image segmentation process and Convolution Neural Network method for efficient results of visual perception. For Sampling assume a local city data-set samples and validation process done in Jupyter Notebook using Python language. We proposed this image segmentation method planning to standard and further the development of state-of-the art methods for visual inspection system understanding. The experimental results achieves 73% mean IOU. Our method also achieves 90 FPS inference speed and using a NVDIA GeForce GTX 1050 GPU.
△ Less
Submitted 4 November, 2020; v1 submitted 25 October, 2020;
originally announced October 2020.
-
An Intrusion Using Malware and DDNS
Authors:
Gopinath Palaniappan,
Balaji Rajendran,
S Sangeetha,
Kumari Roshni V S
Abstract:
This whitepaper captures the details of the technical alert numbered TA18-149A dated 29th May 2018 issued by the United States Computer Emergency Readiness Team.
This whitepaper captures the details of the technical alert numbered TA18-149A dated 29th May 2018 issued by the United States Computer Emergency Readiness Team.
△ Less
Submitted 25 February, 2019;
originally announced February 2019.
-
Design of a Robust Stair Climbing Compliant Modular Robot to Tackle Overhang on Stairs
Authors:
A**kya Bhole,
Sri Harsha Turlapati,
Rajashekhar V. S,
Jay Dixit,
Suril V. Shah,
K Madhava Krishna
Abstract:
This paper discusses the concept and parameter design of a Robust Stair Climbing Compliant Modular Robot, capable of tackling stairs with overhangs. Modifying the geometry of the periphery of the wheels of our robot helps in tackling overhangs. Along with establishing a concept design, robust design parameters are set to minimize performance variation. The Grey-based Taguchi Method is adopted for…
▽ More
This paper discusses the concept and parameter design of a Robust Stair Climbing Compliant Modular Robot, capable of tackling stairs with overhangs. Modifying the geometry of the periphery of the wheels of our robot helps in tackling overhangs. Along with establishing a concept design, robust design parameters are set to minimize performance variation. The Grey-based Taguchi Method is adopted for providing an optimal setting for the design parameters of the robot. The robot prototype is shown to have successfully scaled stairs of varying dimensions, with overhang, thus corroborating the analysis performed.
△ Less
Submitted 11 July, 2016;
originally announced July 2016.