Skip to main content

Showing 1–12 of 12 results for author: S., S R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.04953  [pdf, other

    eess.IV cs.CV

    Effective-LDAM: An Effective Loss Function To Mitigate Data Imbalance for Robust Chest X-Ray Disease Classification

    Authors: Sree Rama Vamsidhar S, Bhargava Satya, Rama Krishna Gorthi

    Abstract: Deep Learning (DL) approaches have gained prominence in medical imaging for disease diagnosis. Chest X-ray (CXR) classification has emerged as an effective method for detecting various diseases. Among these methodologies, Chest X-ray (CXR) classification has proven to be an effective approach for detecting and analyzing various diseases. However, the reliable performance of DL classification algor… ▽ More

    Submitted 6 July, 2024; originally announced July 2024.

  2. arXiv:2407.04815  [pdf, other

    cs.CV

    NSD-DIL: Null-Shot Deblurring Using Deep Identity Learning

    Authors: Sree Rama Vamsidhar S, Rama Krishna Gorthi

    Abstract: In this paper, we propose to reformulate the blind image deblurring task to directly learn an inverse of the degradation model using a deep linear network. We introduce Deep Identity Learning (DIL), a novel learning strategy that includes a dedicated regularization term based on the properties of linear systems, to exploit the identity relation between the degradation and inverse degradation model… ▽ More

    Submitted 5 July, 2024; originally announced July 2024.

  3. arXiv:2407.03941  [pdf, other

    cs.SE cs.AI cs.CL

    Narrow Transformer: Starcoder-Based Java-LM For Desktop

    Authors: Kamalkumar Rathinasamy, Balaji A J, Ankush Kumar, Gagan Gayari, Harshini K, Rajab Ali Mondal, Sreenivasa Raghavan K S, Swayam Singh

    Abstract: This paper presents NT-Java-1.1B, an open-source specialized code language model built on StarCoderBase-1.1B, designed for coding tasks in Java programming. NT-Java-1.1B achieves state-of-the-art performance, surpassing its base model and majority of other models of similar size on MultiPL-E Java code benchmark. While there have been studies on extending large, generic pre-trained models to improv… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

    ACM Class: I.2.7

  4. arXiv:2306.15128  [pdf, other

    cs.CV cs.AI cs.LG

    MIMIC: Masked Image Modeling with Image Correspondences

    Authors: Kalyani Marathe, Mahtab Bigverdi, Nishat Khan, Tuhin Kundu, Patrick Howe, Sharan Ranjit S, Anand Bhattad, Aniruddha Kembhavi, Linda G. Shapiro, Ranjay Krishna

    Abstract: Dense pixel-specific representation learning at scale has been bottlenecked due to the unavailability of large-scale multi-view datasets. Current methods for building effective pretraining datasets heavily rely on annotated 3D meshes, point clouds, and camera parameters from simulated environments, preventing them from building datasets from real-world data sources where such metadata is lacking.… ▽ More

    Submitted 15 May, 2024; v1 submitted 26 June, 2023; originally announced June 2023.

  5. arXiv:2305.19435  [pdf, other

    cs.LG cs.IR

    AdANNS: A Framework for Adaptive Semantic Search

    Authors: Aniket Rege, Aditya Kusupati, Sharan Ranjit S, Alan Fan, Qingqing Cao, Sham Kakade, Prateek Jain, Ali Farhadi

    Abstract: Web-scale search systems learn an encoder to embed a given query which is then hooked into an approximate nearest neighbor search (ANNS) pipeline to retrieve similar data points. To accurately capture tail queries and data points, learned representations typically are rigid, high-dimensional vectors that are generally used as-is in the entire ANNS pipeline and can lead to computationally expensive… ▽ More

    Submitted 18 October, 2023; v1 submitted 30 May, 2023; originally announced May 2023.

    Comments: 25 pages, 15 figures. NeurIPS 2023 camera ready publication

  6. arXiv:2304.08189  [pdf, other

    cs.RO

    Control and Coordination of a SWARM of Unmanned Surface Vehicles using Deep Reinforcement Learning in ROS

    Authors: Shrudhi R S, Sreyash Mohanty, Dr. Susan Elias

    Abstract: An unmanned surface vehicle (USV) can perform complex missions by continuously observing the state of its surroundings and taking action toward a goal. A SWARM of USVs working together can complete missions faster, and more effectively than a single USV alone. In this paper, we propose an autonomous communication model for a swarm of USVs. The goal of this system is to implement a software system… ▽ More

    Submitted 17 April, 2023; originally announced April 2023.

    Comments: 13 pages, 10 figures

  7. arXiv:2304.07555  [pdf, other

    cs.DC

    SerPyTor: A distributed context-aware computational graph execution framework for durable execution

    Authors: Anuran Roy, Sridhar Raj S

    Abstract: Distributed computation is always a tricky topic to deal with, especially in context of various requirements in various scenarios. A popular solution is to use Apache Spark with a setup of multiple systems forming a cluster. However, the prerequisite setup for a Spark cluster often induces an additional overhead, often limiting usage in constrained scenarios, especially in scenarios requiring cont… ▽ More

    Submitted 15 April, 2023; originally announced April 2023.

    Comments: 5 pages, 2 figures

  8. arXiv:2007.10257  [pdf, other

    cs.AI cs.LG

    An Autoencoder Based Approach to Simulate Sports Games

    Authors: Ashwin Vaswani, Rijul Ganguly, Het Shah, Sharan Ranjit S, Shrey Pandit, Samruddhi Bothara

    Abstract: Sports data has become widely available in the recent past. With the improvement of machine learning techniques, there have been attempts to use sports data to analyze not only the outcome of individual games but also to improve insights and strategies. The outbreak of COVID-19 has interrupted sports leagues globally, giving rise to increasing questions and speculations about the outcome of this s… ▽ More

    Submitted 16 July, 2020; originally announced July 2020.

  9. A Heuristic Algorithm for Network Optimization of OTN over DWDM Network

    Authors: Govardan C., Sri Krishna Chaitanya K., Krishna Kumar Naik B., Shreesha Rao D. S., Jagadeesh C., Gowrishankar R., Siva Sankara Sai S., Prabhat Behere, Bhyri Sai Kishore

    Abstract: While the network traffic has seen exponential increase, the revenues have not maintained the same pace. New methods have to be explored to reduce this gap between traffic and revenue. One such method is convergence in networking layers. In this work, we study the convergence of OTN and DWDM layer from a network planning perspective. We compare the costs of planning networks without and with conve… ▽ More

    Submitted 31 December, 2018; originally announced January 2019.

    Comments: Pages: 1-6, Published in: 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems (ANTS), Date of Conference: 15-18 Dec. 2015, Publisher: IEEE, Electronic ISBN: 978-1-5090-0293-1, USB ISBN:978-1-5090-0292-4

  10. arXiv:1602.02390  [pdf, other

    cs.IT

    Lower Bounds for Interactive Function Computation via Wyner Common Information

    Authors: Shi** Rajakrishnan, Sundara Rajan S, Vinod Prabhakaran

    Abstract: The question of how much communication is required between collaborating parties to compute a function of their data is of fundamental importance in the fields of theoretical computer science and information theory. In this work, the focus is on coming up with lower bounds on this. The information cost of a protocol is the amount of information the protocol reveals to Alice and Bob about each othe… ▽ More

    Submitted 7 February, 2016; originally announced February 2016.

    Comments: 7 pages, 4 figures, accepted in NCC 2016

  11. arXiv:1004.4464  [pdf

    cs.IR cs.MM cs.SD

    Audio enabled information extraction system for cricket and hockey domains

    Authors: S. Saraswathi, Narasimha Sravan. V, Sai Vamsi Krishna. B. V, Suresh Reddy. S

    Abstract: The proposed system aims at the retrieval of the summarized information from the documents collected from web based search engine as per the user query related to cricket and hockey domain. The system is designed in a manner that it takes the voice commands as keywords for search. The parts of speech in the query are extracted using the natural language extractor for English. Based on the keywords… ▽ More

    Submitted 26 April, 2010; originally announced April 2010.

    Comments: Journal of Computing online at https://sites.google.com/site/journalofcomputing/

    Journal ref: Journal of Computing, Volume 2, Issue 4, April 2010

  12. arXiv:0908.3587  [pdf

    cs.CR

    Tracing Technique for Blaster Attack

    Authors: Siti Rahayu S., Robiah Y., Shahrin S., Faizal M. A., Mohd Zaki M, Irda R

    Abstract: Blaster worm of 2003 is still persistent, the infection appears to have successfully transitioned to new hosts as the original systems are cleaned or shut off, suggesting that the Blaster worm, and other similar worms, will remain significant Internet threats for many years after their initial release. This paper is to propose technique on tracing the Blaster attack from various logs in differen… ▽ More

    Submitted 25 August, 2009; originally announced August 2009.

    Comments: 8 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423 http://sites.google.com/site/ijcsis/

    Report number: ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Volume 4, No. 1, August 2009, USA