Skip to main content

Showing 1–44 of 44 results for author: Singh, T

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.09005  [pdf, other

    cs.CR

    Privacy Aware Memory Forensics

    Authors: Janardhan Kalikiri, Gaurav Varshney, Jaswinder Kour, Tarandeep Singh

    Abstract: In recent years, insider threats and attacks have been increasing in terms of frequency and cost to the corporate business. The utilization of end-to-end encrypted instant messaging applications (WhatsApp, Telegram, VPN) by malicious insiders raised data breach incidents exponentially. The Securities and Exchange Board of India (SEBI) investigated reports on such data leak incidents and reported a… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

  2. arXiv:2309.00700  [pdf, other

    cs.CR

    Cross-temporal Detection of Novel Ransomware Campaigns: A Multi-Modal Alert Approach

    Authors: Sathvik Murli, Dhruv Nandakumar, Prabhat Kumar Kushwaha, Cheng Wang, Christopher Redino, Abdul Rahman, Shalini Israni, Tarun Singh, Edward Bowen

    Abstract: We present a novel approach to identify ransomware campaigns derived from attack timelines representations within victim networks. Malicious activity profiles developed from multiple alert sources support the construction of alert graphs. This approach enables an effective and scalable representation of the attack timelines where individual nodes represent malicious activity detections with connec… ▽ More

    Submitted 1 September, 2023; originally announced September 2023.

    Comments: Preprint. Under Review

  3. arXiv:2308.13561  [pdf, other

    cs.HC cs.CV

    Project Aria: A New Tool for Egocentric Multi-Modal AI Research

    Authors: Jakob Engel, Kiran Somasundaram, Michael Goesele, Albert Sun, Alexander Gamino, Andrew Turner, Arjang Talattof, Arnie Yuan, Bilal Souti, Brighid Meredith, Cheng Peng, Chris Sweeney, Cole Wilson, Dan Barnes, Daniel DeTone, David Caruso, Derek Valleroy, Dinesh Ginjupalli, Duncan Frost, Edward Miller, Elias Mueggler, Evgeniy Oleinik, Fan Zhang, Guruprasad Somasundaram, Gustavo Solaira , et al. (49 additional authors not shown)

    Abstract: Egocentric, multi-modal data as available on future augmented reality (AR) devices provides unique challenges and opportunities for machine perception. These future devices will need to be all-day wearable in a socially acceptable form-factor to support always available, context-aware and personalized AI applications. Our team at Meta Reality Labs Research built the Aria device, an egocentric, mul… ▽ More

    Submitted 1 October, 2023; v1 submitted 24 August, 2023; originally announced August 2023.

  4. arXiv:2306.10439  [pdf, other

    cs.CV

    Object counting from aerial remote sensing images: application to wildlife and marine mammals

    Authors: Tanya Singh, Hugo Gangloff, Minh-Tan Pham

    Abstract: Anthropogenic activities pose threats to wildlife and marine fauna, prompting the need for efficient animal counting methods. This research study utilizes deep learning techniques to automate counting tasks. Inspired by previous studies on crowd and animal counting, a UNet model with various backbones is implemented, which uses Gaussian density maps for training, bypassing the need of training a d… ▽ More

    Submitted 17 June, 2023; originally announced June 2023.

    Comments: 4 pages, to appear in IGARSS 2023

  5. arXiv:2306.00856  [pdf

    cs.CV cs.LG

    A deep-learning approach to early identification of suggested sexual harassment from videos

    Authors: Shreya Shetye, Anwita Maiti, Tannistha Maiti, Tarry Singh

    Abstract: Sexual harassment, sexual abuse, and sexual violence are prevalent problems in this day and age. Women's safety is an important issue that needs to be highlighted and addressed. Given this issue, we have studied each of these concerns and the factors that affect it based on images generated from movies. We have classified the three terms (harassment, abuse, and violence) based on the visual attrib… ▽ More

    Submitted 1 June, 2023; originally announced June 2023.

    Comments: 7 pages, 4 figures

  6. arXiv:2304.06123  [pdf, other

    cs.CY

    The Impact of Large Language Multi-Modal Models on the Future of Job Market

    Authors: Tarry Singh

    Abstract: The rapid advancements in artificial intelligence, particularly in large language multi-modal models like GPT-4, have raised concerns about the potential displacement of human workers in various industries. This position paper aims to analyze the current state of job replacement by AI models and explores potential implications and strategies for a balanced coexistence between AI and human workers.

    Submitted 22 March, 2023; originally announced April 2023.

    Comments: 16 pages, 1 Table

  7. arXiv:2302.05652  [pdf, other

    math.CO cs.DM

    On Structural and Spectral Properties of Distance Magic Graphs

    Authors: Himadri Mukherjee, Ravindra Pawar, Tarkeshwar Singh

    Abstract: A graph $G=(V,E)$ is said to be distance magic if there is a bijection $f$ from a vertex set of $G$ to the first $|V(G)|$ natural numbers such that for each vertex $v$, its weight given by $\sum_{u \in N(v)}f(u)$ is constant, where $N(v)$ is an open neighborhood of a vertex $v$. In this paper, we introduce the concept of $p$-distance magic labeling and establish the necessary and sufficient condit… ▽ More

    Submitted 8 February, 2024; v1 submitted 11 February, 2023; originally announced February 2023.

    MSC Class: 05C78

  8. arXiv:2210.14252  [pdf, other

    cs.SD eess.AS

    Dynamic Speech Endpoint Detection with Regression Targets

    Authors: Dawei Liang, Hang Su, Tarun Singh, Jay Mahadeokar, Shanil Puri, Jiedan Zhu, Edison Thomaz, Mike Seltzer

    Abstract: Interactive voice assistants have been widely used as input interfaces in various scenarios, e.g. on smart homes devices, wearables and on AR devices. Detecting the end of a speech query, i.e. speech end-pointing, is an important task for voice assistants to interact with users. Traditionally, speech end-pointing is based on pure classification methods along with arbitrary binary targets. In this… ▽ More

    Submitted 25 October, 2022; originally announced October 2022.

    Comments: Manuscript submitted to ICASSP 2023

  9. arXiv:2210.05597  [pdf, other

    physics.geo-ph cs.AI

    Digitization of Raster Logs: A Deep Learning Approach

    Authors: M Quamer Nasim, Narendra Patwardhan, Tannistha Maiti, Tarry Singh

    Abstract: Raster well-log images are digital representations of well-logs data generated over the years. Raster digital well logs represent bitmaps of the log image in a rectangular array of black (zeros) and white dots (ones) called pixels. Experts study the raster logs manually or with software applications that still require a tremendous amount of manual input. Besides the loss of thousands of person-hou… ▽ More

    Submitted 11 October, 2022; originally announced October 2022.

  10. arXiv:2209.14171  [pdf, other

    cs.NI cs.AI

    Programmable and Customized Intelligence for Traffic Steering in 5G Networks Using Open RAN Architectures

    Authors: Andrea Lacava, Michele Polese, Rajarajan Sivaraj, Rahul Soundrarajan, Bhawani Shanker Bhati, Tarunjeet Singh, Tommaso Zugno, Francesca Cuomo, Tommaso Melodia

    Abstract: 5G and beyond mobile networks will support heterogeneous use cases at an unprecedented scale, thus demanding automated control and optimization of network functionalities customized to the needs of individual users. Such fine-grained control of the Radio Access Network (RAN) is not possible with the current cellular architecture. To fill this gap, the Open RAN paradigm and its specification introd… ▽ More

    Submitted 14 October, 2022; v1 submitted 28 September, 2022; originally announced September 2022.

    Comments: 15 pages, 2 algorithms, 1 table, 11 figures, 42 references

  11. Energy-Time Optimal Control of Wheeled Mobile Robots

    Authors: Young** Kim, Tarunraj Singh

    Abstract: This paper focuses on the energy-time optimal control of wheeled mobile robots undergoing point-to-point transitions in an obstacles free space. Two interchangeable models are used to arrive at the necessary conditions for optimality. The first formulation exploits the Hamiltonian, while the second formulation considers the first variation of the augmented cost to derive the necessary conditions f… ▽ More

    Submitted 6 June, 2022; originally announced June 2022.

    Comments: 36 pages,6 figures, 3 appendices

    Journal ref: Journal of the Franklin Institute, 2022

  12. arXiv:2202.00678  [pdf

    eess.IV cs.CV cs.LG

    Classification of Skin Cancer Images using Convolutional Neural Networks

    Authors: Kartikeya Agarwal, Tismeet Singh

    Abstract: Skin cancer is the most common human malignancy(American Cancer Society) which is primarily diagnosed visually, starting with an initial clinical screening and followed potentially by dermoscopic(related to skin) analysis, a biopsy and histopathological examination. Skin cancer occurs when errors (mutations) occur in the DNA of skin cells. The mutations cause the cells to grow out of control and f… ▽ More

    Submitted 1 February, 2022; originally announced February 2022.

    ACM Class: I.4.9; J.3

  13. arXiv:2110.05376  [pdf, other

    cs.CL

    Evaluating User Perception of Speech Recognition System Quality with Semantic Distance Metric

    Authors: Suyoun Kim, Duc Le, Weiyi Zheng, Tarun Singh, Abhinav Arora, Xiaoyu Zhai, Christian Fuegen, Ozlem Kalinli, Michael L. Seltzer

    Abstract: Measuring automatic speech recognition (ASR) system quality is critical for creating user-satisfying voice-driven applications. Word Error Rate (WER) has been traditionally used to evaluate ASR system quality; however, it sometimes correlates poorly with user perception/judgement of transcription quality. This is because WER weighs every word equally and does not consider semantic correctness whic… ▽ More

    Submitted 5 July, 2022; v1 submitted 11 October, 2021; originally announced October 2021.

    Comments: INTERSPEECH 2022

  14. arXiv:2011.14752  [pdf, other

    cs.CV cs.CL

    A Comprehensive Review on Recent Methods and Challenges of Video Description

    Authors: Alok Singh, Thoudam Doren Singh, Sivaji Bandyopadhyay

    Abstract: Video description involves the generation of the natural language description of actions, events, and objects in the video. There are various applications of video description by filling the gap between languages and vision for visually impaired people, generating automatic title suggestion based on content, browsing of the video based on the content and video-guided machine translation [86] etc.I… ▽ More

    Submitted 30 November, 2020; originally announced November 2020.

    Comments: Paper of 35 pages submitted to ACM Computing Surveys

  15. arXiv:2011.10510  [pdf

    physics.geo-ph cs.AI cs.CV cs.LG eess.IV

    Seismic Facies Analysis: A Deep Domain Adaptation Approach

    Authors: M Quamer Nasim, Tannistha Maiti, Ayush Srivastava, Tarry Singh, Jie Mei

    Abstract: Deep neural networks (DNNs) can learn accurately from large quantities of labeled input data, but often fail to do so when labelled data are scarce. DNNs sometimes fail to generalize ontest data sampled from different input distributions. Unsupervised Deep Domain Adaptation (DDA)techniques have been proven useful when no labels are available, and when distribution shifts are observed in the target… ▽ More

    Submitted 27 October, 2021; v1 submitted 20 November, 2020; originally announced November 2020.

    Comments: 22 pages, 13 figures, 5 tables, and supplementary material included in the end of the paper

  16. arXiv:2007.12081  [pdf, other

    cs.CL

    NITS-Hinglish-SentiMix at SemEval-2020 Task 9: Sentiment Analysis For Code-Mixed Social Media Text Using an Ensemble Model

    Authors: Subhra Jyoti Baroi, Nivedita Singh, Ringki Das, Thoudam Doren Singh

    Abstract: Sentiment Analysis is the process of deciphering what a sentence emotes and classifying them as either positive, negative, or neutral. In recent times, India has seen a huge influx in the number of active social media users and this has led to a plethora of unstructured text data. Since the Indian population is generally fluent in both Hindi and English, they end up generating code-mixed Hinglish… ▽ More

    Submitted 4 September, 2020; v1 submitted 23 July, 2020; originally announced July 2020.

    Comments: In Proceedings of the 14th International Workshop on Semantic Evaluation (SemEval-2020), Barcelona, Spain, December. Association for Computational Linguistics

  17. arXiv:2006.16212  [pdf, ps, other

    cs.CL

    Towards the Study of Morphological Processing of the Tangkhul Language

    Authors: Mirinso Shadang, Navanath Saharia, Thoudam Doren Singh

    Abstract: There is no or little work on natural language processing of Tangkhul language. The current work is a humble beginning of morphological processing of this language using an unsupervised approach. We use a small corpus collected from different sources of text books, short stories and articles of other topics. Based on the experiments carried out, the morpheme identification task using morphessor gi… ▽ More

    Submitted 29 June, 2020; originally announced June 2020.

    Comments: In proceeding of Regional International Conference on Natural Language Processing (regICON) 2017, 3rd and 4th November 2017, Imphal, India

    Journal ref: In proceeding of Regional International Conference on Natural Language Processing (regICON) 2017, 3rd and 4th November 2017, IIIT Senapati, Manipur, India

  18. arXiv:2006.11558  [pdf, other

    cs.CL

    Seq2Seq and Joint Learning Based Unix Command Line Prediction System

    Authors: Thoudam Doren Singh, Abdullah Faiz Ur Rahman Khilji, Divyansha, Apoorva Vikram Singh, Surmila Thokchom, Sivaji Bandyopadhyay

    Abstract: Despite being an open-source operating system pioneered in the early 90s, UNIX based platforms have not been able to garner an overwhelming reception from amateur end users. One of the rationales for under popularity of UNIX based systems is the steep learning curve corresponding to them due to extensive use of command line interface instead of usual interactive graphical user interface. In past y… ▽ More

    Submitted 20 June, 2020; originally announced June 2020.

    Comments: 9 pages, 1 Figure

  19. arXiv:2006.04058  [pdf, other

    cs.CV

    NITS-VC System for VATEX Video Captioning Challenge 2020

    Authors: Alok Singh, Thoudam Doren Singh, Sivaji Bandyopadhyay

    Abstract: Video captioning is process of summarising the content, event and action of the video into a short textual form which can be helpful in many research areas such as video guided machine translation, video sentiment analysis and providing aid to needy individual. In this paper, a system description of the framework used for VATEX-2020 video captioning challenge is presented. We employ an encoder-dec… ▽ More

    Submitted 25 September, 2020; v1 submitted 7 June, 2020; originally announced June 2020.

    Comments: Workshop on Language & Vision with applications to Video Understanding (LVVU 2020) - In conjunction with CVPR 2020

  20. arXiv:2005.12978  [pdf

    cs.IR cs.LG

    Devising Malware Characterstics using Transformers

    Authors: Simra Shahid, Tanmay Singh, Yash Sharma, Kapil Sharma

    Abstract: With the increasing number of cybersecurity threats, it becomes more difficult for researchers to skim through the security reports for malware analysis. There is a need to be able to extract highly relevant sentences without having to read through the entire malware reports. In this paper, we are finding relevant malware behavior mentions from Advanced Persistent Threat Reports. This main contrib… ▽ More

    Submitted 23 May, 2020; originally announced May 2020.

    Comments: 5 pages, 3 figures, 3 tables

  21. Big Computing: Where are we heading?

    Authors: Sabuzima Nayak, Ripon Patgiri, Thoudam Doren Singh

    Abstract: This paper presents the overview of the current trends of Big data against the computing scenario from different aspects. Some of the important aspect includes the Exascale, the computing power and the kind of applications which offer the Big data. This starts with the current computing hardware constraint against the need of the rising Big data applications. We highlight the issues and challenges… ▽ More

    Submitted 9 April, 2020; originally announced May 2020.

    Comments: Published in EAI Endorsed Transactions on Scalable Information Systems

    MSC Class: 68-02; 68M14; 68M11; 68M10 ACM Class: C.0; C.1; C.2; C.3; C.5; C.5

    Journal ref: EAI Endorsed Transactions on Scalable Information Systems, 2020

  22. arXiv:2004.14975  [pdf, other

    cs.CL cs.AI cs.LG

    Investigating Transferability in Pretrained Language Models

    Authors: Alex Tamkin, Trisha Singh, Davide Giovanardi, Noah Goodman

    Abstract: How does language model pretraining help transfer learning? We consider a simple ablation technique for determining the impact of each pretrained layer on transfer task performance. This method, partial reinitialization, involves replacing different layers of a pretrained model with random weights, then finetuning the entire model on the transfer task and observing the change in performance. This… ▽ More

    Submitted 9 November, 2020; v1 submitted 30 April, 2020; originally announced April 2020.

    Comments: Findings of EMNLP 2020

  23. arXiv:2004.08417  [pdf, other

    cs.CE

    Identifying Weakly Connected Subsystems in Building Energy Model for Effective Load Estimation in Presence of Parametric Uncertainty

    Authors: Arpan Mukherjee, Anna Kuechle Szweda, Andrew Alegria, Rahul Rai, Tarunraj Singh

    Abstract: It is necessary to estimate the expected energy usage of a building to determine how to reduce energy usage. The expected energy usage of a building can be reliably simulated using a Building Energy Model (BEM). Many of the numerous input parameters in a BEM are uncertain. To ensure that the building simulation is sufficiently accurate, and to better understand the impact of imprecisions in the in… ▽ More

    Submitted 17 April, 2020; originally announced April 2020.

  24. arXiv:2004.06674  [pdf, other

    cs.LG cs.NE stat.ML

    Systematically designing better instance counting models on cell images with Neural Arithmetic Logic Units

    Authors: Ashish Rana, Taranveer Singh, Harpreet Singh, Neeraj Kumar, Prashant Singh Rana

    Abstract: The big problem for neural network models which are trained to count instances is that whenever test range goes high training range generalization error increases i.e. they are not good generalizers outside training range. Consider the case of automating cell counting process where more dense images with higher cell counts are commonly encountered as compared to images used in training data. By ma… ▽ More

    Submitted 15 June, 2020; v1 submitted 14 April, 2020; originally announced April 2020.

    Comments: * code repository for project: https://github.com/ashishrana160796/nalu-cell-counting

  25. arXiv:1910.12008  [pdf, other

    cs.LG cs.CV stat.ML

    Fair Generative Modeling via Weak Supervision

    Authors: Kristy Choi, Aditya Grover, Trisha Singh, Rui Shu, Stefano Ermon

    Abstract: Real-world datasets are often biased with respect to key demographic factors such as race and gender. Due to the latent nature of the underlying factors, detecting and mitigating bias is especially challenging for unsupervised machine learning. We present a weakly supervised algorithm for overcoming dataset bias for deep generative models. Our approach requires access to an additional small, unlab… ▽ More

    Submitted 30 June, 2020; v1 submitted 26 October, 2019; originally announced October 2019.

    Comments: First two authors contributed equally

  26. Reduced-order modeling using Dynamic Mode Decomposition and Least Angle Regression

    Authors: John Graff, Xianzhang Xu, Francis D. Lagor, Tarunraj Singh

    Abstract: Dynamic Mode Decomposition (DMD) yields a linear, approximate model of a system's dynamics that is built from data. We seek to reduce the order of this model by identifying a reduced set of modes that best fit the output. We adopt a model selection algorithm from statistics and machine learning known as Least Angle Regression (LARS). We modify LARS to be complex-valued and utilize LARS to select D… ▽ More

    Submitted 16 January, 2020; v1 submitted 16 May, 2019; originally announced May 2019.

    Comments: 14 pages, 2 Figures, Submitted to AIAA Aviation Conference 2019

  27. arXiv:1903.04090  [pdf

    cs.CV

    A Hybrid Framework for Action Recognition in Low-Quality Video Sequences

    Authors: Tej Singh, Dinesh Kumar Vishwakarma

    Abstract: Vision-based activity recognition is essential for security, monitoring and surveillance applications. Further, real-time analysis having low-quality video and contain less information about surrounding due to poor illumination, and occlusions. Therefore, it needs a more robust and integrated model for low quality and night security operations. In this context, we proposed a hybrid model for illum… ▽ More

    Submitted 10 March, 2019; originally announced March 2019.

    Comments: 13 pages, 9 Figures

  28. arXiv:1902.03570  [pdf, other

    cs.AI cs.CL cs.CV cs.LG

    EvalAI: Towards Better Evaluation Systems for AI Agents

    Authors: Deshraj Yadav, Rishabh Jain, Harsh Agrawal, Prithvijit Chattopadhyay, Taranjeet Singh, Akash Jain, Shiv Baran Singh, Stefan Lee, Dhruv Batra

    Abstract: We introduce EvalAI, an open source platform for evaluating and comparing machine learning (ML) and artificial intelligence algorithms (AI) at scale. EvalAI is built to provide a scalable solution to the research community to fulfill the critical need of evaluating machine learning models and agents acting in an environment against annotations or with a human-in-the-loop. This will help researcher… ▽ More

    Submitted 10 February, 2019; originally announced February 2019.

  29. arXiv:1807.00981  [pdf, other

    cs.NE

    Learning concise representations for regression by evolving networks of trees

    Authors: William La Cava, Tilak Raj Singh, James Taggart, Srinivas Suri, Jason H. Moore

    Abstract: We propose and study a method for learning interpretable representations for the task of regression. Features are represented as networks of multi-type expression trees comprised of activation functions common in neural networks in addition to other elementary functions. Differentiable features are trained via gradient descent, and the performance of features in a linear model is used to weight th… ▽ More

    Submitted 25 March, 2019; v1 submitted 3 July, 2018; originally announced July 2018.

    Comments: 16 pages, 11 figures (including Appendix), published in ICLR 2019

  30. arXiv:1506.06735  [pdf, other

    cs.ET

    Hybrid Memristor-CMOS (MeMOS) based Logic Gates and Adder Circuits

    Authors: Te**der Singh

    Abstract: Practical memristor came into picture just few years back and instantly became the topic of interest for researchers and scientists. Memristor is the fourth basic two-terminal passive circuit element apart from well known resistor, capacitor and inductor. Recently, memristor based architectures has been proposed by many researchers. In this paper, we have designed a hybrid Memristor-CMOS (MeMOS) l… ▽ More

    Submitted 19 June, 2015; originally announced June 2015.

    Comments: 10 pages, 13 figures, 5 tables, journal

  31. arXiv:1406.0124  [pdf

    cs.NI

    Software-Defined Networking: State of the Art and Research Challenges

    Authors: Manar Jammal, Taranpreet Singh, Abdallah Shami, Rasool Asal, Yiming Li

    Abstract: Plug-and-play information technology (IT) infrastructure has been expanding very rapidly in recent years. With the advent of cloud computing, many ecosystem and business paradigms are encountering potential changes and may be able to eliminate their IT infrastructure maintenance processes. Real-time performance and high availability requirements have induced telecom networks to adopt the new conce… ▽ More

    Submitted 31 May, 2014; originally announced June 2014.

  32. arXiv:1403.7774  [pdf

    cs.NI cs.IT

    Study and Capacity Evaluation of SISO, MISO and MIMO RF Wireless Communication Systems

    Authors: Kritika Sengar, Nishu Rani, Ankita Singhal, Dolly Sharma, Seema Verma, Tanya Singh

    Abstract: The wireless communication systems has gone from different generations from SISO systems to MIMO systems. Bandwidth is one important constraint in wireless communication. In wireless communication, high data transmission rates are essential for the services like tripple play i.e. data, voice and video. At user end the capacity determines the quality of the communication systems. This paper aims to… ▽ More

    Submitted 30 March, 2014; originally announced March 2014.

    Comments: 5 pages, 9 figure

  33. arXiv:1312.1822  [pdf

    cs.OS

    Towards the Framework of the File Systems Performance Evaluation Techniques and the Taxonomy of Replay Traces

    Authors: Brijender Kahanwal, Te**der Pal Singh

    Abstract: This is the era of High Performance Computing (HPC). There is a great demand of the best performance evaluation techniques for the file and storage systems. The task of evaluation is both necessary and hard. It gives in depth analysis of the target system and that becomes the decision points for the users. That is also helpful for the inventors or developers to find out the bottleneck in their sys… ▽ More

    Submitted 6 December, 2013; originally announced December 2013.

    Comments: 7 pages

    Journal ref: International Journal of Advanced Research in Computer Science, 2(6) pp. 224-229, 2011

  34. arXiv:1312.1817  [pdf

    cs.SE

    Java File Security System (JFSS) Evaluation Using Software Engineering Approaches

    Authors: Brijender Kahanwal, Te**der Pal Singh

    Abstract: A Java File Security System (JFSS) [1] has been developed by us. That is an ecrypted file system. It is developed by us because there are so many file data breaches in the past and current history and they are going to increase day by day as the reports by DataLossDB (Open Security Foundation) organization, a non-profit organization in US so it is. The JFSS is evaluated regarding the two software… ▽ More

    Submitted 6 December, 2013; originally announced December 2013.

    Journal ref: International Journal of Advanced Research in Computer Science & Software Engineering, 2(1), pp. 132-137, 2012

  35. arXiv:1312.1810  [pdf

    cs.OS

    File System - A Component of Operating System

    Authors: Brijender Kahanwal, Te**der Pal Singh, Ruchira Bhargava, Girish Pal Singh

    Abstract: The file system provides the mechanism for online storage and access to file contents, including data and programs. This paper covers the high-level details of file systems, as well as related topics such as the disk cache, the file system interface to the kernel, and the user-level APIs that use the features of the file system. It will give you a thorough understanding of how a file system works… ▽ More

    Submitted 6 December, 2013; originally announced December 2013.

    Comments: 5 pages, 3 figures, 1 table

    Journal ref: Asian Journal of Computer Science and Information Technology 2(5), pp. 124-128, 2012

  36. arXiv:1312.1460  [pdf

    cs.CR

    Towards the Framework of Information Security

    Authors: Dr. Brijender Kahanwal, Dr. Te**der Pal Singh

    Abstract: Todays modern society is extremely dependent on computer based information systems. Many of the organizations would simply not be able to function properly without services provided by these systems, just like financing organizations. Although interruption might decrease the efficiency of an organization, theft or unintentional disclosure of entrusted private data could have more serious consequen… ▽ More

    Submitted 5 December, 2013; originally announced December 2013.

    Comments: 4 pages, 4 figures, 1 table

    Journal ref: Journal of Current Engineering Research, 2(2), pp. 31-34, 2012

  37. arXiv:1311.7203  [pdf

    cs.PL

    Function Overloading Implementation in C++

    Authors: Dr. Brijender Kahanwal, Dr. T. P. Singh

    Abstract: In this article the function overloading in object-oriented programming is elaborated and how they are implemented in C++. The language supports a variety of programming styles. Here we are describing the polymorphism and its types in brief. The main stress is given on the function overloading implementation styles in the language. The polymorphic nature of languages has advantages like that we ca… ▽ More

    Submitted 27 November, 2013; originally announced November 2013.

    Comments: 7 pages, 9 Figures

    Journal ref: International Journal of Advances in Engineering Sciences (e-ISSN: 2231-0347, ISSN: 2231-2013), Volume 3, Issue 4, pp. 12-18, 2013

  38. arXiv:1311.3686  [pdf

    cs.OS cs.CR cs.PF

    Performance Evaluation of Java File Security System (JFSS)

    Authors: Brijender Kahanwal, Dr. Te**der Pal Singh, Dr. R. K. Tuteja

    Abstract: Security is a critical issue of the modern file and storage systems, it is imperative to protect the stored data from unauthorized access. We have developed a file security system named as Java File Security System (JFSS) [1] that guarantee the security to files on the demand of all users. It has been developed on Java platform. Java has been used as programming language in order to provide portab… ▽ More

    Submitted 13 November, 2013; originally announced November 2013.

    Comments: 7 pages, 5 figures, journal

    Journal ref: Pelagia Research Library Advances in Applied Science Research, Vol. 2(6), pp. 254-260, 2011

  39. arXiv:1311.3070  [pdf

    cs.DC

    The Distributed Computing Paradigms: P2P, Grid, Cluster, Cloud, and Jungle

    Authors: Dr. Brijender Kahanwal, Dr. T. P. Singh

    Abstract: The distributed computing is done on many systems to solve a large scale problem. The growing of high-speed broadband networks in developed and develo** countries, the continual increase in computing power, and the rapid growth of the Internet have changed the way. In it the society manages information and information services. Historically, the state of computing has gone through a series of pl… ▽ More

    Submitted 13 November, 2013; originally announced November 2013.

    Comments: 5 pages, 7 figures, journal

    Journal ref: International Journal of Latest Research in Science and Technology, Vol. 1, No. 2, pp. 183-187, 2012

  40. arXiv:1205.2738  [pdf

    cs.CR

    Analysis of Different Privacy Preserving Cloud Storage Frameworks

    Authors: Rajeev Bedi, Mohit Marwaha, Ta**der Singh, Harwinder Singh, Amritpal Singh

    Abstract: Privacy Security of data in Cloud Storage is one of the main issues. Many Frameworks and Technologies are used to preserve data security in cloud storage. [1] Proposes a framework which includes the design of data organization structure, the generation and management of keys, the treatment of change of user's access right and dynamic operations of data, and the interaction between participants. It… ▽ More

    Submitted 14 January, 2012; originally announced May 2012.

  41. arXiv:1203.5960  [pdf

    cs.CR

    TSET: Token based Secure Electronic Transaction

    Authors: Rajdeep Borgohain, Moirangthem Tiken Singh, Chandrakant Sakharwade, Sugata Sanyal

    Abstract: Security and trust are the most important factors in online transaction, this paper introduces TSET a Token based Secure Electronic Transaction which is an improvement over the existing SET, Secure Electronic Transaction protocol. We take the concept of tokens in the TSET protocol to provide end to end security. It also provides trust evaluation mechanism so that trustworthiness of the merchants c… ▽ More

    Submitted 7 April, 2012; v1 submitted 27 March, 2012; originally announced March 2012.

    Comments: 7 pages, 3 figures, 2 tables

  42. arXiv:1201.5227  [pdf

    cs.CV

    A New Local Adaptive Thresholding Technique in Binarization

    Authors: T. Romen Singh, Sudipta Roy, O. Imocha Singh, Tejmani Sinam, Kh. Manglem Singh

    Abstract: Image binarization is the process of separation of pixel values into two groups, white as background and black as foreground. Thresholding plays a major in binarization of images. Thresholding can be categorized into global thresholding and local thresholding. In images with uniform contrast distribution of background and foreground like document images, global thresholding is more appropriate. In… ▽ More

    Submitted 25 January, 2012; originally announced January 2012.

    Comments: ISSN (Online): 1694-0814 http://www.IJCSI.org 271

    Report number: rs12

    Journal ref: IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 6, No 2, (2011) 271-277

  43. arXiv:1107.1545  [pdf, ps, other

    stat.AP cs.DC physics.data-an

    Comparison of SCIPUFF Plume Prediction with Particle Filter Assimilated Prediction for Dipole Pride 26 Data

    Authors: Gabriel Terejanu, Yang Cheng, Tarunraj Singh, Peter D. Scott

    Abstract: This paper presents the application of a particle filter for data assimilation in the context of puff-based dispersion models. Particle filters provide estimates of the higher moments, and are well suited for strongly nonlinear and/or non-Gaussian models. The Gaussian puff model SCIPUFF, is used in predicting the chemical concentration field after a chemical incident. This model is highly nonlinea… ▽ More

    Submitted 7 July, 2011; originally announced July 2011.

    Comments: The Chemical and Biological Defense Physical Science and Technology Conference, New Orleans, November 2008

  44. arXiv:cs/0701044  [pdf

    cs.CR

    New ID Based Multi-Proxy Multi-Signcryption Scheme from Pairings

    Authors: Sunder Lal, Tej Singh

    Abstract: This paper presents an identity based multi-proxy multi-signcryption scheme from pairings. In this scheme a proxy signcrypter group could authorized as a proxy agent by the coopration of all members in the original signcryption group. Then the proxy signcryption can be generated by the cooperation of all the signcrypters in the authorized proxy signcrypter group on the behalf of the original sig… ▽ More

    Submitted 8 January, 2007; originally announced January 2007.

    Comments: 9 pages