Skip to main content

Showing 1–5 of 5 results for author: Tiwari, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2308.07052  [pdf

    cs.CV cs.AI cs.CY cs.LG

    Diagnosis of Scalp Disorders using Machine Learning and Deep Learning Approach -- A Review

    Authors: Hrishabh Tiwari, Jatin Moolchandani, Shamla Mantri

    Abstract: The morbidity of scalp diseases is minuscule compared to other diseases, but the impact on the patient's life is enormous. It is common for people to experience scalp problems that include Dandruff, Psoriasis, Tinea-Capitis, Alopecia and Atopic-Dermatitis. In accordance with WHO research, approximately 70% of adults have problems with their scalp. It has been demonstrated in descriptive research t… ▽ More

    Submitted 14 August, 2023; originally announced August 2023.

  2. arXiv:2112.14382  [pdf, other

    cs.CV cs.AI

    Self-Supervised Robustifying Guidance for Monocular 3D Face Reconstruction

    Authors: Hitika Tiwari, Min-Hung Chen, Yi-Min Tsai, Hsien-Kai Kuo, Hung-Jen Chen, Kevin Jou, K. S. Venkatesh, Yong-Sheng Chen

    Abstract: Despite the recent developments in 3D Face Reconstruction from occluded and noisy face images, the performance is still unsatisfactory. Moreover, most existing methods rely on additional dependencies, posing numerous constraints over the training procedure. Therefore, we propose a Self-Supervised RObustifying GUidancE (ROGUE) framework to obtain robustness against occlusions and noise in the face… ▽ More

    Submitted 21 October, 2022; v1 submitted 28 December, 2021; originally announced December 2021.

    Comments: Accepted by The 33rd British Machine Vision Conference (BMVC) 2022. Evaluation code and datasets: https://github.com/ArcTrinity9/Datasets-ReaChOcc-and-SynChOcc

  3. On Characterization of Entropic Vectors at the Boundary of Almost Entropic Cones

    Authors: Hitika Tiwari, Satyajit Thakor

    Abstract: The entropy region is a fundamental object in information theory. An outer bound for the entropy region is defined by a minimal set of Shannon-type inequalities called elemental inequalities also referred to as the Shannon region. This paper focuses on characterization of the entropic points at the boundary of the Shannon region for three random variables. The proper faces of the Shannon region fo… ▽ More

    Submitted 21 May, 2020; originally announced May 2020.

    Comments: ITW'19 (c) 2019 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works

  4. arXiv:1904.06672  [pdf, other

    cs.IR

    RelEmb: A relevance-based application embedding for Mobile App retrieval and categorization

    Authors: Ahsaas Bajaj, Shubham Krishna, Mukund Rungta, Hemant Tiwari, Vanraj Vala

    Abstract: Information Retrieval Systems have revolutionized the organization and extraction of Information. In recent years, mobile applications (apps) have become primary tools of collecting and disseminating information. However, limited research is available on how to retrieve and organize mobile apps on users' devices. In this paper, authors propose a novel method to estimate app-embeddings which are th… ▽ More

    Submitted 14 April, 2019; originally announced April 2019.

    Comments: 13 Pages. Accepted at CICLing 2019

  5. arXiv:1003.1492  [pdf

    cs.CR

    A Secure Hash Function MD-192 With Modified Message Expansion

    Authors: Harshvardhan Tiwari, Dr. Krishna Asawa

    Abstract: Cryptographic hash functions play a central role in cryptography. Hash functions were introduced in cryptology to provide message integrity and authentication. MD5, SHA1 and RIPEMD are among the most commonly used message digest algorithm. Recently proposed attacks on well known and widely used hash functions motivate a design of new stronger hash function. In this paper a new approach is presente… ▽ More

    Submitted 7 March, 2010; originally announced March 2010.

    Comments: Pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS, Vol. 7 No. 2, February 2010, USA. ISSN 1947 5500, http://sites.google.com/site/ijcsis/