Zum Hauptinhalt springen

Showing 1–15 of 15 results for author: Sivakumar, V

.
  1. arXiv:2310.00432  [pdf, other

    quant-ph physics.optics

    How much time does a photon spend as an atomic excitation before being transmitted?

    Authors: Kyle Thompson, Kehui Li, Daniela Angulo, Vida-Michelle Nixon, Josiah Sinclair, Amal Vijayalekshmi Sivakumar, Howard M. Wiseman, Aephraim M. Steinberg

    Abstract: When a single photon traverses a cloud of 2-level atoms, the average time it spends as an atomic excitation -- as measured by weakly probing the atoms -- can be shown to be the spontaneous lifetime of the atoms multiplied by the probability of the photon being scattered into a side mode. A tempting inference from this is that an average scattered photon spends one spontaneous lifetime as an atomic… ▽ More

    Submitted 30 September, 2023; originally announced October 2023.

    Comments: 22 pages, 7 figures

  2. arXiv:2207.00416  [pdf, other

    cs.NI cs.LG cs.RO eess.SP

    Energy Efficient Routing For Underwater Acoustic Sensor Network Using Genetic Algorithm

    Authors: Arjun Prasad Chaurasiya, Roshan Sah, Dr. V. Sivakumar

    Abstract: In underwater acoustic sensor networks (UWASN), energy-reliable data transmission is a challenging task. This is due to acoustic transmission disturbances caused by excessive noise, exceptionally long propagation delays, a high bit error rate, limited bandwidth capability, and interference. One of the most important issues of UWASN for research is how to extend the life span of data transmission.… ▽ More

    Submitted 25 April, 2022; originally announced July 2022.

    Comments: 6 pages,10 figures, Research work of Master of Technology (M.Tech.) at Vel Tech University

  3. arXiv:2110.13650  [pdf, other

    cs.CR

    GANash -- A GAN approach to steganography

    Authors: Venkatesh Subramaniyan, Vignesh Sivakumar, A. K. Vagheesan, S. Sakthivelan, K. J. Jegadish Kumar, K. K. Nagarajan

    Abstract: Data security is of the utmost concern of a communication system. Since the early days, many developments have been made to improve the performance of the system. PSNR of the received signal, secure transmission channel, quality of encoding used, etc. are some of the key attributes of a good system. To ensure security, the most commonly used technique is cryptography in which the message is altere… ▽ More

    Submitted 25 October, 2021; originally announced October 2021.

    Comments: Presented at the 6 th National Conference on Information and Communication Technologies (NCICT 2020), June 12, 2020

  4. arXiv:2006.01478  [pdf

    physics.ao-ph

    Surface Temperature Trend Estimation over 12 Sites in Guinea Using 57 Years of Ground-Based Data

    Authors: René Tato Loua, Hassan Bencherif, Nelson Bègue, Nkanyiso Mbatha, Thierry Portafaix, Alain Hauchecorne, Venkataraman Sivakumar, Zoumana Bamba

    Abstract: Trend-Run model was performed to estimate the trend in surface temperatures recorded at 12 sites in Guinea from 1960 to 2016 and to examine the contribution of each climate forcing. The coefficient of determination (R 2) calculated varies between 0.60 and 0.90, it provides total information about the simulation capability of the model. The decadal trend values also calculated show an upward trend… ▽ More

    Submitted 2 June, 2020; originally announced June 2020.

    Journal ref: Climate 2020, 2020, 8

  5. arXiv:2002.11332  [pdf, ps, other

    cs.LG math.ST stat.ML

    Structured Linear Contextual Bandits: A Sharp and Geometric Smoothed Analysis

    Authors: Vidyashankar Sivakumar, Zhiwei Steven Wu, Arindam Banerjee

    Abstract: Bandit learning algorithms typically involve the balance of exploration and exploitation. However, in many practical applications, worst-case scenarios needing systematic exploration are seldom encountered. In this work, we consider a smoothed setting for structured linear contextual bandits where the adversarial contexts are perturbed by Gaussian noise and the unknown parameter $θ^*$ has structur… ▽ More

    Submitted 26 February, 2020; originally announced February 2020.

  6. Rosetta: Large scale system for text detection and recognition in images

    Authors: Fedor Borisyuk, Albert Gordo, Viswanath Sivakumar

    Abstract: In this paper we present a deployed, scalable optical character recognition (OCR) system, which we call Rosetta, designed to process images uploaded daily at Facebook scale. Sharing of image content has become one of the primary ways to communicate information among internet users within social networks such as Facebook and Instagram, and the understanding of such media, including its textual info… ▽ More

    Submitted 11 October, 2019; originally announced October 2019.

    Comments: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining (KDD) 2018, London, United Kingdom

  7. arXiv:1910.04930  [pdf, other

    cs.LG math.ST stat.ML

    Random Quadratic Forms with Dependence: Applications to Restricted Isometry and Beyond

    Authors: Arindam Banerjee, Qilong Gu, Vidyashankar Sivakumar, Zhiwei Steven Wu

    Abstract: Several important families of computational and statistical results in machine learning and randomized algorithms rely on uniform bounds on quadratic forms of random vectors or matrices. Such results include the Johnson-Lindenstrauss (J-L) Lemma, the Restricted Isometry Property (RIP), randomized sketching algorithms, and approximate linear algebra. The existing results critically depend on statis… ▽ More

    Submitted 5 December, 2019; v1 submitted 10 October, 2019; originally announced October 2019.

  8. arXiv:1910.04054  [pdf, other

    cs.LG cs.DC cs.NI stat.ML

    MVFST-RL: An Asynchronous RL Framework for Congestion Control with Delayed Actions

    Authors: Viswanath Sivakumar, Olivier Delalleau, Tim Rocktäschel, Alexander H. Miller, Heinrich Küttler, Nantas Nardelli, Mike Rabbat, Joelle Pineau, Sebastian Riedel

    Abstract: Effective network congestion control strategies are key to keeping the Internet (or any large computer network) operational. Network congestion control has been dominated by hand-crafted heuristics for decades. Recently, ReinforcementLearning (RL) has emerged as an alternative to automatically optimize such control strategies. Research so far has primarily considered RL interfaces which block the… ▽ More

    Submitted 26 May, 2021; v1 submitted 9 October, 2019; originally announced October 2019.

    Comments: Workshop on ML for Systems at NeurIPS 2019

  9. arXiv:1910.03552  [pdf, other

    cs.LG stat.ML

    TorchBeast: A PyTorch Platform for Distributed RL

    Authors: Heinrich Küttler, Nantas Nardelli, Thibaut Lavril, Marco Selvatici, Viswanath Sivakumar, Tim Rocktäschel, Edward Grefenstette

    Abstract: TorchBeast is a platform for reinforcement learning (RL) research in PyTorch. It implements a version of the popular IMPALA algorithm for fast, asynchronous, parallel training of RL agents. Additionally, TorchBeast has simplicity as an explicit design goal: We provide both a pure-Python implementation ("MonoBeast") as well as a multi-machine high-performance version ("PolyBeast"). In the latter, p… ▽ More

    Submitted 8 October, 2019; originally announced October 2019.

  10. arXiv:1811.09886  [pdf, other

    cs.LG stat.ML

    Deep Learning Inference in Facebook Data Centers: Characterization, Performance Optimizations and Hardware Implications

    Authors: Jongsoo Park, Maxim Naumov, Protonu Basu, Summer Deng, Aravind Kalaiah, Daya Khudia, James Law, Parth Malani, Andrey Malevich, Satish Nadathur, Juan Pino, Martin Schatz, Alexander Sidorov, Viswanath Sivakumar, Andrew Tulloch, Xiaodong Wang, Yiming Wu, Hector Yuen, Utku Diril, Dmytro Dzhulgakov, Kim Hazelwood, Bill Jia, Yangqing Jia, Lin Qiao, Vijay Rao , et al. (3 additional authors not shown)

    Abstract: The application of deep learning techniques resulted in remarkable improvement of machine learning models. In this paper provides detailed characterizations of deep learning models used in many Facebook social network services. We present computational characteristics of our models, describe high performance optimizations targeting existing systems, point out their limitations and make suggestions… ▽ More

    Submitted 29 November, 2018; v1 submitted 24 November, 2018; originally announced November 2018.

  11. arXiv:1811.07031  [pdf, other

    cs.CV

    Improving Rotated Text Detection with Rotation Region Proposal Networks

    Authors: Jing Huang, Viswanath Sivakumar, Mher Mnatsakanyan, Guan Pang

    Abstract: A significant number of images shared on social media platforms such as Facebook and Instagram contain text in various forms. It's increasingly becoming commonplace for bad actors to share misinformation, hate speech or other kinds of harmful content as text overlaid on images on such platforms. A scene-text understanding system should hence be able to handle text in various orientations that the… ▽ More

    Submitted 16 November, 2018; originally announced November 2018.

  12. arXiv:1606.05693  [pdf, ps, other

    stat.ML cs.LG

    Structured Stochastic Linear Bandits

    Authors: Nicholas Johnson, Vidyashankar Sivakumar, Arindam Banerjee

    Abstract: The stochastic linear bandit problem proceeds in rounds where at each round the algorithm selects a vector from a decision set after which it receives a noisy linear loss parameterized by an unknown vector. The goal in such a problem is to minimize the (pseudo) regret which is the difference between the total expected loss of the algorithm and the total expected loss of the best fixed vector in hi… ▽ More

    Submitted 17 June, 2016; originally announced June 2016.

  13. arXiv:1505.02294  [pdf, other

    stat.ML cs.LG

    Estimation with Norm Regularization

    Authors: Arindam Banerjee, Sheng Chen, Farideh Fazayeli, Vidyashankar Sivakumar

    Abstract: Analysis of non-asymptotic estimation error and structured statistical recovery based on norm regularized regression, such as Lasso, needs to consider four aspects: the norm, the loss function, the design matrix, and the noise model. This paper presents generalizations of such estimation error analysis on all four aspects compared to the existing literature. We characterize the restricted error se… ▽ More

    Submitted 30 November, 2015; v1 submitted 9 May, 2015; originally announced May 2015.

    Comments: Fixed technical issues. Generalized some results

  14. Multi-task Sparse Structure Learning

    Authors: Andre R. Goncalves, Puja Das, Soumyadeep Chatterjee, Vidyashankar Sivakumar, Fernando J. Von Zuben, Arindam Banerjee

    Abstract: Multi-task learning (MTL) aims to improve generalization performance by learning multiple related tasks simultaneously. While sometimes the underlying task relationship structure is known, often the structure needs to be estimated from data at hand. In this paper, we present a novel family of models for MTL, applicable to regression and classification problems, capable of learning the structure of… ▽ More

    Submitted 1 September, 2014; v1 submitted 31 August, 2014; originally announced September 2014.

    Comments: 23rd ACM International Conference on Information and Knowledge Management - CIKM 2014

    ACM Class: I.5.1, J.2

  15. arXiv:1304.8092  [pdf

    cs.CV

    Fractal-Based Detection of Microcalcification Clusters in Digital Mammograms

    Authors: P. Shanmugavadivu, V. Sivakumar

    Abstract: In this paper, a novel method for edge detection of microcalcification clusters in mammogram images is presented using the concept of Fractal Dimension and Hurst co-efficient that enables to locate the microcalcifications in the mammograms. This technique detects the edges accurately than the ones obtained by the conventional Sobel method. Generally, Sobel method detects the edges of the regions/o… ▽ More

    Submitted 30 April, 2013; originally announced April 2013.

    Comments: Appeared in ICECIT-2012