Zum Hauptinhalt springen

Showing 1–39 of 39 results for author: G, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.14026  [pdf, other

    cs.CL cs.SD eess.AS

    Empowering Low-Resource Language ASR via Large-Scale Pseudo Labeling

    Authors: Kaushal Santosh Bhogale, Deovrat Mehendale, Niharika Parasa, Sathish Kumar Reddy G, Tahir Javed, Pratyush Kumar, Mitesh M. Khapra

    Abstract: In this study, we tackle the challenge of limited labeled data for low-resource languages in ASR, focusing on Hindi. Specifically, we explore pseudo-labeling, by proposing a generic framework combining multiple ideas from existing works. Our framework integrates multiple base models for transcription and evaluators for assessing audio-transcript pairs, resulting in robust pseudo-labeling for low r… ▽ More

    Submitted 26 August, 2024; originally announced August 2024.

  2. arXiv:2403.06350  [pdf, other

    cs.CL

    IndicLLMSuite: A Blueprint for Creating Pre-training and Fine-Tuning Datasets for Indian Languages

    Authors: Mohammed Safi Ur Rahman Khan, Priyam Mehta, Ananth Sankar, Umashankar Kumaravelan, Sumanth Doddapaneni, Suriyaprasaad G, Varun Balan G, Sparsh Jain, Anoop Kunchukuttan, Pratyush Kumar, Raj Dabre, Mitesh M. Khapra

    Abstract: Despite the considerable advancements in English LLMs, the progress in building comparable models for other languages has been hindered due to the scarcity of tailored resources. Our work aims to bridge this divide by introducing an expansive suite of resources specifically designed for the development of Indic LLMs, covering 22 languages, containing a total of 251B tokens and 74.8M instruction-re… ▽ More

    Submitted 10 March, 2024; originally announced March 2024.

  3. arXiv:2311.13800  [pdf

    cs.CR cs.AI cs.LG

    Enhancing Intrusion Detection In Internet Of Vehicles Through Federated Learning

    Authors: Abhishek Sebastian, Pragna R, Sudhakaran G, Renjith P N, Leela Karthikeyan H

    Abstract: Federated learning is a technique of decentralized machine learning. that allows multiple parties to collaborate and learn a shared model without sharing their raw data. Our paper proposes a federated learning framework for intrusion detection in Internet of Vehicles (IOVs) using the CIC-IDS 2017 dataset. The proposed framework employs SMOTE for handling class imbalance, outlier detection for iden… ▽ More

    Submitted 22 November, 2023; originally announced November 2023.

  4. arXiv:2308.16421  [pdf

    cs.SD eess.AS

    Sequential Pitch Distributions for Raga Detection

    Authors: Vishwaas Narasinh, Senthil Raja G

    Abstract: Raga is a fundamental melodic concept in Indian Art Music (IAM). It is characterized by complex patterns. All performances and compositions are based on the raga framework. Raga and tonic detection have been a long-standing research problem in the field of Music Information Retrieval. In this paper, we attempt to detect the raga using a novel feature to extract sequential or temporal information f… ▽ More

    Submitted 30 August, 2023; originally announced August 2023.

    Comments: 16 pages, 6 figures, AI Music Creativity

    Journal ref: AIMC 2023. Retrieved from https://aimc2023.pubpub.org/pub/j9v30p0j

  5. arXiv:2307.10005  [pdf, other

    eess.AS cs.SD

    Alzheimer's Disease Detection from Spontaneous Speech and Text: A review

    Authors: Vrindha M. K., Geethu V., Anurenjan P. R., Deepak S., Sreeni K. G.

    Abstract: In the past decade, there has been a surge in research examining the use of voice and speech analysis as a means of detecting neurodegenerative diseases such as Alzheimer's. Many studies have shown that certain acoustic features can be used to differentiate between normal aging and Alzheimer's disease, and speech analysis has been found to be a cost-effective method of detecting Alzheimer's dement… ▽ More

    Submitted 19 July, 2023; originally announced July 2023.

  6. arXiv:2305.10435  [pdf, other

    cs.CL cs.AI

    Generative Pre-trained Transformer: A Comprehensive Review on Enabling Technologies, Potential Applications, Emerging Challenges, and Future Directions

    Authors: Gokul Yenduri, Ramalingam M, Chemmalar Selvi G, Supriya Y, Gautam Srivastava, Praveen Kumar Reddy Maddikunta, Deepti Raj G, Rutvij H Jhaveri, Prabadevi B, Weizheng Wang, Athanasios V. Vasilakos, Thippa Reddy Gadekallu

    Abstract: The Generative Pre-trained Transformer (GPT) represents a notable breakthrough in the domain of natural language processing, which is propelling us toward the development of machines that can understand and communicate using language in a manner that closely resembles that of humans. GPT is based on the transformer architecture, a deep neural network designed for natural language processing tasks.… ▽ More

    Submitted 21 May, 2023; v1 submitted 11 May, 2023; originally announced May 2023.

    Comments: Submitted to peer review

  7. arXiv:2304.10259  [pdf

    cs.CV

    Social Distance Detection Using Deep Learning And Risk Management System

    Authors: Sangeetha R. G, Jaya Aravindh V. V

    Abstract: An outbreak of the coronavirus disease which occurred three years later and it has hit the world again with many evolutions. The effects on the human race have already been profound. We can only safeguard ourselves against this pandemic by mandating a "Face Mask" also maintaining the "Social Distancing." The necessity of protective face masks in all gatherings is required by many civil institution… ▽ More

    Submitted 20 April, 2023; originally announced April 2023.

  8. arXiv:2304.08162  [pdf, other

    cs.NE

    Cardiac Arrhythmia Detection using Artificial Neural Network

    Authors: Prof Sangeetha R G, Kishore Anand K, Sreevatsan B, Vishal Kumar A

    Abstract: The prime purpose of this project is to develop a portable cardiac abnormality monitoring device which can drastically improvise the quality of the monitoring and the overall safety of the device. While a generic, low cost, wearable battery powered device for such applications may not yield sufficient performance, such devices combined with the capabilities of Artificial Neural Network algorithms… ▽ More

    Submitted 17 April, 2023; originally announced April 2023.

  9. arXiv:2211.12796  [pdf, other

    cs.SD cs.CL eess.AS

    IMaSC -- ICFOSS Malayalam Speech Corpus

    Authors: Deepa P Gopinath, Thennal D K, Vrinda V Nair, Swaraj K S, Sachin G

    Abstract: Modern text-to-speech (TTS) systems use deep learning to synthesize speech increasingly approaching human quality, but they require a database of high quality audio-text sentence pairs for training. Malayalam, the official language of the Indian state of Kerala and spoken by 35+ million people, is a low resource language in terms of available corpora for TTS systems. In this paper, we present IMaS… ▽ More

    Submitted 23 November, 2022; originally announced November 2022.

    Comments: 18 pages, 8 figures

  10. arXiv:2209.11524  [pdf, other

    cs.RO math.OC

    Control Barrier Functions in UGVs for Kinematic Obstacle Avoidance: A Collision Cone Approach

    Authors: Phani Thontepu, Bhavya Giri Goswami, Manan Tayal, Neelaksh Singh, Shyamsundar P I, Shyam Sundar M G, Suresh Sundaram, Vaibhav Katewa, Shishir Kolathaya

    Abstract: In this paper, we propose a new class of Control Barrier Functions (CBFs) for Unmanned Ground Vehicles (UGVs) that help avoid collisions with kinematic (non-zero velocity) obstacles. While the current forms of CBFs have been successful in guaranteeing safety/collision avoidance with static obstacles, extensions for the dynamic case have seen limited success. Moreover, with the UGV models like the… ▽ More

    Submitted 16 October, 2023; v1 submitted 23 September, 2022; originally announced September 2022.

    Comments: 6 pages, 4 figures, For supplement video follow https://youtu.be/Dme7Wm9y6es. *The first and second authors have contributed equally

    ACM Class: I.2.9; G.1.6; J.2

  11. arXiv:2209.09207  [pdf, other

    cs.CV

    Table Detection in the Wild: A Novel Diverse Table Detection Dataset and Method

    Authors: Mrinal Haloi, Shashank Shekhar, Nikhil Fande, Siddhant Swaroop Dash, Sanjay G

    Abstract: Recent deep learning approaches in table detection achieved outstanding performance and proved to be effective in identifying document layouts. Currently, available table detection benchmarks have many limitations, including the lack of samples diversity, simple table structure, the lack of training cases, and samples quality. In this paper, we introduce a diverse large-scale dataset for table det… ▽ More

    Submitted 30 November, 2023; v1 submitted 31 August, 2022; originally announced September 2022.

    Comments: Open source Table detection dataset and baseline results

    MSC Class: 68T45

  12. arXiv:2203.06583  [pdf

    cs.SD cs.AI eess.AS

    Bi-Sampling Approach to Classify Music Mood leveraging Raga-Rasa Association in Indian Classical Music

    Authors: Mohan Rao B C, Vinayak Arkachaari, Harsha M N, Sushmitha M N, Gayathri Ramesh K K, Ullas M S, Pathi Mohan Rao, Sudha G, Narayana Darapaneni

    Abstract: The impact of Music on the mood or emotion of the listener is a well-researched area in human psychology and behavioral science. In Indian classical music, ragas are the melodic structure that defines the various styles and forms of the music. Each raga has been found to evoke a specific emotion in the listener. With the advent of advanced capabilities of audio signal processing and the applicatio… ▽ More

    Submitted 13 March, 2022; originally announced March 2022.

  13. arXiv:2112.06034  [pdf, ps, other

    math.CT cs.IT

    Information entropy re-defined in a category theory context using preradicals

    Authors: Sebastian Pardo G., Gabriel A. Silva

    Abstract: Algebraically, entropy can be defined for abelian groups and their endomorphisms, and was latter extended to consider objects in a Flow category derived from abelian categories, such as $R\textit{-}Mod$ with $R$ a ring. Preradicals are endofunctors which can be realized as compatible choice assignments in the category where they are defined. Here we present a formal definition of entropy for prera… ▽ More

    Submitted 11 December, 2021; originally announced December 2021.

    Comments: 25 pages

  14. arXiv:2112.01241  [pdf

    cs.CY cs.AI

    Course Difficulty Estimation Based on Mapping of Bloom's Taxonomy and ABET Criteria

    Authors: Premalatha M, Suganya G, Viswanathan V, G Jignesh Chowdary

    Abstract: Current Educational system uses grades or marks to assess the performance of the student. The marks or grades a students scores depends on different parameters, the main parameter being the difficulty level of a course. Computation of this difficulty level may serve as a support for both the students and teachers to fix the level of training needed for successful completion of course. In this pape… ▽ More

    Submitted 16 November, 2021; originally announced December 2021.

  15. Automated skin lesion segmentation using multi-scale feature extraction scheme and dual-attention mechanism

    Authors: G Jignesh Chowdary, G V S N Durga Yathisha, Suganya G, Premalatha M

    Abstract: Segmenting skin lesions from dermoscopic images is essential for diagnosing skin cancer. But the automatic segmentation of these lesions is complicated due to the poor contrast between the background and the lesion, image artifacts, and unclear lesion boundaries. In this work, we present a deep learning model for the segmentation of skin lesions from dermoscopic images. To deal with the challenges… ▽ More

    Submitted 7 June, 2022; v1 submitted 16 November, 2021; originally announced November 2021.

    Journal ref: In 2021 3rd International Conference on Advances in Computing, Communication Control and Networking (ICAC3N) (pp. 1763-1771). IEEE (2021)

  16. arXiv:2109.10094  [pdf, ps, other

    cs.CC

    On the Hardness of the Determinant: Sum of Regular Set-Multilinear Circuits

    Authors: S Raja, Sumukha Bharadwaj G V

    Abstract: In this paper, we study the computational complexity of the commutative determinant polynomial computed by a class of set-multilinear circuits which we call regular set-multilinear circuits. Regular set-multilinear circuits are commutative circuits with a restriction on the order in which they can compute polynomials. A regular circuit can be seen as the commutative analogue of the ordered circuit… ▽ More

    Submitted 21 September, 2021; originally announced September 2021.

    Comments: preliminary version appeared in FCT 2021

  17. arXiv:2108.04329  [pdf

    eess.IV cs.CV

    Class dependency based learning using Bi-LSTM coupled with the transfer learning of VGG16 for the diagnosis of Tuberculosis from chest x-rays

    Authors: G Jignesh Chowdary, Suganya G, Premalatha M, Karunamurthy K

    Abstract: Tuberculosis is an infectious disease that is leading to the death of millions of people across the world. The mortality rate of this disease is high in patients suffering from immuno-compromised disorders. The early diagnosis of this disease can save lives and can avoid further complications. But the diagnosis of TB is a very complex task. The standard diagnostic tests still rely on traditional p… ▽ More

    Submitted 19 July, 2021; originally announced August 2021.

  18. AI Based Waste classifier with Thermo-Rapid Composting

    Authors: Saswati kumari behera, Aouthithiye Barathwaj SR Y, Vasundhara L, Saisudha G, Haariharan N C

    Abstract: Waste management is a certainly a very complex and difficult process especially in very large cities. It needs immense man power and also uses up other resources such as electricity and fuel. This creates a need to use a novel method with help of latest technologies. Here in this article we present a new waste classification technique using Computer Vision (CV) and deep learning (DL). To further i… ▽ More

    Submitted 3 August, 2021; originally announced August 2021.

    Comments: 4 pages, 8 figures, conference

  19. arXiv:2107.14037  [pdf, other

    cs.LG cs.AI

    Machine Learning and Deep Learning Methods for Building Intelligent Systems in Medicine and Drug Discovery: A Comprehensive Survey

    Authors: G Jignesh Chowdary, Suganya G, Premalatha M, Asnath Victy Phamila Y, Karunamurthy K

    Abstract: With the advancements in computer technology, there is a rapid development of intelligent systems to understand the complex relationships in data to make predictions and classifications. Artificail Intelligence based framework is rapidly revolutionizing the healthcare industry. These intelligent systems are built with machine learning and deep learning based robust models for early diagnosis of di… ▽ More

    Submitted 19 July, 2021; originally announced July 2021.

  20. arXiv:2104.12950  [pdf, other

    cs.AI cs.CL

    Document Structure aware Relational Graph Convolutional Networks for Ontology Population

    Authors: Abhay M Shalghar, Ayush Kumar, Balaji Ganesan, Aswin Kannan, Akshay Parekh, Shobha G

    Abstract: Ontologies comprising of concepts, their attributes, and relationships are used in many knowledge based AI systems. While there have been efforts towards populating domain specific ontologies, we examine the role of document structure in learning ontological relationships between concepts in any document corpus. Inspired by ideas from hypernym discovery and explainability, our method performs abou… ▽ More

    Submitted 12 April, 2022; v1 submitted 26 April, 2021; originally announced April 2021.

    Comments: 8 pages single column, 5 figures. DLG4NLP Workshop at ICLR 2022

  21. arXiv:2010.03169  [pdf, other

    cs.MM cs.GR

    Haptic Rendering of Cultural Heritage Objects at Different Scales

    Authors: Sreeni K. G, Priyadarshini K, Praseedha A. K, Subhasis Chaudhuri

    Abstract: In this work, we address the issue of a virtual representation of objects of cultural heritage for haptic interaction. Our main focus is to provide haptic access to artistic objects of any physical scale to the differently-abled people. This is a low-cost system and, in conjunction with a stereoscopic visual display, gives a better immersive experience even to the sighted persons. To achieve this,… ▽ More

    Submitted 5 October, 2020; originally announced October 2020.

    Comments: Accepted to EuroHaptics. arXiv admin note: text overlap with arXiv:2010.02015

  22. arXiv:2010.02822  [pdf, other

    cs.MM cs.GR

    Scalable Rendering of Variable Density Point Cloud Data

    Authors: Priyadarshini Kumari, Sreeni K. G, Subhasis Chaudhuri

    Abstract: In this paper, we present a novel proxy-based method of the adaptive haptic rendering of a variable density 3D point cloud data at different levels of detail without pre-computing the mesh structure. We also incorporate features like rotation, translation, and friction to provide a better realistic experience to the user. A proxy-based rendering technique is used to avoid the pop-through problem w… ▽ More

    Submitted 10 October, 2020; v1 submitted 6 October, 2020; originally announced October 2020.

    Comments: Accepted to World Haptics Conference (WHC), 2013

  23. arXiv:2006.15175  [pdf, other

    cs.NE cs.AI cs.LG

    Application of Neuroevolution in Autonomous Cars

    Authors: Sainath G, Vignesh S, Siddarth S, G Suganya

    Abstract: With the onset of Electric vehicles, and them becoming more and more popular, autonomous cars are the future in the travel/driving experience. The barrier to reaching level 5 autonomy is the difficulty in the collection of data that incorporates good driving habits and the lack thereof. The problem with current implementations of self-driving cars is the need for massively large datasets and the n… ▽ More

    Submitted 26 June, 2020; originally announced June 2020.

    Comments: 13 pages, 9 figures, 1 table

  24. arXiv:2005.07600  [pdf

    cs.DC

    An Alternative C++ based HPC system for Hadoop MapReduce

    Authors: Vignesh S., Muthumanikandan V., Siddarth S., Sainath G

    Abstract: MapReduce is a technique used to vastly improve distributed processing of data and can massively speed up computation. Hadoop and its MapReduce relies on JVM and Java which is expensive on memory. High Performance Computing based MapReduce framework could be used that can perform more memory-efficiently and faster than the standard MapReduce. This paper explores an entirely C++ based approach to t… ▽ More

    Submitted 26 June, 2020; v1 submitted 8 May, 2020; originally announced May 2020.

    Comments: 8 pages, 13 figures, 4 authors

  25. arXiv:2005.04292  [pdf

    cs.HC cs.CV

    Deep Residual Network based food recognition for enhanced Augmented Reality application

    Authors: Siddarth S, Sainath G, Vignesh S

    Abstract: Deep neural network based learning approaches is widely utilized for image classification or object detection based problems with remarkable outcomes. Realtime Object state estimation of objects can be used to track and estimate the features that the object of the current frame possesses without causing any significant delay and misclassification. A system that can detect the features of such obje… ▽ More

    Submitted 26 June, 2020; v1 submitted 8 May, 2020; originally announced May 2020.

    Comments: Total Pages:7 Total Figures:10

  26. arXiv:2004.11460  [pdf, other

    q-bio.QM cs.CY cs.LG stat.ML

    Development of a Machine Learning Model and Mobile Application to Aid in Predicting Dosage of Vitamin K Antagonists Among Indian Patients

    Authors: Amruthlal M, Devika S, Ameer Suhail P A, Aravind K Menon, Vignesh Krishnan, Alan Thomas, Manu Thomas, Sanjay G, Lakshmi Kanth L R, Jimmy Jose, Harikrishnan S

    Abstract: Patients who undergo mechanical heart valve replacements or have conditions like Atrial Fibrillation have to take Vitamin K Antagonists (VKA) drugs to prevent coagulation of blood. These drugs have narrow therapeutic range and need to be very closely monitored due to life threatening side effects. The dosage of VKA drug is determined and revised by a physician based on Prothrombin Time - Internati… ▽ More

    Submitted 19 April, 2020; originally announced April 2020.

  27. arXiv:1912.06862  [pdf, other

    cs.DS math.OC

    Approximate and Robust Bounded Job Start Scheduling for Royal Mail Delivery Offices

    Authors: Dimitrios Letsios, Jeremy T. Bradley, Suraj G, Ruth Misener, Natasha Page

    Abstract: Motivated by mail delivery scheduling problems arising in Royal Mail, we study a generalization of the fundamental makespan scheduling P||Cmax problem which we call the bounded job start scheduling problem. Given a set of jobs, each specified by an integer processing time p_j, that have to be executed non-preemptively by a set of m parallel identical machines, the objective is to compute a minimum… ▽ More

    Submitted 6 February, 2021; v1 submitted 14 December, 2019; originally announced December 2019.

  28. arXiv:1903.11219  [pdf

    cs.NI

    5G New Radio Evolution Meets Satellite Communications: Opportunities, Challenges, and Solutions

    Authors: Xingqin Lin, Björn Hofström, Eric Wang, Gino Masini, Helka-Liina Maattanen, Henrik Rydén, Jonas Sedin, Magnus Stattin, Olof Liberg, Sebastian Euler, Siva Muruganathan, Stefan Eriksson G., Talha Khan

    Abstract: The 3rd generation partnership project (3GPP) completed the first global 5th generation (5G) new radio (NR) standard in its Release 15, paving the way for making 5G a commercial reality. So, what is next in NR evolution to further expand the 5G ecosystem? Enabling 5G NR to support satellite communications is one direction under exploration in 3GPP. There has been a resurgence of interest in provid… ▽ More

    Submitted 26 March, 2019; originally announced March 2019.

    Comments: 8 pages, 5 figures, submitted for publication

  29. Unique Sense: Smart Computing Prototype

    Authors: Vijaykumar S., Saravanakumar S. G., M. Balamurugan

    Abstract: Unique sense: Smart computing prototype is a part of unique sense computing architecture, which delivers alternate solution for todays computing architecture. This computing is one step towards future generation needs, which brings extended support to the ubiquitous environment. This smart computing prototype is the light weight compact architecture which is designed to satisfy all the needs of th… ▽ More

    Submitted 8 May, 2015; originally announced May 2015.

    Comments: 6 Pages

    Journal ref: Elsevier Procedia Computer Science 50, 2015 Pages 223-228

  30. arXiv:1412.2857  [pdf

    cs.CR

    Analysis of Maximum Likelihood and Mahalanobis Distance for Identifying Cheating Anchor Nodes

    Authors: Jeril Kuriakose, Amruth V., Sandesh A. G., Jampu Venkata Naveenbabu, Mohammed Shahid, Ashish Shetty

    Abstract: Malicious anchor nodes will constantly hinder genuine and appropriate localization. Discovering the malicious or vulnerable anchor node is an essential problem in wireless sensor networks (WSNs). In wireless sensor networks, anchor nodes are the nodes that know its current location. Neighboring nodes or non-anchor nodes calculate its location (or its location reference) with the help of anchor nod… ▽ More

    Submitted 9 December, 2014; originally announced December 2014.

    Comments: 10 pages, 13 pages, conference

  31. arXiv:1408.2908  [pdf

    cs.IT

    Hardware Implementation of (63,51) BCH Encoder and Decoder For WBAN Using LFSR and BMA

    Authors: Priya Mathew, Lismi Augustine, Sabarinath G., Tomson Devis

    Abstract: Error Correcting Codes are required to have a reliable communication through a medium that has an unacceptable bit error rate and low signal to noise ratio. In IEEE 802.15.6 2.4GHz Wireless Body Area Network (WBAN), data gets corrupted during the transmission and reception due to noises and interferences. Ultra low power operation is crucial to prolong the life of implantable devices. Hence simple… ▽ More

    Submitted 14 August, 2014; v1 submitted 12 August, 2014; originally announced August 2014.

    Comments: 11 Pages,8 Figures, 2 Tables

    Journal ref: International Journal on Information Theory (IJIT), Volume 3, No.3, July 2014

  32. arXiv:1403.6002  [pdf

    cs.CV

    Brain Tumor Detection Based On Mathematical Analysis and Symmetry Information

    Authors: Narkhede Sachin G., Vaishali Khairnar, Sujata Kadu

    Abstract: Image segmentation some of the challenging issues on brain magnetic resonance image tumor segmentation caused by the weak correlation between magnetic resonance imaging intensity and anatomical meaning.With the objective of utilizing more meaningful information to improve brain tumor segmentation,an approach which employs bilateral symmetry information as an additional feature for segmentation is… ▽ More

    Submitted 24 March, 2014; originally announced March 2014.

    Comments: 05 Pages,02 figures

    Journal ref: Int.Journal of Engineering Research and Applications ISSN 2248-9622, Vol.4,Issue 2 Version 1,February 2014,pp.231-235

  33. arXiv:1401.6127  [pdf

    cs.CV

    Brain Tumor Detection Based On Symmetry Information

    Authors: Narkhede Sachin G, Vaishali Khairnar

    Abstract: Advances in computing technology have allowed researchers across many fields of endeavor to collect and maintain vast amounts of observational statistical data such as clinical data, biological patient data, data regarding access of web sites, financial data, and the like. This paper addresses some of the challenging issues on brain magnetic resonance (MR) image tumor segmentation caused by the we… ▽ More

    Submitted 23 November, 2013; originally announced January 2014.

    Comments: 3 Pages, 3 figures, 2 tables

    Journal ref: Int. Journal of Engineering Research and Application Vol. 3, Issue 6, Nov - Dec 2013, pp. 430 -432 (ISSN : 2248 - 9622)

  34. arXiv:1310.8462  [pdf

    cs.DB cs.CY

    Application of Data Mining In Marketing

    Authors: Radhakrishnan B, Shineraj G, Anver Muhammed K. M

    Abstract: One of the most important problems in modern finance is finding efficient ways to summarize and visualize the stock market data to give individuals or institutions useful information about the market behavior for investment decisions. The enormous amount of valuable data generated by the stock market has attracted researchers to explore this problem domain using different methodologies. Potential… ▽ More

    Submitted 31 October, 2013; originally announced October 2013.

    Comments: 06 Pages, 02 Figures, 01 Table, Volume 2, Issue 5

    Report number: IJCSN-2013-2-5-47

    Journal ref: IJCSN - International Journal of Computer Science and Network - October 2013

  35. arXiv:1207.1173  [pdf

    cs.SE

    A Comprehensive Model to achieve Service Reusability for Multi level stakeholders using Non-Functional attributes of Service Oriented Architecture

    Authors: Shanmugasundaram G., V. Prasanna Venkatesan, C. Punitha Devi

    Abstract: SOA is a prominent paradigm for accomplishing reuse of services. Service reusability is one dominant factor which has a greater influence on achieving quality in SOA systems. There exists sufficient research in this area and researchers have contributed many works towards achieving quality in SOA systems but much emphasis was not provided on service reusability [1] [2] [3]. Few authors have addres… ▽ More

    Submitted 5 July, 2012; originally announced July 2012.

  36. arXiv:1112.2026  [pdf

    cs.DB cs.RO

    Future Robotics Database Management System along with Cloud TPS

    Authors: Vijaykumar S, Saravanakumar S G

    Abstract: This paper deals with memory management issues of robotics. In our proposal we break one of the major issues in creating humanoid. . Database issue is the complicated thing in robotics schema design here in our proposal we suggest new concept called NOSQL database for the effective data retrieval, so that the humanoid robots will get the massive thinking ability in searching each items using chain… ▽ More

    Submitted 9 December, 2011; originally announced December 2011.

    Comments: 12 pages,5 figures,First model; International Journal on Cloud Computing: Services and Architecture(IJCCSA),Vol.1, No.3, November 2011

  37. A Mechanism for Detection of Gray Hole Attack in Mobile Ad Hoc Networks

    Authors: Jaydip Sen, M. Girish Chandra, Harihara S. G., Harish Reddy, P. Balamuralidhar

    Abstract: Protecting the network layer from malicious attacks is an important and challenging security issue in mobile ad hoc networks (MANETs). In this paper, a security mechanism is proposed to defend against a cooperative gray hole attack on the well known AODV routing protocol in MANETs. A gray hole is a node that selectively drops and forwards data packets after it advertises itself as having the short… ▽ More

    Submitted 2 November, 2011; originally announced November 2011.

    Comments: 5 pages, 5 figures, 3 tables. In Proceedings of the 6th International Conference on Information, Communications and Signal Processing (ICICS '07), Singapore, December 10-13, 2007, Paper ID: 0458, Track: Th2.5- Network Security. ISBN: 1-4244-0983-7

  38. arXiv:1111.0385  [pdf

    cs.CR cs.NI

    A Distributed Protocol for Detection of Packet Dropping Attack in Mobile Ad Hoc Networks

    Authors: Jaydip Sen, M. Girish Chandra, P. Balamuralidhar, Harihara S. G., Harish Reddy

    Abstract: In multi-hop mobile ad hoc networks (MANETs),mobile nodes cooperate with each other without using any infrastructure such as access points or base stations. Security remains a major challenge for these networks due to their features of open medium, dynamically changing topologies, reliance on cooperative algorithms, absence of centralized monitoring points, and lack of clear lines of defense. Amon… ▽ More

    Submitted 2 November, 2011; originally announced November 2011.

    Comments: 7 pages, 9 figures, 1 table. In Proceedings of the International Conference on Telecommunications and Malaysian International Conference on Communications (ICT-MICC'07), May 14-17, Penang, Malaysia. Paper ID: 74, Track: 3: Ad Hoc Routing and Protocols. ISBN: 1-4244-1094-0

  39. Context Aware End-to-End Connectivity Management

    Authors: Jaydip Sen, P. Balamuralidhar, M. Girish Chandra, Harihara S. G., Harish Reddy

    Abstract: In a dynamic heterogeneous environment, such as pervasive and ubiquitous computing, context-aware adaptation is a key concept to meet the varying requirements of different users. Connectivity is an important context source that can be utilized for optimal management of diverse networking resources. Application QoS (Quality of service) is another important issue that should be taken into considerat… ▽ More

    Submitted 12 December, 2010; originally announced December 2010.

    Comments: 8 pages, 3 figures. Second International Conference on Embedded Systems, Mobile Communication and Computing (ICEMCC), pp. 85 - 95, Bangalore, August 2007, India

    Report number: ISSN: 0973-208X