Zum Hauptinhalt springen

Showing 1–50 of 54 results for author: Ghosh, S K

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.16535  [pdf, other

    cs.LG

    TinyTNAS: GPU-Free, Time-Bound, Hardware-Aware Neural Architecture Search for TinyML Time Series Classification

    Authors: Bidyut Saha, Riya Samanta, Soumya K. Ghosh, Ram Babu Roy

    Abstract: In this work, we present TinyTNAS, a novel hardware-aware multi-objective Neural Architecture Search (NAS) tool specifically designed for TinyML time series classification. Unlike traditional NAS methods that rely on GPU capabilities, TinyTNAS operates efficiently on CPUs, making it accessible for a broader range of applications. Users can define constraints on RAM, FLASH, and MAC operations to di… ▽ More

    Submitted 29 August, 2024; originally announced August 2024.

  2. arXiv:2408.11510  [pdf, other

    cs.ET

    Empowering Volunteer Crowdsourcing Services: A Serverless-assisted, Skill and Willingness Aware Task Assignment Approach for Amicable Volunteer Involvement

    Authors: Riya Samanta, Biswajeet Sethi, Soumya K Ghosh

    Abstract: Volunteer crowdsourcing (VCS) leverages citizen interaction to address challenges by utilizing individuals' knowledge and skills. Complex social tasks often require collaboration among volunteers with diverse skill sets, and their willingness to engage is crucial. Matching tasks with the most suitable volunteers remains a significant challenge. VCS platforms face unpredictable demands in terms of… ▽ More

    Submitted 21 August, 2024; originally announced August 2024.

  3. arXiv:2408.11498  [pdf, other

    cs.ET

    Sustainable Volunteer Engagement: Ensuring Potential Retention and Skill Diversity for Balanced Workforce Composition in Crowdsourcing Paradigm

    Authors: Riya Samanta, Soumya K Ghosh

    Abstract: Crowdsourcing (CS) faces the challenge of managing complex, skill-demanding tasks, which requires effective task assignment and retention strategies to sustain a balanced workforce. This challenge has become more significant in Volunteer Crowdsourcing Services (VCS). This study introduces Workforce Composition Balance (WCB), a novel framework designed to maintain workforce diversity in VCS by dyna… ▽ More

    Submitted 21 August, 2024; originally announced August 2024.

  4. arXiv:2403.09026  [pdf, other

    cs.AR cs.NE

    FlexNN: A Dataflow-aware Flexible Deep Learning Accelerator for Energy-Efficient Edge Devices

    Authors: Arnab Raha, Deepak A. Mathaikutty, Soumendu K. Ghosh, Shamik Kundu

    Abstract: This paper introduces FlexNN, a Flexible Neural Network accelerator, which adopts agile design principles to enable versatile dataflows, enhancing energy efficiency. Unlike conventional convolutional neural network accelerator architectures that adhere to fixed dataflows (such as input, weight, output, or row stationary) for transferring activations and weights between storage and compute units, o… ▽ More

    Submitted 11 April, 2024; v1 submitted 13 March, 2024; originally announced March 2024.

    Comments: Version 1. Work started in 2019

  5. arXiv:2403.04379  [pdf, other

    cs.NI

    Performance evaluation of conditional handover in 5G systems under fading scenario

    Authors: Souvik Deb, Megh Rathod, Rishi Balamurugan, Shankar K. Ghosh, Rajeev K. Singh, Samriddha Sanyal

    Abstract: To enhance the handover performance in fifth generation (5G) cellular systems, conditional handover (CHO) has been evolved as a promising solution. Unlike A3 based handover where handover execution is certain after receiving handover command from the serving access network, in CHO, handover execution is conditional on the RSRP measurements from both current and target access networks, as well as o… ▽ More

    Submitted 7 March, 2024; originally announced March 2024.

  6. Modern Computing: Vision and Challenges

    Authors: Sukhpal Singh Gill, Huaming Wu, Panos Patros, Carlo Ottaviani, Priyansh Arora, Victor Casamayor Pujol, David Haunschild, Ajith Kumar Parlikad, Oktay Cetinkaya, Hanan Lutfiyya, Vlado Stankovski, Ruidong Li, Yuemin Ding, Junaid Qadir, Ajith Abraham, Soumya K. Ghosh, Houbing Herbert Song, Rizos Sakellariou, Omer Rana, Joel J. P. C. Rodrigues, Salil S. Kanhere, Schahram Dustdar, Steve Uhlig, Kotagiri Ramamohanarao, Rajkumar Buyya

    Abstract: Over the past six decades, the computing systems field has experienced significant transformations, profoundly impacting society with transformational developments, such as the Internet and the commodification of computing. Underpinned by technological advancements, computer systems, far from being static, have been continuously evolving and adapting to cover multifaceted societal niches. This has… ▽ More

    Submitted 4 January, 2024; originally announced January 2024.

    Comments: Preprint submitted to Telematics and Informatics Reports, Elsevier (2024)

    Journal ref: Elsevier Telematics and Informatics Reports, Volume 13, March 2024

  7. arXiv:2312.09321  [pdf, other

    cs.CR

    OSTINATO: Cross-host Attack Correlation Through Attack Activity Similarity Detection

    Authors: Sutanu Kumar Ghosh, Kiavash Satvat, Rigel Gjomemo, V. N. Venkatakrishnan

    Abstract: Modern attacks against enterprises often have multiple targets inside the enterprise network. Due to the large size of these networks and increasingly stealthy attacks, attacker activities spanning multiple hosts are extremely difficult to correlate during a threat-hunting effort. In this paper, we present a method for an efficient cross-host attack correlation across multiple hosts. Unlike previo… ▽ More

    Submitted 14 December, 2023; originally announced December 2023.

    Comments: 21 pages, 5 figures

  8. Transformative Effects of ChatGPT on Modern Education: Emerging Era of AI Chatbots

    Authors: Sukhpal Singh Gill, Minxian Xu, Panos Patros, Huaming Wu, Rupinder Kaur, Kamalpreet Kaur, Stephanie Fuller, Manmeet Singh, Priyansh Arora, Ajith Kumar Parlikad, Vlado Stankovski, Ajith Abraham, Soumya K. Ghosh, Hanan Lutfiyya, Salil S. Kanhere, Rami Bahsoon, Omer Rana, Schahram Dustdar, Rizos Sakellariou, Steve Uhlig, Rajkumar Buyya

    Abstract: ChatGPT, an AI-based chatbot, was released to provide coherent and useful replies based on analysis of large volumes of data. In this article, leading scientists, researchers and engineers discuss the transformative effects of ChatGPT on modern education. This research seeks to improve our knowledge of ChatGPT capabilities and its use in the education sector, identifying potential concerns and cha… ▽ More

    Submitted 25 May, 2023; originally announced June 2023.

    Comments: Preprint submitted to IoTCPS Elsevier (2023)

    Journal ref: Internet of Things and Cyber-Physical Systems (Elsevier), Volume 4, 2024, Pages 19-23

  9. arXiv:2212.13897  [pdf, other

    cs.IR

    What You Like: Generating Explainable Topical Recommendations for Twitter Using Social Annotations

    Authors: Parantapa Bhattacharya, Saptarshi Ghosh, Muhammad Bilal Zafar, Soumya K. Ghosh, Niloy Ganguly

    Abstract: With over 500 million tweets posted per day, in Twitter, it is difficult for Twitter users to discover interesting content from the deluge of uninteresting posts. In this work, we present a novel, explainable, topical recommendation system, that utilizes social annotations, to help Twitter users discover tweets, on topics of their interest. A major challenge in using traditional rating dependent r… ▽ More

    Submitted 23 December, 2022; originally announced December 2022.

  10. arXiv:2211.11362  [pdf, other

    cs.CV cs.AI

    Crowdsensing-based Road Damage Detection Challenge (CRDDC-2022)

    Authors: Deeksha Arya, Hiroya Maeda, Sanjay Kumar Ghosh, Durga Toshniwal, Hiroshi Omata, Takehiro Kashiyama, Yoshihide Sekimoto

    Abstract: This paper summarizes the Crowdsensing-based Road Damage Detection Challenge (CRDDC), a Big Data Cup organized as a part of the IEEE International Conference on Big Data'2022. The Big Data Cup challenges involve a released dataset and a well-defined problem with clear evaluation metrics. The challenges run on a data competition platform that maintains a real-time online evaluation system for the p… ▽ More

    Submitted 21 November, 2022; originally announced November 2022.

    Comments: 9 pages 2 figures 5 tables. arXiv admin note: text overlap with arXiv:2011.08740

    ACM Class: E.0; J.0

  11. arXiv:2209.08538  [pdf

    cs.CV cs.AI cs.LG

    RDD2022: A multi-national image dataset for automatic Road Damage Detection

    Authors: Deeksha Arya, Hiroya Maeda, Sanjay Kumar Ghosh, Durga Toshniwal, Yoshihide Sekimoto

    Abstract: The data article describes the Road Damage Dataset, RDD2022, which comprises 47,420 road images from six countries, Japan, India, the Czech Republic, Norway, the United States, and China. The images have been annotated with more than 55,000 instances of road damage. Four types of road damage, namely longitudinal cracks, transverse cracks, alligator cracks, and potholes, are captured in the dataset… ▽ More

    Submitted 18 September, 2022; originally announced September 2022.

    Comments: 16 pages, 20 figures, IEEE BigData Cup - Crowdsensing-based Road damage detection challenge (CRDDC'2022)

    ACM Class: E.0; J.0

  12. eDWaaS: A Scalable Educational Data Warehouse as a Service

    Authors: Anupam Khan, Sourav Ghosh, Soumya K. Ghosh

    Abstract: The university management is perpetually in the process of innovating policies to improve the quality of service. Intellectual growth of the students, the popularity of university are some of the major areas that management strives to improve upon. Relevant historical data is needed in support of taking any decision. Furthermore, providing data to various university ranking frameworks is a frequen… ▽ More

    Submitted 1 September, 2022; originally announced September 2022.

    Comments: 17th International Conference on Intelligent Systems Design and Applications (ISDA 2017). Advances in Intelligent Systems and Computing, vol 736. Springer, Cham. 7th World Congress on Information and Communication Technologies (WICT 2017). December 14-16, 2017. ©2018 Springer International Publishing AG, part of Springer Nature

    Journal ref: Intelligent Systems Design and Applications. ISDA 2017. Advances in Intelligent Systems and Computing, vol 736. Springer, Cham. pp. 998-1007

  13. AI for Next Generation Computing: Emerging Trends and Future Directions

    Authors: Sukhpal Singh Gill, Minxian Xu, Carlo Ottaviani, Panos Patros, Rami Bahsoon, Arash Shaghaghi, Muhammed Golec, Vlado Stankovski, Huaming Wu, Ajith Abraham, Manmeet Singh, Harshit Mehta, Soumya K. Ghosh, Thar Baker, Ajith Kumar Parlikad, Hanan Lutfiyya, Salil S. Kanhere, Rizos Sakellariou, Schahram Dustdar, Omer Rana, Ivona Brandic, Steve Uhlig

    Abstract: Autonomic computing investigates how systems can achieve (user) specified control outcomes on their own, without the intervention of a human operator. Autonomic computing fundamentals have been substantially influenced by those of control theory for closed and open-loop systems. In practice, complex systems may exhibit a number of concurrent and inter-dependent control loops. Despite research into… ▽ More

    Submitted 5 March, 2022; originally announced March 2022.

    Comments: Accepted for Publication in Elsevier IoT Journal, 2022

  14. arXiv:2202.04882  [pdf, other

    cs.SD eess.AS

    Auditory Model based Phase-Aware Bayesian Spectral Amplitude Estimator for Single-Channel Speech Enhancement

    Authors: Suman Samui, Indrajit Chakrabarti, Soumya K. Ghosh

    Abstract: Bayesian estimation of short-time spectral amplitude is one of the most predominant approaches for the enhancement of the noise corrupted speech. The performance of these estimators are usually significantly improved when any perceptually relevant cost function is considered. On the other hand, the recent progress in the phase-based speech signal processing have shown that the phase-only enhanceme… ▽ More

    Submitted 10 February, 2022; originally announced February 2022.

    Comments: Submitted to IEEE

  15. Measuring Domain Knowledge for Early Prediction of Student Performance: A Semantic Approach

    Authors: Anupam Khan, Sourav Ghosh, Soumya K. Ghosh

    Abstract: The growing popularity of data mining catalyses the researchers to explore various exciting aspects of education. Early prediction of student performance is an emerging area among them. The researchers have used various predictors in performance modelling studies. Although prior cognition can affect student performance, establishing their relationship is still an open research challenge. Quantifyi… ▽ More

    Submitted 15 July, 2021; originally announced July 2021.

    Comments: Published in 2020 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE). 8 pages, 5 figures (includes 16 plots). Accessible at https://ieeexplore.ieee.org/document/9368439

    Journal ref: 2020 IEEE International Conference on Teaching, Assessment, and Learning for Engineering (TALE), Takamatsu, Japan, 2020, pp. 444-451

  16. arXiv:2106.04804  [pdf, other

    cs.LG

    EMFlow: Data Imputation in Latent Space via EM and Deep Flow Models

    Authors: Qi Ma, Sujit K. Ghosh

    Abstract: The presence of missing values within high-dimensional data is an ubiquitous problem for many applied sciences. A serious limitation of many available data mining and machine learning methods is their inability to handle partially missing values and so an integrated approach that combines imputation and model estimation is vital for down-stream analysis. A computationally fast algorithm, called EM… ▽ More

    Submitted 31 July, 2022; v1 submitted 9 June, 2021; originally announced June 2021.

  17. arXiv:2105.06255  [pdf, other

    cs.LG cs.AI

    Machine Assistance for Credit Card Approval? Random Wheel can Recommend and Explain

    Authors: Anupam Khan, Soumya K. Ghosh

    Abstract: Approval of credit card application is one of the censorious business decision the bankers are usually taking regularly. The growing number of new card applications and the enormous outstanding amount of credit card bills during the recent pandemic make this even more challenging nowadays. Some of the previous studies suggest the usage of machine intelligence for automating the approval process to… ▽ More

    Submitted 11 May, 2021; originally announced May 2021.

    Comments: 14 pages, 8 figures, 2 tables

  18. arXiv:2104.01600  [pdf, other

    cs.LG

    STOPPAGE: Spatio-temporal Data Driven Cloud-Fog-Edge Computing Framework for Pandemic Monitoring and Management

    Authors: Shreya Ghosh, Anwesha Mukherjee, Soumya K Ghosh, Rajkumar Buyya

    Abstract: Several researches and evidence show the increasing likelihood of pandemics (large-scale outbreaks of infectious disease) which has far reaching sequels in all aspects of human lives ranging from rapid mortality rates to economic and social disruption across the world. In the recent time, COVID-19 (Coronavirus Disease 2019) pandemic disrupted normal human lives, and motivated by the urgent need of… ▽ More

    Submitted 4 April, 2021; originally announced April 2021.

    Comments: 16 pages, 11 figures, pre-print submitted to journal

  19. Global Road Damage Detection: State-of-the-art Solutions

    Authors: Deeksha Arya, Hiroya Maeda, Sanjay Kumar Ghosh, Durga Toshniwal, Hiroshi Omata, Takehiro Kashiyama, Yoshihide Sekimoto

    Abstract: This paper summarizes the Global Road Damage Detection Challenge (GRDDC), a Big Data Cup organized as a part of the IEEE International Conference on Big Data'2020. The Big Data Cup challenges involve a released dataset and a well-defined problem with clear evaluation metrics. The challenges run on a data competition platform that maintains a leaderboard for the participants. In the presented case,… ▽ More

    Submitted 17 November, 2020; originally announced November 2020.

    Comments: 11 Pages, 2 Figures, 3 Tables

  20. arXiv:2008.13101  [pdf, other

    cs.CV cs.CY

    Transfer Learning-based Road Damage Detection for Multiple Countries

    Authors: Deeksha Arya, Hiroya Maeda, Sanjay Kumar Ghosh, Durga Toshniwal, Alexander Mraz, Takehiro Kashiyama, Yoshihide Sekimoto

    Abstract: Many municipalities and road authorities seek to implement automated evaluation of road damage. However, they often lack technology, know-how, and funds to afford state-of-the-art equipment for data collection and analysis of road damages. Although some countries, like Japan, have developed less expensive and readily available Smartphone-based methods for automatic road condition monitoring, other… ▽ More

    Submitted 30 August, 2020; originally announced August 2020.

    Comments: 16 pages, 14 figures

  21. Skip to Secure: Securing Cyber-physical Control Loops with Intentionally Skipped Executions

    Authors: Sunandan Adhikary, Ipsita Koley, Sumana Ghosh, Saurav Kumar Ghosh, Soumyajit Dey, Debdeep Mukhopadhyay

    Abstract: We consider the problem of provably securing a given control loop implementation in the presence of adversarial interventions on data exchange between plant and controller. Such interventions can be thwarted using continuously operating monitoring systems and also cryptographic techniques, both of which consume network and computational resources. We provide a principled approach for intentional s… ▽ More

    Submitted 16 July, 2020; originally announced July 2020.

    Comments: 9 pages

  22. arXiv:2006.11383  [pdf, other

    stat.ML cs.LG

    A Non-Iterative Quantile Change Detection Method in Mixture Model with Heavy-Tailed Components

    Authors: Yuantong Li, Qi Ma, Sujit K. Ghosh

    Abstract: Estimating parameters of mixture model has wide applications ranging from classification problems to estimating of complex distributions. Most of the current literature on estimating the parameters of the mixture densities are based on iterative Expectation Maximization (EM) type algorithms which require the use of either taking expectations over the latent label variables or generating samples fr… ▽ More

    Submitted 19 June, 2020; originally announced June 2020.

  23. arXiv:2002.12412  [pdf, ps, other

    cs.CR eess.SY

    Formal Synthesis of Monitoring and Detection Systems for Secure CPS Implementations

    Authors: Ipsita Koley, Saurav Kumar Ghosh, Soumyajit Dey, Debdeep Mukhopadhyay, Amogh Kashyap K N, Sachin Kumar Singh, Lavanya Lokesh, Jithin Nalu Purakkal, Nishant Sinha

    Abstract: We consider the problem of securing a given control loop implementation of a cyber-physical system (CPS) in the presence of Man-in-the-Middle attacks on data exchange between plant and controller over a compromised network. To this end, there exist various detection schemes that provide mathematical guarantees against such attacks for the theoretical control model. However, such guarantees may not… ▽ More

    Submitted 27 February, 2020; originally announced February 2020.

    Comments: 4 Pages, Date 2019 Poster Presentation

  24. arXiv:1911.07351  [pdf, ps, other

    cs.NI cs.DC

    Caching Techniques to Improve Latency in Serverless Architectures

    Authors: Bishakh Chandra Ghosh, Sourav Kanti Addya, Nishant Baranwal Somy, Shubha Brata Nath, Sandip Chakraborty, Soumya K Ghosh

    Abstract: Serverless computing has gained a significant traction in recent times because of its simplicity of development, deployment and fine-grained billing. However, while implementing complex services comprising databases, file stores, or more than one serverless function, the performance in terms of latency of serving requests often degrades severely. In this work, we analyze different serverless archi… ▽ More

    Submitted 17 November, 2019; originally announced November 2019.

  25. Hardness and approximation for the geodetic set problem in some graph classes

    Authors: Dibyayan Chakraborty, Florent Foucaud, Harmender Gahlawat, Subir Kumar Ghosh, Bodhayan Roy

    Abstract: In this paper, we study the computational complexity of finding the \emph{geodetic number} of graphs. A set of vertices $S$ of a graph $G$ is a \emph{geodetic set} if any vertex of $G$ lies in some shortest path between some pair of vertices from $S$. The \textsc{Minimum Geodetic Set (MGS)} problem is to find a geodetic set with minimum cardinality. In this paper, we prove that solving the \textsc… ▽ More

    Submitted 19 September, 2019; originally announced September 2019.

    Journal ref: Proceedings CALDAM 2020. Lecture Notes in Computer Science 12016:102-115, 2020

  26. Beyond Visual Semantics: Exploring the Role of Scene Text in Image Understanding

    Authors: Arka Ujjal Dey, Suman Kumar Ghosh, Ernest Valveny, Gaurav Harit

    Abstract: Images with visual and scene text content are ubiquitous in everyday life. However, current image interpretation systems are mostly limited to using only the visual features, neglecting to leverage the scene text content. In this paper, we propose to jointly use scene text and visual channels for robust semantic interpretation of images. We do not only extract and encode visual and scene text cues… ▽ More

    Submitted 4 December, 2019; v1 submitted 25 May, 2019; originally announced May 2019.

    Comments: The paper is under consideration at Pattern Recognition Letters

  27. arXiv:1904.08624  [pdf, ps, other

    cs.CG

    On conflict-free chromatic guarding of simple polygons

    Authors: Onur Çağırıcı, Subir Kumar Ghosh, Petr Hliněný, Bodhayan Roy

    Abstract: We study the problem of colouring the vertices of a polygon, such that every viewer in it can see a unique colour. The goal is to minimise the number of colours used. This is also known as the conflict-free chromatic guarding problem with vertex guards, and is motivated, e.g., by the problem of radio frequency assignment to sensors placed at the polygon vertices. We first study the scenario in whi… ▽ More

    Submitted 5 April, 2020; v1 submitted 18 April, 2019; originally announced April 2019.

  28. arXiv:1812.10095  [pdf, other

    cs.SD cs.LG eess.AS

    Tensor-Train Long Short-Term Memory for Monaural Speech Enhancement

    Authors: Suman Samui, Indrajit Chakrabarti, Soumya K. Ghosh

    Abstract: In recent years, Long Short-Term Memory (LSTM) has become a popular choice for speech separation and speech enhancement task. The capability of LSTM network can be enhanced by widening and adding more layers. However, this would introduce millions of parameters in the network and also increase the requirement of computational resources. These limitations hinders the efficient implementation of RNN… ▽ More

    Submitted 25 December, 2018; originally announced December 2018.

    Comments: Submitted to IEEE Signal Processing Letters

  29. arXiv:1811.07325  [pdf, ps, other

    cs.DC

    Stark: Fast and Scalable Strassen's Matrix Multiplication using Apache Spark

    Authors: Chandan Misra, Sourangshu Bhattacharya, Soumya K. Ghosh

    Abstract: This paper presents a new fast, highly scalable distributed matrix multiplication algorithm on Apache Spark, called Stark, based on Strassen's matrix multiplication algorithm. Stark preserves Strassen's 7 multiplications scheme in a distributed environment and thus achieves faster execution. It is based on two new ideas; it creates a recursion tree of computation where each level of such tree corr… ▽ More

    Submitted 22 November, 2018; v1 submitted 18 November, 2018; originally announced November 2018.

  30. PS-Sim: A Framework for Scalable Simulation of Participatory Sensing Data

    Authors: Rajesh P Barnwal, Nirnay Ghosh, Soumya K Ghosh, Sajal K Das

    Abstract: Emergence of smartphone and the participatory sensing (PS) paradigm have paved the way for a new variant of pervasive computing. In PS, human user performs sensing tasks and generates notifications, typically in lieu of incentives. These notifications are real-time, large-volume, and multi-modal, which are eventually fused by the PS platform to generate a summary. One major limitation with PS is t… ▽ More

    Submitted 29 August, 2018; originally announced August 2018.

    Comments: Published and Appeared in Proceedings of IEEE International Conference on Smart Computing (SMARTCOMP-2018)

  31. arXiv:1806.08279  [pdf, other

    cs.CV

    Don't only Feel Read: Using Scene text to understand advertisements

    Authors: Arka Ujjal Dey, Suman K. Ghosh, Ernest Valveny

    Abstract: We propose a framework for automated classification of Advertisement Images, using not just Visual features but also Textual cues extracted from embedded text. Our approach takes inspiration from the assumption that Ad images contain meaningful textual content, that can provide discriminative semantic interpretetion, and can thus aid in classifcation tasks. To this end, we develop a framework usin… ▽ More

    Submitted 13 November, 2019; v1 submitted 21 June, 2018; originally announced June 2018.

    Comments: Accepted in CVPR 2018 Workshop: Towards Automatic Understanding of Visual Advertisements (ADS)

  32. arXiv:1804.10819  [pdf, other

    cs.CV

    Learning Cross-Modal Deep Embeddings for Multi-Object Image Retrieval using Text and Sketch

    Authors: Sounak Dey, Anjan Dutta, Suman K. Ghosh, Ernest Valveny, Josep Lladós, Umapada Pal

    Abstract: In this work we introduce a cross modal image retrieval system that allows both text and sketch as input modalities for the query. A cross-modal deep network architecture is formulated to jointly model the sketch and text input modalities as well as the the image output modality, learning a common embedding between text and images and between sketches and images. In addition, an attention model is… ▽ More

    Submitted 28 April, 2018; originally announced April 2018.

    Comments: Accepted at ICPR 2018

  33. arXiv:1804.04365  [pdf, other

    cs.NI

    A Survey of Fog Computing and Communication: Current Researches and Future Directions

    Authors: Shubha Brata Nath, Harshit Gupta, Sandip Chakraborty, Soumya K Ghosh

    Abstract: In this survey, we discuss the evolution of distributed computing from the utility computing to the fog computing, various research challenges for the development of fog computing environments, the current status on fog computing research along with a taxonomy of various existing works in this direction. Then, we focus on the architectures of fog computing systems, technologies for enabling fog, f… ▽ More

    Submitted 12 April, 2018; originally announced April 2018.

  34. arXiv:1801.04723  [pdf, ps, other

    cs.DC

    SPIN: A Fast and Scalable Matrix Inversion Method in Apache Spark

    Authors: Chandan Misra, Sourangshu Bhattacharya, Soumya K. Ghosh

    Abstract: The growth of big data in domains such as Earth Sciences, Social Networks, Physical Sciences, etc. has lead to an immense need for efficient and scalable linear algebra operations, e.g. Matrix inversion. Existing methods for efficient and distributed matrix inversion using big data platforms rely on LU decomposition based block-recursive algorithms. However, these algorithms are complex and requir… ▽ More

    Submitted 15 January, 2018; originally announced January 2018.

  35. arXiv:1712.06778  [pdf, other

    cs.AI

    Learning Representations from Road Network for End-to-End Urban Growth Simulation

    Authors: Saptarshi Pal, Soumya K Ghosh

    Abstract: From our experiences in the past, we have seen that the growth of cities is very much dependent on the transportation networks. In mega cities, transportation networks determine to a significant extent as to where the people will move and houses will be built. Hence, transportation network data is crucial to an urban growth prediction system. Existing works have used manually derived distance base… ▽ More

    Submitted 7 February, 2018; v1 submitted 18 December, 2017; originally announced December 2017.

  36. arXiv:1712.05492  [pdf, other

    cs.CG

    Constant Approximation Algorithms for Guarding Simple Polygons using Vertex Guards

    Authors: Pritam Bhattacharya, Subir Kumar Ghosh, Sudebkumar Pal

    Abstract: The art gallery problem enquires about the least number of guards sufficient to ensure that an art gallery, represented by a simple polygon $P$, is fully guarded. Most standard versions of this problem are known to be NP-hard. In 1987, Ghosh provided a deterministic $\mathcal{O}(\log n)$-approximation algorithm for the case of vertex guards and edge guards in simple polygons. In the same paper, Gh… ▽ More

    Submitted 11 April, 2018; v1 submitted 14 December, 2017; originally announced December 2017.

    Comments: 39 pages, 31 figures

  37. arXiv:1711.10801  [pdf, other

    cs.OH

    Rule based End-to-End Learning Framework for Urban Growth Prediction

    Authors: Saptarshi Pal, Soumya K Ghosh

    Abstract: Due to the rapid growth of urban areas in the past decades, it has become increasingly important to model and monitor urban growth in mega cities. Although several researchers have proposed models for simulating urban growth, they have been primarily dependent on various manually selected spatial and nonspatial explanatory features for building models. A practical difficulty with this approach is… ▽ More

    Submitted 29 May, 2018; v1 submitted 29 November, 2017; originally announced November 2017.

  38. arXiv:1707.02131  [pdf, other

    cs.CV

    SigNet: Convolutional Siamese Network for Writer Independent Offline Signature Verification

    Authors: Sounak Dey, Anjan Dutta, J. Ignacio Toledo, Suman K. Ghosh, Josep Llados, Umapada Pal

    Abstract: Offline signature verification is one of the most challenging tasks in biometrics and document forensics. Unlike other verification problems, it needs to model minute but critical details between genuine and forged signatures, because a skilled falsification might often resembles the real signature with small deformation. This verification task is even harder in writer independent scenarios which… ▽ More

    Submitted 30 September, 2017; v1 submitted 7 July, 2017; originally announced July 2017.

  39. arXiv:1706.01487  [pdf, other

    cs.CV

    Visual attention models for scene text recognition

    Authors: Suman K. Ghosh, Ernest Valveny, Andrew D. Bagdanov

    Abstract: In this paper we propose an approach to lexicon-free recognition of text in scene images. Our approach relies on a LSTM-based soft visual attention model learned from convolutional features. A set of feature vectors are derived from an intermediate convolutional layer corresponding to different areas of the image. This permits encoding of spatial information into the image representation. In this… ▽ More

    Submitted 5 June, 2017; originally announced June 2017.

  40. arXiv:1609.01190  [pdf, other

    cs.NI

    SDFog: A Software Defined Computing Architecture for QoS Aware Service Orchestration over Edge Devices

    Authors: Harshit Gupta, Shubha Brata Nath, Sandip Chakraborty, Soumya K. Ghosh

    Abstract: Cloud computing revolutionized the information technology (IT) industry by offering dynamic and infinite scaling, on-demand resources and utility-oriented usage. However, recent changes in user traffic and requirements have exposed the shortcomings of cloud computing, particularly the inability to deliver real-time responses and handle massive surge in data volumes. Fog computing, that brings back… ▽ More

    Submitted 5 September, 2016; originally announced September 2016.

    Comments: This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  41. arXiv:1606.02007  [pdf, other

    cs.DC

    iFogSim: A Toolkit for Modeling and Simulation of Resource Management Techniques in Internet of Things, Edge and Fog Computing Environments

    Authors: Harshit Gupta, Amir Vahid Dastjerdi, Soumya K. Ghosh, Rajkumar Buyya

    Abstract: Internet of Things (IoT) aims to bring every object (e.g. smart cameras, wearable, environmental sensors, home appliances, and vehicles) online, hence generating massive amounts of data that can overwhelm storage systems and data analytics applications. Cloud computing offers services at the infrastructure level that can scale to IoT storage and processing requirements. However, there are applicat… ▽ More

    Submitted 6 June, 2016; originally announced June 2016.

    Comments: Cloud Computing and Distributed Systems Laboratory, The University of Melbourne, June 6, 2016

    Report number: CLOUDS-TR-2016-2

  42. arXiv:1601.02752  [pdf

    cs.DC

    Fog Computing: Principles, Architectures, and Applications

    Authors: Amir Vahid Dastjerdi, Harshit Gupta, Rodrigo N. Calheiros, Soumya K. Ghosh, Rajkumar Buyya

    Abstract: The Internet of Everything (IoE) solutions gradually bring every object online, and processing data in centralized cloud does not scale to requirements of such environment. This is because, there are applications such as health monitoring and emergency response that require low latency and delay caused by transferring data to the cloud and then back to the application can seriously impact the perf… ▽ More

    Submitted 27 January, 2016; v1 submitted 12 January, 2016; originally announced January 2016.

    Comments: 26 pages, 6 figures, a Book Chapter in Internet of Things: Principles and Paradigms, R. Buyya and A. Dastjerdi (eds), Morgan Kaufmann, Burlington, Massachusetts, USA, 2016

  43. arXiv:1509.06457  [pdf, other

    q-fin.TR cs.CE stat.ML

    Identifying collusion groups using spectral clustering

    Authors: Suneel Sarswat, Kandathil Mathew Abraham, Subir Kumar Ghosh

    Abstract: In an illiquid stock, traders can collude and place orders on a predetermined price and quantity at a fixed schedule. This is usually done to manipulate the price of the stock or to create artificial liquidity in the stock, which may mislead genuine investors. Here, the problem is to identify such group of colluding traders. We modeled the problem instance as a graph, where each trader corresponds… ▽ More

    Submitted 17 October, 2016; v1 submitted 22 September, 2015; originally announced September 2015.

  44. arXiv:1507.06056  [pdf, other

    cs.CY cs.DM cs.DS

    A National Effort for Motivating Indian Students and Teachers towards Algorithmic Research

    Authors: Subir Kumar Ghosh, Sudebkumar Prasant Pal

    Abstract: During 2008-2015, twenty-two introductory workshops on graph and geometric algorithms were organized for teachers and students (undergraduate, post-graduate and doctoral) of engineering colleges and universities at different states and union territories of India. The lectures were meant to provide exposure to the field of graph and geometric algorithms and to motivate the participants towards rese… ▽ More

    Submitted 6 March, 2016; v1 submitted 22 July, 2015; originally announced July 2015.

    ACM Class: F.2.0; G.2.1

  45. Query by String word spotting based on character bi-gram indexing

    Authors: Suman K. Ghosh, Ernest Valveny

    Abstract: In this paper we propose a segmentation-free query by string word spotting method. Both the documents and query strings are encoded using a recently proposed word representa- tion that projects images and strings into a common atribute space based on a pyramidal histogram of characters(PHOC). These attribute models are learned using linear SVMs over the Fisher Vector representation of the images a… ▽ More

    Submitted 28 May, 2015; originally announced May 2015.

    Comments: To be published in ICDAR2015

  46. arXiv:1409.4621  [pdf, other

    cs.CG

    Approximability of Guarding Weak Visibility Polygons

    Authors: Pritam Bhattacharya, Subir Kumar Ghosh, Bodhayan Roy

    Abstract: The art gallery problem enquires about the least number of guards that are sufficient to ensure that an art gallery, represented by a polygon $P$, is fully guarded. In 1998, the problems of finding the minimum number of point guards, vertex guards, and edge guards required to guard $P$ were shown to be APX-hard by Eidenbenz, Widmayer and Stamm. In 1987, Ghosh presented approximation algorithms for… ▽ More

    Submitted 30 April, 2016; v1 submitted 16 September, 2014; originally announced September 2014.

    Comments: 23 pages, 21 figures, 30 citations

  47. arXiv:1310.1726  [pdf, other

    cs.CG math.CO math.MG

    Four-connected triangulations of planar point sets

    Authors: Ajit Arvind Diwan, Subir Kumar Ghosh, Bodhayan Roy

    Abstract: In this paper, we consider the problem of determining in polynomial time whether a given planar point set $P$ of $n$ points admits 4-connected triangulation. We propose a necessary and sufficient condition for recognizing $P$, and present an $O(n^3)$ algorithm of constructing a 4-connected triangulation of $P$. Thus, our algorithm solves a longstanding open problem in computational geometry and ge… ▽ More

    Submitted 7 October, 2013; originally announced October 2013.

    Comments: 35 pages, 35 figures, 5 references

    MSC Class: 68R10 ACM Class: G.2.2; F.2.2

  48. arXiv:1304.4320  [pdf, other

    cs.CG

    An Algorithm for Computing Constrained Reflection Paths in Simple Polygon

    Authors: Arijit Bishnu, Subir Kumar Ghosh, Partha Pratim Goswami, Sudebkumar Prasant Pal, Swami Sarvattomananda

    Abstract: Let $s$ be a source point and $t$ be a destination point inside an $n$-vertex simple polygon $P$. Euclidean shortest paths and minimum-link paths between $s$ and $t$ inside $P$ have been well studied. Both these kinds of paths are simple and piecewise-convex. However, computing optimal paths in the context of diffuse or specular reflections does not seem to be an easy task. A path from a light sou… ▽ More

    Submitted 1 May, 2014; v1 submitted 15 April, 2013; originally announced April 2013.

    MSC Class: 68R10 ACM Class: G.2.2; F.2.2

  49. arXiv:1209.2308  [pdf, ps, other

    cs.CG cs.DM math.CO

    Some Results On Point Visibility Graphs

    Authors: Subir Kumar Ghosh, Bodhayan Roy

    Abstract: In this paper, we present three necessary conditions for recognizing point visibility graphs. We show that this recognition problem lies in PSPACE. We state new properties of point visibility graphs along with some known properties that are important in understanding point visibility graphs. For planar point visibility graphs, we present a complete characterization which leads to a linear time rec… ▽ More

    Submitted 4 April, 2014; v1 submitted 11 September, 2012; originally announced September 2012.

    MSC Class: 68R10 ACM Class: G.2.2; F.2.2

  50. arXiv:1109.1706  [pdf, other

    cs.DC

    On the Fault Tolerance and Hamiltonicity of the Optical Transpose Interconnection System of Non-Hamiltonian Base Graphs

    Authors: Esha Ghosh, Subhas K. Ghosh, C. Pandu Rangan

    Abstract: Hamiltonicity is an important property in parallel and distributed computation. Existence of Hamiltonian cycle allows efficient emulation of distributed algorithms on a network wherever such algorithm exists for linear-array and ring, and can ensure deadlock freedom in some routing algorithms in hierarchical interconnection networks. Hamiltonicity can also be used for construction of independent s… ▽ More

    Submitted 8 September, 2011; originally announced September 2011.