Zum Hauptinhalt springen

Showing 1–11 of 11 results for author: M, J

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.04986  [pdf

    cs.CV cs.AI cs.LG

    Calorie Burn Estimation in Community Parks Through DLICP: A Mathematical Modelling Approach

    Authors: Abhishek Sebastian, Annis Fathima A, Pragna R, Madhan Kumar S, Jesher Joshua M

    Abstract: Community parks play a crucial role in promoting physical activity and overall well-being. This study introduces DLICP (Deep Learning Integrated Community Parks), an innovative approach that combines deep learning techniques specifically, face recognition technology with a novel walking activity measurement algorithm to enhance user experience in community parks. The DLICP utilizes a camera with f… ▽ More

    Submitted 6 July, 2024; originally announced July 2024.

    Comments: Accepted and to be presented at Intellisys 2024 , Also Part of the Indian Patent: 202441050325

  2. arXiv:2405.15774  [pdf

    cs.RO cs.AI

    Comprehensive Autonomous Vehicle Optimal Routing With Dynamic Heuristics

    Authors: Ragav V, Jesher Joshua M, Syed Ibrahim S P

    Abstract: Auto manufacturers and research groups are working on autonomous driving for long period and achieved significant progress. Autonomous vehicles (AV) are expected to transform road traffic reduction from current conditions, avoiding accidents and congestion. As the implementation of an autonomous vehicle ecosystem includes complex automotive technology, ethics, passenger behaviour, traffic manageme… ▽ More

    Submitted 17 March, 2024; originally announced May 2024.

  3. arXiv:2405.03537  [pdf, other

    cs.LG cs.AI

    Exploring the Efficacy of Federated-Continual Learning Nodes with Attention-Based Classifier for Robust Web Phishing Detection: An Empirical Investigation

    Authors: Jesher Joshua M, Adhithya R, Sree Dananjay S, M Revathi

    Abstract: Web phishing poses a dynamic threat, requiring detection systems to quickly adapt to the latest tactics. Traditional approaches of accumulating data and periodically retraining models are outpaced. We propose a novel paradigm combining federated learning and continual learning, enabling distributed nodes to continually update models on streams of new phishing data, without accumulating data. These… ▽ More

    Submitted 16 June, 2024; v1 submitted 6 May, 2024; originally announced May 2024.

  4. Advanced Knowledge Extraction of Physical Design Drawings, Translation and conversion to CAD formats using Deep Learning

    Authors: Jesher Joshua M, Ragav V, Syed Ibrahim S P

    Abstract: The maintenance, archiving and usage of the design drawings is cumbersome in physical form in different industries for longer period. It is hard to extract information by simple scanning of drawing sheets. Converting them to their digital formats such as Computer-Aided Design (CAD), with needed knowledge extraction can solve this problem. The conversion of these machine drawings to its digital for… ▽ More

    Submitted 17 March, 2024; originally announced March 2024.

  5. Comparative Analysis of Imbalanced Malware Byteplot Image Classification using Transfer Learning

    Authors: Jayasudha M, Ayesha Shaik, Gaurav Pendharkar, Soham Kumar, Muhesh Kumar B, Sudharshanan Balaji

    Abstract: Cybersecurity is a major concern due to the increasing reliance on technology and interconnected systems. Malware detectors help mitigate cyber-attacks by comparing malware signatures. Machine learning can improve these detectors by automating feature extraction, identifying patterns, and enhancing dynamic analysis. In this paper, the performance of six multiclass classification models is compared… ▽ More

    Submitted 4 October, 2023; originally announced October 2023.

    Comments: accepted at PEIS2023 and will be published in Lecture Notes in Electrical Engineering

  6. arXiv:2308.05548  [pdf, other

    math.OC cs.AI

    Learning (With) Distributed Optimization

    Authors: Aadharsh Aadhithya A, Abinesh S, Akshaya J, Jayanth M, Vishnu Radhakrishnan, Sowmya V, Soman K. P

    Abstract: This paper provides an overview of the historical progression of distributed optimization techniques, tracing their development from early duality-based methods pioneered by Dantzig, Wolfe, and Benders in the 1960s to the emergence of the Augmented Lagrangian Alternating Direction Inexact Newton (ALADIN) algorithm. The initial focus on Lagrangian relaxation for convex problems and decomposition st… ▽ More

    Submitted 10 August, 2023; originally announced August 2023.

    Comments: 23 pages

  7. arXiv:2304.14607  [pdf

    cs.CR

    A Brief Study of Privacy-Preserving Practices (PPP) in Data Mining

    Authors: Dhinakaran D, Joe Prathap P. M

    Abstract: Data mining is the way toward mining fascinating patterns or information from an enormous level of the database. Data mining additionally opens another risk to privacy and data security.One of the maximum significant themes in the research fieldis privacy-preserving DM (PPDM). Along these lines, the investigation of ensuring delicate information and securing sensitive mined snippets of data withou… ▽ More

    Submitted 27 April, 2023; originally announced April 2023.

  8. Mining Privacy-Preserving Association Rules based on Parallel Processing in Cloud Computing

    Authors: Dhinakaran D, Joe Prathap P. M, Selvaraj D, Arul Kumar D, Murugeshwari B

    Abstract: With the onset of the Information Era and the rapid growth of information technology, ample space for processing and extracting data has opened up. However, privacy concerns may stifle expansion throughout this area. The challenge of reliable mining techniques when transactions disperse across sources is addressed in this study. This work looks at the prospect of creating a new set of three algori… ▽ More

    Submitted 21 April, 2023; originally announced April 2023.

  9. arXiv:2211.06313  [pdf

    cs.CY

    BioJam Camp: toward justice through bioengineering and biodesign co-learning with youth

    Authors: Callie Chappell, Henry A. -A., Elvia B. O., Emily B., Bailey B., Jacqueline C. -M., Caroline Daws, Cristian F., Emiliano G., Page Goddard, Xavier G., Anne Hu, Gabriela J., Kelley Langhans, Briana Martin-Villa, Penny M. -S., Jennifer M., Soyang N., Melissa Ortiz, Aryana P., Trisha S, Corinne Takara, Emily T., Paloma Vazquez, Rolando Perez , et al. (1 additional authors not shown)

    Abstract: BioJam is a political, artistic, and educational project in which Bay Area artists, scientists, and educators collaborate with youth and communities of color to address historical exclusion of their communities in STEM fields and reframe what science can be. As an intergenerational collective, we co-learn on topics of culture (social and biological), community (cultural and ecological), and creati… ▽ More

    Submitted 1 November, 2022; originally announced November 2022.

  10. Recovering hard-to-find object instances by sampling context-based object proposals

    Authors: Jose Oramas M., Tinne Tuytelaars

    Abstract: In this paper we focus on improving object detection performance in terms of recall. We propose a post-detection stage during which we explore the image with the objective of recovering missed detections. This exploration is performed by sampling object proposals in the image. We analyze four different strategies to perform this sampling, giving special attention to strategies that exploit spatial… ▽ More

    Submitted 4 October, 2016; v1 submitted 5 November, 2015; originally announced November 2015.

    Comments: Computer Vision and Image Understanding (CVIU)

  11. arXiv:0906.3956  [pdf

    cs.CR

    Analysis of the various key management algorithms and new proposal in the secure multicast communications

    Authors: Joe Prathap P M., V. Vasudevan

    Abstract: With the evolution of the Internet, multicast communications seem particularly well adapted for large scale commercial distribution applications, for example, the pay TV channels and secure videoconferencing. Key management for multicast remains an open topic in secure Communications today. Key management mainly has to do with the distribution and update of keying material during the group life.… ▽ More

    Submitted 22 June, 2009; originally announced June 2009.

    Comments: 8 pages, International Journal of Computer Science and Information Security

    Journal ref: IJCSIS 2009, June Issue, Vol.2. No.1