Zum Hauptinhalt springen

Showing 1–18 of 18 results for author: Negi, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.09147  [pdf

    cs.HC

    Evaluating the efficacy of haptic feedback, 360° treadmill-integrated Virtual Reality framework and longitudinal training on decision-making performance in a complex search-and-shoot simulation

    Authors: Akash K Rao, Arnav Bhavsar, Shubhajit Roy Chowdhury, Sushil Chandra, Ramsingh Negi, Prakash Duraisamy, Varun Dutt

    Abstract: Virtual Reality (VR) has made significant strides, offering users a multitude of ways to interact with virtual environments. Each sensory modality in VR provides distinct inputs and interactions, enhancing the user's immersion and presence. However, the potential of additional sensory modalities, such as haptic feedback and 360° locomotion, to improve decision-making performance has not been thoro… ▽ More

    Submitted 14 April, 2024; originally announced April 2024.

    Comments: 13 pages, 6 figures, 1 Table

  2. arXiv:2402.00090  [pdf

    q-bio.NC cs.HC

    Classification of attention performance post-longitudinal tDCS via functional connectivity and machine learning methods

    Authors: Akash K Rao, Vishnu K Menon, Arnav Bhavsar, Shubhajit Roy Chowdhury, Ramsingh Negi, Varun Dutt

    Abstract: Attention is the brain's mechanism for selectively processing specific stimuli while filtering out irrelevant information. Characterizing changes in attention following long-term interventions (such as transcranial direct current stimulation (tDCS)) has seldom been emphasized in the literature. To classify attention performance post-tDCS, this study uses functional connectivity and machine learnin… ▽ More

    Submitted 31 January, 2024; originally announced February 2024.

    Comments: 6 pages, to be presented in the IEEE 9th International Conference for Convergence in Technology (I2CT),Pune, April 2024. arXiv admin note: substantial text overlap with arXiv:2401.17700

  3. arXiv:2305.15426  [pdf, other

    cs.CV cs.LG

    Transcending Grids: Point Clouds and Surface Representations Powering Neurological Processing

    Authors: Kishore Babu Nampalle, Pradeep Singh, Vivek Narayan Uppala, Sumit Gangwar, Rajesh Singh Negi, Balasubramanian Raman

    Abstract: In healthcare, accurately classifying medical images is vital, but conventional methods often hinge on medical data with a consistent grid structure, which may restrict their overall performance. Recent medical research has been focused on tweaking the architectures to attain better performance without giving due consideration to the representation of data. In this paper, we present a novel approa… ▽ More

    Submitted 2 June, 2023; v1 submitted 17 May, 2023; originally announced May 2023.

  4. arXiv:2212.14470  [pdf

    cs.CR

    An electronic warfare approach for deploying a software-based Wi-Fi jammer

    Authors: Keshav Kaushik, Rahul Negi, Prabhav Dev

    Abstract: Some prominent instances have been centered on electronic warfare. For example, the American military has made significant investments in automation through UAV programs, only for competitors like the Iranians to create strategies to interfere with these systems. Iran managed to capture a top-secret U.S. surveil-lance drone by fooling it into descending in the incorrect place by jamming its contro… ▽ More

    Submitted 29 December, 2022; originally announced December 2022.

  5. Security Orchestration, Automation, and Response Engine for Deployment of Behavioural Honeypots

    Authors: Upendra Bartwal, Subhasis Mukhopadhyay, Rohit Negi, Sandeep Shukla

    Abstract: Cyber Security is a critical topic for organizations with IT/OT networks as they are always susceptible to attack, whether insider or outsider. Since the cyber landscape is an ever-evolving scenario, one must keep upgrading its security systems to enhance the security of the infrastructure. Tools like Security Information and Event Management (SIEM), Endpoint Detection and Response (EDR), Threat I… ▽ More

    Submitted 14 January, 2022; originally announced January 2022.

    Comments: SOAR Engine for Honeypots Deployment, 8 pages, 7 figures

    Journal ref: 2022 IEEE Conference on Dependable and Secure Computing (DSC)

  6. arXiv:2108.13302  [pdf, ps, other

    cs.IR cs.IT eess.SY

    A Theoretical Framework for Online Information Search

    Authors: Rohit Negi

    Abstract: A significant part of human activity today consists of searching for a piece of information online, utilizing knowledge repositories. This endeavor may be time-consuming if the individual searching for the information is unfamiliar with the subject matter of that information. However, experts can aid individuals find relevant information by searching online. This paper describes a theoretical fram… ▽ More

    Submitted 19 August, 2021; originally announced August 2021.

    Comments: 9 pages

  7. arXiv:1710.02882  [pdf, other

    cs.SI

    Supermajority Sentiment Detection with External Influence in Large Social Networks

    Authors: Tian Tong, Rohit Negi

    Abstract: In a large social network whose members harbor binary sentiments towards an issue, we investigate the asymptotic accuracy of sentiment detection. We model the user sentiments by an Ising Markov random field model and allow the user sentiments to be biased by an external influence. We consider a general supermajority sentiment detection problem and show that the detection accuracy is affected by th… ▽ More

    Submitted 8 October, 2017; originally announced October 2017.

    Comments: 8 pages, 6 figures, 55th Annual Allerton Conference on Communication

  8. arXiv:1611.04654  [pdf, other

    cs.SI

    Asymptotic Performance Analysis of Majority Sentiment Detection in Online Social Networks

    Authors: Tian Tong, Rohit Negi

    Abstract: We analyze the problem of majority sentiment detection in Online Social Networks (OSN), and relate the detection error probability to the underlying graph of the OSN. Modeling the underlying social network as an Ising Markov random field prior based on a given graph, we show that in the case of the empty graph (independent sentiments) and the chain graph, the detection is always inaccurate, even w… ▽ More

    Submitted 14 November, 2016; originally announced November 2016.

  9. arXiv:1401.2113  [pdf, ps, other

    cs.SI

    Latent Sentiment Detection in Online Social Networks: A Communications-oriented View

    Authors: Rohit Negi, Vinay Uday Prabhu, Miguel Rodrigues

    Abstract: In this paper, we consider the problem of latent sentiment detection in Online Social Networks such as Twitter. We demonstrate the benefits of using the underlying social network as an Ising prior to perform network aided sentiment detection. We show that the use of the underlying network results in substantially lower detection error rates compared to strictly features-based detection. In doing s… ▽ More

    Submitted 9 January, 2014; originally announced January 2014.

    Comments: 13 pages, 6 figures, Submitted to ICC 2014

  10. arXiv:1201.2934  [pdf, ps, other

    math.OC cs.DS cs.IT

    An Information-Theoretic Approach to PMU Placement in Electric Power Systems

    Authors: Qiao Li, Tao Cui, Yang Weng, Rohit Negi, Franz Franchetti, Marija D. Ilic

    Abstract: This paper presents an information-theoretic approach to address the phasor measurement unit (PMU) placement problem in electric power systems. Different from the conventional 'topological observability' based approaches, this paper advocates a much more refined, information-theoretic criterion, namely the mutual information (MI) between the PMU measurements and the power system states. The propos… ▽ More

    Submitted 13 January, 2012; originally announced January 2012.

    Comments: 8 pages, 7 figures

  11. arXiv:1112.0539  [pdf, ps, other

    cs.IT

    Maximal Scheduling in Wireless Networks with Priorities

    Authors: Qiao Li, Rohit Negi

    Abstract: We consider a general class of low complexity distributed scheduling algorithms in wireless networks, maximal scheduling with priorities, where a maximal set of transmitting links in each time slot are selected according to certain pre-specified static priorities. The proposed scheduling scheme is simple, which is easily amendable for distributed implementation in practice, such as using inter-fra… ▽ More

    Submitted 2 December, 2011; originally announced December 2011.

    Comments: 10 pages, 6 figures

  12. Distributed Throughput-optimal Scheduling in Ad Hoc Wireless Networks

    Authors: Qiao Li, Rohit Negi

    Abstract: In this paper, we propose a distributed throughput-optimal ad hoc wireless network scheduling algorithm, which is motivated by the celebrated simplex algorithm for solving linear programming (LP) problems. The scheduler stores a sparse set of basic schedules, and chooses the max-weight basic schedule for transmission in each time slot. At the same time, the scheduler tries to update the set of bas… ▽ More

    Submitted 7 February, 2011; originally announced February 2011.

    Comments: 6 pages, 3 figures. A shorter version will appear in the proceedings of IEEE ICC 2011

  13. Greedy Maximal Scheduling in Wireless Networks

    Authors: Qiao Li, Rohit Negi

    Abstract: In this paper we consider greedy scheduling algorithms in wireless networks, i.e., the schedules are computed by adding links greedily based on some priority vector. Two special cases are considered: 1) Longest Queue First (LQF) scheduling, where the priorities are computed using queue lengths, and 2) Static Priority (SP) scheduling, where the priorities are pre-assigned. We first propose a closed… ▽ More

    Submitted 27 July, 2010; originally announced July 2010.

    Comments: 6 pages, 3 figures. A shorter version will appear in IEEE Globecom 2010

  14. arXiv:1001.2050  [pdf, ps, other

    cs.IT cs.NI math.OC

    Scheduling in Wireless Networks under Uncertainties: A Greedy Primal-Dual Approach

    Authors: Qiao Li, Rohit Negi

    Abstract: This paper proposes a dynamic primal-dual type algorithm to solve the optimal scheduling problem in wireless networks subject to uncertain parameters, which are generated by stochastic network processes such as random packet arrivals, channel fading, and node mobilities. The algorithm is a generalization of the well-known max-weight scheduling algorithm proposed by Tassiulas et al., where only que… ▽ More

    Submitted 12 June, 2010; v1 submitted 12 January, 2010; originally announced January 2010.

    Comments: 8 pages, 2 figures, submitted to Allerton 2010. The title and abstract are updated compared to version 1

  15. arXiv:0901.2922  [pdf, ps, other

    cs.IT

    Scheduling in Multi-hop Wireless Networks with Priorities

    Authors: Qiao Li, Rohit Negi

    Abstract: In this paper we consider prioritized maximal scheduling in multi-hop wireless networks, where the scheduler chooses a maximal independent set greedily according to a sequence specified by certain priorities. We show that if the probability distributions of the priorities are properly chosen, we can achieve the optimal (maximum) stability region using an i.i.d random priority assignment process,… ▽ More

    Submitted 19 January, 2009; originally announced January 2009.

    Comments: 9 pages, 1 figure

  16. The Sensing Capacity of Sensor Networks

    Authors: Yaron Rachlin, Rohit Negi, Pradeep Khosla

    Abstract: This paper demonstrates fundamental limits of sensor networks for detection problems where the number of hypotheses is exponentially large. Such problems characterize many important applications including detection and classification of targets in a geographical area using a network of sensors, and detecting complex substances with a chemical sensor array. We refer to such applications as larges… ▽ More

    Submitted 14 January, 2009; originally announced January 2009.

    Comments: Submitted to IEEE Transactions on Information Theory, November 2006

  17. arXiv:cs/0508095  [pdf, ps, other

    cs.IT cs.NI

    Capacity of Ultra Wide Band Wireless Ad Hoc Networks

    Authors: Rohit Negi, Arjunan Rajeswaran

    Abstract: Throughput capacity is a critical parameter for the design and evaluation of ad-hoc wireless networks. Consider n identical randomly located nodes, on a unit area, forming an ad-hoc wireless network. Assuming a fixed per node transmission capability of T bits per second at a fixed range, it has been shown that the uniform throughput capacity per node r(n) is Theta((T)/(sqrt{n log n})), a decreas… ▽ More

    Submitted 22 August, 2005; originally announced August 2005.

    Comments: 12 pages,2 figures

  18. Sensing Capacity for Markov Random Fields

    Authors: Yaron Rachlin, Rohit Negi, Pradeep Khosla

    Abstract: This paper computes the sensing capacity of a sensor network, with sensors of limited range, sensing a two-dimensional Markov random field, by modeling the sensing operation as an encoder. Sensor observations are dependent across sensors, and the sensor network output across different states of the environment is neither identically nor independently distributed. Using a random coding argument,… ▽ More

    Submitted 10 August, 2005; originally announced August 2005.

    Comments: To appear in the proceedings of the 2005 IEEE International Symposium on Information Theory, Adelaide, Australia, September 4-9, 2005