Skip to main content

Showing 1–39 of 39 results for author: Shrestha, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.17279  [pdf, other

    cs.RO cs.AI

    Learning Decentralized Multi-Biped Control for Payload Transport

    Authors: Bikram Pandit, Ashutosh Gupta, Mohitvishnu S. Gadde, Addison Johnson, Aayam Kumar Shrestha, Helei Duan, Jeremy Dao, Alan Fern

    Abstract: Payload transport over flat terrain via multi-wheel robot carriers is well-understood, highly effective, and configurable. In this paper, our goal is to provide similar effectiveness and configurability for transport over rough terrain that is more suitable for legs rather than wheels. For this purpose, we consider multi-biped robot carriers, where wheels are replaced by multiple bipedal robots at… ▽ More

    Submitted 25 June, 2024; originally announced June 2024.

    Comments: Submitted to CoRL 2024, Project website: decmbc.github.io

  2. arXiv:2406.13383  [pdf, other

    nlin.CG cs.ET

    Emergent Dynamics in Heterogeneous Life-Like Cellular Automata

    Authors: Aarati Shrestha, Felix Reimers, Sanyam Jain, Paolo Baldini, Michele Braccini, Andrea Roli, Stefano Nichele

    Abstract: The Game of Life (GoL), one well known 2D cellular automaton, does not typically ensure interesting long-term phenotypic dynamics. Therefore, while being Turing complete, GoL cannot be said to be open-ended. In this work, we extend GoL with the opportunity for local mutations, thus enabling a heterogeneous life-like cellular automaton guided by an evolutionary inner loop. Additionally, we introduc… ▽ More

    Submitted 19 June, 2024; originally announced June 2024.

    Comments: 16 pages, 9 Figures

  3. Properties that allow or prohibit transferability of adversarial attacks among quantized networks

    Authors: Abhishek Shrestha, Jürgen Großmann

    Abstract: Deep Neural Networks (DNNs) are known to be vulnerable to adversarial examples. Further, these adversarial examples are found to be transferable from the source network in which they are crafted to a black-box target network. As the trend of using deep learning on embedded devices grows, it becomes relevant to study the transferability properties of adversarial examples among compressed networks.… ▽ More

    Submitted 15 May, 2024; originally announced May 2024.

  4. arXiv:2404.19173  [pdf, other

    cs.RO

    Revisiting Reward Design and Evaluation for Robust Humanoid Standing and Walking

    Authors: Bart van Marum, Aayam Shrestha, Helei Duan, Pranay Dugar, Jeremy Dao, Alan Fern

    Abstract: A necessary capability for humanoid robots is the ability to stand and walk while rejecting natural disturbances. Recent progress has been made using sim-to-real reinforcement learning (RL) to train such locomotion controllers, with approaches differing mainly in their reward functions. However, prior works lack a clear method to systematically test new reward functions and compare controller perf… ▽ More

    Submitted 29 April, 2024; originally announced April 2024.

    Comments: 8 pages, 5 figs

  5. arXiv:2404.13327  [pdf, other

    cs.LG cs.AI

    Comparative Analysis on Snowmelt-Driven Streamflow Forecasting Using Machine Learning Techniques

    Authors: Ukesh Thapa, Bipun Man Pati, Samit Thapa, Dhiraj Pyakurel, Anup Shrestha

    Abstract: The rapid advancement of machine learning techniques has led to their widespread application in various domains including water resources. However, snowmelt modeling remains an area that has not been extensively explored. In this study, we propose a state-of-the-art (SOTA) deep learning sequential model, leveraging the Temporal Convolutional Network (TCN), for snowmelt-driven discharge modeling in… ▽ More

    Submitted 23 April, 2024; v1 submitted 20 April, 2024; originally announced April 2024.

    Comments: 17 pages, 4 Tables, 7 figures

  6. arXiv:2403.11936  [pdf, other

    eess.IV cs.CV

    AI-Assisted Cervical Cancer Screening

    Authors: Kanchan Poudel, Lisasha Poudel, Prabin Raj Shakya, Atit Poudel, Archana Shrestha, Bishesh Khanal

    Abstract: Visual Inspection with Acetic Acid (VIA) remains the most feasible cervical cancer screening test in resource-constrained settings of low- and middle-income countries (LMICs), which are often performed screening camps or primary/community health centers by nurses instead of the preferred but unavailable expert Gynecologist. To address the highly subjective nature of the test, various handheld devi… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

  7. arXiv:2311.02511  [pdf

    cs.NI eess.SP physics.optics quant-ph

    EU COST Action on future generation optical wireless communication technologies, 2nd White paper

    Authors: Z. Ghassemlooy, M. A. Khalighi, S. Zvanovec, A. Shrestha, B. Ortega, M. Petkovic, X. Pang, C. Sirtori, D. Orsucci, A. Shrestha, F. Moll, G. Cossu, V. Spirito, M. P. Ninos, E. Ciaramella, J. Bas, M. Amay, S. Huang, M. Safari, T. Gutema, W. Popoola, Vicente Matus, Jose Rabadan, Rafael Perez-Jimenez, E. Panayirci , et al. (3 additional authors not shown)

    Abstract: NEWFOCUS is an EU COST Action targeted at exploring radical solutions that could influence the design of future wireless networks. The project aims to address some of the challenges associated with optical wireless communication (OWC) and to establish it as a complementary technology to the radio frequency (RF)-based wireless systems in order to meet the demanding requirements of the fifth generat… ▽ More

    Submitted 14 June, 2023; originally announced November 2023.

  8. arXiv:2310.20036  [pdf

    cs.CR cs.DC

    Student Certificate Sharing System Using Blockchain and NFTs

    Authors: Prakhyat Khati, Ajay Kumar Shrestha, Julita Vassileva

    Abstract: In this paper, we propose a certificate sharing system based on blockchain that gives students authority and control over their academic certificates. Our strategy involves developing blockchain-based NFT certifications that can be shared with institutions or employers using blockchain addresses. Students may access the data created by each individual institute in a single platform, filter the vie… ▽ More

    Submitted 30 October, 2023; originally announced October 2023.

  9. arXiv:2310.19287  [pdf

    cs.LG

    Enhancing Scalability and Reliability in Semi-Decentralized Federated Learning With Blockchain: Trust Penalization and Asynchronous Functionality

    Authors: Ajay Kumar Shrestha, Faijan Ahamad Khan, Mohammed Afaan Shaikh, Amir Jaberzadeh, Jason Geng

    Abstract: The paper presents an innovative approach to address the challenges of scalability and reliability in Distributed Federated Learning by leveraging the integration of blockchain technology. The paper focuses on enhancing the trustworthiness of participating nodes through a trust penalization mechanism while also enabling asynchronous functionality for efficient and robust model updates. By combinin… ▽ More

    Submitted 30 October, 2023; originally announced October 2023.

    Comments: To appear in 2023 IEEE Ubiquitous Computing, Electronics & Mobile Communication Conference (IEEE UEMCON)

  10. arXiv:2310.04558  [pdf, other

    cs.CV cs.LG

    VTON-IT: Virtual Try-On using Image Translation

    Authors: Santosh Adhikari, Bishnu Bhusal, Prashant Ghimire, Anil Shrestha

    Abstract: Virtual Try-On (trying clothes virtually) is a promising application of the Generative Adversarial Network (GAN). However, it is an arduous task to transfer the desired clothing item onto the corresponding regions of a human body because of varying body size, pose, and occlusions like hair and overlapped clothes. In this paper, we try to produce photo-realistic translated images through semantic s… ▽ More

    Submitted 6 May, 2024; v1 submitted 6 October, 2023; originally announced October 2023.

  11. arXiv:2307.10492  [pdf

    cs.LG

    Blockchain-Based Federated Learning: Incentivizing Data Sharing and Penalizing Dishonest Behavior

    Authors: Amir Jaberzadeh, Ajay Kumar Shrestha, Faijan Ahamad Khan, Mohammed Afaan Shaikh, Bhargav Dave, Jason Geng

    Abstract: With the increasing importance of data sharing for collaboration and innovation, it is becoming more important to ensure that data is managed and shared in a secure and trustworthy manner. Data governance is a common approach to managing data, but it faces many challenges such as data silos, data consistency, privacy, security, and access control. To address these challenges, this paper proposes a… ▽ More

    Submitted 19 July, 2023; originally announced July 2023.

    Comments: To appear in the 5th International Congress on Blockchain and Applications (BLOCKCHAIN'23). Publish by the Lecture Notes in Networks and Systems series of Springer Verlag

  12. arXiv:2305.09378  [pdf, other

    cs.NE cs.AI

    Capturing Emerging Complexity in Lenia

    Authors: Sanyam Jain, Aarati Shrestha, Stefano Nichele

    Abstract: This research project investigates Lenia, an artificial life platform that simulates ecosystems of digital creatures. Lenia's ecosystem consists of simple, artificial organisms that can move, consume, grow, and reproduce. The platform is important as a tool for studying artificial life and evolution, as it provides a scalable and flexible environment for creating a diverse range of organisms with… ▽ More

    Submitted 9 August, 2023; v1 submitted 16 May, 2023; originally announced May 2023.

  13. arXiv:2304.11068  [pdf, other

    eess.SP cs.HC cs.LG cs.RO q-bio.NC

    Color-based classification of EEG Signals for people with the severe locomotive disorder

    Authors: Ankit Shrestha, Bikram Adhikari

    Abstract: The neurons in the brain produces electric signals and a collective firing of these electric signals gives rise to brainwaves. These brainwave signals are captured using EEG (Electroencephalogram) devices as micro voltages. These sequence of signals captured by EEG sensors have embedded features in them that can be used for classification. The signals can be used as an alternative input for people… ▽ More

    Submitted 12 April, 2023; originally announced April 2023.

    Comments: 6 pages, 3 figures, 14 graphs, 4 tables, 2 authors

  14. arXiv:2212.10711  [pdf, other

    cs.CL cs.LG

    Task Ambiguity in Humans and Language Models

    Authors: Alex Tamkin, Kunal Handa, Avash Shrestha, Noah Goodman

    Abstract: Language models have recently achieved strong performance across a wide range of NLP benchmarks. However, unlike benchmarks, real world tasks are often poorly specified, and agents must deduce the user's intended behavior from a combination of context, instructions, and examples. We investigate how both humans and models behave in the face of such task ambiguity by proposing AmbiBench, a new bench… ▽ More

    Submitted 20 December, 2022; originally announced December 2022.

  15. arXiv:2210.02397  [pdf

    cs.NI eess.SP

    EU cost action on future generation optical wireless communication technologies -- newfocus ca19111, a white paper

    Authors: M A Khalighi, Z Ghassemlooy, S Zvanovec, N Stevens, L N Alves, A Shrestha, M Uysal, A M Vegni, P D Diamantoulakis, V K Papanikolaou, G K Karagiannidis, B Ortega, V Almenar, O Bouchet, L Ladid

    Abstract: The EU COST Action NEWFOCUS is focused on investigating radical solutions with the potential to impact the design of future wireless networks. It aims to address some of the challenges in OWC and establish it as an efficient technology that can satisfy the demanding requirements of backhaul and access network levels in 5G networks. This also includes the use of hybrid links that associate OWC with… ▽ More

    Submitted 18 July, 2022; originally announced October 2022.

  16. arXiv:2202.07875  [pdf

    cs.SE

    Knowledge Management for Cloud Computing Field

    Authors: Mahdi Fahmideh, Jun Yan, Jun Shen, Aakash Ahmad, Davoud Mougouei, Anup Shrestha

    Abstract: Migration legacy systems to cloud platforms is a knowledge intensive process. There is an ever increasing body of knowledge reporting empirical scenarios of successful and problematic cloud migration. Reusing this body of knowledge, dispersed and fragmented over the academic/multi-vocal literature, has practical values to mitigate costly risks and pitfalls in further projects of legacy to-cloud an… ▽ More

    Submitted 16 February, 2022; originally announced February 2022.

  17. arXiv:2105.03649  [pdf, other

    cs.NE cs.DC cs.ET

    In-Hardware Learning of Multilayer Spiking Neural Networks on a Neuromorphic Processor

    Authors: Amar Shrestha, Haowen Fang, Daniel Patrick Rider, Zaidao Mei, Qinru Qiu

    Abstract: Although widely used in machine learning, backpropagation cannot directly be applied to SNN training and is not feasible on a neuromorphic processor that emulates biological neuron and synapses. This work presents a spike-based backpropagation algorithm with biological plausible local update rules and adapts it to fit the constraint in a neuromorphic hardware. The algorithm is implemented on Intel… ▽ More

    Submitted 8 May, 2021; originally announced May 2021.

    Comments: 6 pages, 5 figures, accepted for Design Automation Conference (DAC) 2021

  18. arXiv:2010.08891  [pdf, other

    cs.LG cs.AI stat.ML

    DeepAveragers: Offline Reinforcement Learning by Solving Derived Non-Parametric MDPs

    Authors: Aayam Shrestha, Stefan Lee, Prasad Tadepalli, Alan Fern

    Abstract: We study an approach to offline reinforcement learning (RL) based on optimally solving finitely-represented MDPs derived from a static dataset of experience. This approach can be applied on top of any learned representation and has the potential to easily support multiple solution objectives as well as zero-shot adjustment to changing environments and goals. Our main contribution is to introduce t… ▽ More

    Submitted 17 October, 2020; originally announced October 2020.

    Comments: Preprint. Under review at ICLR 2021

  19. arXiv:2007.03547  [pdf, other

    cs.NE cs.LG

    Multivariate Time Series Classification Using Spiking Neural Networks

    Authors: Haowen Fang, Amar Shrestha, Qinru Qiu

    Abstract: There is an increasing demand to process streams of temporal data in energy-limited scenarios such as embedded devices, driven by the advancement and expansion of Internet of Things (IoT) and Cyber-Physical Systems (CPS). Spiking neural network has drawn attention as it enables low power consumption by encoding and processing information as sparse spike events, which can be exploited for event-dri… ▽ More

    Submitted 7 July, 2020; originally announced July 2020.

  20. arXiv:2006.03776  [pdf, other

    cs.CV cs.CL cs.LG

    MAGNet: Multi-Region Attention-Assisted Grounding of Natural Language Queries at Phrase Level

    Authors: Amar Shrestha, Krittaphat Pugdeethosapol, Haowen Fang, Qinru Qiu

    Abstract: Grounding free-form textual queries necessitates an understanding of these textual phrases and its relation to the visual cues to reliably reason about the described locations. Spatial attention networks are known to learn this relationship and focus its gaze on salient objects in the image. Thus, we propose to utilize spatial attention networks for image-level visual-textual fusion preserving loc… ▽ More

    Submitted 6 June, 2020; originally announced June 2020.

    Comments: Submitted to The 2020 European Conference on Computer Vision (ECCV 2020)

  21. arXiv:2004.13890  [pdf

    cs.CR

    Customer Data Sharing Platform: A Blockchain-Based Shopping Cart

    Authors: Ajay Kumar Shrestha, Sandhya Joshi, Julita Vassileva

    Abstract: We propose a new free eCommerce platform with blockchains that allows customers to connect to the seller directly, share personal data without losing control and ownership of it and apply it to the domain of shopping cart. Our new platform provides a solution to four important problems: private payment, ensuring privacy and user control, and incentives for sharing. It allows the trade to be open,… ▽ More

    Submitted 28 April, 2020; originally announced April 2020.

    Comments: To appear in IEEE International Conference on Blockchain and Cryptocurrency (IEEE ICBC)

  22. arXiv:2003.02944  [pdf, other

    cs.NE cs.LG stat.ML

    Exploiting Neuron and Synapse Filter Dynamics in Spatial Temporal Learning of Deep Spiking Neural Network

    Authors: Haowen Fang, Amar Shrestha, Ziyi Zhao, Qinru Qiu

    Abstract: The recent discovered spatial-temporal information processing capability of bio-inspired Spiking neural networks (SNN) has enabled some interesting models and applications. However designing large-scale and high-performance model is yet a challenge due to the lack of robust training algorithms. A bio-plausible SNN model with spatial-temporal property is a complex dynamic system. Each synapse and n… ▽ More

    Submitted 25 July, 2020; v1 submitted 18 February, 2020; originally announced March 2020.

  23. arXiv:2001.02330  [pdf

    cs.AI cs.LG

    High-Level Plan for Behavioral Robot Navigation with Natural Language Directions and R-NET

    Authors: Amar Shrestha, Krittaphat Pugdeethosapol, Haowen Fang, Qinru Qiu

    Abstract: When the navigational environment is known, it can be represented as a graph where landmarks are nodes, the robot behaviors that move from node to node are edges, and the route is a set of behavioral instructions. The route path from source to destination can be viewed as a class of combinatorial optimization problems where the path is a sequential subset from a set of discrete items. The pointer… ▽ More

    Submitted 7 January, 2020; originally announced January 2020.

    Comments: 4 pages, 2 figures

  24. arXiv:2001.00079  [pdf

    cs.CY cs.CR cs.GT

    User Acceptance of Usable Blockchain-Based Research Data Sharing System: An Extended TAM Based Study

    Authors: Ajay Kumar Shrestha, Julita Vassileva

    Abstract: Blockchain technology has evolved as a promising means to transform data management models in many domains including healthcare, agricultural research, tourism domains etc. In the research community, a usable blockchain-based system can allow users to create a proof of ownership and provenance of the research work, share research data without losing control and ownership of it, provide incentives… ▽ More

    Submitted 14 December, 2019; originally announced January 2020.

    Comments: To appear in IEEE TPS 2019

  25. arXiv:1910.11927  [pdf

    cs.CR cs.CY cs.DB cs.GT cs.PF

    User Data Sharing Frameworks: A Blockchain-Based Incentive Solution

    Authors: Ajay Kumar Shrestha, Julita Vassileva

    Abstract: Currently, there is no universal method to track who shared what, with whom, when and for what purposes in a verifiable way to create an individual incentive for data owners. A platform that allows data owners to control, delete, and get rewards from sharing their data would be an important enabler of user data-sharing. We propose a usable blockchain- and smart contracts-based framework that allow… ▽ More

    Submitted 25 October, 2019; originally announced October 2019.

    Comments: 7 pages, 4 figure, 1 table, IEEE IEMCON 2019 conference

  26. arXiv:1910.03474  [pdf, other

    cs.CL cs.LG stat.ML

    Fine-grained Sentiment Classification using BERT

    Authors: Manish Munikar, Sushil Shakya, Aakash Shrestha

    Abstract: Sentiment classification is an important process in understanding people's perception towards a product, service, or topic. Many natural language processing models have been proposed to solve the sentiment classification problem. However, most of them have focused on binary sentiment classification. In this paper, we use a promising deep learning model called BERT to solve the fine-grained sentime… ▽ More

    Submitted 4 October, 2019; originally announced October 2019.

    Comments: Submitted to IEEE International Conference on Artificial Intelligence for Transforming Business and Society

  27. arXiv:1909.06507  [pdf

    eess.IV cs.LG

    Performance Analysis of Spatial and Transform Filters for Efficient Image Noise Reduction

    Authors: Santosh Paudel, Ajay Kumar Shrestha, Pradip Singh Maharjan, Rameshwar Rijal

    Abstract: During the acquisition of an image from its source, noise always becomes an integral part of it. Various algorithms have been used in past to denoise the images. Image denoising still has scope for improvement. Visual information transmitted in the form of digital images has become a considerable method of communication in the modern age, but the image obtained after the transmission is often corr… ▽ More

    Submitted 13 September, 2019; originally announced September 2019.

    Comments: 7 pages, 7 figures, 3 tables, conference "for associated conference file, see http://https://www.researchgate.net/publication/291974499_Performance_Analysis_of_Spatial_and_Transform_Filters_for_Efficient_Image_Noise_Reduction"

  28. arXiv:1909.05028  [pdf

    cs.CR cs.DB

    User-Controlled Privacy-Preserving User Profile Data Sharing based on Blockchain

    Authors: Ajay Kumar Shrestha, Ralph Deters, Julita Vassileva

    Abstract: The tremendous technological advancement in the last few decades has brought many enterprises to collaborate in a better way while making intelligent decisions. The use of Information Technology tools in obtaining data of people's everyday life from various autonomous data sources allowing unrestricted access to user data has emerged as an important practical issue and has given rise to legal impl… ▽ More

    Submitted 10 September, 2019; originally announced September 2019.

    Comments: 10 pages, 11 figures, 4 tables, Future Technologies Conference (FTC) 2017, "for associated proceeding paper, see https://saiconference.com/Downloads/FTC2017/Proceedings/3_Paper_127-User-Controlled_Privacy-Preserving_User_Profile_Data_Sharing.pdf

  29. arXiv:1909.04685  [pdf

    cs.MM cs.CR

    Image Steganography: Protection of Digital Properties against Eavesdropping

    Authors: Ramita Maharjan, Ajay Kumar Shrestha, Rejina Basnet

    Abstract: Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. Different types of carrier file formats can be used, but digital images are the most popular ones because of their frequency on the internet. For hiding secret information in images, there exists a large variety of steganography techniques. Some are more complex than others a… ▽ More

    Submitted 10 September, 2019; originally announced September 2019.

    Comments: 8 pages, 11 figures, 9TH International conference on software, knowledge, information management and applications (SKIMA 2015)

  30. arXiv:1811.09693  [pdf

    cs.CY

    Towards Realizing the Smart Product Traceability System

    Authors: Dharmendra Kumar Mishra, Aicha Sekhari, Sébastien Henry, Dharmendra Mishra, Yacine Ouzrout, Ajay Shrestha, Abdelaziz Bouras

    Abstract: The rapid technological enhancement and innovations in current days have changed people's thought. The use of Information Technology tools in people's daily life has changed their life style completely. The advent of various innovative smart products in the market has tremendous impact on people's lifestyle. They want to know their heart beat while they run, they need a smart car which makes them… ▽ More

    Submitted 7 November, 2018; originally announced November 2018.

    Journal ref: IEEE International Conference on Software, Knowledge, Information Management \& Applications (SKIMA 2015), Dec 2015, Kathmandu, Nepal. 2015

  31. arXiv:1810.09233  [pdf, other

    cs.ET cs.LG stat.ML

    Scalable NoC-based Neuromorphic Hardware Learning and Inference

    Authors: Haowem Fang, Amar Shrestha, De Ma, Qinru Qiu

    Abstract: Bio-inspired neuromorphic hardware is a research direction to approach brain's computational power and energy efficiency. Spiking neural networks (SNN) encode information as sparsely distributed spike trains and employ spike-timing-dependent plasticity (STDP) mechanism for learning. Existing hardware implementations of SNN are limited in scale or do not have in-hardware learning capability. In thi… ▽ More

    Submitted 18 September, 2018; originally announced October 2018.

  32. arXiv:1808.07025  [pdf, other

    cs.IR cs.SI

    Who is Really Affected by Fraudulent Reviews? An analysis of shilling attacks on recommender systems in real-world scenarios

    Authors: Anu Shrestha, Francesca Spezzano, Maria Soledad Pera

    Abstract: We present the results of an initial analysis conducted on a real-life setting to quantify the effect of shilling attacks on recommender systems. We focus on both algorithm performance as well as the types of users who are most affected by these attacks.

    Submitted 21 August, 2018; originally announced August 2018.

    Comments: Proceedings of the Late-Breaking Results track part of the Twelfth ACM Conference on Recommender Systems (RecSys'18)

  33. DeepWalking: Enabling Smartphone-based Walking Speed Estimation Using Deep Learning

    Authors: Aawesh Shrestha, Myounggyu Won

    Abstract: Walking speed estimation is an essential component of mobile apps in various fields such as fitness, transportation, navigation, and health-care. Most existing solutions are focused on specialized medical applications that utilize body-worn motion sensors. These approaches do not serve effectively the general use case of numerous apps where the user holding a smartphone tries to find his or her wa… ▽ More

    Submitted 5 March, 2019; v1 submitted 9 May, 2018; originally announced May 2018.

    Comments: 6 pages, 9 figures, published in IEEE Global Communications Conference (GLOBECOM)

  34. arXiv:1805.02498  [pdf, other

    cs.DC

    Decoupling GPU Programming Models from Resource Management for Enhanced Programming Ease, Portability, and Performance

    Authors: Nandita Vijaykumar, Kevin Hsieh, Gennady Pekhimenko, Samira Khan, Ashish Shrestha, Saugata Ghose, Adwait Jog, Phillip B. Gibbons, Onur Mutlu

    Abstract: The application resource specification--a static specification of several parameters such as the number of threads and the scratchpad memory usage per thread block--forms a critical component of modern GPU programming models. This specification determines the parallelism, and hence performance, of the application during execution because the corresponding on-chip hardware resources are allocated a… ▽ More

    Submitted 2 May, 2018; originally announced May 2018.

    Comments: arXiv admin note: substantial text overlap with arXiv:1802.02573

  35. SaferCross: Enhancing Pedestrian Safety Using Embedded Sensors of Smartphone

    Authors: Myounggyu Won, Aawesh Shrestha, Kyung-Joon Park, Yongsoon Eun

    Abstract: The number of pedestrian accidents continues to keep climbing. Distraction from smartphone is one of the biggest causes for pedestrian fatalities. In this paper, we develop SaferCross, a mobile system based on the embedded sensors of smartphone to improve pedestrian safety by preventing distraction from smartphone. SaferCross adopts a holistic approach by identifying and developing essential syste… ▽ More

    Submitted 26 April, 2020; v1 submitted 20 April, 2018; originally announced May 2018.

    Comments: Published in IEEE Access, 2020

  36. arXiv:1802.02573  [pdf, other

    cs.DC cs.AR

    Zorua: Enhancing Programming Ease, Portability, and Performance in GPUs by Decoupling Programming Models from Resource Management

    Authors: Nandita Vijaykumar, Kevin Hsieh, Gennady Pekhimenko, Samira Khan, Ashish Shrestha, Saugata Ghose, Phillip B. Gibbons, Onur Mutlu

    Abstract: The application resource specification--a static specification of several parameters such as the number of threads and the scratchpad memory usage per thread block--forms a critical component of the existing GPU programming models. This specification determines the performance of the application during execution because the corresponding on-chip hardware resources are allocated and managed purely… ▽ More

    Submitted 7 February, 2018; originally announced February 2018.

    Report number: SAFARI Technical Report 2016-005

  37. arXiv:1606.02483  [pdf

    cs.CY

    Virtualising Process Assessments to Facilitate Continual Service Improvement in IT Service Management

    Authors: Anup Shrestha, Aileen Cater-Steel, Mark Toleman

    Abstract: The IT Service Management (ITSM) industry has defined processes as best practices in the widely-accepted IT Infrastructure Library (ITIL) framework. However, studies on the measurement of ITSM process improvement are scant. Our research addressed the dual problems of the lack of transparency and the need for efficiency in ITSM process assessment. Using the Design Science Research methodology, we d… ▽ More

    Submitted 8 June, 2016; originally announced June 2016.

    Comments: ISBN# 978-0-646-95337-3 Presented at the Australasian Conference on Information Systems 2015 (arXiv:1605.01032)

    Report number: ACIS/2015/159

  38. arXiv:1506.02354   

    cs.IT cs.CR cs.NI

    Secure Ad-hoc Routing Scheme

    Authors: Anish Prasad Shrestha, Kyung Sup Kwak

    Abstract: This paper investigates on the problem of combining routing scheme and physical layer security in multihop wireless networks with cooperative diversity. We propose an ad-hoc natured hop-by-hop best secure relay selection in a multihop network with several relays and an eavesdropper at each hop which provides a safe routing scheme to transmit confidential message from transmitter to legitimate rece… ▽ More

    Submitted 19 July, 2018; v1 submitted 8 June, 2015; originally announced June 2015.

    Comments: There are some errors that needs to be fixed

  39. arXiv:1311.1565   

    cs.IT

    On Maximal Ratio Diversity with Weighting Errors for Physical Layer Security

    Authors: Anish Prasad Shrestha, Kyung Sup Kwak

    Abstract: In this letter, we introduce the performance of maximal ratio combining (MRC) with weighting errors for physical layer security. We assume both legitimate user and eavesdropper each equipped with multiple antennas employ non ideal MRC. The non ideal MRC is designed in terms of power correlation between the estimated and actual fadings. We derive new closedform and generalized expressions for secre… ▽ More

    Submitted 9 November, 2013; v1 submitted 6 November, 2013; originally announced November 2013.

    Comments: It requires some major corrections in equations and numerical results