Zum Hauptinhalt springen

Showing 1–50 of 56 results for author: Singh, Y

Searching in archive cs. Search in all archives.
.
  1. arXiv:2408.07905  [pdf, other

    cs.CV

    Persistence Image from 3D Medical Image: Superpixel and Optimized Gaussian Coefficient

    Authors: Yanfan Zhu, Yash Singh, Khaled Younis, Shunxing Bao, Yuankai Huo

    Abstract: Topological data analysis (TDA) uncovers crucial properties of objects in medical imaging. Methods based on persistent homology have demonstrated their advantages in capturing topological features that traditional deep learning methods cannot detect in both radiology and pathology. However, previous research primarily focused on 2D image analysis, neglecting the comprehensive 3D context. In this p… ▽ More

    Submitted 14 August, 2024; originally announced August 2024.

  2. arXiv:2408.07478  [pdf, other

    cs.NI

    Optical Networks

    Authors: Varsha Lohani, Anjali Sharma, Yatindra Nath Singh, Kumari Akansha, Baljinder Singh Heera, Pallavi Athe

    Abstract: Optical networks play a crucial role in todays digital topography, enabling the high-speed and reliable transmission of vast amounts of data over optical fibre for long distances. This paper provides an overview of optical networks, especially emphasising on their evolution with time.

    Submitted 14 August, 2024; originally announced August 2024.

  3. arXiv:2404.01704  [pdf, other

    cs.NI

    Application of S-band for Protection in Multi-band Flexible-Grid Optical Networks

    Authors: Varsha Lohani, Anjali Sharma, Yatindra Nath Singh

    Abstract: The core network is experiencing bandwidth capacity constraints as internet traffic grows. As a result, the notion of a Multi-band flexible-grid optical network was established to increase the lifespan of an optical core network. In this paper, we use the C+L band for working traffic transmission and the S-band for protection against failure. Furthermore, we compare the proposed method with the ex… ▽ More

    Submitted 2 April, 2024; originally announced April 2024.

    Comments: First Draft

  4. arXiv:2311.13495  [pdf, other

    cs.CY cs.CL cs.LG

    Current Topological and Machine Learning Applications for Bias Detection in Text

    Authors: Colleen Farrelly, Yashbir Singh, Quincy A. Hathaway, Gunnar Carlsson, Ashok Choudhary, Rahul Paul, Gianfranco Doretto, Yassine Himeur, Shadi Atalls, Wathiq Mansoor

    Abstract: Institutional bias can impact patient outcomes, educational attainment, and legal system navigation. Written records often reflect bias, and once bias is identified; it is possible to refer individuals for training to reduce bias. Many machine learning tools exist to explore text data and create predictive models that can search written records to identify real-time bias. However, few previous stu… ▽ More

    Submitted 22 November, 2023; originally announced November 2023.

  5. arXiv:2311.11565  [pdf, other

    cs.NI

    Protected Working Groups-based Resilient Resource Provisioning in MCF-enabled SDM-EONs

    Authors: Anjali Sharma, Varsha Lohani, Yatindra Nath Singh

    Abstract: Space Division Multiplexed- Elastic Optical Networks using Multicore Fibers are a promising and viable solution to meet the increasing heterogeneous bandwidth demands. The extra capacity gained due to spatial parameters in SDM-EONs could encounter detrimental losses if any link fails and timely restoration is not done. This paper proposes a Protected and Unprotected Working Core Groups assignment… ▽ More

    Submitted 20 November, 2023; originally announced November 2023.

  6. arXiv:2310.09020   

    cs.NI cs.GT

    Credit Blockchain for Faster Transactions in P2P Energy Trading

    Authors: Amit kumar Vishwakarma, Yatindra Nath Singh

    Abstract: P2P trading of energy can be a good alternative to incentivize distributed non-conventional energy production and meet the burgeoning energy demand. For efficient P2P trading, a free market for trading needs to be established while ensuring the information reliability, security, and privacy. Blockchain has been used to provide this framework, but it consumes very high energy and is slow. Further,… ▽ More

    Submitted 21 November, 2023; v1 submitted 13 October, 2023; originally announced October 2023.

    Comments: I am submitting the paper to another journal

    MSC Class: NA ACM Class: F.2.2

  7. arXiv:2308.13558  [pdf, other

    cs.CV

    Federated Learning for Computer Vision

    Authors: Yassine Himeur, Iraklis Varlamis, Hamza Kheddar, Abbes Amira, Shadi Atalla, Yashbir Singh, Faycal Bensaali, Wathiq Mansoor

    Abstract: Computer Vision (CV) is playing a significant role in transforming society by utilizing machine learning (ML) tools for a wide range of tasks. However, the need for large-scale datasets to train ML models creates challenges for centralized ML algorithms. The massive computation loads required for processing and the potential privacy risks associated with storing and processing data on central clou… ▽ More

    Submitted 24 August, 2023; originally announced August 2023.

    Comments: 30 pages, 13 figures and 4 figures

  8. Decoding ChatGPT: A Taxonomy of Existing Research, Current Challenges, and Possible Future Directions

    Authors: Shahab Saquib Sohail, Faiza Farhat, Yassine Himeur, Mohammad Nadeem, Dag Øivind Madsen, Yashbir Singh, Shadi Atalla, Wathiq Mansoor

    Abstract: Chat Generative Pre-trained Transformer (ChatGPT) has gained significant interest and attention since its launch in November 2022. It has shown impressive performance in various domains, including passing exams and creative writing. However, challenges and concerns related to biases and trust persist. In this work, we present a comprehensive review of over 100 Scopus-indexed publications on ChatGP… ▽ More

    Submitted 25 August, 2023; v1 submitted 26 July, 2023; originally announced July 2023.

    Comments: 31 pages. 8 figures and 3 tables

    Journal ref: Journal of King Saud University - Computer and Information Science 2023

  9. arXiv:2303.13965  [pdf, other

    cs.NI

    Generalized Distance Metric for Various DHT Routing Algorithms in Peer-to-Peer Networks

    Authors: Rashmi Kushwaha, Shreyas Kulkarni, Yatindra Nath Singh

    Abstract: We present a generalized distance metric that can be used to implement routing strategies and identify routing table entries to reach the root node for a given key, in a DHT (Distributed Hash Table) network based on either Chord, Kademlia, Tapestry, or Pastry. The generalization shows that all the above four DHT algorithms are in fact, the same algorithm but with different parameters in distance r… ▽ More

    Submitted 28 February, 2024; v1 submitted 24 March, 2023; originally announced March 2023.

    Comments: 8 pages, 4 figures, 14 Tables

  10. arXiv:2209.13444  [pdf

    cs.LG cs.AI cs.CV

    Design Perspectives of Multitask Deep Learning Models and Applications

    Authors: Yeshwant Singh, Anupam Biswas, Angshuman Bora, Debashish Malakar, Subham Chakraborty, Suman Bera

    Abstract: In recent years, multi-task learning has turned out to be of great success in various applications. Though single model training has promised great results throughout these years, it ignores valuable information that might help us estimate a metric better. Under learning-related tasks, multi-task learning has been able to generalize the models even better. We try to enhance the feature mapping of… ▽ More

    Submitted 27 September, 2022; originally announced September 2022.

    Comments: To be published in Wiley&IEEE Book "Machine Learning Algorithms for Signal and Image Processing"

    MSC Class: 68Txx ACM Class: I.2

  11. arXiv:2206.04933  [pdf, other

    cs.NI

    Availability-Aware Dynamic RSA with Protection using Consecutive Sub-Channels

    Authors: Varsha Lohani, Anjali Sharma, Yatindra Nath Singh

    Abstract: Flexible grid Optical Networks provide efficient spectrum utilization by employing the mechanisms to provide flexibility in the optical channel (spectrum slot) sizes. One of the research problems in Flexible grid Optical Networks is their survivability against failure. On the other hand, p-Cycles have not found practical use due to the significant compute time required for finding optimal configur… ▽ More

    Submitted 10 June, 2022; originally announced June 2022.

  12. arXiv:2203.16701  [pdf, other

    cs.LG cs.CR stat.ML

    Towards Differential Relational Privacy and its use in Question Answering

    Authors: Simone Bombari, Alessandro Achille, Zijian Wang, Yu-Xiang Wang, Yusheng Xie, Kunwar Yashraj Singh, Srikar Appalaraju, Vijay Mahadevan, Stefano Soatto

    Abstract: Memorization of the relation between entities in a dataset can lead to privacy issues when using a trained model for question answering. We introduce Relational Memorization (RM) to understand, quantify and control this phenomenon. While bounding general memorization can have detrimental effects on the performance of a trained model, bounding RM does not prevent effective learning. The difference… ▽ More

    Submitted 30 March, 2022; originally announced March 2022.

  13. arXiv:2112.07831  [pdf, other

    cs.NI

    Optimal Slot Size under Various Bandwidth Distributions in the Flexible-grid Optical Networks

    Authors: Varsha Lohani, Anjali Sharma, Yatindra Nath Singh

    Abstract: Flexible grid Optical Networks are efficient mechanism to provide flexibility in the optical spectrum utilization. For such networks, the slot width size as specified by the ITU-T G.694.1 is 12.5 GHz. However, one should question if it is the optimal grid size? In this paper, under different bandwidth distribution scenarios, we review which slot size give appropriate spectrum efficiency. Moreover,… ▽ More

    Submitted 14 December, 2021; originally announced December 2021.

  14. arXiv:2111.00164  [pdf, other

    cs.CV

    HIERMATCH: Leveraging Label Hierarchies for Improving Semi-Supervised Learning

    Authors: Ashima Garg, Shaurya Bagga, Yashvardhan Singh, Saket Anand

    Abstract: Semi-supervised learning approaches have emerged as an active area of research to combat the challenge of obtaining large amounts of annotated data. Towards the goal of improving the performance of semi-supervised learning methods, we propose a novel framework, HIERMATCH, a semi-supervised approach that leverages hierarchical information to reduce labeling costs and performs as well as a vanilla s… ▽ More

    Submitted 21 December, 2021; v1 submitted 29 October, 2021; originally announced November 2021.

    Comments: 11 pages, 1 figure, Accepted in WACV 2022

  15. Dynamic Routing and Spectrum Assignment based on the Availability of Consecutive Sub-channels in Flexi-grid Optical Networks

    Authors: Varsha Lohani, Anjali Sharma, Yatindra Nath Singh

    Abstract: Using Optical Orthogonal Frequency Multiplexing (O-OFDM), variable bandwidth channels can be created in Elastic Optical Networks (EON). This allows the use of spectrum more efficiently by allocating integral multiple of basic bandwidth slots to the lightpath requests. Consequently, such networks are also called flexible grid optical networks. It also adds a constraint of keeping all the allocated… ▽ More

    Submitted 2 October, 2021; v1 submitted 16 May, 2021; originally announced May 2021.

  16. A Vectored Fragmentation Metric for Elastic Optical Networks

    Authors: Anjali Sharma, Varsha Lohani, Yatindra Nath Singh

    Abstract: When circuits are set up and dismantled dynamically in elastic optical networks, spectrum tends to become fragmented in the fiber links. The fragmentation limits the available path choices and may lead to significant blocking of connection requests. There are two types of fragmentation in the network spectrum in the links due to contiguity constraints and over the paths due to continuity. Study of… ▽ More

    Submitted 17 February, 2021; originally announced February 2021.

    Comments: 11 pages

    Journal ref: Photonic Network Communication, 2022, (https://rdcu.be/cYvcV)

  17. Sub-Graph p-cycle formation for span failures in all-Optical Networks

    Authors: Varsha Lohani, Anjali Sharma, Yatindra Nath Singh

    Abstract: p-Cycles offer ring-like switching speed and mesh-like spare capacity efficiency for protecting network against link failures. This makes them extremely efficient and effective protection technique. p-Cycles can also protect all the links in a network against simultaneous failures of multiple links. But it has been mostly studied for single link failure scenarios in the networks with the objective… ▽ More

    Submitted 15 February, 2021; originally announced February 2021.

  18. arXiv:2101.04261  [pdf, other

    cs.ET

    NxTF: An API and Compiler for Deep Spiking Neural Networks on Intel Loihi

    Authors: Bodo Rueckauer, Connor Bybee, Ralf Goettsche, Yashwardhan Singh, Joyesh Mishra, Andreas Wild

    Abstract: Spiking Neural Networks (SNNs) are a promising paradigm for efficient event-driven processing of spatio-temporally sparse data streams. SNNs have inspired the design and can take advantage of the emerging class of neuromorphic processors like Intel Loihi. These novel hardware architectures expose a variety of constraints that affect firmware, compiler and algorithm development alike. To enable rap… ▽ More

    Submitted 11 January, 2021; originally announced January 2021.

  19. arXiv:2008.12552  [pdf, other

    cs.LG cs.CL

    Probabilistic Random Indexing for Continuous Event Detection

    Authors: Yashank Singh, Niladri Chatterjee

    Abstract: The present paper explores a novel variant of Random Indexing (RI) based representations for encoding language data with a view to using them in a dynamic scenario where events are happening in a continuous fashion. As the size of the representations in the general method of onehot encoding grows linearly with the size of the vocabulary, they become non-scalable for online purposes with high volum… ▽ More

    Submitted 9 December, 2021; v1 submitted 28 August, 2020; originally announced August 2020.

    Comments: 8 pages, 12 figures

  20. arXiv:2004.13714  [pdf, other

    cs.LG math.OC stat.AP stat.ML

    On Learning Combinatorial Patterns to Assist Large-Scale Airline Crew Pairing Optimization

    Authors: Divyam Aggarwal, Yash Kumar Singh, Dhish Kumar Saxena

    Abstract: Airline Crew Pairing Optimization (CPO) aims at generating a set of legal flight sequences (crew pairings), to cover an airline's flight schedule, at minimum cost. It is usually performed using Column Generation (CG), a mathematical programming technique for guided search-space exploration. CG exploits the interdependencies between the current and the preceding CG-iteration for generating new vari… ▽ More

    Submitted 2 May, 2020; v1 submitted 28 April, 2020; originally announced April 2020.

    Comments: 8 pages, 6 figures

  21. arXiv:1909.00760  [pdf, other

    cs.NI

    On Partial Coverage and Connectivity Relationship in Deterministic WSN Topologies

    Authors: Rameshwar Nath Tripathi, Kumar Gaurav, Yatindra Nath Singh

    Abstract: The primary function of a sensor network is to perform the sensing task. For proper sensing, the coverage and connectivity property of the network must be maintained. Relationship between coverage and connectivity has been extensively investigated for full coverage scenarios. But, investing in full coverage incurs unnecessary cost when partial coverage is sufficient. In this work, we focus on the… ▽ More

    Submitted 2 September, 2019; originally announced September 2019.

  22. arXiv:1811.00849  [pdf

    cs.LG stat.ML

    Algorithms for screening of Cervical Cancer: A chronological review

    Authors: Yasha Singh, Dhruv Srivastava, P. S. Chandranand, Dr. Surinder Singh

    Abstract: There are various algorithms and methodologies used for automated screening of cervical cancer by segmenting and classifying cervical cancer cells into different categories. This study presents a critical review of different research papers published that integrated AI methods in screening cervical cancer via different approaches analyzed in terms of typical metrics like dataset size, drawbacks, a… ▽ More

    Submitted 2 November, 2018; originally announced November 2018.

    Comments: This critical review of various machine learning algorithms for Cervical Cancer Screening was completed at National Institute of Biologicals(NIB), India by B.Tech final year Computer Science students at JSSATE, Noida, India under the supervision of Director at NIB Dr. Surinder Singh and Jr. Scientist Sh. P.S. Chandranand

  23. arXiv:1808.03780  [pdf, other

    cs.CY

    Going Viral: The Epidemiological Strategy of Referral Marketing

    Authors: Sayantari Ghosh, Saumik Bhattacharya, Kumar Gaurav, Yatindra Nath Singh

    Abstract: By now, Internet word-of-mouth marketing has established its importance for almost every kind of products. When word-of-mouth spread of a marketing campaign goes viral, the success of its strategy has been proved to be path-breaking for the firms. The current study is designed to extend knowledge about customer response to these campaigns, and is focused on the motivations that lead them to differ… ▽ More

    Submitted 11 August, 2018; originally announced August 2018.

    Comments: 25 pages, 7 figures

  24. arXiv:1806.08274  [pdf, other

    cs.NI

    Impact Zone Analysis of p-Cycle

    Authors: Pallavi Athe, Yatindra Nath Singh

    Abstract: Pre-configured cycle (p-Cycle) method has been studied in literature extensively for optical network protection. A large p-cycle has high capacity efficiency and can protect a large number of nodes against the single link failure scenarios. All the links protected by such a p-cycle lose protection when the p-cycle is consumed to restore traffic after a failure. As the probability of multiple link… ▽ More

    Submitted 21 June, 2018; originally announced June 2018.

  25. Convergence Rate Analysis for Periodic Gossip Algorithms in Wireless Sensor Networks

    Authors: S. Kouachi, Sateeshkrishna Dhuli, Y. N. Singh

    Abstract: Periodic gossip algorithms have generated a lot of interest due to their ability to compute the global statistics by using local pairwise communications among nodes. Simple execution, robustness to topology changes, and distributed nature make these algorithms quite suitable for wireless sensor networks (WSN). However, these algorithms converge to the global statistics after certain rounds of pair… ▽ More

    Submitted 14 August, 2018; v1 submitted 7 May, 2018; originally announced May 2018.

    Comments: 10 pages, 7 figures

  26. arXiv:1709.05669  [pdf

    cs.CV

    An Improved Fatigue Detection System Based on Behavioral Characteristics of Driver

    Authors: Rajat Gupta, Kanishk Aman, Nalin Shiva, Yadvendra Singh

    Abstract: In recent years, road accidents have increased significantly. One of the major reasons for these accidents, as reported is driver fatigue. Due to continuous and longtime driving, the driver gets exhausted and drowsy which may lead to an accident. Therefore, there is a need for a system to measure the fatigue level of driver and alert him when he/she feels drowsy to avoid accidents. Thus, we propos… ▽ More

    Submitted 17 September, 2017; originally announced September 2017.

    Comments: 4 pages, 2 figures, edited version of published paper in IEEE ICITE 2017

    Journal ref: 2017 2nd IEEE International Conference on Intelligent Transportation Engineering, pp 227-230

  27. arXiv:1702.07992  [pdf, ps, other

    cs.NI

    Simplified Biased Contribution Index (SBCI): A Mechanism to Make P2P Network Fair and Efficient for Resource Sharing

    Authors: Sateesh Kumar Awasthi, Yatindra Nath Singh

    Abstract: To balance the load and to discourage the free-riding in peer-to-peer (P2P) networks, many incentive mechanisms and policies have been proposed in recent years. Global peer ranking is one such mechanism. In this mechanism, peers are ranked based on a metric called contribution index. Contribution index is defined in such a manner that peers are motivated to share the resources in the network. Fair… ▽ More

    Submitted 26 February, 2017; originally announced February 2017.

  28. arXiv:1701.00898  [pdf, other

    cs.NI

    Double Link Failure Protection using a Single P-cycle

    Authors: Pallavi Athe, Yatindra Nath Singh

    Abstract: In this letter, we investigate survivability in optical networks for protection from two simultaneous link failures. Failure probability of two links with overlapping protection can be high if these links are geographically close. In a network with deterministic single link protection, simultaneous failure of two links may lead to partial or full loss of traffic on the failed links. Two link failu… ▽ More

    Submitted 3 May, 2017; v1 submitted 4 January, 2017; originally announced January 2017.

  29. arXiv:1609.06888   

    eess.SY cs.NI

    Analysis of Network Robustness for Finite Sized Wireless Sensor Networks

    Authors: Sateeshkrishna Dhuli, Chakravarthy Gopi, Yatindra Nath Singh

    Abstract: Studying network robustness for wireless sensor networks(WSNs) is an exciting topic of research as sensor nodes often fail due to hardware degradation, resource constraints, and environmental changes. The application of spectral graph theory to networked systems has generated several important results. However, previous research has often failed to consider the network parameters, which is crucial… ▽ More

    Submitted 1 April, 2021; v1 submitted 22 September, 2016; originally announced September 2016.

    Comments: Paper has some fundamental mistakes in calculations. So we would like to withdraw our work from arxiv

  30. arXiv:1606.00717  [pdf, ps, other

    cs.NI

    Biased Contribution Index: A Simpler Mechanism to Maintain Fairness in Peer to Peer Network

    Authors: Sateesh Kumar Awasthi, Yatindra Nath Singh

    Abstract: To maintain fairness, in the terms of resources shared by an individual peer, a proper incentive policy is required in a peer to peer network. This letter proposes, a simpler mechanism to rank the peers based on their resource contributions to the network. This mechanism will suppress the free riders from downloading the resources from the network. Contributions of the peers are biased in such a w… ▽ More

    Submitted 2 June, 2016; originally announced June 2016.

  31. arXiv:1603.00589  [pdf, ps, other

    cs.NI

    Generalized Analysis of Convergence of Absolute Trust in Peer to Peer Networks

    Authors: Sateesh Kumar Awasthi, Yatindra Nath Singh

    Abstract: Open and anonymous nature of peer to peer networks provides an opportunity to malicious peers to behave unpredictably in the network. This leads the lack of trust among the peers. To control the behavior of peers in the network, reputation system can be used. In a reputation system, aggregation of trust is a primary issue. Algorithm for aggregation of trust should be designed such that, it can con… ▽ More

    Submitted 2 March, 2016; originally announced March 2016.

  32. arXiv:1601.01419  [pdf, ps, other

    cs.NI cs.CR

    Absolute Trust: Algorithm for Aggregation of Trust in Peer-to- Peer Networks

    Authors: Sateesh Kumar Awasthi, Yatindra Nath Singh

    Abstract: To mitigate the attacks by malicious peers and to motivate the peers to share the resources in peer-to-peer networks, several reputation systems have been proposed in the past. In most of them, the peers evaluate other peers based on their past interactions and then aggregate this information in the whole network. However such an aggregation process requires approximations in order to converge at… ▽ More

    Submitted 7 January, 2016; originally announced January 2016.

  33. arXiv:1601.01245  [pdf

    cs.NI

    Loop Free Multipath Routing Algorithm

    Authors: Rashmi Singh, Yatindra Nath Singh, Anita Yadav

    Abstract: Single path routing that is currently used in the internet routers,is easy to implement as it simplifies the routing tables and packet flow paths. However it is not optimal and has shortcomings in utilizing the network resources optimally, load balancing & fast recovery in case of faults (fault tolerance). The given algorithm resolves all these problems by using all possible multiple paths for tra… ▽ More

    Submitted 6 January, 2016; originally announced January 2016.

  34. arXiv:1509.07989  [pdf, ps, other

    cs.NI cs.DC

    Resource allocation in Peer-to-Peer Networks: A Control-Theoretical Perspective

    Authors: Nitin Singha, Ruchir Gupta, Yatindra Nath Singh

    Abstract: P2P system rely on voluntary allocation of resources by its members due to absence of any central controlling authority. This resource allocation can be viewed as classical control problem where feedback is the amount of resource received, which controls the output i.e. the amount of resources shared back to the network by the node. The motivation behind the use of control system in resource alloc… ▽ More

    Submitted 24 December, 2015; v1 submitted 26 September, 2015; originally announced September 2015.

  35. arXiv:1507.05409  [pdf, other

    cs.CV

    A Parameter-free Affinity Based Clustering

    Authors: Bhaskar Mukhoty, Ruchir Gupta, Y. N. Singh

    Abstract: Several methods have been proposed to estimate the number of clusters in a dataset; the basic ideal behind all of them has been to study an index that measures inter-cluster separation and intra-cluster cohesion over a range of cluster numbers and report the number which gives an optimum value of the index. In this paper we propose a simple, parameter free approach that is like human cognition to… ▽ More

    Submitted 11 January, 2016; v1 submitted 20 July, 2015; originally announced July 2015.

  36. arXiv:1412.3102  [pdf, other

    cs.NI

    Analysis of Average Travel Time for Stateless Opportunistic Routing Techniques

    Authors: Sateeshkrishna Dhuli, Yatindra Nath Singh

    Abstract: Wireless network applications, such as, searching, routing, self stabilization and query processing can be modeled as random walks on graphs. Stateless Opportunistic routing technique is a robust distributed routing technique based on random walk approach, where nodes transfer the packets to one of their direct neighbors uniformly, until the packets reach their destinations. Simplicity in executio… ▽ More

    Submitted 9 December, 2014; originally announced December 2014.

    Comments: 6 pages, 12 figures. arXiv admin note: text overlap with arXiv:1412.2934

  37. arXiv:1412.2934   

    cs.NI

    Network Criticality Analysis for Finite Sized Wireless Sensor Networks

    Authors: Sateeshkrishna Dhuli, Yatindra Nath Singh

    Abstract: The topology of a sensor network changes very frequently due to node failures because of power constraints or physical destruction. Robustness to topology changes is one of the important design factors of wireless sensor networks which makes them suitable to military, communications, health and surveillance applications. Network criticality is a measure which capture the properties of network robu… ▽ More

    Submitted 30 March, 2021; v1 submitted 9 December, 2014; originally announced December 2014.

    Comments: Paper has some fundamental mistakes. Hence, we would like to withdraw the same

  38. Convergence Analysis for Regular Wireless Consensus Networks

    Authors: Sateeshkrishna Dhuli, Kumar Gaurav, Y. N. Singh

    Abstract: Average consensus algorithms can be implemented over wireless sensor networks (WSN), where global statistics can be computed using communications among sensor nodes locally. Simple execution, robustness to global topology changes due to frequent node failures and underlying distributed philosophy has made consensus algorithms more suitable to WSNs. Since these algorithms are iterative in nature, t… ▽ More

    Submitted 22 September, 2016; v1 submitted 4 November, 2014; originally announced November 2014.

    Comments: 10 pages, 19 figures

    Journal ref: IEEE Sensors Journal, 2015, Volume: 15 Issue: 8, Page(s): 4522-4531

  39. Robust Statistical Approach for Extraction of Moving Human Silhouettes from Videos

    Authors: Oinam Binarani Devi, Nissi S. Paul, Y. Jayanta Singh

    Abstract: Human pose estimation is one of the key problems in computer vision that has been studied in the recent years. The significance of human pose estimation is in the higher level tasks of understanding human actions applications such as recognition of anomalous actions present in videos and many other related applications. The human poses can be estimated by extracting silhouettes of humans as silhou… ▽ More

    Submitted 17 August, 2014; originally announced August 2014.

    Comments: 10 pages, 5 figures

    Journal ref: International Journal on Information Theory (IJIT), Vol.3, No.3, July 2014, Pg.55-64

  40. arXiv:1310.5985  [pdf

    cs.NI cs.DC cs.SI

    Adaptive Push-Then-Pull Gossip Algorithm for Scale-free Networks

    Authors: Ruchir Gupta, Abhijeet C. Maali, Yatindra Nath Singh

    Abstract: Real life networks are generally modelled as scale free networks. Information diffusion in such networks in decentralised environment is a difficult and resource consuming affair. Gossip algorithms have come up as a good solution to this problem. In this paper, we have proposed Adaptive First Push Then Pull gossip algorithm. We show that algorithm works with minimum cost when the transition round… ▽ More

    Submitted 22 October, 2013; originally announced October 2013.

  41. arXiv:1310.4291  [pdf

    cs.NI

    Approaches to Maintain Bi-connectivity for Resilience in Overlaid Multicasting

    Authors: Ashutosh Singh, Yatindra Nath Singh

    Abstract: Application layer multicast (ALM) also called Overlay Multicast, is an attractive alternative solution to most of the problems associated with IP multicast. In ALM, multicast-related functionalities are moved to end-hosts. Application layer multicast builds a peer-to-peer (P2P) overlay topology consisting of end-to-end unicast connections between end-hosts. The key advantages, overlays offer, are… ▽ More

    Submitted 2 March, 2017; v1 submitted 16 October, 2013; originally announced October 2013.

  42. arXiv:1309.3628  [pdf

    cs.NI

    Multipath Approach for Reliability in Query Network based Overlaid Multicasting

    Authors: Ashutosh Singh, Yatindra Nath Singh

    Abstract: In Application layer multicast (ALM) also called Overlay Multicast, multicast-related functionalities are moved to end-hosts. The key advantages, overlays offers, are flexibility, adaptability and ease of deployment [1]. Application layer multicast builds a peer-to-peer (P2P) overlay multicast tree topology consisting of end-to-end unicast connections between end-hosts. End users self organize the… ▽ More

    Submitted 14 September, 2013; originally announced September 2013.

  43. arXiv:1309.2254  [pdf

    cs.IT

    Design of Two Dimensional Unipolar (Optical) Orthogonal Codes Through One Dimensional Unipolar (Optical) Orthogonal Codes

    Authors: Ram Chandra Singh Chauhan, Yatindra Nath Singh, Rachna Asthana

    Abstract: In this paper, an algorithm for construction of multiple sets of two dimensional (2D) or matrix unipolar (optical) orthogonal codes has been proposed. Representations of these 2D codes in difference of positions representation (DoPR) have also been discussed along-with conventional weighted positions representation (WPR) of the code. This paper also proposes less complex methods for calculation of… ▽ More

    Submitted 9 September, 2013; originally announced September 2013.

  44. arXiv:1309.2250  [pdf

    cs.IT

    A Search Algorithm to Find Multiple Sets of One Dimensional Unipolar (Optical) Orthogonal Codes with Same Code-length and Low Weight

    Authors: R. C. S. Chauhan, Y. N. Singh, R. Asthana

    Abstract: This paper describes a search algorithm to find multiple sets of one dimensional unipolar (optical) orthogonal codes characterized by parameters, binary code sequence of length (n bits) and weight w (number of bit 1s in the sequence) as well as auto-correlation and cross-correlation constraint respectively for the codes within a set. For a given code length n and code weight w all possible differe… ▽ More

    Submitted 9 September, 2013; originally announced September 2013.

  45. arXiv:1309.0193  [pdf

    cs.IT

    Design of Minimum Correlated, Maximal Clique Sets of One-Dimensional Uni-polar (Optical) Orthogonal Codes

    Authors: Ram Chandra Singh Chauhan, Yatindra Nath Singh, Rachna Asthana

    Abstract: This paper proposes an algorithm to search a family of multiple sets of minimum correlated one dimensional uni-polar (optical) orthogonal codes (1-DUOC) or optical orthogonal codes (OOC) with fixed as well as variable code parameters. The cardinality of each set is equal to upper bound. The codes within a set can be searched for general values of code length, code weight, auto-correlation constrai… ▽ More

    Submitted 1 September, 2013; originally announced September 2013.

  46. A Reputation Based Framework to Avoid Free-riding in Unstructured Peer-to-Peer network

    Authors: Ruchir Gupta, Yatindra Nath singh

    Abstract: Free riding is a major problem in peer-to-peer networks. Reputation management systems are generally proposed to overcome this problem. In this paper we have discussed a possible way of resource allocation on the basis of reputation management system i.e. probabilistic allocation based on reputation. This seems to be a better way for allocation of resources because in this case nodes that do not h… ▽ More

    Submitted 25 July, 2013; originally announced July 2013.

  47. arXiv:1307.5057  [pdf, ps, other

    cs.NI cs.MA

    Avoiding Whitewashing in Unstructured Peer-to-Peer Resource Sharing Network

    Authors: Ruchir Gupta, Yatindra Nath Singh

    Abstract: In peer-to-peer file sharing network, it is hard to distinguish between a legitimate newcomer and a whitewasher. This makes whitewashing a big problem in peer-to-peer networks. Although the problem of whitewashing can be solved using permanent identities, it may take away the right of anonymity for users. In this paper, we a have proposed a novel algorithm to avoid this problem when network uses f… ▽ More

    Submitted 18 July, 2013; originally announced July 2013.

  48. Speedy Object Detection based on Shape

    Authors: Y. Jayanta Singh, Shalu Gupta

    Abstract: This study is a part of design of an audio system for in-house object detection system for visually impaired, low vision personnel by birth or by an accident or due to old age. The input of the system will be scene and output as audio. Alert facility is provided based on severity levels of the objects (snake, broke glass etc) and also during difficulties. The study proposed techniques to provide s… ▽ More

    Submitted 12 July, 2013; originally announced July 2013.

    Comments: arXiv admin note: text overlap with arXiv:1210.7038 by other authors

    Journal ref: The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.3, June 2013

  49. arXiv:1304.1649  [pdf, ps, other

    cs.NI

    Trust Estimation in Peer-to-Peer Network Using BLUE

    Authors: Ruchir Gupta, Yatindra Nath Singh

    Abstract: In peer-to-peer networks, free riding is a major problem. Reputation management systems can be used to overcome this problem. Reputation estimation methods generally do not consider the uncertainties in the inputs. We propose a reputation estimation method using BLUE (Best Linear Unbiased estimator) estimator that consider uncertainties in the input variables.

    Submitted 5 April, 2013; originally announced April 2013.

    Comments: arXiv admin note: substantial text overlap with arXiv:1210.4301

  50. arXiv:1301.4204  [pdf, other

    cs.NI cs.DC

    DSAT-MAC : Dynamic Slot Allocation based TDMA MAC protocol for Cognitive Radio Networks

    Authors: Rajeev K. Shakya, Satyam Agarwal, Y. N. Singh, Nishchal K. Verma, Amitabha Roy

    Abstract: Cognitive Radio Networks (CRN) have enabled us to efficiently reuse the underutilized radio spectrum. The MAC protocol in CRN defines the spectrum usage by sharing the channels efficiently among users. In this paper we propose a novel TDMA based MAC protocol with dynamically allocated slots. Most of the MAC protocols proposed in the literature employ Common Control Channel (CCC) to manage the reso… ▽ More

    Submitted 17 January, 2013; originally announced January 2013.

    Comments: 19 pages, 20 figures, Initial work in proc. of the Ninth IEEE International Conference on Wireless and Optical Communications Networks (IEEE WOCN-2012), Indore, INDIA, 20-22 September, 2012