Skip to main content

Showing 1–12 of 12 results for author: Babu, A V

Searching in archive cs. Search in all archives.
.
  1. arXiv:2304.04297  [pdf, other

    cs.CV cs.DC eess.IV

    AI-assisted Automated Workflow for Real-time X-ray Ptychography Data Analysis via Federated Resources

    Authors: Anakha V Babu, Tekin Bicer, Saugat Kandel, Tao Zhou, Daniel J. Ching, Steven Henke, SiniĊĦa Veseli, Ryan Chard, Antonino Miceli, Mathew Joseph Cherukara

    Abstract: We present an end-to-end automated workflow that uses large-scale remote compute resources and an embedded GPU platform at the edge to enable AI/ML-accelerated real-time analysis of data collected for x-ray ptychography. Ptychography is a lensless method that is being used to image samples through a simultaneous numerical inversion of a large number of diffraction patterns from adjacent overlappin… ▽ More

    Submitted 9 April, 2023; originally announced April 2023.

    Comments: 7 pages, 1 figure, to be published in High Performance Computing for Imaging Conference, Electronic Imaging (HPCI 2023)

  2. arXiv:2209.09408  [pdf, other

    cs.LG eess.IV

    Deep learning at the edge enables real-time streaming ptychographic imaging

    Authors: Anakha V Babu, Tao Zhou, Saugat Kandel, Tekin Bicer, Zhengchun Liu, William Judge, Daniel J. Ching, Yi Jiang, Sinisa Veseli, Steven Henke, Ryan Chard, Yudong Yao, Ekaterina Sirazitdinova, Geetika Gupta, Martin V. Holt, Ian T. Foster, Antonino Miceli, Mathew J. Cherukara

    Abstract: Coherent microscopy techniques provide an unparalleled multi-scale view of materials across scientific and technological fields, from structural materials to quantum devices, from integrated circuits to biological cells. Driven by the construction of brighter sources and high-rate detectors, coherent X-ray microscopy methods like ptychography are poised to revolutionize nanoscale materials charact… ▽ More

    Submitted 19 September, 2022; originally announced September 2022.

  3. arXiv:2008.02189  [pdf, other

    cs.NE cs.AR cs.ET

    SpinAPS: A High-Performance Spintronic Accelerator for Probabilistic Spiking Neural Networks

    Authors: Anakha V Babu, Osvaldo Simeone, Bipin Rajendran

    Abstract: We discuss a high-performance and high-throughput hardware accelerator for probabilistic Spiking Neural Networks (SNNs) based on Generalized Linear Model (GLM) neurons, that uses binary STT-RAM devices as synapses and digital CMOS logic for neurons. The inference accelerator, termed "SpinAPS" for Spintronic Accelerator for Probabilistic SNNs, implements a principled direct learning rule for first-… ▽ More

    Submitted 5 August, 2020; originally announced August 2020.

    Comments: 25 pages, 10 figures, Submitted to Elsevier Neural Networks for review

  4. arXiv:1711.03640  [pdf, other

    stat.ML cs.AI cs.LG cs.NE

    Stochastic Deep Learning in Memristive Networks

    Authors: Anakha V Babu, Bipin Rajendran

    Abstract: We study the performance of stochastically trained deep neural networks (DNNs) whose synaptic weights are implemented using emerging memristive devices that exhibit limited dynamic range, resolution, and variability in their programming characteristics. We show that a key device parameter to optimize the learning efficiency of DNNs is the variability in its programming characteristics. DNNs with s… ▽ More

    Submitted 9 November, 2017; originally announced November 2017.

    Comments: 4 pages, 5 figures, accepted at ICECS 2017

  5. arXiv:1509.00693  [pdf

    cs.DB cs.IR

    A Fuzzy Clustering Based Approach for Mining Usage Profiles from Web Log Data

    Authors: Zahid Ansari, Mohammad Fazle Azeem, A. Vinaya Babu, Waseem Ahmed

    Abstract: The World Wide Web continues to grow at an amazing rate in both the size and complexity of Web sites and is well on its way to being the main reservoir of information and data. Due to this increase in growth and complexity of WWW, web site publishers are facing increasing difficulty in attracting and retaining users. To design popular and attractive websites publishers must understand their users… ▽ More

    Submitted 1 September, 2015; originally announced September 2015.

    Journal ref: International Journal of Computer Science and Information Security, pp. 70-79 Vol. 9, No. 6, June 2011. (ISSN 1947-5500, IJCSIS Publications, United State)

  6. arXiv:1509.00692  [pdf

    cs.DB cs.IR cs.LG

    Discovery of Web Usage Profiles Using Various Clustering Techniques

    Authors: Zahid Ansari, Waseem Ahmed, M. F. Azeem, A. Vinaya Babu

    Abstract: The explosive growth of World Wide Web (WWW) has necessitated the development of Web personalization systems in order to understand the user preferences to dynamically serve customized content to individual users. To reveal information about user preferences from Web usage data, Web Usage Mining (WUM) techniques are extensively being applied to the Web log data. Clustering techniques are widely us… ▽ More

    Submitted 1 September, 2015; originally announced September 2015.

    Comments: arXiv admin note: substantial text overlap with arXiv:1507.03340

    Journal ref: International Journal of Computer Information Systems, pp. 18-27 Vol. 1, No. 3, July 2011. (ISSN 2229-5208, Silicon Valley Publishers, United Kingdom)

  7. arXiv:1509.00690  [pdf

    cs.DB cs.AI cs.IR

    A Fuzzy Approach for Feature Evaluation and Dimensionality Reduction to Improve the Quality of Web Usage Mining Results

    Authors: Zahid Ansari, M. F. Azeem, A. Vinaya Babu, Waseem Ahmed

    Abstract: Web Usage Mining is the application of data mining techniques to web usage log repositories in order to discover the usage patterns that can be used to analyze the users navigational behavior. During the preprocessing stage, raw web log data is transformed into a set of user profiles. Each user profile captures a set of URLs representing a user session. Clustering can be applied to this sessionize… ▽ More

    Submitted 1 September, 2015; originally announced September 2015.

    Journal ref: International Journal on Advanced Science Engineering and Information Technology, pp. 67-73 Vol. 2 No. 6, 2012. (ISSN: 2088-5334, INSIGHT Publishers, Indonesia)

  8. arXiv:1507.03340  [pdf

    cs.LG cs.SI

    Quantitative Evaluation of Performance and Validity Indices for Clustering the Web Navigational Sessions

    Authors: Zahid Ansari, M. F. Azeem, Waseem Ahmed, A. Vinaya Babu

    Abstract: Clustering techniques are widely used in Web Usage Mining to capture similar interests and trends among users accessing a Web site. For this purpose, web access logs generated at a particular web site are preprocessed to discover the user navigational sessions. Clustering techniques are then applied to group the user session data into user session clusters, where intercluster similarities are mini… ▽ More

    Submitted 13 July, 2015; originally announced July 2015.

    Journal ref: World of Computer Science and Information Technology Journal pp. 217-226, Vol. 1, No. 5, June 2011. (ISSN: 2221- 0741, WCSIT Publisher, Unites States)

  9. arXiv:1010.3862  [pdf

    cs.CR

    A New Non Linear, Time Stamped & Feed Back Model Based Encryption Mechanism with Acknowledgement Support

    Authors: A. V. N. Krishna, A. Vinaya Babu

    Abstract: In this work a model is going to be used which develops data distributed over a identified value which is used as nonce (IV). The model considers an equilibrium equation which is a function of non linear relationships, time variant and nonce variant values and takes the feed back of earlier round as input to the present round. The process is repeated for different timings which are used as time st… ▽ More

    Submitted 19 October, 2010; originally announced October 2010.

    Comments: 6 pages

    Journal ref: IJoAT Vol 1, No 2 (October 2010)

  10. arXiv:1007.0411  [pdf

    cs.NI

    Role of Statistical tests in Estimation of the Security of a New Encryption Algorithm

    Authors: Addepalli V. N Krishna, A Vinay Babu

    Abstract: Encryption study basically deals with three levels of algorithms. The first algorithm deals with encryption mechanism, second deals with decryption Mechanism and the third discusses about the generation of keys and sub keys used in the encryption study. In the given study, a new algorithm is discussed. The algorithm executes a series of steps and generates a sequence. This sequence is being used a… ▽ More

    Submitted 1 July, 2010; originally announced July 2010.

    Comments: http://ijict.org/index.php/ijoat/article/view/statistical-tests-for-encryption-algorithm

    Journal ref: International Journal of Advancements in Technology, Vol 1, No 1 (2010)

  11. arXiv:1004.4477  [pdf

    cs.CR

    Preserving Privacy and Sharing the Data in Distributed Environment using Cryptographic Technique on Perturbed data

    Authors: P. Kamakshi, A. Vinaya Babu

    Abstract: The main objective of data mining is to extract previously unknown patterns from large collection of data. With the rapid growth in hardware, software and networking technology there is outstanding growth in the amount data collection. Organizations collect huge volumes of data from heterogeneous databases which also contain sensitive and private information about and individual .The data mining e… ▽ More

    Submitted 26 April, 2010; originally announced April 2010.

    Comments: https://sites.google.com/site/journalofcomputing/

    Journal ref: Journal of Computing, Volume 2, Issue 4, April 2010, 115-119

  12. Node Isolation Probability of Wireless Adhoc Networks in Nagakami Fading Channel

    Authors: A. V. Babu, Mukesh Kumar Singh

    Abstract: This paper investigates the issue of connectivity of a wireless adhoc network in the presence of channel impairments. We derive analytical expressions for the node isolation probability in an adhoc network in the presence of Nakagami-m fading with superimposed lognormal shadowing. The node isolation probability is the probability that a randomly chosen node is not able to communicate with none of… ▽ More

    Submitted 16 March, 2010; originally announced March 2010.

    Comments: 16 pages, IJCNC Journal

    Journal ref: International Journal of Computer Networks & Communications 2.2 (2010) 21-36