-
Identification of Patterns of Cognitive Impairment for Early Detection of Dementia
Authors:
Anusha A. S.,
Uma Ranjan,
Medha Sharma,
Siddharth Dutt
Abstract:
Early detection of dementia is crucial to devise effective interventions. Comprehensive cognitive tests, while being the most accurate means of diagnosis, are long and tedious, thus limiting their applicability to a large population, especially when periodic assessments are needed. The problem is compounded by the fact that people have differing patterns of cognitive impairment as they progress to…
▽ More
Early detection of dementia is crucial to devise effective interventions. Comprehensive cognitive tests, while being the most accurate means of diagnosis, are long and tedious, thus limiting their applicability to a large population, especially when periodic assessments are needed. The problem is compounded by the fact that people have differing patterns of cognitive impairment as they progress to different forms of dementia. This paper presents a novel scheme by which individual-specific patterns of impairment can be identified and used to devise personalized tests for periodic follow-up. Patterns of cognitive impairment are initially learned from a population cluster of combined normals and MCIs, using a set of standardized cognitive tests. Impairment patterns in the population are identified using a 2-step procedure involving an ensemble wrapper feature selection followed by cluster identification and analysis. These patterns have been shown to correspond to clinically accepted variants of MCI, a prodrome of dementia. The learned clusters of patterns can subsequently be used to identify the most likely route of cognitive impairment, even for pre-symptomatic and apparently normal people. Baseline data of 24,000 subjects from the NACC database was used for the study.
△ Less
Submitted 29 May, 2025;
originally announced May 2025.
-
MonetGPT: Solving Puzzles Enhances MLLMs' Image Retouching Skills
Authors:
Niladri Shekhar Dutt,
Duygu Ceylan,
Niloy J. Mitra
Abstract:
Retouching is an essential task in post-manipulation of raw photographs. Generative editing, guided by text or strokes, provides a new tool accessible to users but can easily change the identity of the original objects in unacceptable and unpredictable ways. In contrast, although traditional procedural edits, as commonly supported by photoediting tools (e.g., Gimp, Lightroom), are conservative, th…
▽ More
Retouching is an essential task in post-manipulation of raw photographs. Generative editing, guided by text or strokes, provides a new tool accessible to users but can easily change the identity of the original objects in unacceptable and unpredictable ways. In contrast, although traditional procedural edits, as commonly supported by photoediting tools (e.g., Gimp, Lightroom), are conservative, they are still preferred by professionals. Unfortunately, professional quality retouching involves many individual procedural editing operations that is challenging to plan for most novices. In this paper, we ask if a multimodal large language model (MLLM) can be taught to critique raw photographs, suggest suitable remedies, and finally realize them with a given set of pre-authored procedural image operations. We demonstrate that MLLMs can be first made aware of the underlying image processing operations, by training them to solve specially designed visual puzzles. Subsequently, such an operation-aware MLLM can both plan and propose edit sequences. To facilitate training, given a set of expert-edited photos, we synthesize a reasoning dataset by procedurally manipulating the expert edits and then grounding a pretrained LLM on the visual adjustments, to synthesize reasoning for finetuning. The proposed retouching operations are, by construction, understandable by the users, preserve object details and resolution, and can be optionally overridden. We evaluate our setup on a variety of test examples and show advantages, in terms of explainability and identity preservation, over existing generative and other procedural alternatives. Code, data, models, and supplementary results can be found via our project website at https://monetgpt.github.io.
△ Less
Submitted 9 May, 2025;
originally announced May 2025.
-
SMF: Template-free and Rig-free Animation Transfer using Kinetic Codes
Authors:
Sanjeev Muralikrishnan,
Niladri Shekhar Dutt,
Niloy J. Mitra
Abstract:
Animation retargeting involves applying a sparse motion description (e.g., 2D/3D keypoint sequences) to a given character mesh to produce a semantically plausible and temporally coherent full-body motion. Existing approaches come with a mix of restrictions - they require annotated training data, assume access to template-based shape priors or artist-designed deformation rigs, suffer from limited g…
▽ More
Animation retargeting involves applying a sparse motion description (e.g., 2D/3D keypoint sequences) to a given character mesh to produce a semantically plausible and temporally coherent full-body motion. Existing approaches come with a mix of restrictions - they require annotated training data, assume access to template-based shape priors or artist-designed deformation rigs, suffer from limited generalization to unseen motion and/or shapes, or exhibit motion jitter. We propose Self-supervised Motion Fields (SMF) as a self-supervised framework that can be robustly trained with sparse motion representations, without requiring dataset specific annotations, templates, or rigs. At the heart of our method are Kinetic Codes, a novel autoencoder-based sparse motion encoding, that exposes a semantically rich latent space simplifying large-scale training. Our architecture comprises dedicated spatial and temporal gradient predictors, which are trained end-to-end. The resultant network, regularized by the Kinetic Codes's latent space, has good generalization across shapes and motions. We evaluated our method on unseen motion sampled from AMASS, D4D, Mixamo, and raw monocular video for animation transfer on various characters with varying shapes and topology. We report a new SoTA on the AMASS dataset in the context of generalization to unseen motion. Project webpage at https://motionfields.github.io/
△ Less
Submitted 7 April, 2025;
originally announced April 2025.
-
FlairGPT: Repurposing LLMs for Interior Designs
Authors:
Gabrielle Littlefair,
Niladri Shekhar Dutt,
Niloy J. Mitra
Abstract:
Interior design involves the careful selection and arrangement of objects to create an aesthetically pleasing, functional, and harmonized space that aligns with the client's design brief. This task is particularly challenging, as a successful design must not only incorporate all the necessary objects in a cohesive style, but also ensure they are arranged in a way that maximizes accessibility, whil…
▽ More
Interior design involves the careful selection and arrangement of objects to create an aesthetically pleasing, functional, and harmonized space that aligns with the client's design brief. This task is particularly challenging, as a successful design must not only incorporate all the necessary objects in a cohesive style, but also ensure they are arranged in a way that maximizes accessibility, while adhering to a variety of affordability and usage considerations. Data-driven solutions have been proposed, but these are typically room- or domain-specific and lack explainability in their design design considerations used in producing the final layout. In this paper, we investigate if large language models (LLMs) can be directly utilized for interior design. While we find that LLMs are not yet capable of generating complete layouts, they can be effectively leveraged in a structured manner, inspired by the workflow of interior designers. By systematically probing LLMs, we can reliably generate a list of objects along with relevant constraints that guide their placement. We translate this information into a design layout graph, which is then solved using an off-the-shelf constrained optimization setup to generate the final layouts. We benchmark our algorithm in various design configurations against existing LLM-based methods and human designs, and evaluate the results using a variety of quantitative and qualitative metrics along with user studies. In summary, we demonstrate that LLMs, when used in a structured manner, can effectively generate diverse high-quality layouts, making them a viable solution for creating large-scale virtual scenes. Project webpage at https://flairgpt.github.io/
△ Less
Submitted 8 January, 2025;
originally announced January 2025.
-
Temporal Residual Jacobians For Rig-free Motion Transfer
Authors:
Sanjeev Muralikrishnan,
Niladri Shekhar Dutt,
Siddhartha Chaudhuri,
Noam Aigerman,
Vladimir Kim,
Matthew Fisher,
Niloy J. Mitra
Abstract:
We introduce Temporal Residual Jacobians as a novel representation to enable data-driven motion transfer. Our approach does not assume access to any rigging or intermediate shape keyframes, produces geometrically and temporally consistent motions, and can be used to transfer long motion sequences. Central to our approach are two coupled neural networks that individually predict local geometric and…
▽ More
We introduce Temporal Residual Jacobians as a novel representation to enable data-driven motion transfer. Our approach does not assume access to any rigging or intermediate shape keyframes, produces geometrically and temporally consistent motions, and can be used to transfer long motion sequences. Central to our approach are two coupled neural networks that individually predict local geometric and temporal changes that are subsequently integrated, spatially and temporally, to produce the final animated meshes. The two networks are jointly trained, complement each other in producing spatial and temporal signals, and are supervised directly with 3D positional information. During inference, in the absence of keyframes, our method essentially solves a motion extrapolation problem. We test our setup on diverse meshes (synthetic and scanned shapes) to demonstrate its superiority in generating realistic and natural-looking animations on unseen body shapes against SoTA alternatives. Supplemental video and code are available at https://temporaljacobians.github.io/ .
△ Less
Submitted 20 July, 2024;
originally announced July 2024.
-
Diffusion 3D Features (Diff3F): Decorating Untextured Shapes with Distilled Semantic Features
Authors:
Niladri Shekhar Dutt,
Sanjeev Muralikrishnan,
Niloy J. Mitra
Abstract:
We present Diff3F as a simple, robust, and class-agnostic feature descriptor that can be computed for untextured input shapes (meshes or point clouds). Our method distills diffusion features from image foundational models onto input shapes. Specifically, we use the input shapes to produce depth and normal maps as guidance for conditional image synthesis. In the process, we produce (diffusion) feat…
▽ More
We present Diff3F as a simple, robust, and class-agnostic feature descriptor that can be computed for untextured input shapes (meshes or point clouds). Our method distills diffusion features from image foundational models onto input shapes. Specifically, we use the input shapes to produce depth and normal maps as guidance for conditional image synthesis. In the process, we produce (diffusion) features in 2D that we subsequently lift and aggregate on the original surface. Our key observation is that even if the conditional image generations obtained from multi-view rendering of the input shapes are inconsistent, the associated image features are robust and, hence, can be directly aggregated across views. This produces semantic features on the input shapes, without requiring additional data or training. We perform extensive experiments on multiple benchmarks (SHREC'19, SHREC'20, FAUST, and TOSCA) and demonstrate that our features, being semantic instead of geometric, produce reliable correspondence across both isometric and non-isometrically related shape families. Code is available via the project page at https://diff3f.github.io/
△ Less
Submitted 2 April, 2024; v1 submitted 28 November, 2023;
originally announced November 2023.
-
ProteusNeRF: Fast Lightweight NeRF Editing using 3D-Aware Image Context
Authors:
Binglun Wang,
Niladri Shekhar Dutt,
Niloy J. Mitra
Abstract:
Neural Radiance Fields (NeRFs) have recently emerged as a popular option for photo-realistic object capture due to their ability to faithfully capture high-fidelity volumetric content even from handheld video input. Although much research has been devoted to efficient optimization leading to real-time training and rendering, options for interactive editing NeRFs remain limited. We present a very s…
▽ More
Neural Radiance Fields (NeRFs) have recently emerged as a popular option for photo-realistic object capture due to their ability to faithfully capture high-fidelity volumetric content even from handheld video input. Although much research has been devoted to efficient optimization leading to real-time training and rendering, options for interactive editing NeRFs remain limited. We present a very simple but effective neural network architecture that is fast and efficient while maintaining a low memory footprint. This architecture can be incrementally guided through user-friendly image-based edits. Our representation allows straightforward object selection via semantic feature distillation at the training stage. More importantly, we propose a local 3D-aware image context to facilitate view-consistent image editing that can then be distilled into fine-tuned NeRFs, via geometric and appearance adjustments. We evaluate our setup on a variety of examples to demonstrate appearance and geometric edits and report 10-30x speedup over concurrent work focusing on text-guided NeRF editing. Video results can be seen on our project webpage at https://proteusnerf.github.io.
△ Less
Submitted 23 April, 2024; v1 submitted 15 October, 2023;
originally announced October 2023.
-
Reversible complement cyclic codes over finite chain rings
Authors:
Monika Dalal,
Sucheta Dutt,
Ranjeet Sehmi
Abstract:
Let k be an arbitrary element of a finite commutative chain ring R and u be a unit in R. In this work, we present necessary conditions which are sufficient as well for a cyclic code to be a (u,k) reversible complement code over R. Using these conditions, all principally generated cyclic codes over the ring Z_{2}+vZ_{2}+v^{2}Z_{2}, v^{3}=0 of length 4 have been checked to find whether they are (1,1…
▽ More
Let k be an arbitrary element of a finite commutative chain ring R and u be a unit in R. In this work, we present necessary conditions which are sufficient as well for a cyclic code to be a (u,k) reversible complement code over R. Using these conditions, all principally generated cyclic codes over the ring Z_{2}+vZ_{2}+v^{2}Z_{2}, v^{3}=0 of length 4 have been checked to find whether they are (1,1) reversible complement or not.
△ Less
Submitted 1 August, 2023;
originally announced August 2023.
-
Reversible cyclic codes over finite chain rings
Authors:
Monika Dalal,
Sucheta Dutt,
Ranjeet Sehmi
Abstract:
In this paper, necessary and sufficient conditions for the reversibility of a cyclic code of arbitrary length over a finite commutative chain ring have been derived. MDS reversible cyclic codes having length p^s over a finite chain ring with nilpotency index 2 have been characterized and a few examples of MDS reversible cyclic codes have been presented. Further, it is shown that the torsion codes…
▽ More
In this paper, necessary and sufficient conditions for the reversibility of a cyclic code of arbitrary length over a finite commutative chain ring have been derived. MDS reversible cyclic codes having length p^s over a finite chain ring with nilpotency index 2 have been characterized and a few examples of MDS reversible cyclic codes have been presented. Further, it is shown that the torsion codes of a reversible cyclic code over a finite chain ring are reversible. Also, an example of a non-reversible cyclic code for which all its torsion codes are reversible has been presented to show that the converse of this statement is not true. The cardinality and Hamming distance of a cyclic code over a finite commutative chain ring have also been determined.
△ Less
Submitted 23 July, 2023; v1 submitted 18 July, 2023;
originally announced July 2023.
-
Reversible and Reversible Complement Cyclic codes over a class of non-chain rings
Authors:
Nikita Jain,
Sucheta Dutt,
Ranjeet Sehmi
Abstract:
In this paper, necessary and sufficient conditions for a cyclic code of arbitrary length over the non-chain rings $Z_{4}+νZ_{4}$ for $ν^{2} \in \{0,1,ν,2ν,3ν,2+ν,2+3ν,3+2ν\}$ to be a reversible cyclic code have been established. Also, conditions for a cyclic code over these non-chain rings to be a reversible complement cyclic code which are necessary as well as sufficient have been determined. Som…
▽ More
In this paper, necessary and sufficient conditions for a cyclic code of arbitrary length over the non-chain rings $Z_{4}+νZ_{4}$ for $ν^{2} \in \{0,1,ν,2ν,3ν,2+ν,2+3ν,3+2ν\}$ to be a reversible cyclic code have been established. Also, conditions for a cyclic code over these non-chain rings to be a reversible complement cyclic code which are necessary as well as sufficient have been determined. Some examples of reversible and reversible complement cyclic codes over these rings have also been presented.
△ Less
Submitted 6 April, 2023;
originally announced April 2023.
-
MDS and MHDR cyclic codes over finite chain rings
Authors:
Monika Dalal,
Sucheta Dutt,
Ranjeet Sehmi
Abstract:
In this work, a unique set of generators for a cyclic code over a finite chain ring has been established. The minimal spanning set and rank of the code have also been determined. Further, sufficient as well as necessary conditions for a cyclic code to be an MDS code and for a cyclic code to be an MHDR code have been obtained. Some examples of optimal cyclic codes have also been presented.
In this work, a unique set of generators for a cyclic code over a finite chain ring has been established. The minimal spanning set and rank of the code have also been determined. Further, sufficient as well as necessary conditions for a cyclic code to be an MDS code and for a cyclic code to be an MHDR code have been obtained. Some examples of optimal cyclic codes have also been presented.
△ Less
Submitted 28 March, 2023;
originally announced March 2023.
-
An Algorithm to find the Generators of Multidimensional Cyclic Codes over a Finite Chain Ring
Authors:
Disha,
Sucheta Dutt
Abstract:
The aim of this paper is to determine the algebraic structure of multidimensional cyclic codes over a finite chain ring $\mathfrak{R}$. An algorithm to find the generator polynomials of $n$ dimensional ($n$D) cyclic codes of length $m_{1}m_{2}\dots m_{n}$ over $\mathfrak{R}$ has been developed using the generator polynomials of cyclic codes over $\mathfrak{R}$. Additionally, the generators of $n$D…
▽ More
The aim of this paper is to determine the algebraic structure of multidimensional cyclic codes over a finite chain ring $\mathfrak{R}$. An algorithm to find the generator polynomials of $n$ dimensional ($n$D) cyclic codes of length $m_{1}m_{2}\dots m_{n}$ over $\mathfrak{R}$ has been developed using the generator polynomials of cyclic codes over $\mathfrak{R}$. Additionally, the generators of $n$D cyclic codes with length $m_{1}m_{2}\dots m_{n}$ over $\mathfrak{R}$ have been obtained as separable polynomials for the case $q\equiv 1(mod~ m_{j}), j\geq 2$, where $q=p^{r}$ is the cardinality of residue field of $\mathfrak{R}$.
△ Less
Submitted 14 March, 2023;
originally announced March 2023.
-
Structure and Rank of Cyclic codes over a class of non-chain rings
Authors:
Nikita Jain,
Sucheta Dutt,
Ranjeet Sehmi
Abstract:
The rings $Z_{4}+νZ_{4}$ have been classified into chain rings and non-chain rings on the basis of the values of $ν^{2} \in Z_{4}+νZ_{4}.$ In this paper, the structure of cyclic codes of arbitrary length over the rings $Z_{4}+νZ_{4}$ for those values of $ν^{2}$ for which these are non-chain rings has been established. A unique form of generators of these codes has also been obtained. Further, rank…
▽ More
The rings $Z_{4}+νZ_{4}$ have been classified into chain rings and non-chain rings on the basis of the values of $ν^{2} \in Z_{4}+νZ_{4}.$ In this paper, the structure of cyclic codes of arbitrary length over the rings $Z_{4}+νZ_{4}$ for those values of $ν^{2}$ for which these are non-chain rings has been established. A unique form of generators of these codes has also been obtained. Further, rank and cardinality of these codes have been established by finding minimal spanning sets for these codes.
△ Less
Submitted 14 March, 2023;
originally announced March 2023.
-
Blockchain for Unmanned Underwater Drones: Research Issues, Challenges, Trends and Future Directions
Authors:
Neelu Jyoti Ahuja,
Adarsh Kumar,
Monika Thapliyal,
Sarthika Dutt,
Tanesh Kumar,
Diego Augusto De Jesus Pacheco,
Charalambos Konstantinou,
Kim-Kwang Raymond Choo
Abstract:
Underwater drones have found a place in oceanography, oceanic research, bathymetric surveys, military, surveillance, monitoring, undersea exploration, mining, commercial diving, photography and several other activities. Drones housed with several sensors and complex propulsion systems help oceanographic scientists and undersea explorers to map the seabed, study waves, view dead zones, analyze fish…
▽ More
Underwater drones have found a place in oceanography, oceanic research, bathymetric surveys, military, surveillance, monitoring, undersea exploration, mining, commercial diving, photography and several other activities. Drones housed with several sensors and complex propulsion systems help oceanographic scientists and undersea explorers to map the seabed, study waves, view dead zones, analyze fish counts, predict tidal wave behaviors, aid in finding shipwrecks, building windfarms, examine oil platforms located in deep seas and inspect nuclear reactors in the ship vessels. While drones can be explicitly programmed for specific missions, data security and privacy are crucial issues of serious concern. Blockchain has emerged as a key enabling technology, amongst other disruptive technological enablers, to address security, data sharing, storage, process tracking, collaboration and resource management. This study presents a comprehensive review on the utilization of Blockchain in different underwater applications, discussing use cases and detailing benefits. Potential challenges of underwater applications addressed by Blockchain have been detailed. This work identifies knowledge gaps between theoretical research and real-time Blockchain integration in realistic underwater drone applications. The key limitations for effective integration of Blockchain in real-time integration in UUD applications, along with directions for future research have been presented.
△ Less
Submitted 12 October, 2022;
originally announced October 2022.
-
A study of traits that affect learnability in GANs
Authors:
Niladri Shekhar Dutt,
Sunil Patel
Abstract:
Generative Adversarial Networks GANs are algorithmic architectures that use two neural networks, pitting one against the opposite so as to come up with new, synthetic instances of data that can pass for real data. Training a GAN is a challenging problem which requires us to apply advanced techniques like hyperparameter tuning, architecture engineering etc. Many different losses, regularization and…
▽ More
Generative Adversarial Networks GANs are algorithmic architectures that use two neural networks, pitting one against the opposite so as to come up with new, synthetic instances of data that can pass for real data. Training a GAN is a challenging problem which requires us to apply advanced techniques like hyperparameter tuning, architecture engineering etc. Many different losses, regularization and normalization schemes, network architectures have been proposed to solve this challenging problem for different types of datasets. It becomes necessary to understand the experimental observations and deduce a simple theory for it. In this paper, we perform empirical experiments using parameterized synthetic datasets to probe what traits affect learnability.
△ Less
Submitted 27 November, 2020;
originally announced November 2020.
-
An optimum energy consumption hybrid algorithm for xln strategic design in wsns
Authors:
Md. Khaja Mohiddin,
V. B. S. Srilatha Indira Dutt
Abstract:
In this paper, X-Layer protocol is originated which executes mobility error prediction (MEP) algorithm to calculate the remaining energy level of each node. This X-Layer protocol structure employs the mobility aware protocol that senses the mobility concerned to each node with the utilization of Ad-hoc On-Demand Distance Vector (AODV), which shares the information or data specific to the distance…
▽ More
In this paper, X-Layer protocol is originated which executes mobility error prediction (MEP) algorithm to calculate the remaining energy level of each node. This X-Layer protocol structure employs the mobility aware protocol that senses the mobility concerned to each node with the utilization of Ad-hoc On-Demand Distance Vector (AODV), which shares the information or data specific to the distance among individual nodes. With the help of this theory, the neighbour list will be updated only to those nodes which are mobile resulting in less energy consumption when compared to all (static/mobile) other nodes in the network. Apart from the MEP algorithm, clustering head (CH) election algorithm has also been specified to identify the relevant clusters whether they exists within the network region or not. Also clustering multi-hop routing (CMHR) algorithm was implemented in which the node can identify the cluster to which it belongs depending upon the distance from each cluster surrounding the node. Finally comprising the AODV routing protocol with the Two-Ray Ground method, we implement X-Layer protocol structure by considering MAC protocol in accordance to IEEE 802.15.4 to obtain the best results in energy consumption and also by reducing the energy wastage with respect to each node. The effective results had been illustrated through Network Simulator-II platform.
△ Less
Submitted 31 January, 2020;
originally announced February 2020.
-
A Scalable and Robust Framework for Intelligent Real-time Video Surveillance
Authors:
Shreenath Dutt,
Ankita Kalra
Abstract:
In this paper, we present an intelligent, reliable and storage-efficient video surveillance system using Apache Storm and OpenCV. As a Storm topology, we have added multiple information extraction modules that only write important content to the disk. Our topology is extensible, capable of adding novel algorithms as per the use case without affecting the existing ones, since all the processing is…
▽ More
In this paper, we present an intelligent, reliable and storage-efficient video surveillance system using Apache Storm and OpenCV. As a Storm topology, we have added multiple information extraction modules that only write important content to the disk. Our topology is extensible, capable of adding novel algorithms as per the use case without affecting the existing ones, since all the processing is independent of each other. This framework is also highly scalable and fault tolerant, which makes it a best option for organisations that need to monitor a large network of surveillance cameras.
△ Less
Submitted 29 October, 2016;
originally announced October 2016.