Skip to main content

Showing 1–17 of 17 results for author: Dutt, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2505.23109  [pdf, other

    cs.CV

    Identification of Patterns of Cognitive Impairment for Early Detection of Dementia

    Authors: Anusha A. S., Uma Ranjan, Medha Sharma, Siddharth Dutt

    Abstract: Early detection of dementia is crucial to devise effective interventions. Comprehensive cognitive tests, while being the most accurate means of diagnosis, are long and tedious, thus limiting their applicability to a large population, especially when periodic assessments are needed. The problem is compounded by the fact that people have differing patterns of cognitive impairment as they progress to… ▽ More

    Submitted 29 May, 2025; originally announced May 2025.

    Comments: 4 pages, 2 figures, to be published in IEEE EMBC 2020

  2. arXiv:2505.06176  [pdf, ps, other

    cs.GR cs.CV cs.LG

    MonetGPT: Solving Puzzles Enhances MLLMs' Image Retouching Skills

    Authors: Niladri Shekhar Dutt, Duygu Ceylan, Niloy J. Mitra

    Abstract: Retouching is an essential task in post-manipulation of raw photographs. Generative editing, guided by text or strokes, provides a new tool accessible to users but can easily change the identity of the original objects in unacceptable and unpredictable ways. In contrast, although traditional procedural edits, as commonly supported by photoediting tools (e.g., Gimp, Lightroom), are conservative, th… ▽ More

    Submitted 9 May, 2025; originally announced May 2025.

    Comments: Accepted at SIGGRAPH 2025 [ACM Transactions on Graphics]; Project website: https://monetgpt.github.io

  3. arXiv:2504.04831  [pdf, other

    cs.GR cs.CV

    SMF: Template-free and Rig-free Animation Transfer using Kinetic Codes

    Authors: Sanjeev Muralikrishnan, Niladri Shekhar Dutt, Niloy J. Mitra

    Abstract: Animation retargeting involves applying a sparse motion description (e.g., 2D/3D keypoint sequences) to a given character mesh to produce a semantically plausible and temporally coherent full-body motion. Existing approaches come with a mix of restrictions - they require annotated training data, assume access to template-based shape priors or artist-designed deformation rigs, suffer from limited g… ▽ More

    Submitted 7 April, 2025; originally announced April 2025.

  4. arXiv:2501.04648  [pdf, other

    cs.GR cs.CL cs.CV

    FlairGPT: Repurposing LLMs for Interior Designs

    Authors: Gabrielle Littlefair, Niladri Shekhar Dutt, Niloy J. Mitra

    Abstract: Interior design involves the careful selection and arrangement of objects to create an aesthetically pleasing, functional, and harmonized space that aligns with the client's design brief. This task is particularly challenging, as a successful design must not only incorporate all the necessary objects in a cohesive style, but also ensure they are arranged in a way that maximizes accessibility, whil… ▽ More

    Submitted 8 January, 2025; originally announced January 2025.

    Comments: Accepted at EUROGRAPHICS 2025

  5. arXiv:2407.14958  [pdf, other

    cs.CV cs.GR

    Temporal Residual Jacobians For Rig-free Motion Transfer

    Authors: Sanjeev Muralikrishnan, Niladri Shekhar Dutt, Siddhartha Chaudhuri, Noam Aigerman, Vladimir Kim, Matthew Fisher, Niloy J. Mitra

    Abstract: We introduce Temporal Residual Jacobians as a novel representation to enable data-driven motion transfer. Our approach does not assume access to any rigging or intermediate shape keyframes, produces geometrically and temporally consistent motions, and can be used to transfer long motion sequences. Central to our approach are two coupled neural networks that individually predict local geometric and… ▽ More

    Submitted 20 July, 2024; originally announced July 2024.

    Comments: 15 pages, 6 figures

  6. arXiv:2311.17024  [pdf, other

    cs.CV cs.GR

    Diffusion 3D Features (Diff3F): Decorating Untextured Shapes with Distilled Semantic Features

    Authors: Niladri Shekhar Dutt, Sanjeev Muralikrishnan, Niloy J. Mitra

    Abstract: We present Diff3F as a simple, robust, and class-agnostic feature descriptor that can be computed for untextured input shapes (meshes or point clouds). Our method distills diffusion features from image foundational models onto input shapes. Specifically, we use the input shapes to produce depth and normal maps as guidance for conditional image synthesis. In the process, we produce (diffusion) feat… ▽ More

    Submitted 2 April, 2024; v1 submitted 28 November, 2023; originally announced November 2023.

    Comments: Accepted at CVPR'24

  7. arXiv:2310.09965  [pdf, other

    cs.CV cs.GR

    ProteusNeRF: Fast Lightweight NeRF Editing using 3D-Aware Image Context

    Authors: Binglun Wang, Niladri Shekhar Dutt, Niloy J. Mitra

    Abstract: Neural Radiance Fields (NeRFs) have recently emerged as a popular option for photo-realistic object capture due to their ability to faithfully capture high-fidelity volumetric content even from handheld video input. Although much research has been devoted to efficient optimization leading to real-time training and rendering, options for interactive editing NeRFs remain limited. We present a very s… ▽ More

    Submitted 23 April, 2024; v1 submitted 15 October, 2023; originally announced October 2023.

    Comments: Accepted at I3D'24 (ACM SIGGRAPH SYMPOSIUM ON INTERACTIVE 3D GRAPHICS AND GAMES)

  8. arXiv:2308.00642  [pdf, ps, other

    cs.IT

    Reversible complement cyclic codes over finite chain rings

    Authors: Monika Dalal, Sucheta Dutt, Ranjeet Sehmi

    Abstract: Let k be an arbitrary element of a finite commutative chain ring R and u be a unit in R. In this work, we present necessary conditions which are sufficient as well for a cyclic code to be a (u,k) reversible complement code over R. Using these conditions, all principally generated cyclic codes over the ring Z_{2}+vZ_{2}+v^{2}Z_{2}, v^{3}=0 of length 4 have been checked to find whether they are (1,1… ▽ More

    Submitted 1 August, 2023; originally announced August 2023.

  9. arXiv:2307.09156  [pdf, ps, other

    cs.IT

    Reversible cyclic codes over finite chain rings

    Authors: Monika Dalal, Sucheta Dutt, Ranjeet Sehmi

    Abstract: In this paper, necessary and sufficient conditions for the reversibility of a cyclic code of arbitrary length over a finite commutative chain ring have been derived. MDS reversible cyclic codes having length p^s over a finite chain ring with nilpotency index 2 have been characterized and a few examples of MDS reversible cyclic codes have been presented. Further, it is shown that the torsion codes… ▽ More

    Submitted 23 July, 2023; v1 submitted 18 July, 2023; originally announced July 2023.

  10. arXiv:2304.02913  [pdf, ps, other

    cs.IT

    Reversible and Reversible Complement Cyclic codes over a class of non-chain rings

    Authors: Nikita Jain, Sucheta Dutt, Ranjeet Sehmi

    Abstract: In this paper, necessary and sufficient conditions for a cyclic code of arbitrary length over the non-chain rings $Z_{4}+νZ_{4}$ for $ν^{2} \in \{0,1,ν,2ν,3ν,2+ν,2+3ν,3+2ν\}$ to be a reversible cyclic code have been established. Also, conditions for a cyclic code over these non-chain rings to be a reversible complement cyclic code which are necessary as well as sufficient have been determined. Som… ▽ More

    Submitted 6 April, 2023; originally announced April 2023.

  11. arXiv:2303.15819  [pdf, ps, other

    cs.IT

    MDS and MHDR cyclic codes over finite chain rings

    Authors: Monika Dalal, Sucheta Dutt, Ranjeet Sehmi

    Abstract: In this work, a unique set of generators for a cyclic code over a finite chain ring has been established. The minimal spanning set and rank of the code have also been determined. Further, sufficient as well as necessary conditions for a cyclic code to be an MDS code and for a cyclic code to be an MHDR code have been obtained. Some examples of optimal cyclic codes have also been presented.

    Submitted 28 March, 2023; originally announced March 2023.

  12. arXiv:2303.07881  [pdf, ps, other

    cs.IT

    An Algorithm to find the Generators of Multidimensional Cyclic Codes over a Finite Chain Ring

    Authors: Disha, Sucheta Dutt

    Abstract: The aim of this paper is to determine the algebraic structure of multidimensional cyclic codes over a finite chain ring $\mathfrak{R}$. An algorithm to find the generator polynomials of $n$ dimensional ($n$D) cyclic codes of length $m_{1}m_{2}\dots m_{n}$ over $\mathfrak{R}$ has been developed using the generator polynomials of cyclic codes over $\mathfrak{R}$. Additionally, the generators of $n$D… ▽ More

    Submitted 14 March, 2023; originally announced March 2023.

  13. arXiv:2303.07800  [pdf, ps, other

    cs.IT

    Structure and Rank of Cyclic codes over a class of non-chain rings

    Authors: Nikita Jain, Sucheta Dutt, Ranjeet Sehmi

    Abstract: The rings $Z_{4}+νZ_{4}$ have been classified into chain rings and non-chain rings on the basis of the values of $ν^{2} \in Z_{4}+νZ_{4}.$ In this paper, the structure of cyclic codes of arbitrary length over the rings $Z_{4}+νZ_{4}$ for those values of $ν^{2}$ for which these are non-chain rings has been established. A unique form of generators of these codes has also been obtained. Further, rank… ▽ More

    Submitted 14 March, 2023; originally announced March 2023.

    Comments: 11 pages

    MSC Class: 94B15; 20M05; 15A03; 54A25; 13C12 (Primary) ACM Class: F.2.2

  14. arXiv:2210.06540  [pdf

    cs.CR

    Blockchain for Unmanned Underwater Drones: Research Issues, Challenges, Trends and Future Directions

    Authors: Neelu Jyoti Ahuja, Adarsh Kumar, Monika Thapliyal, Sarthika Dutt, Tanesh Kumar, Diego Augusto De Jesus Pacheco, Charalambos Konstantinou, Kim-Kwang Raymond Choo

    Abstract: Underwater drones have found a place in oceanography, oceanic research, bathymetric surveys, military, surveillance, monitoring, undersea exploration, mining, commercial diving, photography and several other activities. Drones housed with several sensors and complex propulsion systems help oceanographic scientists and undersea explorers to map the seabed, study waves, view dead zones, analyze fish… ▽ More

    Submitted 12 October, 2022; originally announced October 2022.

  15. arXiv:2011.13728  [pdf, other

    cs.LG cs.CV

    A study of traits that affect learnability in GANs

    Authors: Niladri Shekhar Dutt, Sunil Patel

    Abstract: Generative Adversarial Networks GANs are algorithmic architectures that use two neural networks, pitting one against the opposite so as to come up with new, synthetic instances of data that can pass for real data. Training a GAN is a challenging problem which requires us to apply advanced techniques like hyperparameter tuning, architecture engineering etc. Many different losses, regularization and… ▽ More

    Submitted 27 November, 2020; originally announced November 2020.

  16. arXiv:2002.00131  [pdf

    cs.NI

    An optimum energy consumption hybrid algorithm for xln strategic design in wsns

    Authors: Md. Khaja Mohiddin, V. B. S. Srilatha Indira Dutt

    Abstract: In this paper, X-Layer protocol is originated which executes mobility error prediction (MEP) algorithm to calculate the remaining energy level of each node. This X-Layer protocol structure employs the mobility aware protocol that senses the mobility concerned to each node with the utilization of Ad-hoc On-Demand Distance Vector (AODV), which shares the information or data specific to the distance… ▽ More

    Submitted 31 January, 2020; originally announced February 2020.

    Comments: 20 pages

    MSC Class: 14J60 (Primary) 14F05

  17. arXiv:1610.09590  [pdf, other

    cs.CV cs.DC

    A Scalable and Robust Framework for Intelligent Real-time Video Surveillance

    Authors: Shreenath Dutt, Ankita Kalra

    Abstract: In this paper, we present an intelligent, reliable and storage-efficient video surveillance system using Apache Storm and OpenCV. As a Storm topology, we have added multiple information extraction modules that only write important content to the disk. Our topology is extensible, capable of adding novel algorithms as per the use case without affecting the existing ones, since all the processing is… ▽ More

    Submitted 29 October, 2016; originally announced October 2016.

    Comments: 4 pages, 3 figures, Presented in International Conference on Advances in Computing, Communications and Informatics (ICACCI-2016), September 2016