Skip to main content

Showing 1–3 of 3 results for author: Jani, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2305.00385  [pdf

    eess.IV cs.CV

    Cross-Shaped Windows Transformer with Self-supervised Pretraining for Clinically Significant Prostate Cancer Detection in Bi-parametric MRI

    Authors: Yuheng Li, Jacob Wynne, Jing Wang, Richard L. J. Qiu, Justin Roper, Shaoyan Pan, Ashesh B. Jani, Tian Liu, Pretesh R. Patel, Hui Mao, Xiaofeng Yang

    Abstract: Biparametric magnetic resonance imaging (bpMRI) has demonstrated promising results in prostate cancer (PCa) detection using convolutional neural networks (CNNs). Recently, transformers have achieved competitive performance compared to CNNs in computer vision. Large scale transformers need abundant annotated data for training, which are difficult to obtain in medical imaging. Self-supervised learni… ▽ More

    Submitted 17 March, 2024; v1 submitted 30 April, 2023; originally announced May 2023.

  2. arXiv:2109.05663  [pdf, other

    cs.MA cs.RO

    Learning Robot Swarm Tactics over Complex Adversarial Environments

    Authors: Amir Behjat, Hemanth Manjunatha, Prajit KrisshnaKumar, Apurv Jani, Leighton Collins, Payam Ghassemi, Joseph Distefano, David Doermann, Karthik Dantu, Ehsan Esfahani, Souma Chowdhury

    Abstract: To accomplish complex swarm robotic missions in the real world, one needs to plan and execute a combination of single robot behaviors, group primitives such as task allocation, path planning, and formation control, and mission-specific objectives such as target search and group coverage. Most such missions are designed manually by teams of robotics experts. Recent work in automated approaches to l… ▽ More

    Submitted 12 September, 2021; originally announced September 2021.

    Comments: Accepted to IEEE International Symposium on Multi-Robot and Multi-Agent Systems 2021

  3. arXiv:1301.4337  [pdf

    cs.MM cs.CR

    A Novel Digital Watermarking Algorithm using Random Matrix Image

    Authors: Mahimn Pandya, Hiren Joshi, Ashish Jani

    Abstract: The availability of bandwidth for internet access is sufficient enough to communicate digital assets. These digital assets are subjected to various types of threats. [19] As a result of this, protection mechanism required for the protection of digital assets is of priority in research. The threat of current focus is unauthorized copying of digital assets which give boost to piracy. This under the… ▽ More

    Submitted 22 January, 2013; v1 submitted 18 January, 2013; originally announced January 2013.

    Comments: 4 pages, 8 figures

    Journal ref: International Journal of Computer Applications, Volume 61, Number 2, pp. 18-12, 2013