Skip to main content

Showing 1–23 of 23 results for author: N, N

Searching in archive cs. Search in all archives.
.
  1. arXiv:2503.17505  [pdf, other

    cs.LG

    Geometry adaptive waveformer for cardio-vascular modeling

    Authors: Navaneeth N, Souvik Chakraborty

    Abstract: Modeling cardiovascular anatomies poses a significant challenge due to their complex, irregular structures and inherent pathological conditions. Numerical simulations, while accurate, are often computationally expensive, limiting their practicality in clinical settings. Traditional machine learning methods, on the other hand, often struggle with some major hurdles, including high dimensionality of… ▽ More

    Submitted 21 March, 2025; originally announced March 2025.

  2. arXiv:2501.04398  [pdf

    cs.RO

    Implementation Of Wildlife Observation System

    Authors: Neethu K N, Rakshitha Y Nayak, Rashmi, Meghana S

    Abstract: By entering the habitats of wild animals, wildlife watchers can engage closely with them. There are some wild animals that are not always safe to approach. Therefore, we suggest this system for observing wildlife. Android phones can be used by users to see live events. Wildlife observers can thus get a close-up view of wild animals by employing this robotic vehicle. The commands are delivered to t… ▽ More

    Submitted 8 January, 2025; originally announced January 2025.

  3. arXiv:2409.19248  [pdf

    cs.CE

    Integrating Data Mining and Predictive Modeling Techniques for Enhanced Retail Optimization

    Authors: Sri Darshan M, Jaisachin B, NithinRaj N

    Abstract: Predictive modeling and time-pattern analysis are increasingly critical in this swiftly shifting retail environment to improve operational efficiency and informed decision-making. This paper reports a comprehensive application of state-of-the-art machine learning to the retailing domain with a specific focus on association rule mining, sequential pattern mining, and time-series forecasting. Associ… ▽ More

    Submitted 28 September, 2024; originally announced September 2024.

    Comments: 5 pages, 8 fiqures, published in journal IJCSIS(International Journal of Computer Science and Information Security)

    Journal ref: IJCSIS (Volume 22 No. 5 ) 2024

  4. arXiv:2409.01642  [pdf, other

    cs.ET

    Acoustic Levitation for Environmental Remediation: An Effective Approach for Containment and Forecasting of Oil Spills

    Authors: L Rochit, Nithish Kumar N, Devi Priya V S, Sibi Chakkaravarthy Sethuraman, Anitha Subramanian

    Abstract: The ocean ecology is badly impacted by large-scale oil spills, plastic waste, and chemical pollution, which destroy ecosystems and endanger marine life. Acknowledging the detrimental effects of oil spills on ecosystems, our research aims to establish the foundation for creative methods to lessen their impact. With an emphasis on the containment and prediction of oil spills, this research investiga… ▽ More

    Submitted 3 September, 2024; originally announced September 2024.

  5. arXiv:2408.15367  [pdf, other

    cs.RO cs.HC

    How Much is too Much: Exploring the Effect of Verbal Route Description Length on Indoor Navigation

    Authors: Fathima Nourin N, Pradip Pramanick, Chayan Sarkar

    Abstract: Navigating through a new indoor environment can be stressful. Recently, many places have deployed robots to assist visitors. One of the features of such robots is escorting the visitors to their desired destination within the environment, but this is neither scalable nor necessary for every visitor. Instead, a robot assistant could be deployed at a strategic location to provide wayfinding instruct… ▽ More

    Submitted 27 August, 2024; originally announced August 2024.

    Comments: Accepted in IEEE ROMAN 2024

  6. arXiv:2408.01843  [pdf, other

    cs.CV

    Supervised Image Translation from Visible to Infrared Domain for Object Detection

    Authors: Prahlad Anand, Qiranul Saadiyean, Aniruddh Sikdar, Nalini N, Suresh Sundaram

    Abstract: This study aims to learn a translation from visible to infrared imagery, bridging the domain gap between the two modalities so as to improve accuracy on downstream tasks including object detection. Previous approaches attempt to perform bi-domain feature fusion through iterative optimization or end-to-end deep convolutional networks. However, we pose the problem as similar to that of image transla… ▽ More

    Submitted 3 August, 2024; originally announced August 2024.

  7. arXiv:2306.14430  [pdf, other

    cs.LG stat.ML

    Enhanced multi-fidelity modelling for digital twin and uncertainty quantification

    Authors: AS Desai, Navaneeth N, S Adhikari, S Chakraborty

    Abstract: The increasing significance of digital twin technology across engineering and industrial domains, such as aerospace, infrastructure, and automotive, is undeniable. However, the lack of detailed application-specific information poses challenges to its seamless implementation in practical systems. Data-driven models play a crucial role in digital twins, enabling real-time updates and predictions by… ▽ More

    Submitted 26 June, 2023; originally announced June 2023.

  8. arXiv:2302.05925  [pdf, other

    stat.ML cs.LG

    Physics informed WNO

    Authors: Navaneeth N, Tapas Tripura, Souvik Chakraborty

    Abstract: Deep neural operators are recognized as an effective tool for learning solution operators of complex partial differential equations (PDEs). As compared to laborious analytical and computational tools, a single neural operator can predict solutions of PDEs for varying initial or boundary conditions and different inputs. A recently proposed Wavelet Neural Operator (WNO) is one such operator that har… ▽ More

    Submitted 12 February, 2023; originally announced February 2023.

  9. arXiv:2210.12446  [pdf, other

    cs.LG cs.IT

    Learning Classifiers for Imbalanced and Overlapping Data

    Authors: Shivaditya Shivganesh, Nitin Narayanan N, Pranav Murali, Ajaykumar M

    Abstract: This study is about inducing classifiers using data that is imbalanced, with a minority class being under-represented in relation to the majority classes. The first section of this research focuses on the main characteristics of data that generate this problem. Following a study of previous, relevant research, a variety of artificial, imbalanced data sets influenced by important elements were crea… ▽ More

    Submitted 22 October, 2022; originally announced October 2022.

  10. arXiv:2209.13724  [pdf, other

    cs.CE

    Stochastic projection based approach for gradient free physics informed learning

    Authors: Navaneeth N, Souvik Chakraborty

    Abstract: We propose a stochastic projection-based gradient free physics-informed neural network. The proposed approach, referred to as the stochastic projection based physics informed neural network (SP-PINN), blends upscaled stochastic projection theory with the recently proposed physics-informed neural network. This results in a framework that is robust and can solve problems involving complex solution d… ▽ More

    Submitted 25 September, 2022; originally announced September 2022.

  11. arXiv:2203.02658  [pdf, other

    stat.ML cs.LG eess.SY

    Koopman operator for time-dependent reliability analysis

    Authors: Navaneeth N., Souvik Chakraborty

    Abstract: Time-dependent structural reliability analysis of nonlinear dynamical systems is non-trivial; subsequently, scope of most of the structural reliability analysis methods is limited to time-independent reliability analysis only. In this work, we propose a Koopman operator based approach for time-dependent reliability analysis of nonlinear dynamical systems. Since the Koopman representations can tran… ▽ More

    Submitted 13 March, 2022; v1 submitted 4 March, 2022; originally announced March 2022.

  12. arXiv:2109.05329  [pdf, other

    cs.DC

    MODC: Resilience for disaggregated memory architectures using task-based programming

    Authors: Kimberly Keeton, Sharad Singhal, Haris Volos, Yupu Zhang, Ramesh Chandra Chaurasiya, Clarete Riana Crasta, Sherin T George, Nagaraju K N, Mashood Abdulla K, Kavitha Natarajan, Porno Shome, Sanish Suresh

    Abstract: Disaggregated memory architectures provide benefits to applications beyond traditional scale out environments, such as independent scaling of compute and memory resources. They also provide an independent failure model, where computations or the compute nodes they run on may fail independently of the disaggregated memory; thus, data that's resident in the disaggregated memory is unaffected by the… ▽ More

    Submitted 11 September, 2021; originally announced September 2021.

    Comments: 9 pages, 4 figures

    ACM Class: D.4.1; D.4.5; D.4.7; C.1.4; E.1

    Journal ref: Proceedings of 2nd Workshop on Resource Disaggregation and Serverless (WORDS'21), Co-located with ASPLOS'21, April 2021

  13. arXiv:2107.06849  [pdf

    cs.CR

    Digital Passport and Visa Asset Management Using Private and Permissioned Blockchain

    Authors: Keenu Chandra, Maroof Mushtaq, Nalini N

    Abstract: Blockchain is currently one of the fastest-growing technologies in the field of Computer Science. It has found a prevalent use in financial applications like cryptocurrency, for example, Bitcoin and Ethereum. They have been able to bring an unforeseen disruption in the field of finance. However, permissionless Blockchains like these have some downsides, namely the computation cost of the Proof of… ▽ More

    Submitted 27 July, 2021; v1 submitted 14 July, 2021; originally announced July 2021.

  14. Surrogate assisted active subspace and active subspace assisted surrogate -- A new paradigm for high dimensional structural reliability analysis

    Authors: Navaneeth N., Souvik Chakraborty

    Abstract: Performing reliability analysis on complex systems is often computationally expensive. In particular, when dealing with systems having high input dimensionality, reliability estimation becomes a daunting task. A popular approach to overcome the problem associated with time-consuming and expensive evaluations is building a surrogate model. However, these computationally efficient models often suffe… ▽ More

    Submitted 12 May, 2021; v1 submitted 11 May, 2021; originally announced May 2021.

    Comments: 19 pages

  15. arXiv:2007.13078  [pdf, other

    cs.CV cs.LG

    SMART: Simultaneous Multi-Agent Recurrent Trajectory Prediction

    Authors: Sriram N N, Buyu Liu, Francesco Pittaluga, Manmohan Chandraker

    Abstract: We propose advances that address two key challenges in future trajectory prediction: (i) multimodality in both training data and predictions and (ii) constant time inference regardless of number of agents. Existing trajectory predictions are fundamentally limited by lack of diversity in training data, which is difficult to acquire with sufficient coverage of possible modes. Our first contribution… ▽ More

    Submitted 26 July, 2020; originally announced July 2020.

    Comments: Accepted at ECCV 2020

  16. arXiv:1906.03584  [pdf, other

    cs.RO cs.CV

    A Hierarchical Network for Diverse Trajectory Proposals

    Authors: Sriram N. N., Gourav Kumar, Abhay Singh, M. Siva Karthik, Saket Saurav Brojeshwar Bhowmick, K. Madhava Krishna

    Abstract: Autonomous explorative robots frequently encounter scenarios where multiple future trajectories can be pursued. Often these are cases with multiple paths around an obstacle or trajectory options towards various frontiers. Humans in such situations can inherently perceive and reason about the surrounding environment to identify several possibilities of either manoeuvring around the obstacles or mov… ▽ More

    Submitted 9 June, 2019; originally announced June 2019.

    Comments: Accepted in IV 2019

  17. arXiv:1812.05833  [pdf, ps, other

    math.CO cs.DM

    Total Colourings - A survey

    Authors: Geetha Jayabalan, Narayanan N, K Somasundaram

    Abstract: The smallest integer $k$ needed for the assignment of colors to the elements so that the coloring is proper (vertices and edges) is called the total chromatic number of a graph. Vizing and Behzed conjectured that the total coloring can be done using at most $Δ(G)+2$ colors, where $Δ(G)$ is the maximum degree of $G$. It is not settled even for planar graphs. In this paper we give a survey on tota… ▽ More

    Submitted 14 December, 2018; originally announced December 2018.

    Comments: 23 pages, 3 figures 1 table

  18. arXiv:1804.08679  [pdf, other

    cs.RO

    Gradient Aware - Shrinking Domain based Control Design for Reactive Planning Frameworks used in Autonomous Vehicles

    Authors: Adarsh Modh, Siddharth Singh, A. V. S. Sai Bhargav Kumar, Sriram N. N., K. Madhava Krishna

    Abstract: In this paper, we present a novel control law for longitudinal speed control of autonomous vehicles. The key contributions of the proposed work include the design of a control law that reactively integrates the longitudinal surface gradient of road into its operation. In contrast to the existing works, we found that integrating the path gradient into the control framework improves the speed tracki… ▽ More

    Submitted 23 April, 2018; originally announced April 2018.

    Comments: 8 pages

  19. Artificial Intelligence (AI) Methods in Optical Networks: A Comprehensive Survey

    Authors: Javier Mata, Ignacio de Miguel, Ramó n J. Durá n, Noemí Merayo, Sandeep Kumar Singh, Admela Jukan, Mohit Chamania

    Abstract: Artificial intelligence (AI) is an extensive scientific discipline which enables computer systems to solve problems by emulating complex biological processes such as learning, reasoning and self-correction. This paper presents a comprehensive review of the application of AI techniques for improving performance of optical communication systems and networks. The use of AI-based techniques is first s… ▽ More

    Submitted 15 January, 2018; v1 submitted 5 January, 2018; originally announced January 2018.

    Journal ref: Optical Switching and Networking, Jan 2018

  20. arXiv:1706.00498  [pdf

    cs.CY

    Facial Recognition Enabled Smart Door Using Microsoft Face API

    Authors: Karan Maheshwari, Nalini N

    Abstract: Privacy and Security are two universal rights and, to ensure that in our daily life we are secure, a lot of research is going on in the field of home security, and IoT is the turning point for the industry, where we connect everyday objects to share data for our betterment. Facial recognition is a well-established process in which the face is detected and identified out of the image. We aim to cre… ▽ More

    Submitted 29 May, 2017; originally announced June 2017.

    Comments: 4 pages, 5 figures, published with International Journal of Engineering Trends and Applications

    Journal ref: IJETA V4(3): Page(1-4) May - Jun 2017. ISSN: 2393-9516 http://www.ijetajournal.org. Published by Eighth Sense Research Group

  21. arXiv:1406.4566  [pdf, ps, other

    cs.LG stat.ML

    Guaranteed Scalable Learning of Latent Tree Models

    Authors: Furong Huang, Niranjan U. N., Ioakeim Perros, Robert Chen, Jimeng Sun, Anima Anandkumar

    Abstract: We present an integrated approach for structure and parameter estimation in latent tree graphical models. Our overall approach follows a "divide-and-conquer" strategy that learns models over small groups of variables and iteratively merges onto a global solution. The structure learning involves combinatorial operations such as minimum spanning tree construction and local recursive grouping; the pa… ▽ More

    Submitted 17 December, 2019; v1 submitted 17 June, 2014; originally announced June 2014.

  22. arXiv:1404.7330  [pdf, ps, other

    cs.NI

    Zero Energy Network stack for Energy Harvested WSNs

    Authors: Akshay Uttama Nambi S. N., Prabhakar T. V, R Venkatesha Prasad, Jamadagni H. S

    Abstract: We present our ``Zero Energy Network'' (ZEN) protocol stack for energy harvesting wireless sensor networks applications. The novelty in our work is $4$ fold: (1) Energy harvesting aware fully featured MAC layer. Carrier sensing, Backoff algorithms, ARQ, RTS/CTS mechanisms, Adaptive Duty Cycling are either auto configurable or available as tunable parameters to match the available energy (b) Energy… ▽ More

    Submitted 29 April, 2014; originally announced April 2014.

    Comments: 12 pages, 2013

  23. arXiv:1110.6105  [pdf, ps, other

    cs.OH

    Generation of Test Vectors for Sequential Cell Verification

    Authors: Santanu Bhowmick, S. Bhattacherjee, Nandakumar G. N

    Abstract: For Application Specific Integrated Circuits (ASIC) and System-on-Chip (SOC) designs, Cell - Based Design (CBD) is the most prevalent practice as it guarantees a shorter design cycle, minimizes errors and is easier to maintain. In modern ASIC design, standard cell methodology is practiced with sizable libraries of cells, each containing multiple implementations of the same logic functionality, in… ▽ More

    Submitted 26 October, 2011; originally announced October 2011.

    Comments: Presented in ARM Regional Engineering Conference, 2008