Skip to main content

Showing 1–41 of 41 results for author: N, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2502.15223  [pdf, other

    cs.IR cs.CL cs.SI

    A BERT Based Hybrid Recommendation System For Academic Collaboration

    Authors: Sangeetha N, Harish Thangaraj, Varun Vashisht, Eshaan Joshi, Kanishka Verma, Diya Katariya

    Abstract: Universities serve as a hub for academic collaboration, promoting the exchange of diverse ideas and perspectives among students and faculty through interdisciplinary dialogue. However, as universities expand in size, conventional networking approaches via student chapters, class groups, and faculty committees become cumbersome. To address this challenge, an academia-specific profile recommendation… ▽ More

    Submitted 21 February, 2025; originally announced February 2025.

    Comments: International Conference on Intelligent Systems and Security - 2024

  2. arXiv:2412.17310  [pdf, other

    cs.IR cs.AI

    Popularity Estimation and New Bundle Generation using Content and Context based Embeddings

    Authors: Ashutosh Nayak, Prajwal NJ, Sameeksha Keshav, Kavitha S. N., Roja Reddy, Rajasekhara Reddy Duvvuru Muni

    Abstract: Recommender systems create enormous value for businesses and their consumers. They increase revenue for businesses while improving the consumer experience by recommending relevant products amidst huge product base. Product bundling is an exciting development in the field of product recommendations. It aims at generating new bundles and recommending exciting and relevant bundles to their consumers.… ▽ More

    Submitted 23 December, 2024; originally announced December 2024.

  3. arXiv:2412.06743  [pdf, other

    cs.CV

    3D Graph Attention Networks for High Fidelity Pediatric Glioma Segmentation

    Authors: Harish Thangaraj, Diya Katariya, Eshaan Joshi, Sangeetha N

    Abstract: Pediatric brain tumors, particularly gliomas, represent a significant cause of cancer related mortality in children with complex infiltrative growth patterns that complicate treatment. Early, accurate segmentation of these tumors in neuroimaging data is crucial for effective diagnosis and intervention planning. This study presents a novel 3D UNet architecture with a spatial attention mechanism tai… ▽ More

    Submitted 9 December, 2024; originally announced December 2024.

    Comments: 8 pages, 9 figures

  4. arXiv:2409.20374  [pdf, other

    cs.CL cs.SD eess.AS

    Word-wise intonation model for cross-language TTS systems

    Authors: Tomilov A. A., Gromova A. Y., Svischev A. N

    Abstract: In this paper we propose a word-wise intonation model for Russian language and show how it can be generalized for other languages. The proposed model is suitable for automatic data markup and its extended application to text-to-speech systems. It can also be implemented for an intonation contour modeling by using rule-based algorithms or by predicting contours with language models. The key idea is… ▽ More

    Submitted 30 September, 2024; originally announced September 2024.

  5. arXiv:2407.13779  [pdf, other

    q-bio.BM cs.LG cs.NE

    Leveraging Latent Evolutionary Optimization for Targeted Molecule Generation

    Authors: Siddartha Reddy N, Sai Prakash MV, Varun V, Vishal Vaddina, Saisubramaniam Gopalakrishnan

    Abstract: Lead optimization is a pivotal task in the drug design phase within the drug discovery lifecycle. The primary objective is to refine the lead compound to meet specific molecular properties for progression to the subsequent phase of development. In this work, we present an innovative approach, Latent Evolutionary Optimization for Molecule Generation (LEOMol), a generative modeling framework for the… ▽ More

    Submitted 2 July, 2024; originally announced July 2024.

  6. arXiv:2403.08834  [pdf, other

    cs.LG cs.AI

    Predictive Analysis of Tuberculosis Treatment Outcomes Using Machine Learning: A Karnataka TB Data Study at a Scale

    Authors: SeshaSai Nath Chinagudaba, Darshan Gera, Krishna Kiran Vamsi Dasu, Uma Shankar S, Kiran K, Anil Singarajpure, Shivayogappa. U, Somashekar N, Vineet Kumar Chadda, Sharath B N

    Abstract: Tuberculosis (TB) remains a global health threat, ranking among the leading causes of mortality worldwide. In this context, machine learning (ML) has emerged as a transformative force, providing innovative solutions to the complexities associated with TB treatment.This study explores how machine learning, especially with tabular data, can be used to predict Tuberculosis (TB) treatment outcomes mor… ▽ More

    Submitted 13 March, 2024; originally announced March 2024.

  7. arXiv:2401.09476  [pdf

    cs.CR cs.AI

    A Framework for Agricultural Food Supply Chain using Blockchain

    Authors: Sudarssan N

    Abstract: The main aim of the paper is to create a trust and transparency in the food supply chain system, ensuring food safety for everyone with the help of Blockchain Technology. Food supply chain is the process of tracing a crop from the farmer or producer to the buyer. With the advent of blockchain, providing a safe and fraud-free environment for the provision of numerous agricultural necessities has be… ▽ More

    Submitted 13 January, 2024; originally announced January 2024.

    Comments: 5 Pages, 5 figures, Under Review

  8. arXiv:2310.03027  [pdf, other

    physics.chem-ph cs.AI cs.LG

    Synergistic Fusion of Graph and Transformer Features for Enhanced Molecular Property Prediction

    Authors: M V Sai Prakash, Siddartha Reddy N, Ganesh Parab, Varun V, Vishal Vaddina, Saisubramaniam Gopalakrishnan

    Abstract: Molecular property prediction is a critical task in computational drug discovery. While recent advances in Graph Neural Networks (GNNs) and Transformers have shown to be effective and promising, they face the following limitations: Transformer self-attention does not explicitly consider the underlying molecule structure while GNN feature representation alone is not sufficient to capture granular a… ▽ More

    Submitted 25 August, 2023; originally announced October 2023.

  9. Identification of an influence network using ensemble-based filtering for Hawkes processes driven by count data

    Authors: Santitissadeekorn N., Delahaies S., Lloyd D. J. B

    Abstract: Many networks have event-driven dynamics (such as communication, social media and criminal networks), where the mean rate of the events occurring at a node in the network changes according to the occurrence of other events in the network. In particular, events associated with a node of the network could increase the rate of events at other nodes, depending on their influence relationship. Thus, it… ▽ More

    Submitted 1 February, 2023; originally announced February 2023.

    Comments: to appear in Physica D: Nonlinear Phenomena. 22 pages, 15 figures

  10. arXiv:2211.06313  [pdf

    cs.CY

    BioJam Camp: toward justice through bioengineering and biodesign co-learning with youth

    Authors: Callie Chappell, Henry A. -A., Elvia B. O., Emily B., Bailey B., Jacqueline C. -M., Caroline Daws, Cristian F., Emiliano G., Page Goddard, Xavier G., Anne Hu, Gabriela J., Kelley Langhans, Briana Martin-Villa, Penny M. -S., Jennifer M., Soyang N., Melissa Ortiz, Aryana P., Trisha S, Corinne Takara, Emily T., Paloma Vazquez, Rolando Perez , et al. (1 additional authors not shown)

    Abstract: BioJam is a political, artistic, and educational project in which Bay Area artists, scientists, and educators collaborate with youth and communities of color to address historical exclusion of their communities in STEM fields and reframe what science can be. As an intergenerational collective, we co-learn on topics of culture (social and biological), community (cultural and ecological), and creati… ▽ More

    Submitted 1 November, 2022; originally announced November 2022.

  11. arXiv:2210.10372  [pdf

    cs.DL cs.CY cs.IR

    A Study of Obstacles in Plagiarism Software Subscribing by Colleges in Tamil Nadu

    Authors: Subaveerapandiyan A, Sakthivel N

    Abstract: This article attempts to comprehend the current issues and hurdles that Indian colleges affiliated with Tamil Nadu State Universities encounter when trying to subscribe to a software that detects plagiarism. The study goals are to determine whether colleges employ anti-plagiarism software, whether they ensure that their student-given assignments are free of copyright infringement, whether tutors t… ▽ More

    Submitted 19 October, 2022; originally announced October 2022.

  12. arXiv:2209.03069  [pdf

    cs.SE

    A Review on the Process of Automated Software Testing

    Authors: Durga Shree N, Sree Dharinya S, Dasari Vijayasree, Nadendla Sai Roopa, Anugu Arun

    Abstract: The requirements in automation, digitalization, and fast computations have loaded the IT sector with expectations of highly reliable, efficient, and cost-effective software. Given that the process of testing, verification, and validation of software products consumes 50-75% of the total revenue if the testing process is ineffective, "n" times the expenditure must be invested to mend the havoc caus… ▽ More

    Submitted 7 September, 2022; originally announced September 2022.

    Comments: 7 pages, 2 figures, 2 tables

  13. arXiv:2203.06583  [pdf

    cs.SD cs.AI eess.AS

    Bi-Sampling Approach to Classify Music Mood leveraging Raga-Rasa Association in Indian Classical Music

    Authors: Mohan Rao B C, Vinayak Arkachaari, Harsha M N, Sushmitha M N, Gayathri Ramesh K K, Ullas M S, Pathi Mohan Rao, Sudha G, Narayana Darapaneni

    Abstract: The impact of Music on the mood or emotion of the listener is a well-researched area in human psychology and behavioral science. In Indian classical music, ragas are the melodic structure that defines the various styles and forms of the music. Each raga has been found to evoke a specific emotion in the listener. With the advent of advanced capabilities of audio signal processing and the applicatio… ▽ More

    Submitted 13 March, 2022; originally announced March 2022.

  14. arXiv:2110.08510  [pdf, ps, other

    cs.LG cs.IR cs.SI

    DFW-PP: Dynamic Feature Weighting based Popularity Prediction for Social Media Content

    Authors: Viswanatha Reddy G, Chaitanya B S N V, Prathyush P, Sumanth M, Mrinalini C, Dileep Kumar P, Snehasis Mukherjee

    Abstract: The increasing popularity of social media platforms makes it important to study user engagement, which is a crucial aspect of any marketing strategy or business model. The over-saturation of content on social media platforms has persuaded us to identify the important factors that affect content popularity. This comes from the fact that only an iota of the humongous content available online receive… ▽ More

    Submitted 16 October, 2021; originally announced October 2021.

  15. arXiv:2108.03978  [pdf, other

    cs.AR cs.LG cs.SE

    VeRLPy: Python Library for Verification of Digital Designs with Reinforcement Learning

    Authors: Aebel Joe Shibu, Sadhana S, Shilpa N, Pratyush Kumar

    Abstract: Digital hardware is verified by comparing its behavior against a reference model on a range of randomly generated input signals. The random generation of the inputs hopes to achieve sufficient coverage of the different parts of the design. However, such coverage is often difficult to achieve, amounting to large verification efforts and delays. An alternative is to use Reinforcement Learning (RL) t… ▽ More

    Submitted 9 August, 2021; originally announced August 2021.

    Comments: submitted to The first international conference on AI-ML Systems

  16. Topic Modeling Based Extractive Text Summarization

    Authors: Kalliath Abdul Rasheed Issam, Shivam Patel, Subalalitha C. N

    Abstract: Text summarization is an approach for identifying important information present within text documents. This computational technique aims to generate shorter versions of the source text, by including only the relevant and salient information present within the source text. In this paper, we propose a novel method to summarize a text document by clustering its contents based on latent topics produce… ▽ More

    Submitted 29 June, 2021; originally announced June 2021.

    Comments: 10 pages, 13 figures, 3 tables

    Journal ref: International Journal of Innovative Technology and Exploring Engineering, Volume-9 Issue-6, April 2020, Page No. 1710-1719

  17. arXiv:2103.12335  [pdf, other

    cs.RO eess.SY

    Model Based Control of Commercial-Off-TheShelf (COTS) Unmanned Rotorcraft for BrickWall Construction

    Authors: Nithya Sridhar, Sai Abhinay. N, Chaithanya Krishna. B, Shubhankar Shobhit, Kaushik Das, Debasish Ghose

    Abstract: This work proposes a systematic framework for modelling and controller design of a Commercial-Off-The Shelf (COTS) unmanned rotorcraft using control theory and principles, for brick wall construction. With point to point navigation as the primary application, command velocities in the three axes of the Unmanned Aerial Vehicle (UAV) are considered as inputs of the system while its actual velocities… ▽ More

    Submitted 23 March, 2021; originally announced March 2021.

    Comments: MBZIRC Symposium 2020

  18. arXiv:2009.12695  [pdf, other

    cs.CL cs.AI

    Techniques to Improve Q&A Accuracy with Transformer-based models on Large Complex Documents

    Authors: Chejui Liao, Tabish Maniar, Sravanajyothi N, Anantha Sharma

    Abstract: This paper discusses the effectiveness of various text processing techniques, their combinations, and encodings to achieve a reduction of complexity and size in a given text corpus. The simplified text corpus is sent to BERT (or similar transformer based models) for question and answering and can produce more relevant responses to user queries. This paper takes a scientific approach to determine t… ▽ More

    Submitted 26 September, 2020; originally announced September 2020.

  19. arXiv:2007.13078  [pdf, other

    cs.CV cs.LG

    SMART: Simultaneous Multi-Agent Recurrent Trajectory Prediction

    Authors: Sriram N N, Buyu Liu, Francesco Pittaluga, Manmohan Chandraker

    Abstract: We propose advances that address two key challenges in future trajectory prediction: (i) multimodality in both training data and predictions and (ii) constant time inference regardless of number of agents. Existing trajectory predictions are fundamentally limited by lack of diversity in training data, which is difficult to acquire with sufficient coverage of possible modes. Our first contribution… ▽ More

    Submitted 26 July, 2020; originally announced July 2020.

    Comments: Accepted at ECCV 2020

  20. arXiv:1906.03584  [pdf, other

    cs.RO cs.CV

    A Hierarchical Network for Diverse Trajectory Proposals

    Authors: Sriram N. N., Gourav Kumar, Abhay Singh, M. Siva Karthik, Saket Saurav Brojeshwar Bhowmick, K. Madhava Krishna

    Abstract: Autonomous explorative robots frequently encounter scenarios where multiple future trajectories can be pursued. Often these are cases with multiple paths around an obstacle or trajectory options towards various frontiers. Humans in such situations can inherently perceive and reason about the surrounding environment to identify several possibilities of either manoeuvring around the obstacles or mov… ▽ More

    Submitted 9 June, 2019; originally announced June 2019.

    Comments: Accepted in IV 2019

  21. A Proactive Flow Admission and Re-Routing Scheme for Load Balancing and Mitigation of Congestion Propagation in SDN Data Plane

    Authors: Sminesh C. N., Grace Mary Kanaga E., Ranjitha K

    Abstract: The centralized architecture in software-defined network (SDN) provides a global view of the underlying network, paving the way for enormous research in the area of SDN traffic engineering (SDN TE). This research focuses on the load balancing aspects of SDN TE, given that the existing reactive methods for data-plane load balancing eventually result in packet loss and proactive schemes for data pla… ▽ More

    Submitted 6 December, 2018; originally announced December 2018.

    Comments: 18 pages, 117-134

    Journal ref: International Journal of Computer Networks & Communications (IJCNC) Vol.10, No.6, November 2018

  22. arXiv:1808.09068  [pdf, other

    cs.HC

    WeSeer: Visual Analysis for Better Information Cascade Prediction of WeChat Articles

    Authors: Quan Li, Ziming Wu, Lingling Yi, Kristanto Sean N, Huamin Qu, Xiaojuan Ma

    Abstract: Social media, such as Facebook and WeChat, empowers millions of users to create, consume, and disseminate online information on an unprecedented scale. The abundant information on social media intensifies the competition of WeChat Public Official Articles (i.e., posts) for gaining user attention due to the zero-sum nature of attention. Therefore, only a small portion of information tends to become… ▽ More

    Submitted 27 August, 2018; originally announced August 2018.

    Comments: IEEE Transactions on Visualization and Computer Graphics (TVCG), 2019 (To appear)

  23. arXiv:1804.08679  [pdf, other

    cs.RO

    Gradient Aware - Shrinking Domain based Control Design for Reactive Planning Frameworks used in Autonomous Vehicles

    Authors: Adarsh Modh, Siddharth Singh, A. V. S. Sai Bhargav Kumar, Sriram N. N., K. Madhava Krishna

    Abstract: In this paper, we present a novel control law for longitudinal speed control of autonomous vehicles. The key contributions of the proposed work include the design of a control law that reactively integrates the longitudinal surface gradient of road into its operation. In contrast to the existing works, we found that integrating the path gradient into the control framework improves the speed tracki… ▽ More

    Submitted 23 April, 2018; originally announced April 2018.

    Comments: 8 pages

  24. arXiv:1710.07992  [pdf

    cs.DS

    Twin Sort Technique

    Authors: Veeresh D, Thimmaraju S. N, Ravish G. K

    Abstract: The objective behind the Twin Sort technique is to sort the list of unordered data elements efficiently and to allow efficient and simple arrangement of data elements within the data structure with optimization of comparisons and iterations in the sorting method. This sorting technique effectively terminates the iterations when there is no need of comparison if the elements are all sorted in betwe… ▽ More

    Submitted 22 October, 2017; originally announced October 2017.

    Comments: core computer algorithm, 3 pages, conference

    Journal ref: International Journal of Combined Research & Development October 2014

  25. arXiv:1503.00843  [pdf

    cs.MM cs.CV

    A Survey On Video Forgery Detection

    Authors: Sowmya K. N., H. R. Chennamma

    Abstract: The Digital Forgeries though not visibly identifiable to human perception it may alter or meddle with underlying natural statistics of digital content. Tampering involves fiddling with video content in order to cause damage or make unauthorized alteration/modification. Tampering detection in video is cumbersome compared to image when considering the properties of the video. Tampering impacts need… ▽ More

    Submitted 3 March, 2015; originally announced March 2015.

    Comments: 11 pages, 3 figures, International Journal of Computer Engineering and Applications, Volume IX, Issue II, February 2015

    Journal ref: International Journal of Computer Engineering and Applications, Volume IX, Issue II, pp. 17-27, February 2015

  26. arXiv:1404.7330  [pdf, ps, other

    cs.NI

    Zero Energy Network stack for Energy Harvested WSNs

    Authors: Akshay Uttama Nambi S. N., Prabhakar T. V, R Venkatesha Prasad, Jamadagni H. S

    Abstract: We present our ``Zero Energy Network'' (ZEN) protocol stack for energy harvesting wireless sensor networks applications. The novelty in our work is $4$ fold: (1) Energy harvesting aware fully featured MAC layer. Carrier sensing, Backoff algorithms, ARQ, RTS/CTS mechanisms, Adaptive Duty Cycling are either auto configurable or available as tunable parameters to match the available energy (b) Energy… ▽ More

    Submitted 29 April, 2014; originally announced April 2014.

    Comments: 12 pages, 2013

  27. arXiv:1404.6020  [pdf

    cs.CE

    A Fast Multiple Attractor Cellular Automata with Modified Clonal Classifier for Splicing Site Prediction in Human Genome

    Authors: Pokkuluri Kiran Sree, Inampudi Ramesh Babu, SSSN Usha Devi N

    Abstract: Bioinformatics encompass storing, analyzing and interpreting the biological data. Most of the challenges for Machine Learning methods like Cellular Automata is to furnish the functional information with the corresponding biological sequences. In eukaryotes DNA is divided into introns and exons. The introns will be removed to make the coding region by a process called splicing. By indentifying a sp… ▽ More

    Submitted 23 April, 2014; originally announced April 2014.

    Comments: Four Pages, Global Perspectives on Artificial Intelligence (GPAI) Volume 2, April 2014

  28. arXiv:1404.1144  [pdf

    cs.CE cs.LG

    AIS-MACA- Z: MACA based Clonal Classifier for Splicing Site, Protein Coding and Promoter Region Identification in Eukaryotes

    Authors: Pokkuluri Kiran Sree, Inampudi Ramesh Babu, SSSN Usha Devi N

    Abstract: Bioinformatics incorporates information regarding biological data storage, accessing mechanisms and presentation of characteristics within this data. Most of the problems in bioinformatics and be addressed efficiently by computer techniques. This paper aims at building a classifier based on Multiple Attractor Cellular Automata (MACA) which uses fuzzy logic with version Z to predict splicing site,… ▽ More

    Submitted 3 April, 2014; originally announced April 2014.

    Comments: 6,1-6 Pages, Journal of Artificial Intelligence Research & Advances Volume 1, Issue 1,2014. arXiv admin note: text overlap with arXiv:1403.5933, arXiv:1404.0453

  29. arXiv:1404.0453  [pdf

    cs.CE cs.LG

    Cellular Automata and Its Applications in Bioinformatics: A Review

    Authors: Pokkuluri Kiran Sree, Inampudi Ramesh Babu, SSSN Usha Devi N

    Abstract: This paper aims at providing a survey on the problems that can be easily addressed by cellular automata in bioinformatics. Some of the authors have proposed algorithms for addressing some problems in bioinformatics but the application of cellular automata in bioinformatics is a virgin field in research. None of the researchers has tried to relate the major problems in bioinformatics and find a com… ▽ More

    Submitted 2 April, 2014; originally announced April 2014.

    Journal ref: Global Perspectives on Artificial Intelligence (GPAI) Volume 2 Issue 2, Pages 16-22 April 2014

  30. arXiv:1401.5364  [pdf

    cs.CE cs.LG

    HMACA: Towards Proposing a Cellular Automata Based Tool for Protein Coding, Promoter Region Identification and Protein Structure Prediction

    Authors: Pokkuluri Kiran Sree, Inampudi Ramesh Babu, SSSN Usha Devi N

    Abstract: Human body consists of lot of cells, each cell consist of DeOxaRibo Nucleic Acid (DNA). Identifying the genes from the DNA sequences is a very difficult task. But identifying the coding regions is more complex task compared to the former. Identifying the protein which occupy little place in genes is a really challenging issue. For understating the genes coding region analysis plays an important ro… ▽ More

    Submitted 21 January, 2014; originally announced January 2014.

    Journal ref: International Journal of Research in Computer Applications & Information Technology, Volume 1, Issue 1, July-September, 2013, pp. 26-31

  31. PSMACA: An Automated Protein Structure Prediction Using MACA (Multiple Attractor Cellular Automata)

    Authors: Pokkuluri Kiran Sree, Inamupudi Ramesh Babu, SSSN Usha Devi N

    Abstract: Protein Structure Predication from sequences of amino acid has gained a remarkable attention in recent years. Even though there are some prediction techniques addressing this problem, the approximate accuracy in predicting the protein structure is closely 75%. An automated procedure was evolved with MACA (Multiple Attractor Cellular Automata) for predicting the structure of the protein. Most of th… ▽ More

    Submitted 12 January, 2014; originally announced January 2014.

    Comments: 6 pages. arXiv admin note: substantial text overlap with arXiv:1310.4342, arXiv:1310.4495

    Journal ref: Journal of Bioinformatics and Intelligent Control Vol 2, pp 211--215, 2013

  32. arXiv:1312.1889  [pdf

    cs.OH

    FELFCNCA: Fast & Efficient Log File Compression Using Non Linear Cellular Automata Classifier

    Authors: P. Kiran Sree, Inampudi Ramesh Babu, SSSN Usha Devi N

    Abstract: Log Files are created for Traffic Analysis, Maintenance, Software debugging, customer management at multiple places like System Services, User Monitoring Applications, Network servers, database management systems which must be kept for long periods of time. These Log files may grow to huge sizes in this complex systems and environments. For storage and convenience log files must be compressed. Mos… ▽ More

    Submitted 18 November, 2013; originally announced December 2013.

    Comments: International Journal on Communications (IJC) Volume 1 Issue 1, December 2012 http://www.seipub.org/ijc

  33. arXiv:1311.4420  [pdf

    cs.IR

    CAVDM: Cellular Automata Based Video Cloud Mining Framework for Information Retrieval

    Authors: P. Kiran Sree, Inampudi Ramesh Babu, SSSN Usha Devi N

    Abstract: Cloud Mining technique can be applied to various documents. Acquisition and storage of video data is an easy task but retrieval of information from video data is a challenging task. So video Cloud Mining plays an important role in efficient video data management for information retrieval. This paper proposes a Cellular Automata based framework for video Cloud Mining to extract the information from… ▽ More

    Submitted 18 November, 2013; originally announced November 2013.

    Journal ref: Parallel Computing and Cloud Computing Research (PCCR) Volume 1 Issue 1, April 2013

  34. arXiv:1302.3308  [pdf, ps, other

    cs.CC

    Arithmetic Circuit Lower Bounds via MaxRank

    Authors: Mrinal Kumar, Gaurav Maheshwari, Jayalal Sarma M. N

    Abstract: We introduce the polynomial coefficient matrix and identify maximum rank of this matrix under variable substitution as a complexity measure for multivariate polynomials. We use our techniques to prove super-polynomial lower bounds against several classes of non-multilinear arithmetic circuits. In particular, we obtain the following results : As our main result, we prove that any homogeneous dept… ▽ More

    Submitted 13 February, 2013; originally announced February 2013.

    Comments: 22 pages

  35. arXiv:1301.1425  [pdf, ps, other

    cs.CC

    Pebbling, Entropy and Branching Program Size Lower Bounds

    Authors: Balagopal Komarath, Jayalal Sarma M. N

    Abstract: We contribute to the program of proving lower bounds on the size of branching programs solving the Tree Evaluation Problem introduced by Cook et. al. (2012). Proving a super-polynomial lower bound for the size of nondeterministic thrifty branching programs (NTBP) would separate $NL$ from $P$ for thrifty models solving the tree evaluation problem. First, we show that {\em Read-Once NTBPs} are equiv… ▽ More

    Submitted 16 November, 2013; v1 submitted 8 January, 2013; originally announced January 2013.

    Comments: 25 Pages, Manuscript submitted to Journal in June 2013 This version includes a proof for tight size bounds for (syntactic) read-once NTBPs. The proof is in the same spirit as the proof for size bounds for bitwise independent NTBPs present in the earlier version of the paper and is included in the journal version of the paper submitted in June 2013

    ACM Class: F.1.1

  36. arXiv:1211.7356  [pdf

    cs.NI

    WiGig and IEEE 802.11ad - For multi-gigabyte-per-second WPAN and WLAN

    Authors: Sai Shankar N., Debashis Dash, Hassan El Madi, Guru Gopalakrishnan

    Abstract: The Wireless Gigabit Alliance (WiGig) and IEEE 802.11ad are developing a multigigabit wireless personal and local area network (WPAN/WLAN) specification in the 60 GHz millimeter wave band. Chipset manufacturers, original equipment manufacturers (OEMs), and telecom companies are also assisting in this development. 60 GHz millimeter wave transmission will scale the speed of WLANs and WPANs to 6.75 G… ▽ More

    Submitted 30 November, 2012; originally announced November 2012.

    Comments: 24 pages, 18 figures. Submitted to ZTE Communications 2012

  37. arXiv:1108.5703  [pdf

    cs.IR

    Web Pages Clustering: A New Approach

    Authors: Jeevan H E, Prashanth P P, Punith Kumar S N, Vinay Hegde

    Abstract: The rapid growth of web has resulted in vast volume of information. Information availability at a rapid speed to the user is vital. English language (or any for that matter) has lot of ambiguity in the usage of words. So there is no guarantee that a keyword based search engine will provide the required results. This paper introduces the use of dictionary (standardised) to obtain the context with w… ▽ More

    Submitted 26 August, 2011; originally announced August 2011.

    Comments: Clustering, concept mining, information retrieval, metasearch engine

  38. arXiv:1002.1951  [pdf

    cs.MM cs.IR

    Image Retrieval Techniques based on Image Features, A State of Art approach for CBIR

    Authors: Mr. Kondekar V. H., Mr. Kolkure V. S., Prof. Kore S. N

    Abstract: The purpose of this Paper is to describe our research on different feature extraction and matching techniques in designing a Content Based Image Retrieval (CBIR) system. Due to the enormous increase in image database sizes, as well as its vast deployment in various applications, the need for CBIR development arose. Firstly, this paper outlines a description of the primitive feature extraction te… ▽ More

    Submitted 9 February, 2010; originally announced February 2010.

    Comments: IEEE format, International Journal of Computer Science and Information Security, IJCSIS January 2010, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: Journal of Computer Science, ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 7, No. 1, pp. 69-76, January 2010, USA

  39. arXiv:1001.3504  [pdf

    cs.CR

    A Noise Addition Scheme in Decision Tree for Privacy Preserving Data Mining

    Authors: Mohammad Ali Kadampur, Somayajulu D. V. L. N

    Abstract: Data mining deals with automatic extraction of previously unknown patterns from large amounts of data. Organizations all over the world handle large amounts of data and are dependent on mining gigantic data sets for expansion of their enterprises. These data sets typically contain sensitive individual information, which consequently get exposed to the other parties. Though we cannot deny the ben… ▽ More

    Submitted 20 January, 2010; originally announced January 2010.

    Journal ref: Journal of Computing, Vol. 2, Issue 1, January 2010

  40. Using Elimination Theory to construct Rigid Matrices

    Authors: Abhinav Kumar, Satyanarayana V. Lokam, Vijay M. Patankar, Jayalal Sarma M. N

    Abstract: The rigidity of a matrix A for target rank r is the minimum number of entries of A that must be changed to ensure that the rank of the altered matrix is at most r. Since its introduction by Valiant (1977), rigidity and similar rank-robustness functions of matrices have found numerous applications in circuit complexity, communication complexity, and learning complexity. Almost all nxn matrices over… ▽ More

    Submitted 16 April, 2014; v1 submitted 28 October, 2009; originally announced October 2009.

    Comments: 25 Pages, minor typos corrected

    Journal ref: Computational Complexity 23 (2014), 531-563

  41. Balancing Bounded Treewidth Circuits

    Authors: Maurice Jansen, Jayalal Sarma M. N

    Abstract: Algorithmic tools for graphs of small treewidth are used to address questions in complexity theory. For both arithmetic and Boolean circuits, it is shown that any circuit of size $n^{O(1)}$ and treewidth $O(\log^i n)$ can be simulated by a circuit of width $O(\log^{i+1} n)$ and size $n^c$, where $c = O(1)$, if $i=0$, and $c=O(\log \log n)$ otherwise. For our main construction, we prove that mult… ▽ More

    Submitted 8 October, 2009; originally announced October 2009.

    ACM Class: F.2.3