-
Leveraging Virtual Reality and AI Tutoring for Language Learning: A Case Study of a Virtual Campus Environment with OpenAI GPT Integration with Unity 3D
Authors:
Adithya TG,
Abhinavaram N,
Gowri Srinivasa
Abstract:
This paper presents a new approach to multiple language learning, with Hindi the language to be learnt in our case, by using the integration of virtual reality environments and AI enabled tutoring systems using OpenAIs GPT api calls. We have developed a scenario which has a virtual campus environment using Unity which focuses on a detailed representation of our universitys buildings 11th floor, wh…
▽ More
This paper presents a new approach to multiple language learning, with Hindi the language to be learnt in our case, by using the integration of virtual reality environments and AI enabled tutoring systems using OpenAIs GPT api calls. We have developed a scenario which has a virtual campus environment using Unity which focuses on a detailed representation of our universitys buildings 11th floor, where most of the cultural and technological activities take place. Within this virtual environment that we have created, we have an AI tutor powered by OpenAI's GPT model which was called using an api which moves around with the user. This provided language learning support in Hindi, as GPT is able to take care of language translation. Our approach mainly involves utilising speech to text, text to text conversion and text to speech capabilities to facilitate real time interaction between users and the AI tutor in the presence of internet. This research demonstrates the use of combining VR technology with AI tutoring for immersive language learning experiences and provides interaction.
△ Less
Submitted 19 November, 2024;
originally announced November 2024.
-
Word-wise intonation model for cross-language TTS systems
Authors:
Tomilov A. A.,
Gromova A. Y.,
Svischev A. N
Abstract:
In this paper we propose a word-wise intonation model for Russian language and show how it can be generalized for other languages. The proposed model is suitable for automatic data markup and its extended application to text-to-speech systems. It can also be implemented for an intonation contour modeling by using rule-based algorithms or by predicting contours with language models. The key idea is…
▽ More
In this paper we propose a word-wise intonation model for Russian language and show how it can be generalized for other languages. The proposed model is suitable for automatic data markup and its extended application to text-to-speech systems. It can also be implemented for an intonation contour modeling by using rule-based algorithms or by predicting contours with language models. The key idea is a partial elimination of the variability connected with different placements of a stressed syllable in a word. It is achieved with simultaneous applying of pitch simplification with a dynamic time warping clustering. The proposed model could be used as a tool for intonation research or as a backbone for prosody description in text-to-speech systems. As the advantage of the model, we show its relations with the existing intonation systems as well as the possibility of using language models for prosody prediction. Finally, we demonstrate some practical evidence of the system robustness to parameter variations.
△ Less
Submitted 30 September, 2024;
originally announced September 2024.
-
InteractiveIE: Towards Assessing the Strength of Human-AI Collaboration in Improving the Performance of Information Extraction
Authors:
Ishani Mondal,
Michelle Yuan,
Anandhavelu N,
Aparna Garimella,
Francis Ferraro,
Andrew Blair-Stanek,
Benjamin Van Durme,
Jordan Boyd-Graber
Abstract:
Learning template based information extraction from documents is a crucial yet difficult task. Prior template-based IE approaches assume foreknowledge of the domain templates; however, real-world IE do not have pre-defined schemas and it is a figure-out-as you go phenomena. To quickly bootstrap templates in a real-world setting, we need to induce template slots from documents with zero or minimal…
▽ More
Learning template based information extraction from documents is a crucial yet difficult task. Prior template-based IE approaches assume foreknowledge of the domain templates; however, real-world IE do not have pre-defined schemas and it is a figure-out-as you go phenomena. To quickly bootstrap templates in a real-world setting, we need to induce template slots from documents with zero or minimal supervision. Since the purpose of question answering intersect with the goal of information extraction, we use automatic question generation to induce template slots from the documents and investigate how a tiny amount of a proxy human-supervision on-the-fly (termed as InteractiveIE) can further boost the performance. Extensive experiments on biomedical and legal documents, where obtaining training data is expensive, reveal encouraging trends of performance improvement using InteractiveIE over AI-only baseline.
△ Less
Submitted 17 November, 2023; v1 submitted 23 May, 2023;
originally announced May 2023.
-
Production Assessment using a Knowledge Transfer Framework and Evidence Theory
Authors:
Fernando Arevalo N.,
Christian Alison M. Piolo,
Tahasanul Ibrahim,
Andreas Schwung
Abstract:
Operational knowledge is one of the most valuable assets in a company, as it provides a strategic advantage over competitors and ensures steady and optimal operation in machines. An (interactive) assessment system on the shop floor can optimize the process and reduce stopovers because it can provide constant valuable information regarding the machine condition to the operators. However, formalizin…
▽ More
Operational knowledge is one of the most valuable assets in a company, as it provides a strategic advantage over competitors and ensures steady and optimal operation in machines. An (interactive) assessment system on the shop floor can optimize the process and reduce stopovers because it can provide constant valuable information regarding the machine condition to the operators. However, formalizing operational (tacit) knowledge to explicit knowledge is not an easy task. This transformation considers modeling expert knowledge, quantification of knowledge uncertainty, and validation of the acquired knowledge. This study proposes a novel approach for production assessment using a knowledge transfer framework and evidence theory to address the aforementioned challenges. The main contribution of this paper is a methodology for the formalization of tacit knowledge based on an extended failure mode and effect analysis for knowledge extraction, as well as the use of evidence theory for the uncertainty definition of knowledge. Moreover, this approach uses primitive recursive functions for knowledge modeling and proposes a validation strategy of the knowledge using machine data. These elements are integrated into an interactive recommendation system hosted on a backend that uses HoloLens as a visual interface. We demonstrate this approach using an industrial setup: a laboratory bulk good system. The results yield interesting insights, including the knowledge validation, uncertainty behavior of knowledge, and interactive troubleshooting for the machine operator.
△ Less
Submitted 7 July, 2022;
originally announced July 2022.
-
Robust Unpaired Single Image Super-Resolution of Faces
Authors:
Saurabh Goswami,
Rajagopalan A. N
Abstract:
We propose an adversarial attack for facial class-specific Single Image Super-Resolution (SISR) methods. Existing attacks, such as the Fast Gradient Sign Method (FGSM) or the Projected Gradient Descent (PGD) method, are either fast but ineffective, or effective but prohibitively slow on these networks. By closely inspecting the surface that the MSE loss, used to train such networks, traces under v…
▽ More
We propose an adversarial attack for facial class-specific Single Image Super-Resolution (SISR) methods. Existing attacks, such as the Fast Gradient Sign Method (FGSM) or the Projected Gradient Descent (PGD) method, are either fast but ineffective, or effective but prohibitively slow on these networks. By closely inspecting the surface that the MSE loss, used to train such networks, traces under varying degradations, we were able to identify its parameterizable property. We leverage this property to propose an adverasrial attack that is able to locate the optimum degradation (effective) without needing multiple gradient-ascent steps (fast). Our experiments show that the proposed method is able to achieve a better speed vs effectiveness trade-off than the state-of-theart adversarial attacks, such as FGSM and PGD, for the task of unpaired facial as well as class-specific SISR.
△ Less
Submitted 22 January, 2022;
originally announced January 2022.
-
Unsupervised Domain-Specific Deblurring using Scale-Specific Attention
Authors:
Praveen Kandula,
Rajagopalan. A. N
Abstract:
In the literature, coarse-to-fine or scale-recurrent approach i.e. progressively restoring a clean image from its low-resolution versions has been successfully employed for single image deblurring. However, a major disadvantage of existing methods is the need for paired data; i.e. sharpblur image pairs of the same scene, which is a complicated and cumbersome acquisition procedure. Additionally, du…
▽ More
In the literature, coarse-to-fine or scale-recurrent approach i.e. progressively restoring a clean image from its low-resolution versions has been successfully employed for single image deblurring. However, a major disadvantage of existing methods is the need for paired data; i.e. sharpblur image pairs of the same scene, which is a complicated and cumbersome acquisition procedure. Additionally, due to strong supervision on loss functions, pre-trained models of such networks are strongly biased towards the blur experienced during training and tend to give sub-optimal performance when confronted by new blur kernels during inference time. To address the above issues, we propose unsupervised domain-specific deblurring using a scale-adaptive attention module (SAAM). Our network does not require supervised pairs for training, and the deblurring mechanism is primarily guided by adversarial loss, thus making our network suitable for a distribution of blur functions. Given a blurred input image, different resolutions of the same image are used in our model during training and SAAM allows for effective flow of information across the resolutions. For network training at a specific scale, SAAM attends to lower scale features as a function of the current scale. Different ablation studies show that our coarse-to-fine mechanism outperforms end-to-end unsupervised models and SAAM is able to attend better compared to attention models used in literature. Qualitative and quantitative comparisons (on no-reference metrics) show that our method outperforms prior unsupervised methods.
△ Less
Submitted 12 December, 2021;
originally announced December 2021.
-
CLAUSEREC: A Clause Recommendation Framework for AI-aided Contract Authoring
Authors:
Vinay Aggarwal,
Aparna Garimella,
Balaji Vasan Srinivasan,
Anandhavelu N,
Rajiv Jain
Abstract:
Contracts are a common type of legal document that frequent in several day-to-day business workflows. However, there has been very limited NLP research in processing such documents, and even lesser in generating them. These contracts are made up of clauses, and the unique nature of these clauses calls for specific methods to understand and generate such documents. In this paper, we introduce the t…
▽ More
Contracts are a common type of legal document that frequent in several day-to-day business workflows. However, there has been very limited NLP research in processing such documents, and even lesser in generating them. These contracts are made up of clauses, and the unique nature of these clauses calls for specific methods to understand and generate such documents. In this paper, we introduce the task of clause recommendation, asa first step to aid and accelerate the author-ing of contract documents. We propose a two-staged pipeline to first predict if a specific clause type is relevant to be added in a contract, and then recommend the top clauses for the given type based on the contract context. We pretrain BERT on an existing library of clauses with two additional tasks and use it for our prediction and recommendation. We experiment with classification methods and similarity-based heuristics for clause relevance prediction, and generation-based methods for clause recommendation, and evaluate the results from various methods on several clause types. We provide analyses on the results, and further outline the advantages and limitations of the various methods for this line of research.
△ Less
Submitted 26 October, 2021;
originally announced October 2021.
-
Multilingual Audio-Visual Smartphone Dataset And Evaluation
Authors:
Hareesh Mandalapu,
Aravinda Reddy P N,
Raghavendra Ramachandra,
K Sreenivasa Rao,
Pabitra Mitra,
S R Mahadeva Prasanna,
Christoph Busch
Abstract:
Smartphones have been employed with biometric-based verification systems to provide security in highly sensitive applications. Audio-visual biometrics are getting popular due to their usability, and also it will be challenging to spoof because of their multimodal nature. In this work, we present an audio-visual smartphone dataset captured in five different recent smartphones. This new dataset cont…
▽ More
Smartphones have been employed with biometric-based verification systems to provide security in highly sensitive applications. Audio-visual biometrics are getting popular due to their usability, and also it will be challenging to spoof because of their multimodal nature. In this work, we present an audio-visual smartphone dataset captured in five different recent smartphones. This new dataset contains 103 subjects captured in three different sessions considering the different real-world scenarios. Three different languages are acquired in this dataset to include the problem of language dependency of the speaker recognition systems. These unique characteristics of this dataset will pave the way to implement novel state-of-the-art unimodal or audio-visual speaker recognition systems. We also report the performance of the bench-marked biometric verification systems on our dataset. The robustness of biometric algorithms is evaluated towards multiple dependencies like signal noise, device, language and presentation attacks like replay and synthesized signals with extensive experiments. The obtained results raised many concerns about the generalization properties of state-of-the-art biometrics methods in smartphones.
△ Less
Submitted 15 November, 2021; v1 submitted 9 September, 2021;
originally announced September 2021.
-
An Approach Towards Physics Informed Lung Ultrasound Image Scoring Neural Network for Diagnostic Assistance in COVID-19
Authors:
Mahesh Raveendranatha Panicker,
Yale Tung Chen,
Gayathri M,
Madhavanunni A N,
Kiran Vishnu Narayan,
C Kesavadas,
A P Vinod
Abstract:
Ultrasound is fast becoming an inevitable diagnostic tool for regular and continuous monitoring of the lung with the recent outbreak of COVID-19. In this work, a novel approach is presented to extract acoustic propagation-based features to automatically highlight the region below pleura, which is an important landmark in lung ultrasound (LUS). Subsequently, a multichannel input formed by using the…
▽ More
Ultrasound is fast becoming an inevitable diagnostic tool for regular and continuous monitoring of the lung with the recent outbreak of COVID-19. In this work, a novel approach is presented to extract acoustic propagation-based features to automatically highlight the region below pleura, which is an important landmark in lung ultrasound (LUS). Subsequently, a multichannel input formed by using the acoustic physics-based feature maps is fused to train a neural network, referred to as LUSNet, to classify the LUS images into five classes of varying severity of lung infection to track the progression of COVID-19. In order to ensure that the proposed approach is agnostic to the type of acquisition, the LUSNet, which consists of a U-net architecture is trained in an unsupervised manner with the acoustic feature maps to ensure that the encoder-decoder architecture is learning features in the pleural region of interest. A novel combination of the U-net output and the U-net encoder output is employed for the classification of severity of infection in the lung. A detailed analysis of the proposed approach on LUS images over the infection to full recovery period of ten confirmed COVID-19 subjects shows an average five-fold cross-validation accuracy, sensitivity, and specificity of 97%, 93%, and 98% respectively over 5000 frames of COVID-19 videos. The analysis also shows that, when the input dataset is limited and diverse as in the case of COVID-19 pandemic, an aided effort of combining acoustic propagation-based features along with the gray scale images, as proposed in this work, improves the performance of the neural network significantly and also aids the labelling and triaging process.
△ Less
Submitted 13 June, 2021;
originally announced June 2021.
-
Model Based Control of Commercial-Off-TheShelf (COTS) Unmanned Rotorcraft for BrickWall Construction
Authors:
Nithya Sridhar,
Sai Abhinay. N,
Chaithanya Krishna. B,
Shubhankar Shobhit,
Kaushik Das,
Debasish Ghose
Abstract:
This work proposes a systematic framework for modelling and controller design of a Commercial-Off-The Shelf (COTS) unmanned rotorcraft using control theory and principles, for brick wall construction. With point to point navigation as the primary application, command velocities in the three axes of the Unmanned Aerial Vehicle (UAV) are considered as inputs of the system while its actual velocities…
▽ More
This work proposes a systematic framework for modelling and controller design of a Commercial-Off-The Shelf (COTS) unmanned rotorcraft using control theory and principles, for brick wall construction. With point to point navigation as the primary application, command velocities in the three axes of the Unmanned Aerial Vehicle (UAV) are considered as inputs of the system while its actual velocities are system outputs. Using the sine and step response data acquired from a Hardware-in-Loop (HiL) test simulator, the considered system was modelled in individual axes with the help of the proposed framework. This model was employed for controller design where a sliding mode controller was chosen to satisfy certain requirements of the application like robustness, flexibility and accuracy. The model was validated using step response data and produced a deviation of only 9%. Finally, the controller results from field test showed fine control up to 8 cms accuracy. Sliding Mode Control (SMC) was also compared with a linear controller derived from iterative experimentations and seen to perform better than the latter in terms of accuracy, and robustness to parametric variations and wind disturbances.
△ Less
Submitted 23 March, 2021;
originally announced March 2021.
-
Super-Resolution of Real-World Faces
Authors:
Saurabh Goswami,
Aakanksha,
Rajagopalan A. N
Abstract:
Real low-resolution (LR) face images contain degradations which are too varied and complex to be captured by known downsampling kernels and signal-independent noises. So, in order to successfully super-resolve real faces, a method needs to be robust to a wide range of noise, blur, compression artifacts etc. Some of the recent works attempt to model these degradations from a dataset of real images…
▽ More
Real low-resolution (LR) face images contain degradations which are too varied and complex to be captured by known downsampling kernels and signal-independent noises. So, in order to successfully super-resolve real faces, a method needs to be robust to a wide range of noise, blur, compression artifacts etc. Some of the recent works attempt to model these degradations from a dataset of real images using a Generative Adversarial Network (GAN). They generate synthetically degraded LR images and use them with corresponding real high-resolution(HR) image to train a super-resolution (SR) network using a combination of a pixel-wise loss and an adversarial loss. In this paper, we propose a two module super-resolution network where the feature extractor module extracts robust features from the LR image, and the SR module generates an HR estimate using only these robust features. We train a degradation GAN to convert bicubically downsampled clean images to real degraded images, and interpolate between the obtained degraded LR image and its clean LR counterpart. This interpolated LR image is then used along with it's corresponding HR counterpart to train the super-resolution network from end to end. Entropy Regularized Wasserstein Divergence is used to force the encoded features learnt from the clean and degraded images to closely resemble those extracted from the interpolated image to ensure robustness.
△ Less
Submitted 7 February, 2022; v1 submitted 4 November, 2020;
originally announced November 2020.
-
Development of Automatic Speech Recognition for Kazakh Language using Transfer Learning
Authors:
Amirgaliyev E. N.,
Kuanyshbay D. N.,
Baimuratov O
Abstract:
Development of Automatic Speech Recognition system for Kazakh language is very challenging due to a lack of data.Existing data of kazakh speech with its corresponding transcriptions are heavily accessed and not enough to gain a worth mentioning results.For this reason, speech recognition of Kazakh language has not been explored well.There are only few works that investigate this area with traditio…
▽ More
Development of Automatic Speech Recognition system for Kazakh language is very challenging due to a lack of data.Existing data of kazakh speech with its corresponding transcriptions are heavily accessed and not enough to gain a worth mentioning results.For this reason, speech recognition of Kazakh language has not been explored well.There are only few works that investigate this area with traditional methods Hidden Markov Model, Gaussian Mixture Model, but they are suffering from poor outcome and lack of enough data.In our work we suggest a new method that takes pre-trained model of Russian language and applies its knowledge as a starting point to our neural network structure, which means that we are transferring the weights of pre-trained model to our neural network.The main reason we chose Russian model is that pronunciation of kazakh and russian languages are quite similar because they share 78 percent letters and there are quite large corpus of russian speech dataset. We have collected a dataset of Kazakh speech with transcriptions in the base of Suleyman Demirel University with 50 native speakers each having around 400 sentences.Data have been chosen from famous Kazakh books.
We have considered 4 different scenarios in our experiment. First, we trained our neural network without using a pre-trained Russian model with 2 LSTM layers and 2 BiLSTM .Second, we have trained the same 2 LSTM layered and 2 BiLSTM layered using a pre-trained model. As a result, we have improved our models training cost and Label Error Rate by using external Russian speech recognition model up to 24 percent and 32 percent respectively.Pre-trained Russian language model has trained on 100 hours of data with the same neural network architecture.
△ Less
Submitted 8 March, 2020;
originally announced March 2020.
-
Formal Synthesis of Monitoring and Detection Systems for Secure CPS Implementations
Authors:
Ipsita Koley,
Saurav Kumar Ghosh,
Soumyajit Dey,
Debdeep Mukhopadhyay,
Amogh Kashyap K N,
Sachin Kumar Singh,
Lavanya Lokesh,
Jithin Nalu Purakkal,
Nishant Sinha
Abstract:
We consider the problem of securing a given control loop implementation of a cyber-physical system (CPS) in the presence of Man-in-the-Middle attacks on data exchange between plant and controller over a compromised network. To this end, there exist various detection schemes that provide mathematical guarantees against such attacks for the theoretical control model. However, such guarantees may not…
▽ More
We consider the problem of securing a given control loop implementation of a cyber-physical system (CPS) in the presence of Man-in-the-Middle attacks on data exchange between plant and controller over a compromised network. To this end, there exist various detection schemes that provide mathematical guarantees against such attacks for the theoretical control model. However, such guarantees may not hold for the actual control software implementation. In this article, we propose a formal approach towards synthesizing attack detectors with varying thresholds which can prevent performance degrading stealthy attacks while minimizing false alarms.
△ Less
Submitted 27 February, 2020;
originally announced February 2020.
-
Analyzing Perception-Distortion Tradeoff using Enhanced Perceptual Super-resolution Network
Authors:
Subeesh Vasu,
Nimisha Thekke Madam,
Rajagopalan A. N
Abstract:
Convolutional neural network (CNN) based methods have recently achieved great success for image super-resolution (SR). However, most deep CNN based SR models attempt to improve distortion measures (e.g. PSNR, SSIM, IFC, VIF) while resulting in poor quantified perceptual quality (e.g. human opinion score, no-reference quality measures such as NIQE). Few works have attempted to improve the perceptua…
▽ More
Convolutional neural network (CNN) based methods have recently achieved great success for image super-resolution (SR). However, most deep CNN based SR models attempt to improve distortion measures (e.g. PSNR, SSIM, IFC, VIF) while resulting in poor quantified perceptual quality (e.g. human opinion score, no-reference quality measures such as NIQE). Few works have attempted to improve the perceptual quality at the cost of performance reduction in distortion measures. A very recent study has revealed that distortion and perceptual quality are at odds with each other and there is always a trade-off between the two. Often the restoration algorithms that are superior in terms of perceptual quality, are inferior in terms of distortion measures. Our work attempts to analyze the trade-off between distortion and perceptual quality for the problem of single image SR. To this end, we use the well-known SR architecture-enhanced deep super-resolution (EDSR) network and show that it can be adapted to achieve better perceptual quality for a specific range of the distortion measure. While the original network of EDSR was trained to minimize the error defined based on per-pixel accuracy alone, we train our network using a generative adversarial network framework with EDSR as the generator module. Our proposed network, called enhanced perceptual super-resolution network (EPSR), is trained with a combination of mean squared error loss, perceptual loss, and adversarial loss. Our experiments reveal that EPSR achieves the state-of-the-art trade-off between distortion and perceptual quality while the existing methods perform well in either of these measures alone.
△ Less
Submitted 4 November, 2018; v1 submitted 1 November, 2018;
originally announced November 2018.
-
DSRS: Estimation and Forecasting of Journal Influence in the Science and Technology Domain via a Lightweight Quantitative Approach
Authors:
Snehanshu Saha,
Neelam Jangid,
Archana Mathur,
Anand M N
Abstract:
The evaluation of journals based on their influence is of interest for numerous reasons. Various methods of computing a score have been proposed for measuring the scientific influence of scholarly journals. Typically the computation of any of these scores involves compiling the citation information pertaining to the journal under consideration. This involves significant overhead since the article…
▽ More
The evaluation of journals based on their influence is of interest for numerous reasons. Various methods of computing a score have been proposed for measuring the scientific influence of scholarly journals. Typically the computation of any of these scores involves compiling the citation information pertaining to the journal under consideration. This involves significant overhead since the article citation information of not only the journal under consideration but also that of other journals for the recent few years need to be stored. Our work is motivated by the idea of developing a computationally lightweight approach that does not require any data storage, yet yields a score which is useful for measuring the importance of journals. In this paper, a regression analysis based method is proposed to calculate Journal Influence Score. Proposed model is validated using historical data from the SCImago portal. The results show that the error is small between rankings obtained using the proposed method and the SCImago Journal Rank, thus proving that the proposed approach is a feasible and effective method of calculating scientific impact of journals.
△ Less
Submitted 9 April, 2016;
originally announced April 2016.
-
Periodicity Detection of Outlier Sequences Using Constraint Based Pattern Tree with MAD
Authors:
Archana N.,
S. S. Pawar
Abstract:
Patterns that appear rarely or unusually in the data can be defined as outlier patterns. The basic idea behind detecting outlier patterns is comparison of their relative frequencies with frequent patterns. Their frequencies of appearance are less and thus have lesser support in the data. Detecting outlier patterns is an important data mining task which will reveal some interesting facts. The searc…
▽ More
Patterns that appear rarely or unusually in the data can be defined as outlier patterns. The basic idea behind detecting outlier patterns is comparison of their relative frequencies with frequent patterns. Their frequencies of appearance are less and thus have lesser support in the data. Detecting outlier patterns is an important data mining task which will reveal some interesting facts. The search for periodicity of patterns gives the behavior of these patterns across time as to when they repeat likely. This in turn helps in prediction of events. These patterns are found in Time series-data, social networks etc. In this paper, an algorithm for periodic outlier pattern detection is proposed with the usage of a Constraint Based FP (Frequent Pattern)-tree as the underlying data structure for time series data. The growth of the tree is limited by using level and monotonic constraints. The protein sequence of bacteria named E.Coli is collected and periodic outlier patterns in the sequence are identified. Further the enhancement of results is obtained by finding the Median Absolute Deviation (MAD) in defining candidate outlier patterns. The comparative results between STNR-out (Suffix Tree Noise Resilient for Outlier Detection) and proposed algorithm are illustrated. The results show the effectiveness and applicability of the proposed algorithm.
△ Less
Submitted 7 July, 2015;
originally announced July 2015.
-
Radix-2 Fast Hartley Transform Revisited
Authors:
H. M. de Oliveira,
V. L. Sousa,
H. A. N.,
R. M. Campello de Souza
Abstract:
A Fast algorithm for the Discrete Hartley Transform (DHT) is presented, which resembles radix-2 fast Fourier Transform (FFT). Although fast DHTs are already known, this new approach bring some light about the deep relationship between fast DHT algorithms and a multiplication-free fast algorithm for the Hadamard Transform.
A Fast algorithm for the Discrete Hartley Transform (DHT) is presented, which resembles radix-2 fast Fourier Transform (FFT). Although fast DHTs are already known, this new approach bring some light about the deep relationship between fast DHT algorithms and a multiplication-free fast algorithm for the Hadamard Transform.
△ Less
Submitted 12 March, 2015;
originally announced March 2015.
-
Critical Database Size for Effective Caching
Authors:
Ajaykrishnan N.,
Navya S. Prem,
Vinod M. Prabhakaran,
Rahul Vaze
Abstract:
Replicating or caching popular content in memories distributed across the network is a technique to reduce peak network loads. Conventionally, the performance gain of caching was thought to result from making part of the requested data available closer to end users. Recently, it has been shown that by using a carefully designed technique to store the contents in the cache and coding across data st…
▽ More
Replicating or caching popular content in memories distributed across the network is a technique to reduce peak network loads. Conventionally, the performance gain of caching was thought to result from making part of the requested data available closer to end users. Recently, it has been shown that by using a carefully designed technique to store the contents in the cache and coding across data streams a much more significant gain can be achieved in reducing the network load. Inner and outer bounds on the network load v/s cache memory tradeoff were obtained in (Maddah-Ali and Niesen, 2012). We give an improved outer bound on the network load v/s cache memory tradeoff. We address the question of to what extent caching is effective in reducing the server load when the number of files becomes large as compared to the number of users. We show that the effectiveness of caching become small when the number of files becomes comparable to the square of the number of users.
△ Less
Submitted 12 January, 2015;
originally announced January 2015.
-
Zero Energy Network stack for Energy Harvested WSNs
Authors:
Akshay Uttama Nambi S. N.,
Prabhakar T. V,
R Venkatesha Prasad,
Jamadagni H. S
Abstract:
We present our ``Zero Energy Network'' (ZEN) protocol stack for energy harvesting wireless sensor networks applications. The novelty in our work is $4$ fold: (1) Energy harvesting aware fully featured MAC layer. Carrier sensing, Backoff algorithms, ARQ, RTS/CTS mechanisms, Adaptive Duty Cycling are either auto configurable or available as tunable parameters to match the available energy (b) Energy…
▽ More
We present our ``Zero Energy Network'' (ZEN) protocol stack for energy harvesting wireless sensor networks applications. The novelty in our work is $4$ fold: (1) Energy harvesting aware fully featured MAC layer. Carrier sensing, Backoff algorithms, ARQ, RTS/CTS mechanisms, Adaptive Duty Cycling are either auto configurable or available as tunable parameters to match the available energy (b) Energy harvesting aware Routing Protocol. The multi-hop network establishes routes to the base station using a modified version of AODVjr routing protocol assisted by energy predictions. (c) Application of a time series called ``Holt-Winters'' for predicting the incoming energy. (d) A distributed smart application running over the ZEN stack which utilizes a multi parameter optimized perturbation technique to optimally use the available energy. The application is capable of programming the ZEN stack in an energy efficient manner. The energy harvested distributed smart application runs on a realistic solar energy trace with a three year seasonality database. We implement a smart application, capable of modifying itself to suit its own as well as the network's energy level. Our analytical results show a close match with the measurements conducted over EHWSN testbed.
△ Less
Submitted 29 April, 2014;
originally announced April 2014.
-
Region and Location Based Indexing and Retrieval of MR-T2 Brain Tumor Images
Authors:
Krishna A N,
B G Prasad
Abstract:
In this paper, region based and location based retrieval systems have been implemented for retrieval of MR-T2 axial 2-D brain images. This is done by extracting and characterizing the tumor portion of 2-D brain slices by use of a suitable threshold computed over the entire image. Indexing and retrieval is then performed by computing texture features based on gray-tone spatial-dependence matrix of…
▽ More
In this paper, region based and location based retrieval systems have been implemented for retrieval of MR-T2 axial 2-D brain images. This is done by extracting and characterizing the tumor portion of 2-D brain slices by use of a suitable threshold computed over the entire image. Indexing and retrieval is then performed by computing texture features based on gray-tone spatial-dependence matrix of segmented regions. A Hash structure is used to index all images. A combined index is adopted to point to all similar images in terms of the texture features. At query time, only those images that are in the same hash bucket as those of the queried image are compared for similarity, thus reducing the search space and time.
△ Less
Submitted 7 December, 2013;
originally announced December 2013.