Skip to main content

Showing 1–9 of 9 results for author: S, S P

Searching in archive cs. Search in all archives.
.
  1. arXiv:2503.22363  [pdf, ps, other

    cs.CV cs.AI

    ForcePose: A Deep Learning Approach for Force Calculation Based on Action Recognition Using MediaPipe Pose Estimation Combined with Object Detection

    Authors: Nandakishor M, Vrinda Govind V, Anuradha Puthalath, Anzy L, Swathi P S, Aswathi R, Devaprabha A R, Varsha Raj, Midhuna Krishnan K, Akhila Anilkumar T V, Yamuna P V

    Abstract: Force estimation in human-object interactions is crucial for various fields like ergonomics, physical therapy, and sports science. Traditional methods depend on specialized equipment such as force plates and sensors, which makes accurate assessments both expensive and restricted to laboratory settings. In this paper, we introduce ForcePose, a novel deep learning framework that estimates applied fo… ▽ More

    Submitted 28 March, 2025; originally announced March 2025.

  2. arXiv:2501.00876  [pdf

    eess.IV cs.CV cs.LG

    A Novel Approach using CapsNet and Deep Belief Network for Detection and Identification of Oral Leukopenia

    Authors: Hirthik Mathesh GV, Kavin Chakravarthy M, Sentil Pandi S

    Abstract: Oral cancer constitutes a significant global health concern, resulting in 277,484 fatalities in 2023, with the highest prevalence observed in low- and middle-income nations. Facilitating automation in the detection of possibly malignant and malignant lesions in the oral cavity could result in cost-effective and early disease diagnosis. Establishing an extensive repository of meticulously annotated… ▽ More

    Submitted 1 January, 2025; originally announced January 2025.

    Comments: Accepted to IEEE International Conference on Advancement in Communication and Computing Technology (INOACC), will be held in Sai Vidya Institute of Technology, Bengaluru, Karnataka, India. (Preprint)

  3. arXiv:2306.17084  [pdf

    cs.DC cs.CR

    A Framework for Securing Health Information Using Blockchain in Cloud Hosted Cyber Physical Systems

    Authors: Aisha Banu, Sharon Priya S, Poojitha K, Kiruthiga R, Ruby Annette, Subash Chandran

    Abstract: Electronic Health Records (EHRs) have undergone numerous technical improvements in recent years, including the incorporation of mobile devices with the cloud computing technologies to facilitate medical data exchanges between patients and the healthcare professionals. This cutting-edge architecture enables cyber physical systems housed in the cloud to provide healthcare services with minimal opera… ▽ More

    Submitted 25 June, 2023; originally announced June 2023.

  4. arXiv:2305.11189  [pdf

    cs.DC cs.AI cs.HC cs.LG

    Taxonomy of AISecOps Threat Modeling for Cloud Based Medical Chatbots

    Authors: Ruby Annette J, Aisha Banu, Sharon Priya S, Subash Chandran

    Abstract: Artificial Intelligence (AI) is playing a vital role in all aspects of technology including cyber security. Application of Conversational AI like the chatbots are also becoming very popular in the medical field to provide timely and immediate medical assistance to patients in need. As medical chatbots deal with a lot of sensitive information, the security of these chatbots is crucial. To secure th… ▽ More

    Submitted 17 May, 2023; originally announced May 2023.

  5. arXiv:2002.01664  [pdf, other

    cs.CL cs.LG eess.AS

    Identification of Indian Languages using Ghost-VLAD pooling

    Authors: Krishna D N, Ankita Patil, M. S. P Raj, Sai Prasad H S, Prabhu Aashish Garapati

    Abstract: In this work, we propose a new pooling strategy for language identification by considering Indian languages. The idea is to obtain utterance level features for any variable length audio for robust language recognition. We use the GhostVLAD approach to generate an utterance level feature vector for any variable length input audio by aggregating the local frame level features across time. The genera… ▽ More

    Submitted 5 February, 2020; originally announced February 2020.

    Journal ref: REJECTED ICASSP 2020

  6. arXiv:1610.00024  [pdf, other

    cs.DC

    A Study of Revenue Cost Dynamics in Large Data Centers: A Factorial Design Approach

    Authors: Gambhire Swati Sampatrao, Sudeepa Roy Dey, Bidisha Goswami, Sai Prasanna M. S, Snehanshu Saha

    Abstract: Revenue optimization of large data centers is an open and challenging problem. The intricacy of the problem is due to the presence of too many parameters posing as costs or investment. This paper proposes a model to optimize the revenue in cloud data center and analyzes the model, revenue and different investment or cost commitments of organizations investing in data centers. The model uses the Co… ▽ More

    Submitted 30 September, 2016; originally announced October 2016.

  7. arXiv:1409.7916  [pdf

    cs.DC cs.SE

    A Survey on Deadline Constrained Workflow Scheduling Algorithms in Cloud Environment

    Authors: Nallakumar R., Sruthi Priya K. S

    Abstract: Cloud Computing is the latest blooming technology in the era of Computer Science and Information Technology domain. There is an enormous pool of data centres, which are termed as Clouds where the services and associated data are being deployed and users need a constant Internet connection to access them. One of the highlights in Cloud is the delivering of applications or services in an on-demand e… ▽ More

    Submitted 28 September, 2014; originally announced September 2014.

    Comments: 6 pages,2 figures,Published with International Journal of Computer Science Trends and Technology(IJCST)

    Journal ref: IJCST V2(5): Page(44-50) Sep 2014

  8. arXiv:1004.4444  [pdf

    cs.NI

    An Intelligent Call Admission Control Decision Mechanism for Wireless Networks

    Authors: Ramesh Babu H. S., Gowrishankar, Satyanarayana P. S

    Abstract: The Call admission control (CAC) is one of the Radio Resource Management (RRM) techniques plays instrumental role in ensuring the desired Quality of Service (QoS) to the users working on different applications which have diversified nature of QoS requirements. This paper proposes a fuzzy neural approach for call admission control in a multi class traffic based Next Generation Wireless Networks (NG… ▽ More

    Submitted 26 April, 2010; originally announced April 2010.

    Comments: Journal of Computing online at https://sites.google.com/site/journalofcomputing/

    Journal ref: Journal of Computing, Volume 2, Issue 4, April 2010

  9. arXiv:1004.3563  [pdf

    cs.NI

    A QoS Provisioning Recurrent Neural Network based Call Admission Control for beyond 3G Networks

    Authors: Ramesh Babu H. S., Gowrishankar, Satyanarayana P. S

    Abstract: The Call admission control (CAC) is one of the Radio Resource Management (RRM) techniques that plays influential role in ensuring the desired Quality of Service (QoS) to the users and applications in next generation networks. This paper proposes a fuzzy neural approach for making the call admission control decision in multi class traffic based Next Generation Wireless Networks (NGWN). The proposed… ▽ More

    Submitted 20 April, 2010; originally announced April 2010.

    Comments: International Journal of Computer Science Issues online at http://ijcsi.org/articles/A-QoS-Provisioning-Recurrent-Neural-Network-based-Call-Admission-Control-for-beyond-3G-Networks.php

    Journal ref: IJCSI, Volume 7, Issue 2, March 2010