Search Results for author: Rajesh Kumar

Found 26 papers, 5 papers with code

An Adaptive feature mode decomposition based on a novel health indicator for bearing fault diagnosis

no code implementations19 Mar 2024 Sumika Chauhan, Govind Vashishtha, Rajesh Kumar, Radoslaw Zimroz, Pradeep Kundu

Initially, the artificial hummingbird algorithm (AHA) is used to make the feature mode decomposition (FMD) adaptive by optimizing its parameter based on a newly developed health indicator (HI) i. e. sparsity impact measure index (SIMI).

Can LLMs Compute with Reasons?

no code implementations19 Feb 2024 Harshit Sandilya, Peehu Raj, Jainit Sushil Bafna, Srija Mukhopadhyay, Shivansh Sharma, Ellwil Sharma, Arastu Sharma, Neeta Trivedi, Manish Shrivastava, Rajesh Kumar

Large language models (LLMs) often struggle with complex mathematical tasks, prone to "hallucinating" incorrect answers due to their reliance on statistical patterns.

Language Modelling

Dictionary Attack on IMU-based Gait Authentication

1 code implementation21 Sep 2023 Rajesh Kumar, Can Isik, Chilukuri K. Mohan

We present a novel adversarial model for authentication systems that use gait patterns recorded by the inertial measurement unit (IMU) built into smartphones.

Quantitative analysis of collagen remodeling in pancreatic lesions using computationally translated collagen images derived from brightfield microscopy images

no code implementations25 Apr 2023 Varun Nair, Gavish Uppal, Saurav Bharadwaj, Ruchi Sinha, Manjit Kaur, Rajesh Kumar, .

However, a technical approach that can perform a quantitative analysis of fibrillar collagen directly on standard slides stained with H&E can (i) discard the need for specialized and costly equipment or labels, (ii) further supplement the conventional histopathological insights and, (iii) potentially be integrated within the framework of standard histopathology workflow.

Image Generation

Synthesizing Human Gaze Feedback for Improved NLP Performance

no code implementations11 Feb 2023 Varun Khurana, Yaman Kumar Singla, Nora Hollenstein, Rajesh Kumar, Balaji Krishnamurthy

Feedback can be either explicit (e. g. ranking used in training language models) or implicit (e. g. using human cognitive signals in the form of eyetracking).

iCTGAN--An Attack Mitigation Technique for Random-vector Attack on Accelerometer-based Gait Authentication Systems

no code implementations2 Oct 2022 Jun Hyung Mo, Rajesh Kumar

A recent study showed that commonly (vanilla) studied implementations of accelerometer-based gait authentication systems ($v$ABGait) are susceptible to random-vector attack.

Generative Adversarial Network

Sparse Image based Navigation Architecture to Mitigate the need of precise Localization in Mobile Robots

no code implementations29 Mar 2022 Pranay Mathur, Rajesh Kumar, Sarthak Upadhyay

Traditional simultaneous localization and mapping (SLAM) methods focus on improvement in the robot's localization under environment and sensor uncertainty.

Autonomous Navigation Navigate +1

Attention-based Estimation and Prediction of Human Intent to augment Haptic Glove aided Control of Robotic Hand

no code implementations15 Oct 2021 Muneeb Ahmed, Rajesh Kumar, Qaim Abbas, Brejesh lall, Arzad A. Kherani, Sudipto Mukherjee

The test-MSE in prediction of human intent is reported to yield ~ 97. 3 -98. 7% improvement of accuracy in comparison to LSTM-based benchmark

Defending Touch-based Continuous Authentication Systems from Active Adversaries Using Generative Adversarial Networks

1 code implementation15 Jun 2021 Mohit Agrawal, Pragyan Mehrotra, Rajesh Kumar, Rajiv Ratn Shah

Previous studies have demonstrated that commonly studied (vanilla) touch-based continuous authentication systems (V-TCAS) are susceptible to population attack.

Generative Adversarial Network

Communication is the universal solvent: atreya bot -- an interactive bot for chemical scientists

no code implementations14 Jun 2021 Mahak Sharma, Abhishek Kaushik, Rajesh Kumar, Sushant Kumar Rai, Harshada Hanumant Desai, Sargam Yadav

In this paper, we introduce "Atreya", an interactive bot for chemistry enthusiasts, researchers, and students to study the ChEMBL database.

Blockchain based Privacy-Preserved Federated Learning for Medical Images: A Case Study of COVID-19 CT Scans

no code implementations22 Apr 2021 Rajesh Kumar, Wenyong Wang, Cheng Yuan, Jay Kumar, Zakria, He Qing, Ting Yang, Abdullah Aman Khan

To solve this challenging task, we propose a blockchain-based federated learning framework that provides collaborative data training solutions by coordinating multiple hospitals to train and share encrypted federated models without leakage of data privacy.

Federated Learning

Collective Intelligence: Decentralized Learning for Android Malware Detection in IoT with Blockchain

no code implementations26 Feb 2021 Rajesh Kumar, Wenyong Wang, Jay Kumar, Zakria, Ting Yang, Waqar Ali

Specifically for malware detection task, (i) we propose a novel user (local) neural network (LNN) which trains on local distribution and (ii) then to assure the model authenticity and quality, we propose a novel smart contract which enable aggregation process over blokchain platform.

Android Malware Detection Malware Detection

Trends in Vehicle Re-identification Past, Present, and Future: A Comprehensive Review

no code implementations19 Feb 2021 Zakria, Jianhua Deng, Muhammad Saddam Khokhar, Muhammad Umar Aftab, Jingye Cai, Rajesh Kumar, Jay Kumar

Vehicle Re-identification (re-id) over surveillance camera network with non-overlapping field of view is an exciting and challenging task in intelligent transportation systems (ITS).

Vehicle Re-Identification

A note on synthesizing geodesic based contact curves

no code implementations29 Jan 2021 Rajesh Kumar, Sudipto Mukherjee

The paper focuses on synthesizing optimal contact curves that can be used to ensure a rolling constraint between two bodies in relative motion.

Robotics

Treadmill Assisted Gait Spoofing (TAGS): An Emerging Threat to wearable Sensor-based Gait Authentication

no code implementations17 Dec 2020 Rajesh Kumar, Can Isik, Vir V Phoha

We consider more realistic implementation and deployment scenarios than the previous study, which focused only on the accelerometer sensor and a fixed set of features.

Touchless Typing using Head Movement-based Gestures

1 code implementation24 Jan 2020 Shivam Rustagi, Aakash Garg, Pranay Raj Anand, Rajesh Kumar, Yaman Kumar, Rajiv Ratn Shah

The modified GRU-based model outperforms the standard CNN-RNN and Conv3D models for three of the four scenarios.

Human-Computer Interaction I.2.7

Identification of Internal Faults in Indirect Symmetrical Phase Shift Transformers Using Ensemble Learning

no code implementations12 Nov 2018 Pallav Kumar Bera, Rajesh Kumar, Can Isik

This paper proposes methods to identify 40 different types of internal faults in an Indirect Symmetrical Phase Shift Transformer (ISPST).

Ensemble Learning

Continuous Authentication Using One-class Classifiers and their Fusion

no code implementations30 Oct 2017 Rajesh Kumar, Partha Pratim Kundu, Vir V. Phoha

While developing continuous authentication systems (CAS), we generally assume that samples from both genuine and impostor classes are readily available.

Authenticating users through their arm movement patterns

no code implementations7 Mar 2016 Rajesh Kumar, Vir V. Phoha, Rahul Raina

The DFAR and DFRR increased from 5. 68% and 4. 23% to 15. 03% and 14. 62% respectively when feature level fusion-based design with classifier k-NN was tested under the inter-phase environment on a dataset of 12 users.

Cannot find the paper you are looking for? You can Submit a new open access paper.