Export Citations
Publication Archive
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-article
A new space transformed finite element method for elliptic interface problems in R n
Journal of Computational and Applied Mathematics (JCAM), Volume 457, Issue Chttps://doi.org/10.1016/j.cam.2024.116277AbstractInterface problems, where distinct materials or physical domains meet, pose significant challenges in numerical simulations due to the discontinuities and sharp gradients across interfaces. Traditional finite element methods struggle to capture ...
- research-article
Properties of interconnected negative imaginary systems and extension to formation‐containment control of networked multi‐UAV systems with experimental validation results
Asian Journal of Control (ASJC), Volume 27, Issue 1Pages 99–116https://doi.org/10.1002/asjc.3258AbstractThis paper extends the properties of a positive feedback interconnection of two negative imaginary (NI) systems to multi‐agent NI systems and proposes a new formation‐containment control methodology relying on the characteristic loci technique. ...
- research-article
Distilling Knowledge in Machine Translation of Agglutinative Languages with Backward and Morphological Decoders
ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP), Volume 24, Issue 1Article No.: 1, Pages 1–19https://doi.org/10.1145/3703455Agglutinative languages often have morphologically complex words (MCWs) composed of multiple morphemes arranged in a hierarchical structure, posing significant challenges in translation tasks. We present a novel Knowledge Distillation approach tailored ...
- research-article
SHIELD: Security-Aware Scheduling for Real-Time DAGs on Heterogeneous Systems
ACM Transactions on Cyber-Physical Systems (TCPS), Volume 9, Issue 1Article No.: 2, Pages 1–29https://doi.org/10.1145/3702236Many control applications in real-time cyber-physical systems are represented as Directed Acyclic Graphs (DAGs) due to complex interactions among their functional components, and executed on distributed heterogeneous platforms. Data communication between ...
- research-article
LiteHash: Hash Functions for Resource-Constrained Hardware
ACM Transactions on Embedded Computing Systems (TECS), Volume 24, Issue 2Article No.: 28, Pages 1–17https://doi.org/10.1145/3677181The global paradigm shift toward edge computing has led to a growing demand for efficient integrity verification. Hash functions are one-way algorithms which act as a zero-knowledge proof of a datum’s contents. However, it is infeasible to compute hashes ...
- research-article
Fixed‐Time State Observer‐Based Robust Adaptive Neural Fault‐Tolerant Control for a Quadrotor Unmanned Aerial Vehicle
International Journal of Adaptive Control and Signal Processing (ACSP), Volume 39, Issue 1Pages 132–151https://doi.org/10.1002/acs.3925ABSTRACTThis paper presents a fixed‐time state observer‐based robust adaptive neural fault‐tolerant control (RANFTC) for attitude and altitude tracking and control of quadrotor unmanned aerial vehicles (UAVs), considering multiple actuator faults, ...
This article presents a fixed‐time state observer‐based robust adaptive neural fault‐tolerant control for attitude and altitude tracking and control of quadrotor unmanned aerial vehicles, addressing multiple actuator faults, model uncertainty, and unknown ...
- research-article
Black Hole Search in Dynamic Graphs
ICDCN '25: Proceedings of the 26th International Conference on Distributed Computing and NetworkingPages 221–230https://doi.org/10.1145/3700838.3700869A black hole is considered to be a dangerous node present in a graph that disposes of any resources that enter that node. Therefore, it is essential to find such a node in the graph. Let a group of agents be present on a graph G. The Black Hole Search (...
- rapid-communication
Dispersion problem on a convex polygon
Information Processing Letters (IPRL), Volume 187, Issue Chttps://doi.org/10.1016/j.ipl.2024.106498AbstractGiven a set P = { p 1 , p 2 , … , p n } of n points in R 2 and a positive integer k ( ≤ n ), we wish to find a subset S of P of size k such that the cost of a subset S, c o s t ( S ) = min { d ( p , q ) | p , q ∈ S }, is maximized, where d ( p ,...
Highlights
- The paper studies the dispersion problem on convex polygon.
- A greedy approximation algorithm is proposed which gives 1.733 factor result.
- Furthermore, an O(n3) time algorithm is proposed where the objective is to select 4 points ...
- erratum
Corrigendum to “Singular graphs and the reciprocal eigenvalue property” [Discrete Math. 347 (2024) 114003]
Discrete Mathematics (DMAT), Volume 348, Issue 1https://doi.org/10.1016/j.disc.2024.114198AbstractWe correct an error in Theorem 13 in our published article Barik et al. [1].
- research-article
Deep multi-task learning based detection of correlated mental disorders using audio modality
Computer Speech and Language (CSPL), Volume 89, Issue Chttps://doi.org/10.1016/j.csl.2024.101710AbstractThe existence of correlation among mental disorders is a well-known phenomenon. Multi-task learning (MTL) has been reported to yield enhanced detection performance of a targeted mental disorder by leveraging its correlation with other related ...
Highlights- Correlation among mental disorders can be leveraged to enhance their detection.
- MDD and PTSD detection performances are improved by leveraging the correlations.
- An ensemble of weighting schemes for combining training losses is more ...
- research-article
A weak Galerkin finite element method for fourth-order parabolic singularly perturbed problems on layer adapted Shishkin mesh
Applied Numerical Mathematics (APNM), Volume 207, Issue CPages 520–533https://doi.org/10.1016/j.apnum.2024.09.019AbstractIn this paper, we propose a weak Galerkin finite element approximation for a class of fourth-order singularly perturbed parabolic problems. The problem exhibits boundary layers and so we have considered layer adapted triangulations, in particular ...
- research-article
A parameter-uniform hybrid method for singularly perturbed parabolic 2D convection-diffusion-reaction problems
Applied Numerical Mathematics (APNM), Volume 207, Issue CPages 111–135https://doi.org/10.1016/j.apnum.2024.08.026AbstractThe solution of the singular perturbation problems (SPP) of convection-diffusion-reaction type may exhibit regular and corner layers in a rectangular domain. In this work, we construct and analyze a parameter-uniform operator-splitting ...
- research-article
Contextual Self-Attention Based UNet Architecture for Fluid Segmentation in Retinal OCT B-scans
ICVGIP '24: Proceedings of the Fifteenth Indian Conference on Computer Vision Graphics and Image ProcessingArticle No.: 41, Pages 1–8https://doi.org/10.1145/3702250.3702291Retinal edema caused by fluid buildups has links to vision threatening retinal diseases. Presently, spectral-domain optical coherence tomography (SD-OCT) is the imaging method of choice for evaluating retinal health and tracking treatment progress. ...
- research-article
Med-SeAM: Medical Context Aware Self-Supervised Learning Framework for Anomaly Classification in Knee MRI
ICVGIP '24: Proceedings of the Fifteenth Indian Conference on Computer Vision Graphics and Image ProcessingArticle No.: 26, Pages 1–8https://doi.org/10.1145/3702250.3702276In deep learning-based medical applications involving musculoskeletal image classification, obtaining high-quality and expert-level annotations of Magnetic Resonance Imaging (MRI) slices has been a significant challenge. This problem is magnified while ...
- research-article
IDA-UIE: An Iterative Framework for Deep Network based Degradation Aware Underwater Image Enhancement
ICVGIP '24: Proceedings of the Fifteenth Indian Conference on Computer Vision Graphics and Image ProcessingArticle No.: 2, Pages 1–9https://doi.org/10.1145/3702250.3702252Underwater image quality is often compromised due to factors like fluorescence, low illumination, absorption, and scattering. Recent advancements in underwater image enhancement have introduced various deep network architectures to address these issues. ...
- research-article
Minimum length word-representants of graph products
Discrete Applied Mathematics (DAMA), Volume 358, Issue CPages 91–104https://doi.org/10.1016/j.dam.2024.07.002AbstractA graph G = ( V , E ) is said to be word-representable if a word w can be formed using the letters of the alphabet V such that for every pair of vertices x and y, x ≠ y, x y ∈ E if and only if x and y alternate in w. Gaetz and Ji have recently ...
- Article
Attacks and Countermeasures for Digital Microfluidic Biochips: Extended Abstract
- Navajit Singh Baban,
- Prithwish Basu Roy,
- Pauline John,
- Azhar Zam,
- Sukanta Bhattacharjee,
- Yong-Ak Song,
- Ramesh Karri,
- Krishnendu Chakrabarty
Security, Privacy, and Applied Cryptography EngineeringPages 1–5https://doi.org/10.1007/978-3-031-80408-3_1AbstractDigital Microfluidic Biochips (DMFBs) precisely control droplets on an electrode array, making them vital for healthcare. However, they are vulnerable to numerous security threats, including structural modifications during the design phase, ...
- short-paper
Using Isoefficiency as a Metric to Assess Disaggregated Memory Systems for High Performance Computing
MEMSYS '24: Proceedings of the International Symposium on Memory SystemsPages 192–197https://doi.org/10.1145/3695794.3695812Memory disaggregation is an approach to decouple compute and memory to minimize the total cost of ownership. However, analytical methods to study the impact of this approach are not readily available for high performance computing use cases. In this ...
- Article
A Deep-Learning Based Real-Time License Plate Recognition System for Resource-Constrained Scenarios
Pattern RecognitionPages 226–242https://doi.org/10.1007/978-3-031-78498-9_16AbstractLicense Plate Recognition plays a pivotal role in modern traffic law enforcement, ensuring public safety and order. However, conventional surveillance systems such as CCTVs and static cameras lack real-time response capabilities and have limited ...