24 results on '"P. M. Ashok Kumar"'
Search Results
2. A hybrid generative-discriminative model for abnormal event detection in surveillance video scenes.
- Author
-
P. M. Ashok Kumar, D. Kavitha, and S. Arun Kumar
- Published
- 2020
- Full Text
- View/download PDF
3. Further Results on Geometric Properties of a Family of Relative Entropies
- Author
-
M., Ashok Kumar and Sundaresan, Rajesh
- Subjects
Computer Science - Information Theory - Abstract
This paper extends some geometric properties of a one-parameter family of relative entropies. These arise as redundancies when cumulants of compressed lengths are considered instead of expected compressed lengths. These parametric relative entropies are a generalization of the Kullback-Leibler divergence. They satisfy the Pythagorean property and behave like squared distances. This property, which was known for finite alphabet spaces, is now extended for general measure spaces. Existence of projections onto convex and certain closed sets is also established. Our results may have applications in the R\'enyi entropy maximization rule of statistical physics., Comment: 7 pages, Prop. 5 modified, in Proceedings of the 2011 IEEE International Symposium on Information Theory
- Published
- 2011
4. Expression invariant face recognition based on multi-level feature fusion and transfer learning technique
- Author
-
P. M. Ashok Kumar, L. Arun Raj, K. Martin Sagayam, and N. Sree Ram
- Subjects
Computer Networks and Communications ,Hardware and Architecture ,Media Technology ,Software - Published
- 2022
- Full Text
- View/download PDF
5. Smart Vehicle Management based on Vehicular Cloud
- Author
-
G Manikanta Reddy, M Vinod Reddy, V Dinesh, C Karthikeyan, and P. M. Ashok Kumar
- Published
- 2023
- Full Text
- View/download PDF
6. A Systematic Approach towards Security Concerns in Cloud
- Author
-
Mantur Vivekvardhan Reddy, Paruchuri Sri Charan, D. Devisaran, R. Shankar, and P. M. Ashok Kumar
- Published
- 2023
- Full Text
- View/download PDF
7. Stacked Bidirectional-LSTM Network for FakeNews Detection on Twitter Data
- Author
-
Paladugula DineshBabu, M. D. V. Sampath Kumar, Boyina Vishnu Vardhan Rao, Taneem Kowsar Shaik, P. M. Ashok Kumar, and R. Shankar
- Published
- 2023
- Full Text
- View/download PDF
8. Software Defined Network Framework & Routing Protocol Based on VANET Technology
- Author
-
Pamidimukkala Lahari, Ravella Srilatha, Omkar Eswar Chejarla, Ravuri Yogesh, R Shankar, and P M Ashok Kumar
- Published
- 2023
- Full Text
- View/download PDF
9. Enhanced Facial Emotion Recognition by Optimal Descriptor Selection with Neural Network
- Author
-
K. Martin Sagayam, P. M. Ashok Kumar, and Jeevan Babu Maddala
- Subjects
Facial expression ,Artificial neural network ,Computer science ,business.industry ,020208 electrical & electronic engineering ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Scale-invariant feature transform ,020206 networking & telecommunications ,Pattern recognition ,02 engineering and technology ,Affine scale invariant feature transform ,Convolutional neural network ,Computer Science Applications ,Theoretical Computer Science ,stomatognathic diseases ,ComputingMethodologies_PATTERNRECOGNITION ,ComputerApplications_MISCELLANEOUS ,0202 electrical engineering, electronic engineering, information engineering ,Computer-aided ,Emotion recognition ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,GeneralLiterature_REFERENCE(e.g.,dictionaries,encyclopedias,glossaries) ,Selection (genetic algorithm) - Abstract
Facial Emotion Recognition (FER) is the approach of detecting emotions of humans from facial expressions. Emotions are detected automatically by the human brain and hence, many computer aided techn...
- Published
- 2021
- Full Text
- View/download PDF
10. Ultra Wide Band Multiple Input Multiple Output Antenna for Internet of Things Applications
- Author
-
K Nageswara Rao, G. Harshitha, P. M. Ashok Kumar, K. Koteswara Rao, G. Veerendra Nath, and E. Nalin
- Subjects
Computational Mathematics ,Computer science ,business.industry ,Electrical engineering ,Ultra-wideband ,General Materials Science ,General Chemistry ,Electrical and Electronic Engineering ,Antenna (radio) ,Condensed Matter Physics ,Internet of Things ,business ,Multiple input - Abstract
This paper mainly gives information about a compact 4-element multiple input multiple output (MIMO) antenna which is useful for IOT applications. Advantages of the proposed antenna is that it can be easily extendable for a large size array. The array consists of 4 elements placed at an angle of 90 degree to the adjacent element. The substrate used in the design is a low loss laminate of FR4 with dielectric constant of 4.4. Based on the results obtained the antenna covers a UWB band of 2.4 GHz–13.0 GHz and the isolations also exceed 20 dB. Return loss, radiation pattern and isolation is plotted. The simulation results show that the proposed antenna can perform well for MIMO devices. The proposed antenna is much suitable for the applications of IOT and RADAR.
- Published
- 2020
- Full Text
- View/download PDF
11. Cloud Storage Performance Improvement Using Deduplication and Compression Techniques
- Author
-
P M Ashok Kumar, E. Pugazhendhi, and Rudra Kalyan Nayak
- Published
- 2022
- Full Text
- View/download PDF
12. Cloud Data Storage Optimization by Using Novel De-Duplication Technique
- Author
-
P M Ashok Kumar, E. Pugazhendhi, and K. Vara Lakshmi
- Published
- 2022
- Full Text
- View/download PDF
13. Predicting the Post Graduate Admissions using Classification Techniques
- Author
-
Selvaprabu Jeganathan, Md. Khurshid Alam Khan, Saravanan Parthasarathy, Arun Raj Lakshminarayanan, and P. M. Ashok Kumar
- Subjects
Service (systems architecture) ,business.industry ,Computer science ,Decision tree ,Machine learning ,computer.software_genre ,Logistic regression ,Random forest ,Support vector machine ,Naive Bayes classifier ,ComputingMethodologies_PATTERNRECOGNITION ,Business intelligence ,Classifier (linguistics) ,Artificial intelligence ,business ,computer - Abstract
Decision making by applying data mining methods is being used in many service organizations. Educational bodies gradually started to use the business intelligence techniques to identify the current progress in their institutions. Numerous factors which have an impact in academia will be vivid to the educationalists while applying data mining techniques on the academic data. By employing the data mining methodologies, we could identify different patterns which aid institutions to take strategic decisions to improve the students’ academic performance. Potential graduate students will have a dilemma on identifying the universities for their post graduate admissions and on the other hand an average graduate student would be uncertain on getting post graduate admission in a reputed university based on their academic scores. In this study, we applied the classification techniques such as Logistic Regression, KNN Classification, Support Vector Classification, Naive Bayes Classification, Decision Tree Classification and Random Forest Classification on the given academic admission dataset. By comparing the accuracy and mean absolute error of each model, the Logistic Regression classifier outperformed others with an accuracy of 99%.
- Published
- 2021
- Full Text
- View/download PDF
14. An Efficient Scene Content-Based Indexing and Retrieval on Video Lectures
- Author
-
L. Arun Raj, P. M. Ashok Kumar, and Rami Reddy Ambati
- Subjects
Stop words ,Information retrieval ,Okapi BM25 ,Computer science ,Search engine indexing ,Frame (networking) ,Key frame ,Relevance (information retrieval) ,Optical character recognition ,computer.software_genre ,computer ,Ranking (information retrieval) - Abstract
Recently, the popularity for massive online open course (MOOC) learning among student community is increasing day by day. In most of the MOOC learning Web sites, indexing and retrieval techniques are based on the keywords like names, titles and Web addresses of the videos. As a result, the response for content-based queries is not good in most of the scenarios. In this paper, we propose an efficient scene content-based indexing and retrieval (ESCIR) framework for lecture videos. The proposed ESCIR framework consists of two phases: offline phase and online phase. In offline phase, we apply novel block-level key frame extraction (BLKFE) technique to segment video frames into shots and choose the right frame. The optical character recognition (OCR) tool is applied to the generated key frames in the videos for extracting the text. The jaccard similarity coefficient measure is used to eliminate the duplicate text frames, and then use of stop word removal and stemming algorithms are applied to get meaningful keywords from the scene. We used single-pass in-memory indexing (SPIMI) technique for building the indexing with the help of extracted keywords. In online phase, search and matching algorithms will map input queries given by user to the corresponding videos. We applied the okapi BestMatch25 (BM25) ranking function to rank those matched videos for best relevance results. The proposed ESCIR framework has been validated on standard video lectures and found to give better results than the existing state of art algorithms in terms of precision and accuracy. We compared our results with existing methods of lecture video techniques reflects improvising robust performance on lecture videos.
- Published
- 2020
- Full Text
- View/download PDF
15. An Efficient Text-Based Image Retrieval Using Natural Language Processing (NLP) Techniques
- Author
-
T. Subha Mastan Rao, L. Arun Raj, P. M. Ashok Kumar, and E. Pugazhendi
- Subjects
Topic model ,Computer science ,business.industry ,InformationSystems_INFORMATIONSTORAGEANDRETRIEVAL ,Document clustering ,computer.software_genre ,Latent Dirichlet allocation ,Digital image ,Annotation ,symbols.namesake ,Automatic image annotation ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,symbols ,Artificial intelligence ,business ,tf–idf ,Image retrieval ,computer ,Natural language processing - Abstract
The image retrieval system is a computer system for browsing, searching and retrieving images from a large database of digital images or text. Most traditional and common methods of image retrieval utilize some method of adding metadata such as captioning, keywords or descriptions to the images so that retrieval can be performed over the annotation words. Manual image annotation is time-consuming, laborious and expensive. To address this, there has been a large amount of research done on automatic image annotation. With the rapid development of information technology, the number of electronic documents and digital content within documents exceeds the capacity of manual control and management. The usage of images is increased in real time. So, the proposed system concentrates on retrieving image by using the text-based image retrieval system. Text documents are given as input to the preprocessing stage, and features are extracted using TF-IDF. Finally, document clustering method can be used to automatically group the retrieved documents into list of meaningful categories. Document clustering clusters the document of different domains and latent Dirichlet allocation (LDA), each document may be viewed as a mixture of various topics where each document is considered to have a set of topics, and after that relevant documents are retrieved and then images of those relevant documents are retrieved.
- Published
- 2020
- Full Text
- View/download PDF
16. A transfer learning framework for traffic video using neuro-fuzzy approach
- Author
-
V. Vaidehi and P. M. Ashok Kumar
- Subjects
Engineering ,Adaptive neuro fuzzy inference system ,Multidisciplinary ,Neuro-fuzzy ,business.industry ,Optical flow ,Inference ,020207 software engineering ,02 engineering and technology ,computer.software_genre ,Set (abstract data type) ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Anomaly detection ,Data mining ,business ,Gradient descent ,Transfer of learning ,computer - Abstract
One of the main challenges in the Traffic Anomaly Detection (TAD) system is the ability to deal with unknown target scenes. As a result, the TAD system performs less in detecting anomalies. This paper introduces a novelty in the form of Adaptive Neuro-Fuzzy Inference System-Lossy-Count-based Topic Extraction (ANFIS-LCTE) for classification of anomalies in source and target traffic scenes. The process of transforming the input variables, learning the semantic rules in source scene and transferring the model to target scene achieves the transfer learning property. The proposed ANFIS-LCTE transfer learning model consists of four steps. (1) Low level visual items are extracted only for motion regions using optical flow technique. (2) Temporal transactions are created using aggregation of visual items for each set of frames. (3) An LCTE is applied for each set of temporal transaction to extract latent sequential topics. (4) ANFIS training is done with the back-propagation gradient descent method. The proposed ANFIS model framework is tested on standard dataset and performance is evaluated in terms of training performance and classification accuracies. Experimental results confirm that the proposed ANFIS-LCTE approach performs well in both source and target datasets.
- Published
- 2017
- Full Text
- View/download PDF
17. A Critical Review on Federated Cloud Consumer Perspective of Maximum Resource Utilization for Optimal Price Using EM Algorithm
- Author
-
Kolla Bhanu Prakash and P. M. Ashok Kumar
- Subjects
Relation (database) ,Operations research ,business.industry ,Computer science ,Vendor ,Quality of service ,Response time ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Maximization ,Resource (project management) ,Expectation–maximization algorithm ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business - Abstract
Federated clouds have been a solution to some of the challenges of cloud computing like vendor lock-in and performance-related issues in terms of a wide range of resource utilization and pricing for cloud consumers. This paper provides much insight into the problems faced by cloud consumers while utilizing resources for particular price in relation to SLA violation, QoS awareness and cloud brokerage. A brief review of resource utilization with pricing in perspective of cloud consumers is presented, and a layered agent-based model was proposed for simulating federated cloud. To analyze maximum resource utilization on pricing option a MaxResourceUtility, an expected maximization (EM) algorithm was proposed to consider the influence of missing QoS factors while estimating it for resource utility. The results show that 5–10% increase in maximum resource utility and 10–20% decrease in pricing are observed by considering QoS factor response time while utilizing resources.
- Published
- 2019
- Full Text
- View/download PDF
18. Anomalous Event Detection in Traffic Video Surveillance Based on Temporal Pattern Analysis
- Author
-
V S Arvinth Prasath, V. Vaidehi, R Deepika, P. M. Ashok Kumar, and M. Indhumathi
- Subjects
General Computer Science ,Computer science ,020204 information systems ,Event (relativity) ,Real-time computing ,0202 electrical engineering, electronic engineering, information engineering ,Pattern analysis ,020201 artificial intelligence & image processing ,02 engineering and technology - Published
- 2017
- Full Text
- View/download PDF
19. Cross-user level de-duplication using distributive soft links
- Author
-
D. Kavitha, E Pugazhendi, and P. M. Ashok Kumar
- Subjects
Reduction (complexity) ,Reference data ,Distributive property ,Computer science ,Backup ,Distributed computing ,Level data ,Digital data ,Data_FILES ,Data deduplication ,Space (commercial competition) - Abstract
The amount of digital data has been increasing exponentially. There is a need to reduce the amount of storage space by storing data efficiently. De-duplication tends to save a lot of storage space in commercial applications like backup. De-duplication suffers from a serious disadvantage that data cannot be referenced across various locations. Soft links can be established only within a single disk that has been used for storage. In this paper we discuss cross level links that can be established across data which in turn is stored in a distributive manner. When user level data is stored across various volumes separated geographically a medium is required to reference data at the same time saving storage space. We implemented at file level de-duplication, a significant reduction in storage space was observed.
- Published
- 2017
- Full Text
- View/download PDF
20. A Petri Net-based Approach for Event Detection in Pedestrian Crossing Sequence
- Author
-
P M Ashok Kumar and Arun Kumar Sangaiah
- Subjects
Sequence ,Multidisciplinary ,Series (mathematics) ,Computer science ,Event (computing) ,business.industry ,Gaussian ,Pattern recognition ,Pedestrian crossing ,Petri net ,Object (computer science) ,Outcome (probability) ,symbols.namesake ,symbols ,Computer vision ,Artificial intelligence ,business - Abstract
In this paper we present an approach to automatically detect anomalous traffic events like pedestrians crossing the junction, based on traffic video of low-level features such as size of the blob, spatial location, and velocity. The construction of Petri-Nets was used for both semantic description and event detection within traffic videos. The major novelties of this paper are extensions to both the modeling and the recognition capacities of Object Petri-Nets (PN). The detection of object level features are done with the help of state of art techniques like Gaussian Mixture of Models (GMM), and a series of Petri-Nets composed of various objects is proposed to describe the video content. The expected outcome of the proposed framework is that we can easily build semantic detectors based on PNs to search within traffic videos and identify interesting events. Experimental results based on recorded traffic video data sets and synthetic data sets are used to illustrate the potential of this framework.
- Published
- 2014
- Full Text
- View/download PDF
21. Detection of dropped non protruding objects in video surveillance using clustered data stream
- Author
-
V. Vaidehi, P. M. Ashok Kumar, P. Jayasuganthi, and V. Jeyaprabha
- Subjects
Computer science ,business.industry ,Data stream mining ,Frame (networking) ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Pattern recognition ,Object (computer science) ,Object detection ,Data set ,Object-class detection ,Video tracking ,Computer vision ,Viola–Jones object detection framework ,Artificial intelligence ,business - Abstract
As more and more surveillance cameras are deployed in a facility or area the demand for automatic detection of suspicious objects is increasing. Most of the work in recent literature concentrated on protruding object detection in video sequences. This paper proposes a novel approach to detect protruding as well as non protruding objects in sequences of walking pedestrians based on texture of the foreground objects. Initially static background is modeled with the help of mixture of Gaussian algorithm and the foreground objects are segmented. Later object is detected frame by frame which is followed by the calculation of statistical parameters such as mean and standard deviation, in every blob, to form data streams. These parameters are clustered online using k-means methodology over data streams, in order to find the outliers (dropped objects). Here k is based on the number of objects present in the video. Finally we have implemented on a standard data set from the website Video Surveillance Online Repository [15] and also our own dataset. The experimental results show that our system performs reasonable well and can accurately detect dropped objects in video data streams.
- Published
- 2013
- Full Text
- View/download PDF
22. Video traffic analysis for abnormal event detection using frequent item set mining
- Author
-
V. Vaidehi, E. Chandralekha, and P. M. Ashok Kumar
- Subjects
Data stream mining ,business.industry ,Computer science ,Frame (networking) ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Pattern recognition ,Lossy compression ,Blob detection ,Mixture model ,Set (abstract data type) ,Video tracking ,Computer vision ,Pattern matching ,Artificial intelligence ,business - Abstract
As powerful computers and cameras have become wide spread, the number of applications using vision techniques has increased enormously. One such application that has received significant attention from the computer vision community is traffic surveillance. We propose a new event detection technique for detecting abnormal events in traffic video surveillance. The main objective of this work is to detect the abnormal events which normally occur at junction, in video surveillance. Our work consists of two phases 1) Training Phase 2) Testing Phase. Our main novelty in this work is modified lossy counting algorithm based on set approach. Initially, the frames are divided into grid regions at the junction and labels are assigned. The proposed work consist of blob detection and tracking, conversion of object location to data streams, frequent item set mining and pattern matching. In the training phase, blob detection is carried out by separating the modelled static background frame using Gaussian mixture models (GMM) and this will be carried out for every frame for tracking purpose. The blobs location is determined by assigning to the corresponding grid label and numbered moving object direction to form data streams. A modified lossy counting algorithm is performed over temporal data steams for discovering regular spatial video patterns. In testing phase, the same process is repeated except frequent item set mining, for finding the spatial pattern in each frame and it is compared with stored regular video patterns for abnormal event detection. The proposed system has shown significant improvement in performance over to the existing techniques.
- Published
- 2013
- Full Text
- View/download PDF
23. Intelligent Computer Control of Flexible AC Transmission System (FACTS)
- Author
-
Amit Khare, M. S. Rao, C M Bhatia, and P. M. Ashok Kumar
- Subjects
Engineering ,business.industry ,Electrical engineering ,Thyristor ,Fault (power engineering) ,Switched capacitor ,Computer Science Applications ,Theoretical Computer Science ,Flexible AC transmission system ,Impedance control ,Transmission (telecommunications) ,Control theory ,Electrical and Electronic Engineering ,business ,Intelligent control - Abstract
A 5 kVA, 415 V, 48–52 Hz, three-phase laboratory model Flexible AC Transmission System (FACTS) built around intelligent microprocessor based thyristor controlled switched capacitor is described. This laboratory model has been developed to conduct the feasibility studies for implementation of rapid impedance control on a 400 kV double circuit transmission corridor between Itarsi and Indore in the central part of India. The laboratory model uses scaled parameters of this transmission corridor for maintaining the receiving end voltage at Indore. The system studies reported in this paper include the simulation on PC and also the intelligent control aspect eg fault diagnosis and its identification, along with other steady state experimental investigations made on the newly developed laboratory model controller. A comparison between the simulated and experimental results reveals good correlation.
- Published
- 1995
- Full Text
- View/download PDF
24. Expert system for building cognitive model of a student using 8-puzzle game and for career assessment
- Author
-
J. K. R. Sastry, G. Ravi Teja, N. Venkatesh, P. M. Ashok Kumar, K.B. Anusha, and V. Chandra Prakash
- Subjects
Cognitive model ,Environmental Engineering ,ComputingMilieux_THECOMPUTINGPROFESSION ,General Chemical Engineering ,Applied psychology ,General Engineering ,computer.software_genre ,Expert system ,Hardware and Architecture ,ComputingMilieux_COMPUTERSANDEDUCATION ,Computer Science (miscellaneous) ,Psychology ,computer ,Career assessment ,Biotechnology - Abstract
Career assessment is useful for a student in order to know the suitable jobs for him/her in future basing on student’s knowledge memory power, Intelligence, psychological aptitude, etc. During the academic program of a student, it is very important to assess the appropriate career(s), so that a student can select some appropriate electives and some specialized subjects, which lead to an appropriate career(s). In the process of academic program of a student, it is highly essential to plan his/her career. Generally, the career counselor in an institution analyzes the student’s academic record/Cumulative Grade Point Average (C.G.P.A.) and predicts suitable career(s) in industry. In case of students belonging to Computer Science and Engineering branch, counselor will suggest some appropriate jobs in software industry viz. software designer, software engineer, tester, marketing person, etc. based on the academic record. Apart from academic record, one should also consider the student’s psychological factors like intelligence, problem solving ability, patience, etc. to predict a better career. We developed an expert system for predicting career by assessing psychological factors of a student like problem solving ability, intelligence and patience levels of a student. In order to assess these psychological factors, we developed 8-puzzle game to assess student’s intelligence and planning ability levels, fastness in playing game, and patience levels. The system requests the student to play 8-puzzle game many times and displays the scores of student. A career table is designed which consists of list of careers in software industry and the minimum levels of requirements in academic record, intelligence, patience, etc. The academic record and psychological factors of the student are compared with the minimum levels required for each career and thus the system predicts the matching career(s) for the student.
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.