Piyush Kumar

ORCID: 0000-0002-7912-393X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Computational Geometry and Mesh Generation
  • Data Management and Algorithms
  • Computer Graphics and Visualization Techniques
  • Human Pose and Action Recognition
  • Medical Image Segmentation Techniques
  • 3D Shape Modeling and Analysis
  • Anomaly Detection Techniques and Applications
  • Hand Gesture Recognition Systems
  • Advanced Data Storage Technologies
  • Digital Image Processing Techniques
  • Chaos-based Image/Signal Encryption
  • Algorithms and Data Compression
  • Robotics and Sensor-Based Localization
  • Point processes and geometric inequalities
  • Indoor and Outdoor Localization Technologies
  • Advanced Malware Detection Techniques
  • Spam and Phishing Detection
  • Software Engineering Research
  • Time Series Analysis and Forecasting
  • Parallel Computing and Optimization Techniques
  • Advanced Vision and Imaging
  • Machine Learning and Algorithms
  • Remote Sensing and LiDAR Applications
  • Image and Object Detection Techniques
  • Advanced Neural Network Applications

National Institute of Technology Patna
2023-2025

Chandigarh University
2025

Florida State University
2011-2024

Online Technologies (United States)
2024

Systems and Technology Research (United States)
2019-2024

SRM Institute of Science and Technology
2024

Indian Institute of Technology Kharagpur
1999-2022

Indian Institute of Information Technology Allahabad
2011-2018

National Institute of Technology
2018

Atal Bihari Vajpayee Indian Institute of Information Technology and Management
2018

Explainable Artificial Intelligence (XAI) has emerged as a critical facet in the realm of machine learning and artificial intelligence, responding to increasing complexity models, particularly deep neural networks, subsequent need for transparent decision making processes. This research paper delves into essence XAI, unraveling its significance across diverse domains such healthcare, finance, criminal justice. As countermeasure opacity intricate explores various XAI methods techniques,...

10.36893/jnao.2022.v13i02.041-047 article EN Journal of Nonlinear Analysis and Optimization 2023-01-01

10.1007/s10957-005-2653-6 article EN Journal of Optimization Theory and Applications 2005-07-01

Due to their light weight, low power, and practically unlimited identification capacity, radio frequency (RFID) tags associated devices offer distinctive advantages are widely recognized for promising potential in context-aware computing; by tagging objects with RFID tags, the environment can be sensed a cost- energy-efficient means. However, prerequisite fully realizing is accurate localization of which will enable enhance wide range applications. In this paper we show how exploit phase...

10.1109/rfid.2010.5467268 article EN 2010-04-01

We present a parallel algorithm for k-nearest neighbor graph construction that uses Morton ordering. Experiments show our approach has the following advantages over existing methods: 1) faster of graphs in practice on multicore machines, 2) less space usage, 3) better cache efficiency, 4) ability to handle large data sets, and 5) ease parallelization implementation. If point set bounded expansion constant, requires one-comparison-based sort points, according order plus near-linear additional...

10.1109/tvcg.2010.9 article EN IEEE Transactions on Visualization and Computer Graphics 2010-01-20

We study the minimum enclosing ball (MEB) problem for sets of points or balls in high dimensions. Using techniques second-order cone programming and "core-sets", we have developed (1 + ε)-approximation algorithms that perform well practice, especially very dimensions, addition to having provable guarantees. prove existence core-sets size O (1/ε), improving previous bound (1/ε 2 ), empirically how core-set grows with dimension. show our algorithm, which is simple implement, results fast...

10.1145/996546.996548 article EN ACM Journal of Experimental Algorithmics 2003-12-31

Nearest neighbor searching of large databases in high-dimensional spaces is inherently difficult due to the curse dimensionality. A flavor approximation is, therefore, necessary practically solve problem nearest search. In this paper, we propose a novel yet simple indexing scheme, HD-Index , approximate k-nearest queries massive databases. consists set hierarchical structures called RDB-trees built on Hilbert keys database objects. The leaves store distances objects reference objects,...

10.14778/3204028.3204034 article EN Proceedings of the VLDB Endowment 2018-04-01

Finding the k nearest neighbors (kNN) of a query point, or set points (kNN-Join) are fundamental problems in many application domains. Many previous efforts to solve these focused on spatial databases stand-alone systems, where changes database engine may be required, which limit their large data sets that stored relational management system. Furthermore, methods not automatically optimize kNN queries kNN-Joins when additional conditions specified. In this work, we study both and kNN-Join...

10.1109/icde.2010.5447837 article EN 2022 IEEE 38th International Conference on Data Engineering (ICDE) 2010-01-01

Federated Adversarial Learning (FAL) maintains the decentralization of adversarial training for data-driven innovations while allowing collaborative a common model to protect privacy facilities. Before sharing with bigger global aggregation, it allows users change settings locally over many iterations. However, strong network against attackers in Industry 5.0 towards consumer digital ecosystems is challenge methodologies. To solve this issue, novel FAL-based Customized Inequality-Aware...

10.1109/tce.2024.3522018 article EN IEEE Transactions on Consumer Electronics 2025-01-01

Potholes are dangerous both to the users of road facilities and even authorities that in charge maintaining roads. Use computer vision real-time detection potholes, as described earlier, is a solution reduce such risks. For pothole new paradigm involving implementation YOLOv8, highly developed object model, employed. In our implementation, we conduct pre-processing images boost features train model on annotated sets. The trained incorporated surveillance system used for processing live...

10.2139/ssrn.5089189 article EN SSRN Electronic Journal 2025-01-01

The presence of GPU from different vendors demands the Lattice QCD codes to support multiple architectures. To this end, Open Computing Language (OpenCL) is one viable frameworks for writing a portable code. It interest find out how OpenCL implementation performs as compared code based on dedicated programming interface such CUDA Nvidia GPUs. We have developed an backend our already existing Wuppertal-Budapest collaboration. In contribution, we show benchmarks most time consuming part...

10.48550/arxiv.2502.03249 preprint EN arXiv (Cornell University) 2025-02-05

A formal method for checking equivalence between a given behavioral specification prior to scheduling and the one produced by scheduler is described. Finite state machine with data path (FSMD) models have been used represent both behaviors. The consists of introducing cutpoints in FSMD, visualizing its computations as concatenation paths from cutpoints, identifying equivalent finite segments other FSMD; process then repeated FSMDs interchanged. Unlike many reported techniques, this strong...

10.1109/tcad.2007.913390 article EN IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2008-02-21

This Human-Computer Interaction (HCI) is a field in which the developer makes user friendly system. In this paper, real-time based on hand data glove and k-NN classifier for gesture recognition proposed. HCI becoming more natural intuitive to be used. The important part of body that most frequently used as interaction digital environment thus complexity flexibility motion research topic. To recognize accurately successfully Here, capture current position angle fingers, further classify it...

10.1109/rait.2012.6194548 article EN 2012-03-01

Given a set of points P and query point q, the reverse furthest neighbor (Rfn) fetches p isin such that q is their among all in PU{q}. This monochromatic Rfn (Mrfn) query. Another interesting version bichromatic (Brfn) P, Q Q, Brfn Q. The Rrfn has many applications spatial databases beyond. For instance, given large residential database (as P) potential sites Q) for building chemical plant complex, construction site should be selected as one maximum number neighbors. an instance paper...

10.1109/icde.2009.62 article EN Proceedings - International Conference on Data Engineering 2009-03-01

We present an algorithm to reconstruct a collection of disjoint smooth closed curves from n noisy samples. Our noise model assumes that the samples are obtained by first drawing points on according locally uniform distribution followed perturbation each point in normal direction with magnitude smaller than minimum local feature size. The reconstruction is faithful probability approaches 1 as increases.We expect our approach can lead provable algorithms under less restrictive models and for...

10.1145/777792.777838 article EN 2003-06-08
Coming Soon ...