- Autism Spectrum Disorder Research
- Chaos-based Image/Signal Encryption
- Advanced Steganography and Watermarking Techniques
- Quantum Information and Cryptography
- Quantum optics and atomic interactions
- Domain Adaptation and Few-Shot Learning
- Remote-Sensing Image Classification
- Software System Performance and Reliability
- Digital Media Forensic Detection
- Machine Learning and Data Classification
- Functional Brain Connectivity Studies
- Data Stream Mining Techniques
- IPv6, Mobility, Handover, Networks, Security
- Chromatography in Natural Products
- Geophysical Methods and Applications
- Time Series Analysis and Forecasting
- Asphalt Pavement Performance Evaluation
- Machine Learning and ELM
- Human Pose and Action Recognition
- Male Breast Health Studies
- Biometric Identification and Security
- Wireless Communication Security Techniques
- Medicinal Plant Research
- Advanced machining processes and optimization
- Virology and Viral Diseases
Tata Consultancy Services (India)
2020-2024
National Institute of Technology Rourkela
2021-2024
National Institute of Technology Tiruchirappalli
2023
Atal Bihari Vajpayee Indian Institute of Information Technology and Management
2023
University of Arizona
2022
University of Petroleum and Energy Studies
2021
KIIT University
2017-2020
Indian Institute of Science Education and Research Mohali
2020
Max Planck Institute for Nuclear Physics
2015
Max Planck Society
2015
We introduce Granite Vision, a lightweight large language model with vision capabilities, specifically designed to excel in enterprise use cases, particularly visual document understanding. Our is trained on comprehensive instruction-following dataset, including document-related tasks, such as content extraction from tables, charts, diagrams, sketches, and infographics, well general image tasks. The architecture of Vision centered around modality alignment decoder-only, 2 billion parameter...
Bare-state population inversion is demonstrated in a two-level system with all dipole matrix elements nonzero. A laser field resonantly driving the sample, whereas second weaker and lower frequency coherent additionally pumps it near resonance dynamically Stark-splitted states. Due to existence of differing permanent moments excited ground bare states, quantum coherences among involved dressed states are induced, leading steady state. Furthermore, large refractive indices feasible, as well...
This paper begins by introducing the concept of wireless LAN (WLAN). The introductory section gives brief information on WLAN components and its architecture. In order to examine security threats, this will look at both active & passive attacks. then explain flaws legacy IEEE802.11 standards. situation leads further research regarding practical solutions in implementing a more secured WLAN. also cover new standards improve such as IEEE 802. lx standard, which comprises three separated...
Among various brain disorders, Autism Spectrum Disorder (ASD) is very different of its kind. It generally occurs at a early age children. becomes difficult for even parents to identify an abnormality in their child due occurrence. This paper presents the machine learning approach detection ASD using surface morphometric features T1 weighted structural Magnetic Resonance Imaging (sMRI). also compares classification evaluation utilized models based on left hemispheric and right brain. work...
Machine learning algorithms have accelerated data access through 'learned index', where a set of items is indexed by model learned on the pairs key and corresponding record's position in memory. Most indexes require retraining for new insertions set. The expensive takes as much time training. So, today, are updated batch inserts to amortize cost. However, real-time applications, such data-driven recommendation applications need users' feature store both reading existing users adding well.
We show the enhancement of distillable key rate for quantum distribution(QKD), by local filtering, several bound entangled states. Through our work it becomes evident that filtration operations, while transforming one state to another, have potential increase utility new QKD. demonstrate three examples `one way rate' filtering and in this process, discover states which are distillable.
The lack of large amounts training data diminishes the power deep learning to train models with a high accuracy. Few shot (i.e. using few samples) is implemented by Meta-learning, learn approach. Most gradient based metalearning approaches are hierarchical in nature and computationally expensive. Metalearning generalize well across new tasks on very tasks; but require multiple iterations which lead times.
Abstract In our work, we look to classify images that make their way into smartphone devices through various social-media text-messaging platforms. We aim at classifying three broad categories: document-based images, quote-based and photographs. People, especially students, share many include snapshots of essential emails, handwritten notes, articles, etc. Quote based consisting birthday wishes, motivational messages, festival greetings, etc., are among the highly shared on social media A...
Authenticity of image and its copyright protection are one the essential application watermarking. In this paper, a hybrid technique for watermarking in DWT domain is presented field providing authentication to images. work binary used as watermark embedded 'host image'. Before embedding host, host splitted into 8 bit planes using plane slicing. Followed that applied least significant which partitions respective low frequency (LL subband) high (HH, HL LH subbands). The SVD HH subband on...
Autism Spectrum Disorder (ASD) is a neurological disease that seen in children at an early age. A child with ASD faces challenges while communicating social meetings. The use of facial expressions increasing rapidly for the identification various medical disorders. work puts forward approach autistic using images help Big Transfer (BiT) model. Kaggle dataset comprising 2940 and typically developing has been utilized experiment. BiT model incorporates architecture ResNet50. performed better...
With the rapid development in digital world, authentication and protection of data i.e. audio, image, video, is one major problem present era.Digital watermarking technique to provide copyright data.In past recent years many algorithms or schemes have been introduced for images.Among which few are unable recover original image after embedding watermark get distorted during extraction watermark.And reversible nature.In this paper, we proposed a scheme discrete wavelet transform (DWT) domain,...
The proliferation of commodity based big data platforms and an exponential increase in the research machine learning techniques lead to a change application development paradigm from traditional control-flow Software 1.0 data-flow 2.0 programming e.g. use models over customer-scoring methods for generating recommendations. is data-driven that requires specialized management get clean, governed unbiased sets, well defined neural network architectures building model, efficient model training,...
Machine learning, a data-driven approach, is widely used to automate applications. It has been observed that 80% of the time spent in pre-processing data make it available for building machine learning models. Data scientists generally develop and test these pipelines, primarily python (a popular language models) small (in thousands) number records or points. These pipelines may incur non-linear increase execution when production large-sized 10s millions billions points); are not scalable...
Fingerprint recognition is a widely used method for biometric identification. However, matching fingerprints in large databases can be slow and challenging process. This work proposes an indexing-based framework that uses the Cuckoo filter to overcome this issue. The approach involves initially generating fixed-length feature vector using minutia cylinder code (MCC) from fingerprint images. These vectors are then hashed stored filter, enabling efficient retrieval of query templates reducing...