Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–10 of 10 results for author: Gautam, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2406.08876  [pdf, other

    cs.SI

    Heuristics for Influence Maximization with Tiered Influence and Activation thresholds

    Authors: Rahul Kumar Gautam, Anjeneya Swami Kare, Durga Bhavani S

    Abstract: The information flows among the people while they communicate through social media websites. Due to the dependency on digital media, a person shares important information or regular updates with friends and family. The set of persons on social media forms a social network. Influence Maximization (IM) is a known problem in social networks. In social networks, information flows from one person to an… ▽ More

    Submitted 13 June, 2024; originally announced June 2024.

  2. arXiv:2404.08236  [pdf, other

    cs.SI

    Interest Maximization in Social Networks

    Authors: Rahul Kumar Gautam, Anjeneya Swami Kare, S. Durga Bhavani

    Abstract: Nowadays, organizations use viral marketing strategies to promote their products through social networks. It is expensive to directly send the product promotional information to all the users in the network. In this context, Kempe et al. \cite{kempe2003maximizing} introduced the Influence Maximization (IM) problem, which identifies $k$ most influential nodes (spreader nodes), such that the maximum… ▽ More

    Submitted 12 April, 2024; originally announced April 2024.

  3. arXiv:2402.05817  [pdf

    eess.IV cs.CV cs.LG

    Using YOLO v7 to Detect Kidney in Magnetic Resonance Imaging

    Authors: Pouria Yazdian Anari, Fiona Obiezu, Nathan Lay, Fatemeh Dehghani Firouzabadi, Aditi Chaurasia, Mahshid Golagha, Shiva Singh, Fatemeh Homayounieh, Aryan Zahergivar, Stephanie Harmon, Evrim Turkbey, Rabindra Gautam, Kevin Ma, Maria Merino, Elizabeth C. Jones, Mark W. Ball, W. Marston Linehan, Baris Turkbey, Ashkan A. Malayeri

    Abstract: Introduction This study explores the use of the latest You Only Look Once (YOLO V7) object detection method to enhance kidney detection in medical imaging by training and testing a modified YOLO V7 on medical image formats. Methods Study includes 878 patients with various subtypes of renal cell carcinoma (RCC) and 206 patients with normal kidneys. A total of 5657 MRI scans for 1084 patients were r… ▽ More

    Submitted 12 February, 2024; v1 submitted 8 February, 2024; originally announced February 2024.

  4. arXiv:2308.09195  [pdf

    cs.NI cs.SE cs.SI

    Architecture and Applications of IoT Devices in Socially Relevant Fields

    Authors: S. Anush Lakshman, S. Akash, J. Cynthia, R. Gautam, D. Ebenezer

    Abstract: Number of IoT enabled devices are being tried and introduced every year and there is a healthy competition among researched and businesses to capitalize the space created by IoT, as these devices have a great market potential. Depending on the type of task involved and sensitive nature of data that the device handles, various IoT architectures, communication protocols and components are chosen and… ▽ More

    Submitted 17 August, 2023; originally announced August 2023.

    Comments: 17

  5. arXiv:2307.08505  [pdf, other

    cs.DS cs.DM

    Approximation Algorithms for the Graph Burning on Cactus and Directed Trees

    Authors: Rahul Kumar Gautam, Anjeneya Swami Kare, S. Durga Bhavani

    Abstract: Given a graph $G=(V, E)$, the problem of Graph Burning is to find a sequence of nodes from $V$, called a burning sequence, to burn the whole graph. This is a discrete-step process, and at each step, an unburned vertex is selected as an agent to spread fire to its neighbors by marking it as a burnt node. A burnt node spreads the fire to its neighbors at the next consecutive step. The goal is to fin… ▽ More

    Submitted 17 July, 2023; originally announced July 2023.

    Comments: arXiv admin note: text overlap with arXiv:2204.00772

  6. Four Factor Authentication with emerging cybersecurity for Mobile Transactions

    Authors: Sanyam Jain, Raju gautam, Shivani Sharma, Ravi Tomar

    Abstract: Cybersecurity is very essential for Mobile Transactions to complete seamlessly. Mobile Commerce (Mcom.) is the very basic transaction type, which is very commonly used (2 in 5 people uses mobile as transaction medium), To secure this there are various technologies used by this research. The four factors formally known as Multi-Factor-Authentication are: two of them are Traditional methods (User Lo… ▽ More

    Submitted 16 May, 2023; originally announced May 2023.

  7. arXiv:2204.00772   

    cs.DS

    Improved Approximation Algorithm for Graph Burning on Trees

    Authors: Rahul Kumar Gautam, Anjeneya Swami Kare, Durga Bhavani S

    Abstract: Given a graph $G=(V,E)$, the problem of \gb{} is to find a sequence of nodes from $V$, called burning sequence, in order to burn the whole graph. This is a discrete-step process, in each step an unburned vertex is selected as an agent to spread fire to its neighbors by marking it as a burnt node. A node that is burnt spreads the fire to its neighbors at the next consecutive step. The goal is to fi… ▽ More

    Submitted 15 September, 2022; v1 submitted 2 April, 2022; originally announced April 2022.

    Comments: We found an issue in the proof. We will submit after rectifying the proof

  8. arXiv:2011.07227  [pdf, other

    cs.CV cs.AI cs.LG

    OGNet: Towards a Global Oil and Gas Infrastructure Database using Deep Learning on Remotely Sensed Imagery

    Authors: Hao Sheng, Jeremy Irvin, Sasankh Munukutla, Shawn Zhang, Christopher Cross, Kyle Story, Rose Rustowicz, Cooper Elsworth, Zutao Yang, Mark Omara, Ritesh Gautam, Robert B. Jackson, Andrew Y. Ng

    Abstract: At least a quarter of the warming that the Earth is experiencing today is due to anthropogenic methane emissions. There are multiple satellites in orbit and planned for launch in the next few years which can detect and quantify these emissions; however, to attribute methane emissions to their sources on the ground, a comprehensive database of the locations and characteristics of emission sources w… ▽ More

    Submitted 14 November, 2020; originally announced November 2020.

    Comments: Tackling Climate Change with Machine Learning at NeurIPS 2020 (Spotlight talk)

  9. arXiv:2008.08811  [pdf, ps, other

    cs.DS cs.DM

    Faster Heuristics for Graph Burning

    Authors: Rahul Kumar Gautam, Anjeneya Swami Kare, S. Durga Bhavani

    Abstract: Graph burning is a process of information spreading through the network by an agent in discrete steps. The problem is to find an optimal sequence of nodes which have to be given information so that the network is covered in least number of steps. Graph burning problem is NP-Hard for which two approximation algorithms and a few heuristics have been proposed in the literature. In this work, we propo… ▽ More

    Submitted 20 August, 2020; originally announced August 2020.

    Comments: 16 pages

  10. arXiv:cs/0702026  [pdf, ps, other

    cs.GR

    Shape preservation behavior of spline curves

    Authors: Ravi Shankar Gautam

    Abstract: Shape preservation behavior of a spline consists of criterial conditions for preserving convexity, inflection, collinearity, torsion and coplanarity shapes of data polgonal arc. We present our results which acts as an improvement in the definitions of and provide geometrical insight into each of the above shape preservation criteria. We also investigate the effect of various results from the lit… ▽ More

    Submitted 5 February, 2007; originally announced February 2007.

    Comments: 54 pages

    ACM Class: I.3.5