Skip to main content

Showing 1–34 of 34 results for author: Paul, K

  1. arXiv:2407.06096  [pdf, other

    cs.CV

    Muzzle-Based Cattle Identification System Using Artificial Intelligence (AI)

    Authors: Hasan Zohirul Islam, Safayet Khan, Sanjib Kumar Paul, Sheikh Imtiaz Rahi, Fahim Hossain Sifat, Md. Mahadi Hasan Sany, Md. Shahjahan Ali Sarker, Tareq Anam, Ismail Hossain Polas

    Abstract: Absence of tamper-proof cattle identification technology was a significant problem preventing insurance companies from providing livestock insurance. This lack of technology had devastating financial consequences for marginal farmers as they did not have the opportunity to claim compensation for any unexpected events such as the accidental death of cattle in Bangladesh. Using machine learning and… ▽ More

    Submitted 8 July, 2024; originally announced July 2024.

  2. arXiv:2407.03831  [pdf, other

    math.CO cs.DM

    Exploring Algorithmic Solutions for the Independent Roman Domination Problem in Graphs

    Authors: Kaustav Paul, Ankit Sharma, Arti Pandey

    Abstract: Given a graph $G=(V,E)$, a function $f:V\to \{0,1,2\}$ is said to be a \emph{Roman Dominating function} if for every $v\in V$ with $f(v)=0$, there exists a vertex $u\in N(v)$ such that $f(u)=2$. A Roman Dominating function $f$ is said to be an \emph{Independent Roman Dominating function} (or IRDF), if $V_1\cup V_2$ forms an independent set, where $V_i=\{v\in V~\vert~f(v)=i\}$, for… ▽ More

    Submitted 12 July, 2024; v1 submitted 4 July, 2024; originally announced July 2024.

  3. arXiv:2407.03812  [pdf, other

    cs.DM cs.DS

    Algorithmic Results for Weak Roman Domination Problem in Graphs

    Authors: Kaustav Paul, Ankit Sharma, Arti Pandey

    Abstract: Consider a graph $G = (V, E)$ and a function $f: V \rightarrow \{0, 1, 2\}$. A vertex $u$ with $f(u)=0$ is defined as \emph{undefended} by $f$ if it lacks adjacency to any vertex with a positive $f$-value. The function $f$ is said to be a \emph{Weak Roman Dominating function} (WRD function) if, for every vertex $u$ with $f(u) = 0$, there exists a neighbour $v$ of $u$ with $f(v) > 0$ and a new func… ▽ More

    Submitted 4 July, 2024; originally announced July 2024.

  4. arXiv:2405.05126  [pdf, other

    cs.SD cs.AI cs.CL eess.AS

    Exploring Speech Pattern Disorders in Autism using Machine Learning

    Authors: Chuanbo Hu, Jacob Thrasher, Wenqi Li, Mindi Ruan, Xiangxu Yu, Lynn K Paul, Shuo Wang, Xin Li

    Abstract: Diagnosing autism spectrum disorder (ASD) by identifying abnormal speech patterns from examiner-patient dialogues presents significant challenges due to the subtle and diverse manifestations of speech-related symptoms in affected individuals. This study presents a comprehensive approach to identify distinctive speech patterns through the analysis of examiner-patient dialogues. Utilizing a dataset… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

  5. arXiv:2405.01799  [pdf, other

    cs.CL cs.AI

    Exploiting ChatGPT for Diagnosing Autism-Associated Language Disorders and Identifying Distinct Features

    Authors: Chuanbo Hu, Wenqi Li, Mindi Ruan, Xiangxu Yu, Lynn K. Paul, Shuo Wang, Xin Li

    Abstract: Diagnosing language disorders associated with autism is a complex and nuanced challenge, often hindered by the subjective nature and variability of traditional assessment methods. Traditional diagnostic methods not only require intensive human effort but also often result in delayed interventions due to their lack of speed and specificity. In this study, we explored the application of ChatGPT, a s… ▽ More

    Submitted 2 May, 2024; originally announced May 2024.

  6. arXiv:2403.15522  [pdf, other

    cs.CR cs.CV

    Medical Image Data Provenance for Medical Cyber-Physical System

    Authors: Vijay Kumar, Kolin Paul

    Abstract: Continuous advancements in medical technology have led to the creation of affordable mobile imaging devices suitable for telemedicine and remote monitoring. However, the rapid examination of large populations poses challenges, including the risk of fraudulent practices by healthcare professionals and social workers exchanging unverified images via mobile applications. To mitigate these risks, this… ▽ More

    Submitted 22 March, 2024; originally announced March 2024.

    ACM Class: I.4.9; I.4.m; K.6.5; J.3; J.7

  7. arXiv:2402.17808  [pdf

    eess.SP cs.IT cs.LG

    AN An ica-ensemble learning approach for prediction of uwb nlos signals data classification

    Authors: Jiya A. Enoch, Ilesanmi B. Oluwafemi, Francis A. Ibikunle, Olulope K. Paul

    Abstract: Trapped human detection in search and rescue (SAR) scenarios poses a significant challenge in pervasive computing. This study addresses this issue by leveraging machine learning techniques, given their high accuracy. However, accurate identification of trapped individuals is hindered by the curse of dimensionality and noisy data. Particularly in non-line-of-sight (NLOS) situations during catastrop… ▽ More

    Submitted 27 February, 2024; originally announced February 2024.

    Comments: 20 pages,4 figures, 1 algorithm and 3 tables

  8. arXiv:2402.17807  [pdf, other

    q-bio.GN cs.LG

    Exploring Gene Regulatory Interaction Networks and predicting therapeutic molecules for Hypopharyngeal Cancer and EGFR-mutated lung adenocarcinoma

    Authors: Abanti Bhattacharjya, Md Manowarul Islam, Md Ashraf Uddin, Md. Alamin Talukder, AKM Azad, Sunil Aryal, Bikash Kumar Paul, Wahia Tasnim, Muhammad Ali Abdulllah Almoyad, Mohammad Ali Moni

    Abstract: With the advent of Information technology, the Bioinformatics research field is becoming increasingly attractive to researchers and academicians. The recent development of various Bioinformatics toolkits has facilitated the rapid processing and analysis of vast quantities of biological data for human perception. Most studies focus on locating two connected diseases and making some observations to… ▽ More

    Submitted 27 February, 2024; originally announced February 2024.

    Comments: Accepted In The FEBS OPEN BIO (Q2, SCOPUS, SCIE, IF: 2.6, CS: 4.7), Wiley Journal, On FEB 25, 2024

  9. arXiv:2401.15088  [pdf

    eess.SY cs.CY cs.LG

    Design & Implementation of Automatic Machine Condition Monitoring and Maintenance System in Limited Resource Situations

    Authors: Abu Hanif Md. Ripon, Muhammad Ahsan Ullah, Arindam Kumar Paul, Md. Mortaza Morshed

    Abstract: In the era of the fourth industrial revolution, it is essential to automate fault detection and diagnosis of machineries so that a warning system can be developed that will help to take an appropriate action before any catastrophic damage. Some machines health monitoring systems are used globally but they are expensive and need trained personnel to operate and analyse. Predictive maintenance and o… ▽ More

    Submitted 22 January, 2024; originally announced January 2024.

    Comments: Under Peer Review, Journal: Heliyon, Section: Engineering, Page: 26

  10. arXiv:2312.07368  [pdf

    cs.AI cs.RO

    Sequential Planning in Large Partially Observable Environments guided by LLMs

    Authors: Swarna Kamal Paul

    Abstract: Sequential planning in large state space and action space quickly becomes intractable due to combinatorial explosion of the search space. Heuristic methods, like monte-carlo tree search, though effective for large state space, but struggle if action space is large. Pure reinforcement learning methods, relying only on reward signals, needs prohibitively large interactions with the environment to de… ▽ More

    Submitted 12 December, 2023; originally announced December 2023.

    Comments: 8 pages, 2 figures, 1 table

  11. arXiv:2308.08658  [pdf

    cs.CV

    A Data-Theoretic Approach to Identifying Violent Facial Expressions in Social Crime Contexts

    Authors: Arindam Kumar Paul

    Abstract: Human Facial Expressions plays an important role in identifying human actions or intention. Facial expressions can represent any specific action of any person and the pattern of violent behavior of any person strongly depends on the geographic region. Here we have designed an automated system by using a Convolutional Neural Network which can detect whether a person has any intention to commit any… ▽ More

    Submitted 19 December, 2023; v1 submitted 16 August, 2023; originally announced August 2023.

  12. arXiv:2303.01746  [pdf, other

    cs.DM cs.CC math.CO

    Complexity of total dominator coloring in graphs

    Authors: Michael A. Henning, Kusum, Arti Pandey, Kaustav Paul

    Abstract: Let $G=(V,E)$ be a graph with no isolated vertices. A vertex $v$ totally dominate a vertex $w$ ($w \ne v$), if $v$ is adjacent to $w$. A set $D \subseteq V$ called a total dominating set of $G$ if every vertex $v\in V$ is totally dominated by some vertex in $D$. The minimum cardinality of a total dominating set is the total domination number of $G$ and is denoted by $γ_t(G)$. A total dominator col… ▽ More

    Submitted 3 March, 2023; originally announced March 2023.

    Comments: V1, 18 pages, 1 figure

  13. arXiv:2302.10311  [pdf, other

    cs.LG cs.AI

    Understanding the effect of varying amounts of replay per step

    Authors: Animesh Kumar Paul, Videh Raj Nema

    Abstract: Model-based reinforcement learning uses models to plan, where the predictions and policies of an agent can be improved by using more computation without additional data from the environment, thereby improving sample efficiency. However, learning accurate estimates of the model is hard. Subsequently, the natural question is whether we can get similar benefits as planning with model-free methods. Ex… ▽ More

    Submitted 20 February, 2023; originally announced February 2023.

    Comments: 10 Pages, 4 figures

  14. arXiv:2212.01091  [pdf, other

    cs.RO math.AT

    Sequential parametrized motion planning and its complexity, II

    Authors: Michael Farber, Amit Kumar Paul

    Abstract: This is a continuation of our recent paper in which we developed the theory of sequential parametrized motion planning. A sequential parametrized motion planning algorithm produced a motion of the system which is required to visit a prescribed sequence of states, in a certain order, at specified moments of time. In the previous publication we analysed the sequential parametrized topological comple… ▽ More

    Submitted 2 December, 2022; originally announced December 2022.

    MSC Class: 55M30

  15. arXiv:2211.14748  [pdf, ps, other

    cs.RO eess.SY

    Safe Human Robot-Interaction using Switched Model Reference Admittance Control

    Authors: Chayan Kumar Paul, Bhabani Shankar Dey, Udayan Banerjee, Indra Narayan Kar

    Abstract: Physical Human-Robot Interaction (pHRI) task involves tight coupling between safety constraints and compliance with human intentions. In this paper, a novel switched model reference admittance controller is developed to maintain compliance with the external force while upholding safety constraints in the workspace for an n-link manipulator involved in pHRI. A switched reference model is designed f… ▽ More

    Submitted 27 November, 2022; originally announced November 2022.

  16. An isogeometric finite element formulation for boundary and shell viscoelasticity based on a multiplicative surface deformation split

    Authors: Karsten Paul, Roger A. Sauer

    Abstract: This work presents a numerical formulation to model isotropic viscoelastic material behavior for membranes and thin shells. The surface and the shell theory are formulated within a curvilinear coordinate system, which allows the representation of general surfaces and deformations. The kinematics follow from Kirchhoff-Love theory and the discretization makes use of isogeometric shape functions. A m… ▽ More

    Submitted 23 August, 2022; v1 submitted 27 February, 2022; originally announced February 2022.

    Comments: In this version, parts of the introduction and conclusion are rewritten, remarks 1.1, 1.2 and 3.1 are added, the title is slightly modified, the list of highlights is updated, and minor typos are fixed

    Journal ref: Int. J. Numer. Methods Eng. (2022)

  17. arXiv:2112.05486  [pdf, other

    cs.DM math.CO

    Complexity of Paired Domination in AT-free and Planar Graphs

    Authors: Vikash Tripathi, Ton Kloks, Arti Pandey, Kaustav Paul, Hung-Lung Wang

    Abstract: For a graph $G=(V,E)$, a subset $D$ of vertex set $V$, is a dominating set of $G$ if every vertex not in $D$ is adjacent to atleast one vertex of $D$. A dominating set $D$ of a graph $G$ with no isolated vertices is called a paired dominating set (PD-set), if $G[D]$, the subgraph induced by $D$ in $G$ has a perfect matching. The Min-PD problem requires to compute a PD-set of minimum cardinality. T… ▽ More

    Submitted 10 December, 2021; originally announced December 2021.

  18. arXiv:2107.01185  [pdf

    cs.CR cs.LG eess.SP

    Artificial Neural Network for Cybersecurity: A Comprehensive Review

    Authors: Prajoy Podder, Subrato Bharati, M. Rubaiyat Hossain Mondal, Pinto Kumar Paul, Utku Kose

    Abstract: Cybersecurity is a very emerging field that protects systems, networks, and data from digital attacks. With the increase in the scale of the Internet and the evolution of cyber attacks, developing novel cybersecurity tools has become important, particularly for Internet of things (IoT) networks. This paper provides a systematic review of the application of deep learning (DL) approaches for cyberse… ▽ More

    Submitted 20 June, 2021; originally announced July 2021.

    Comments: 14 Pages, 8 Figures

    Journal ref: Journal of Information Assurance and Security, Volume: 16, Issue: 1, 2021, pp.010-023

  19. An Improved Real-Time Face Recognition System at Low Resolution Based on Local Binary Pattern Histogram Algorithm and CLAHE

    Authors: Kamal Chandra Paul, Semih Aslan

    Abstract: This research presents an improved real-time face recognition system at a low resolution of 15 pixels with pose and emotion and resolution variations. We have designed our datasets named LRD200 and LRD100, which have been used for training and classification. The face detection part uses the Viola-Jones algorithm, and the face recognition part receives the face image from the face detection part t… ▽ More

    Submitted 15 April, 2021; originally announced April 2021.

    Comments: Journal, Optics and Photonics Journal

    Journal ref: Optics and Photonics Journal, 2021, 11, 63-78

  20. Machine Learning on the COVID-19 Pandemic, Human Mobility and Air Quality: A Review

    Authors: Md. Mokhlesur Rahman, Kamal Chandra Paul, Md. Amjad Hossain, G. G. Md. NawazAli, Md. Shahinoor Rahman, Jean-Claude Thill

    Abstract: The ongoing COVID-19 global pandemic is affecting every facet of human lives (e.g., public health, education, economy, transportation, and the environment). This novel pandemic and citywide implemented lockdown measures are affecting virus transmission, people's travel patterns, and air quality. Many studies have been conducted to predict the COVID-19 diffusion, assess the impacts of the pandemic… ▽ More

    Submitted 13 March, 2021; originally announced April 2021.

    Comments: Machine Learning, COVID_19, Pandemic

  21. arXiv:2101.07347  [pdf, other

    cs.RO cs.CV

    Object Detection and Pose Estimation from RGB and Depth Data for Real-time, Adaptive Robotic Grasping

    Authors: S. K. Paul, M. T. Chowdhury, M. Nicolescu, M. Nicolescu

    Abstract: In recent times, object detection and pose estimation have gained significant attention in the context of robotic vision applications. Both the identification of objects of interest as well as the estimation of their pose remain important capabilities in order for robots to provide effective assistance for numerous robotic applications ranging from household tasks to industrial manipulation. This… ▽ More

    Submitted 18 January, 2021; originally announced January 2021.

    ACM Class: I.4.8; I.4.9; I.2.9

  22. Review on the Security Threats of Internet of Things

    Authors: Prajoy Podder, M. Rubaiyat Hossain Mondal, Subrato Bharati, Pinto Kumar Paul

    Abstract: Internet of Things (IoT) is being considered as the growth engine for industrial revolution 4.0. The combination of IoT, cloud computing and healthcare can contribute in ensuring well-being of people. One important challenge of IoT network is maintaining privacy and to overcome security threats. This paper provides a systematic review of the security aspects of IoT. Firstly, the application of IoT… ▽ More

    Submitted 12 January, 2021; originally announced January 2021.

    Comments: 9 Pages, 9 figures

    Journal ref: International Journal of Computer Applications (IJCA), 2020

  23. arXiv:2012.04135  [pdf

    cs.CV

    Performance Analysis of Keypoint Detectors and Binary Descriptors Under Varying Degrees of Photometric and Geometric Transformations

    Authors: Shuvo Kumar Paul, Pourya Hoseini, Mircea Nicolescu, Monica Nicolescu

    Abstract: Detecting image correspondences by feature matching forms the basis of numerous computer vision applications. Several detectors and descriptors have been presented in the past, addressing the efficient generation of features from interest points (keypoints) in an image. In this paper, we investigate eight binary descriptors (AKAZE, BoostDesc, BRIEF, BRISK, FREAK, LATCH, LUCID, and ORB) and eight i… ▽ More

    Submitted 7 December, 2020; originally announced December 2020.

    ACM Class: I.4.10; I.4.0; I.4.7

  24. arXiv:2008.08409  [pdf, other

    cs.CR

    Early RTL Analysis for SCA Vulnerability in Fuzzy Extractors of Memory-Based PUF Enabled Devices

    Authors: Xinhui Lai, Maksim Jenihhin, Georgios Selimis, Sven Goossens, Roel Maes, Kolin Paul

    Abstract: Physical Unclonable Functions (PUFs) are gaining attention in the cryptography community because of the ability to efficiently harness the intrinsic variability in the manufacturing process. However, this means that they are noisy devices and require error correction mechanisms, e.g., by employing Fuzzy Extractors (FEs). Recent works demonstrated that applying FEs for error correction may enable n… ▽ More

    Submitted 19 August, 2020; originally announced August 2020.

    Comments: 6 pages, 5 figures, 2 tables

  25. arXiv:2007.00054  [pdf, other

    cs.IR cs.SI

    Twitter and Census Data Analytics to Explore Socioeconomic Factors for Post-COVID-19 Reopening Sentiment

    Authors: Md. Mokhlesur Rahman, G. G. Md. Nawaz Ali, Xue Jun Li, Kamal Chandra Paul, Peter H. J. Chong

    Abstract: Investigating and classifying sentiments of social media users towards an item, situation, and system are very popular among the researchers. However, they rarely discuss the underlying socioeconomic factor associations for such sentiments. This study attempts to explore the factors associated with positive and negative sentiments of the people about reopening the economy, in the United States (US… ▽ More

    Submitted 30 June, 2020; originally announced July 2020.

  26. arXiv:2006.05509  [pdf

    eess.IV cs.CV cs.LG q-bio.QM

    Can artificial intelligence (AI) be used to accurately detect tuberculosis (TB) from chest X-rays? An evaluation of five AI products for TB screening and triaging in a high TB burden setting

    Authors: Zhi Zhen Qin, Shahriar Ahmed, Mohammad Shahnewaz Sarker, Kishor Paul, Ahammad Shafiq Sikder Adel, Tasneem Naheyan, Rachael Barrett, Sayera Banu, Jacob Creswell

    Abstract: Artificial intelligence (AI) products can be trained to recognize tuberculosis (TB)-related abnormalities on chest radiographs. Various AI products are available commercially, yet there is lack of evidence on how their performance compared with each other and with radiologists. We evaluated five AI software products for screening and triaging TB using a large dataset that had not been used to trai… ▽ More

    Submitted 28 May, 2021; v1 submitted 9 June, 2020; originally announced June 2020.

    Comments: 43 pages, 3 Tables 3 Figures

    MSC Class: 92B20 ACM Class: I.2.1

  27. arXiv:2004.12442  [pdf, other

    cs.CR

    Airmed: Efficient Self-Healing Network of Low-End Devices

    Authors: Sourav Das, Samuel Wedaj, Kolin Paul, Umesh Bellur, Vinay Joseph Ribeiro

    Abstract: The proliferation of application specific cyber-physical systems coupled with the emergence of a variety of attacks on such systems (malware such as Mirai and Hajime) underlines the need to secure such networks. Most existing security efforts have focused on only detection of the presence of malware. However given the ability of most attacks to spread through the network once they infect a few dev… ▽ More

    Submitted 29 April, 2020; v1 submitted 26 April, 2020; originally announced April 2020.

    Comments: 13 pages, 12 figures

  28. arXiv:2002.11108  [pdf, other

    cs.CR

    PASCAL: Timing SCA Resistant Design and Verification Flow

    Authors: Xinhui Lai, Maksim Jenihhin, Jaan Raik, Kolin Paul

    Abstract: A large number of crypto accelerators are being deployed with the widespread adoption of IoT. It is vitally important that these accelerators and other security hardware IPs are provably secure. Security is an extra functional requirement and hence many security verification tools are not mature. We propose an approach/flow-PASCAL-that works on RTL designs and discovers potential Timing Side-Chann… ▽ More

    Submitted 19 August, 2020; v1 submitted 25 February, 2020; originally announced February 2020.

    Comments: Total page number: 4 pages; Figures: 5 figures; conference: 25th IEEE International Symposium on On-Line Testing and Robust System Design 2019

  29. Isogeometric continuity constraints for multi-patch shells governed by fourth-order deformation and phase field models

    Authors: Karsten Paul, Christopher Zimmermann, Thang X. Duong, Roger A. Sauer

    Abstract: This work presents numerical techniques to enforce continuity constraints on multi-patch surfaces for three distinct problem classes. The first involves structural analysis of thin shells that are described by general Kirchhoff-Love kinematics. Their governing equation is a vector-valued, fourth-order, nonlinear, partial differential equation (PDE) that requires at least $C^1$-continuity within a… ▽ More

    Submitted 6 October, 2021; v1 submitted 16 January, 2020; originally announced January 2020.

    Comments: In this version, typos in the list of references were fixed, floating pictures in Chapter 6 were reduced, and the sign of the bending moments was changed (see text passages after Eqs. (63) and (71), footnotes 13-14 and 23, and Appendix A

    Journal ref: Comput. Methods Appl. Mech. Eng. 370 (2020)

  30. arXiv:2001.02925  [pdf, other

    cs.CR cs.DC

    Architecture and Security of SCADA Systems: A Review

    Authors: Geeta Yadav, Kolin Paul

    Abstract: Pipeline bursting, production lines shut down, frenzy traffic, trains confrontation, nuclear reactor shut down, disrupted electric supply, interrupted oxygen supply in ICU - these catastrophic events could result because of an erroneous SCADA system/ Industrial Control System(ICS). SCADA systems have become an essential part of automated control and monitoring of many of the Critical Infrastructur… ▽ More

    Submitted 9 January, 2020; originally announced January 2020.

    ACM Class: A.1; J.6

  31. arXiv:1910.13635  [pdf

    cs.CR cs.CY

    Blockchain Based Secured E-voting by Using the Assistance of Smart Contract

    Authors: Kazi Sadia, Md. Masuduzzaman, Rajib Kumar Paul, Anik Islam

    Abstract: Voting is a very important issue which can be beneficial in term of choosing the right leader in an election. A good leader can bring prosperity to a country and also can lead the country in the right direction every time. However, elections are surrounds with ballot forgery, coercion and multiple voting issues. Moreover, while giving votes, a person has to wait in a long queue and it is a very ti… ▽ More

    Submitted 29 October, 2019; originally announced October 2019.

    Comments: The paper has been accepted and presented in Springer IETE International Conference on Blockchain Technology (IC-BCT 2019),29-30 March 2019,Mumbai, India. It's in Press now

  32. An adaptive space-time phase field formulation for dynamic fracture of brittle shells based on LR NURBS

    Authors: Karsten Paul, Christopher Zimmermann, Kranthi K. Mandadapu, Thomas J. R. Hughes, Chad M. Landis, Roger A. Sauer

    Abstract: We present an adaptive space-time phase field formulation for dynamic fracture of brittle shells. Their deformation is characterized by the Kirchhoff-Love thin shell theory using a curvilinear surface description. All kinematical objects are defined on the shell's mid-plane. The evolution equation for the phase field is determined by the minimization of an energy functional based on Griffith's the… ▽ More

    Submitted 18 June, 2020; v1 submitted 25 June, 2019; originally announced June 2019.

    Comments: In this version, typos were fixed, Fig. 16 is added, the literature review is extended and clarifying explanations and remarks are added at several places. Supplementary movies are available at https://av.tib.eu/series/641/supplemental+videos+of+the+paper+an+adaptive+space+time+phase+field+formulation+for+dynamic+fracture+of+brittle+shells+based+on+lr+nurbs

    Journal ref: Comput. Mech. 65, 1039-1062 (2020)

  33. arXiv:1205.6594  [pdf, other

    cs.SE

    Towards a better understanding of testing if conditionals

    Authors: Shimul Kumar Nath, Robert Merkel, Man Fai Lau, Tanay Kanti Paul

    Abstract: Fault based testing is a technique in which test cases are chosen to reveal certain classes of faults. At present, testing professionals use their personal experience to select testing methods for fault classes considered the most likely to be present. However, there is little empirical evidence available in the open literature to support these intuitions. By examining the source code changes when… ▽ More

    Submitted 30 May, 2012; originally announced May 2012.

    Comments: 10 pages, 1 figure, 9 tables

  34. arXiv:1203.3270  [pdf

    cs.CV

    Extraction of Facial Feature Points Using Cumulative Histogram

    Authors: Sushil Kumar Paul, Mohammad Shorif Uddin, Saida Bouakaz

    Abstract: This paper proposes a novel adaptive algorithm to extract facial feature points automatically such as eyebrows corners, eyes corners, nostrils, nose tip, and mouth corners in frontal view faces, which is based on cumulative histogram approach by varying different threshold values. At first, the method adopts the Viola-Jones face detector to detect the location of face and also crops the face regio… ▽ More

    Submitted 15 March, 2012; originally announced March 2012.

    Comments: 8 pages, 6 figures,3 equations, 2 tables, 20 references

    Journal ref: IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 1, No 3, January 2012 ISSN (Online): 1694-0814 www.IJCSI.org