Conference Papers

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506

Browse

Search Results

Now showing 1 - 7 of 7
  • Item
    SmartSlate: Rethinking tactile interfaces for the Blind
    (Institute of Electrical and Electronics Engineers Inc., 2014) Raghavendra, S.H.; Sankaranarayanan, S.
    In today's elementary education landscape for the blind, there exists little support for effectively visualizing concepts like figures, graphs, maps, terrains, shapes and the like. Moreover, pedagogy for the blind relies excessively on trained teachers. Current interfaces involve conversion of text to Braille (Tactile Feedback). Only text being translated however, is insufficient for a comprehensive learning experience. This paper describes a solution for this issue by introducing a redesigned low-cost tactile interface called the SmartSlate that will complement classroom education and serve as a partial substitute. The SmartSlate will support terrain and geographic projections, reiterative learning processes and educational games to enforce effective learning. As a proof of concept, an application that teaches coordinate geometry has been developed to work with the SmartSlate. This idea was well received at the Roman & Catherine Lobo School for the Blind, Kadri, Mangalore, India where our experiments will be conducted. © 2014 IEEE.
  • Item
    Project Jagriti: Crowdsourced child abuse reporting
    (Institute of Electrical and Electronics Engineers Inc., 2014) Dhruv Chand, M.; Sankaranarayanan, S.; Sharma, C.
    Child abuse and its myriad forms often go undetected due to the geographically distributed and widespread nature of the crime. The process of reporting is also long and is often used as an excuse to allow the proliferation of these activities. To prevent the crime from going unpunished, this paper introduces a browser based web application and a mobile application called Project Jagriti that uses the power of Crowdsourcing to ensure justice for the child victims. All reports of child abuse filed using the platform are forwarded to the Child Welfare Committee (CWC); a body constituted by the Government of India to oversee child welfare and expedite the process of recovery and rehabilitation of the victims. The platform also provides anonymity for encouraging users. © 2014 IEEE.
  • Item
    Audio segmentation using a priori information in the context of Karnatic Music
    (Institute of Electrical and Electronics Engineers Inc., 2015) Kalyan, V.A.; Sankaranarayanan, S.; Sumam David, S.
    Karnatic Music (KM) is distinct because of the prevalence of gamaka - embellishments to musical notes in the form of frequency traversals. Another important aspect of KM is that the performance style is mostly extempore. Hence, Music Information Retrieval (MIR) tasks in the context of KM are highly challenging. This paper deals with the task of Audio Segmentation and its application to MIR challenges of KM at various levels. This work presents a method that incorporates a priori knowledge about the music system and the audio track at hand for segmenting the audio into its constituent notes. The method uses amplitude and energy based features to train a neural network and an accuracy of 95.2% has been achieved on KM audio samples. The paper also elucidates the application of the method to important MIR tasks such as Music Transcription and Score-Alignment in the context of KM. © 2015 IEEE.
  • Item
    Investigating the "wisdom of crowds" at scale
    (Association for Computing Machinery, Inc acmhelp@acm.org, 2015) Mysore, A.S.; Yaligar, V.S.; Ibarra, I.A.; Simoiu, C.; Goel, S.; Arvind, R.; Sumanth, C.; Srikantan, A.; Bhargav, H.S.; Pahadia, M.; Dobhal, T.; Ahmed, A.; Shankar, M.; Agarwal, H.; Agarwal, R.; Anirudh-Kondaveeti, S.; Arun-Gokhale, S.; Attri, A.; Chandra, A.; Chilukuri, Y.; Dharmaji, S.; Garg, D.; Gupta, N.; Gupta, P.; Jacob, G.M.; Jain, S.; Joshi, S.; Khajuria, T.; Khillan, S.; Konam, S.; Kumar-Kolla, P.; Loomba, S.; Madan, R.; Maharaja, A.; Mathur, V.; Munshi, B.; Nawazish, M.; Neehar-Kurukunda, V.; Nirmal-Gavarraju, V.; Parashar, S.; Parikh, H.; Paritala, A.; Patil, A.; Phatak, R.; Pradhan, M.; Ravichander, A.; Sangeeth, K.; Sankaranarayanan, S.; Sehgal, V.; Sheshan, A.; Shibiraj, S.; Singh, A.; Singh, A.; Sinha, P.; Soni, P.; Thomas, B.; Tuteja, L.; Varma-Dattada, K.; Venkataraman, S.; Verma, P.; Yelurwar, I.
    In a variety of problem domains, it has been observed that the aggregate opinions of groups are often more accurate than those of the constituent individuals, a phenomenon that has been termed the "wisdom of the crowd." Yet, perhaps surprisingly, there is still little consensus on how generally the phenomenon holds, how best to aggregate crowd judgements, and how social influence affects estimates. We investigate these questions by taking a meta wisdom of crowds approach. With a distributed team of over 100 student researchers across 17 institutions in the United States and India, we develop a large-scale online experiment to systematically study the wisdom of crowds effect for 1,000 different tasks in 50 subject domains. These tasks involve various types of knowledge (e.g., explicit knowledge, tacit knowledge, and prediction), question formats (e.g., multiple choice and point estimation), and inputs (e.g., text, audio, and video). To examine the effect of social influence, participants are randomly assigned to one of three different experiment conditions in which they see varying degrees of information on the responses of others. In this ongoing project, we are now preparing to recruit participants via Amazon's Mechanical Turk.
  • Item
    Towards sentiment orientation data set enrichment
    (Association for Computing Machinery acmhelp@acm.org, 2016) Sankaranarayanan, S.; Ingale, D.; Bhambhu, R.; Chandrasekaran, K.
    Sentiment orientation data sets referred to variously as affective word lists, opinion lexicons, sentiment lexicons, emotion lexicons or sentiment dictionaries contain a list of words scored for the degree of positive and negative emotion they exhibit. Although these lists have been used extensively for the sentiment analysis of text data, they contain a limited number of words that are often inadequate for data obtained from modern text sources dominated by the inuence of social media that has resulted in the creation and coining of new words on a regular basis. In an effort to enrich these data sets with new words, we propose two methods. The first method involves the sentiment analysis of portmanteau words. We have hypothesized that the sentiment score of a portmanteau word; which is a combination of two (or more) words and their meanings into a single new word; can be determined as a function of the sentiment scores of its component words. Regression analysis has been used to determine this functional relationship and several cases arising from the above have been evaluated on a data set constructed from SentiWordNet. The second method is an in situ approach for sentiment discovery for unknown words that uses labeled tweets and words from the sentiment orientation data set as inputs to discover the sentiment score of the unknown word. In order to validate the resultant score, we have also used a novel validation-feedback mechanism akin to crossvalidation. Both these methods produce acceptable levels of accuracy proving that they can be implemented in practice. © 2016 ACM.
  • Item
    Game theoretic modeling of gray hole attacks in wireless ad hoc networks
    (Springer Verlag service@springer.de, 2017) Ketankumar, C.K.; Sankaranarayanan, S.; Lakshman, V.; Chandrasekaran, K.
    Wireless ad hoc networks rely on the cooperation of participating nodes to undertake activities such as routing. Malicious nodes participating in the network may refuse to forward packets and instead discard them to mount a denial-of-service attack called a packet drop or blackhole attack. Blackhole attacks can however be easily detected using common networking tools like trace route as all packets passing through the malicious node is dropped. A gray hole attack on the other hand accomplishes denial of service by selectively dropping packets thus escaping detection. In this paper, a novel two player incomplete information extensive form game is used to model the defender and the attacker both of whom are considered rational agents in an effort to determine their optimal (equilibrium) strategies under different values for the parameters true detection rate, false alarm rate, packet value, packets forwarded per unit time, probability of the node being a gray hole, cost of exposure of the attacker and cost of not using a node for the defender. The respective equilibrium strategies if followed guarantee maximum possible protection for the defender and maximal possible damage potential for the attacker. © Springer India 2017.
  • Item
    Single inductor dual output buck converter for low power applications and its stability analysis
    (IEEE Computer Society help@computer.org, 2018) Sankaranarayanan, S.; Vinod, K.C.; Sreekumar, A.; Laxminidhi, L.; Singhal, V.; Chauhan, R.
    The applications like sensor nodes and wearables, which run on coin/button cell and/or harvested energy source need small form factor and very low power consumption. A single inductor multiple output (SIMO) converter provides saving on inductor count and hence becomes a right choice for such applications. This paper presents a single inductor dual output (SIDO) buck converter targeting light load applications. The architecture uses discontinuous conduction mode (DCM) with pulse frequency modulation (PFM) control and the switching scheme ensures almost zero cross-regulation. The proposed converter is simulated in 180 nm CMOS technology showing zero cross-regulation. An efficiency of above 88% is achieved considering inductor and package losses in load range of micro-Amperes to a few milli-Amperes. This paper also presents a detailed stability analysis and model for the selected SIMO architecture along with some interesting observations and inferences derived from this analysis. © 2018 IEEE.