Basanta Joshi

Basanta Joshi
  • Doctor of Engineering
  • Professor (Assistant) at Tribhuvan University

Seeking collaboration for IOE,TU faculities/students capacity building and promote research https://card.ioe.edu.np

About

72
Publications
39,291
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
315
Citations
Introduction
Basanta Joshi currently works at the Institute of Engineering, Tribhuvan University. Basanta does research in Artificial Intelligence and its application in images and speech.
Current institution
Tribhuvan University
Current position
  • Professor (Assistant)
Additional affiliations
December 2005 - November 2016
Tribhuvan University
Position
  • Professor (Assistant)
October 2008 - March 2013
Osaka Sangyo University
Position
  • PhD Student

Publications

Publications (72)
Conference Paper
The integration of technology has revolutionized various industries of different domains, including agriculture. While agriculture is vital to many developing countries, reliance on traditional farming and the absence of data-driven methods have led to decreased productivity. Adopting new technologies is crucial for enhancing agricultural productiv...
Conference Paper
Full-text available
Deep learning for sequence modeling has gained prominence during the past few years. To accomplish this, LSTM network architectures have shown to be quite helpful for forecasting the next output in a series. There are several ways to generate music and this paper presents a novel way to generate digital music. Leveraging the power of sequence model...
Chapter
Named Entity Recognition (NER) is one of the vital task for many Natural Language Processing (NLP) tasks. In recent times, transformer architecture-based models have become very popular for NLP tasks including NER achieving state-of-the-art results. The Bidirectional Encoder Representations from Transformers (BERT) model especially has been found t...
Chapter
Automatic speech recognition has allowed human beings to use their voices to speak with a computer interface. Nepali speech recognition involves conversion of Nepali language to corresponding text in Devanagari lipi. This work proposes a novel approach for developing Nepali Speech recognition model based using CNN-GRU. The data is collected from th...
Chapter
Recently, there has been interest in generating natural looking handwritten characters that the observers could not distinguish whether they are generated or written by humans. The generation of handwritten characters is a popular research topic having several applications. In the context of Nepalese handwritten character, very few of the steps wer...
Conference Paper
Full-text available
In the field of security analysis of an organization, identifying anomalous activities of user from log data for insider threat detection is difficult as well as important. Identification of such anomalous insider behavior is commonly achieved by use of behavior modeling. This paper presents an approach of one class learning, also known as unary cl...
Conference Paper
With the advancement of technology, many things with greater accuracy and ease than past had been made possible. Using image processing and machine learning techniques, various noticeable achievements have been seen in medical science. This paper stands on the foundation of the Convolution Neural Network to diagnose the disease of patients from Che...
Conference Paper
Full-text available
Timbre, Content, Rhythm and Prosody are four crucial aspects of speech. These aspects controls how person speaks. When two speaker utters same content, then other three aspects controls the differences in their speech. Converting any person voice to the targeted speaker voice by control over these three parameters is the the main work presented in...
Chapter
Nepal suffers from earthquakes frequently as it lies in a highly earthquake prone region. The relief that is to be sent to the earthquake affected area requires rapid earliest assessment of the impact in the area. The number of damaged buildings provides us with the necessary information and can be used to assess the impact. Disaster damage assessm...
Chapter
Full-text available
Mishra, SagarJoshi, BasantaPaudyal, RajendraChaulagain, DuryodhanShakya, SubarnaFacial emotion recognition has been an active research topic with its extensive applications in the field of health care, videoconferencing, security and authentication and many more. Human facial emotion recognition (anger, happiness, sadness, etc.) is still a challeng...
Article
Full-text available
Huge loss in crop production occurs every year due to late identification of pant diseases in developing countries like Nepal. Timely and correct identification of such diseases with less dependency in related field expert can be more effective solution to the problem. Plants suffer from various diseases and correctly identifying them by observing...
Article
Full-text available
Alumni tracking is a difficult task for any institution that has been running for a long time. The Department of Electronics and Computer Engineering (DOECE), Pulchowk Campus, IOE, has been offering undergraduate programs since 1994 A.D. and masters programs since 2001 A.D. The existing information about the alumni of the department is unmanaged an...
Research Proposal
This research project is initiated with the aim to pursue study of intra- and inter-band frequency interferences due to allocation of frequencies for technologies like 5G. Specifically, this research will concentrate in identifying possible interference issues with already existing communication networks (in particular SRDs networks) while implemen...
Article
Full-text available
Identifying anomalous motion behavior in video sequences is a challenging task. Manual annotation of a large number of surveillance videos is time-consuming because of the limited human brain's visual attention. This work presents a new framework to detect abnormalities from unlabeled videos using motion patterns for the normal and abnormal event....
Article
Full-text available
A heterogeneous energy source, comprising more than one type of energy sources, can function as a reliable source of power. The constituent energy sources may have characteristics with varying degree of preferences. In this paper, a multi-agent based system is used in a heterogeneous power system to maximize the use of energy sources with preferred...
Article
Full-text available
ANN is a computational model that is composed of several processing elements (neurons) that tries to solve a specific problem. Like the human brain, it provides the ability to learn from experiences without being explicitly programmed. This article is based on the implementation of artificial neural networks for logic gates. At first, the 3 layers...
Chapter
Anomalies refer to any non-conforming patterns to the expected behavior in the system. The detection of anomaly in real time from logs arriving at very high velocity and are in huge volume requires a distributed framework with high through-put and low latency. In this research, statistical method has been implemented for finding the suspicious asso...
Chapter
Coronary artery disease (CAD) has become very common nowadays and is the leading cause of death across the world. In this paper, an attempt has been made to develop a model for the classification of CAD by using clinical features, ECG, and features from laboratory tests of patients. Optimum features were selected with the help of domain expert advi...
Conference Paper
The guided navigation has enabled users with minimal amount of training to navigate and perform flight mission of micro unmanned aerial vehicle (MAV). In non-urban areas, where there are no other aerial traffic and congestion, MAV takeoff & travel does not need much Global Positioning System (GPS) accuracy. The critical part seems to be during the...
Chapter
The guided navigation has enabled users with minimal amount of training to navigate and perform flight mission of micro unmanned aerial vehicle (MAV). In non-urban areas, where there are no other aerial traffic and congestion, MAV take-off & travel does not need much Global Positioning System (GPS) accuracy. The critical part seems to be during the...
Conference Paper
Communication is an important part of life. To use communication technology efficiently we need to know how to use them or how to instruct these devices to perform tasks. Automatic speech recognition plays an important role in interaction with the technology. Nepali speech recognition involves in conversion of Nepali speech to its correct Nepali tr...
Article
Full-text available
Today data structuring, processing and transforming data from one system to another regardless of source is a big need. Need of big data was felt almost when first GPS technology was introduced. GPS technology has evolved significantly since big data technology became widely used. Big Data has long been the subject of interest for Computer Science...
Conference Paper
Identifying anomalies from log data for insider threat detection is practically a very challenging task for security analysts. User behavior modeling is very important for the identification of these anomalies. This paper presents unsupervised user behavior modeling for anomaly detection. The proposed approach uses LSTM based Autoencoder to model u...
Conference Paper
Full-text available
Automatic emotion recognition is a challenging task as human uses more than one varieties of modalities to express their emotion. The applications of emotional intelligence can be found in many domains including multimedia retrieval and human-computer interaction. With arrival of deep neural network, there is great success in determining emotional...
Technical Report
The project is initiated in accordance with the Contract Agreement between “The Water Resource Research and Development Centre (WRRDC)”, herein after referred to as the “WRRDC”, and “Laboratory for Information and Communication Technology, Information and Communication Technology Center, Institute of Engineering (IOE), Tribhuvan University (TU), he...
Conference Paper
Surveillance cameras are widely being used in public places for security and monitoring purposes. Detecting abnormal motion pattern from surveillance video sequences is challenging task. Most of the existing methods are based on supervised technique. Supervised method groups feature points into normal and abnormal motion pattern using classifier. B...
Conference Paper
Full-text available
Pattern recognition is very important for the identification of anomalous patterns in log messages. This paper presents pattern recognition in time series log data for anomaly detection. The proposed method uses Seasonal Auto Regression Integrated Moving Average (Seasonal ARIMA) to identify deviations between actual and predicted values. The deviat...
Article
Full-text available
This paper presents a Neural Network based Nepali Speech Recognition model. RNN (Recurrent Neural Networks) is used for processing sequential audio data. CTC (Connectionist Temporal Classification) technique is applied allowing RNN to train over audio data. CTC is a probabilistic approach of maximizing the occurrence probability of the desired labe...
Article
Full-text available
Image classification is a popular machine learning based applications of deep learning. Deep learning techniques are very popular because they can be effectively used in performing operations on image data in large-scale. In this paper CNN model was designed to better classify images. We make use of feature extraction part of inception v3 model for...
Article
Full-text available
Analysis of log message is very important for the identification of a suspicious system and network activity. This analysis requires the correct extraction of variable entities. The variable entities are extracted by comparing the logs messages against the log patterns. Each of these log patterns can be represented in the form of a log signature. I...
Conference Paper
Full-text available
Computer vision plays important role in Intelligent Transportation System (ITS) for traffic management and surveillance. This paper implements existing vision-based detection and tracking algorithms to detect and track motorcycles. While few research has been carried out for vehicle detection, but no research has been carried as far known for track...
Research
Full-text available
I used LeNet, an architecture of convolutional neural network, to classify Nepali data-sets from 0 to 9. The number of images used to train was 2000 for training purposes and 200 for validation purposes. My network consists of 2 convolutional layers with 2 max pooling layers and RELU as my activation function with 2 dense layers and also used softm...
Conference Paper
Object detection is the task of recognizing and localizing objects in an image. Object detection in images have many applications including object counting, Visual Search Engine, security, surveillance etc. Deep Learning based techniques for object detection are divided into two categories as region based approch and single shot approach. In this p...
Conference Paper
The advent of internet and the growing number of digital media has increased the necessity of Music Information Retrieval systems within which Music Classification is a prominent task. Here, we present methods to perform genre based classification over five different genre and mood based classification using a mood model that maps mood onto a two-d...
Conference Paper
This research provides a statistical method for detecting anomaly using multivariate data from system metrics. The spectral anomaly detection technique has been implemented using PCA (Principal Component Analysis) as unsupervised method to detect anomaly from data consisting of both normal and abnormal events. A comparison has been done with anothe...
Conference Paper
Full-text available
Mining patterns from the log messages is valuable for real-time analysis and detecting faults, anomaly and security threats. A data-streaming algorithm with an efficient pattern finding approach is more practical way to classify these ubiquitous logs. Thus, in this paper the authors propose a novel online approach for finding patterns in log data s...
Article
Full-text available
Log files consists of several independent lines of text data and contains information about the events from one or different services which may come from one or more nodes on the network. Mining patterns from these log messages are valuable for real-time analysis of network behavior and then detecting fault, anomaly and security threats. A sequenti...
Article
In the new trend of 3D image velocimetry techniques for flow measurement, particle streak visualization is attempted in order to apply it to tomographic reconstruction of 3D particle streaks. The reconstructed particle streaks are then morphologically analyzed and their locations and three vector components are quantified. The velocity recovery res...
Article
Novel 3D image analysis and particle matching techniques for the use in the volumetric particle tracking velocimetry have been developed and tested by using synthetic images and experimental images of unsteady 3D flows. A tomography based particle reconstruction scheme along with the subsequent process of individual particle detection and validatio...
Article
Full-text available
http://repository.tudelft.nl/assets/uuid:b472e0a1-89a8-41b0-a8c8-b0bb0a94c916/A160_paper.pdf
Article
Full-text available
Camera calibration is just an entry process but eventually an essential part of every particle image based velocity measurement technique. In the present paper, three representative camera calibration models are tested and their accuracy is compared for the use in the 3D particle tracking velocimetry (PTV). The three camera calibration models, prop...
Article
Novel methodology of 3D particle tracking velocimetry (PTV) has been developed for the use in full 3D flow diagnosis experiments. The new PTV method makes use of an algebraic tomographic reconstruction technique for estimating the 3D locations of seeding particles in the measurement volume which is illuminated by a volumetric light source. After de...
Article
Full-text available
New algorithms of 3D particle tracking velocimetry (3D PTV) based on a tomographic reconstruction approach have been developed and tested by using synthetic images of unsteady 3D flows. The new algorithms are considered not only in the tomographic reconstruction process of the fluid volume with particles but also in the subsequent process of indivi...
Conference Paper
A self-organizing map (SOM) based algorithm has been developed for 3-D particle tracking velocimetry (3-D PTV) in stereoscopic particle pairing process. In this process every particle image in the left-camera frame should be paired with the most probably correct partner in the right-camera frame or vice versa for evaluating the exact coordinate. In...
Article
Full-text available
Digital holography appears to be the next-generation technology for holographic diagnostics of particle fields and has been applied to holographic particle tracking flow measurements. In the digital holography, the Fresnel or Fourier holograms are recorded directly by the CCD or CMOS cameras and stored digitally. No film material involving wet-chem...

Questions

Questions (5)
Question
We are using CMU-CERT r4.2 dataset for performing Insider threat detection. Are there any alternative to this data set?
Question
We don't have servers with high specs and with GPUs.
We want access to cloud resources for running students projects and thesis.
Question
We are looking for best algorithm for real-time object detection.
We are looking for tools for this implementation
Question
How can we collect dataset similar to KDDcup 99 dataset in real environment? We want to check the performance of an unsupervised anomaly algorithm by collecting real dataset 

Network

Cited By