-
AipanVR: A Virtual Reality Experience for Preserving Uttarakhand's Traditional Art Form
Authors:
Nishant Chaudhary,
Mihir Raj,
Richik Bhattacharjee,
Anmol Srivastava,
Rakesh Sah,
Pankaj Badoni
Abstract:
This paper presents a demonstration of the developed prototype showcasing a way to preserve the Intangible Cultural Heritage of Uttarakhand, India. Aipan is a traditional art form practiced in the Kumaon region in the state of Uttarakhand. It is typically used to decorate floors and walls at places of worship or entrances of homes and is considered auspicious to begin any work or event. This art i…
▽ More
This paper presents a demonstration of the developed prototype showcasing a way to preserve the Intangible Cultural Heritage of Uttarakhand, India. Aipan is a traditional art form practiced in the Kumaon region in the state of Uttarakhand. It is typically used to decorate floors and walls at places of worship or entrances of homes and is considered auspicious to begin any work or event. This art is associated with a great degree of social, cultural as well as religious significance and is passed from generation to generation. However, in the present era of modernization and technological advancements, this art form now stands on the verge of depletion. This study presents a humble attempt to preserve this vanishing art form through the use of Virtual Reality (VR). Ethnographic studies were conducted in Almora, Nainital, and Haldwani regions of Uttarakhand to trace the origins as well as to gain a deeper understanding of this art form. A total of ten (N =10) Aipan designers were interviewed. Several interesting insights are revealed through these studies that show the potential to be incorporated as a VR experience.
△ Less
Submitted 19 April, 2024;
originally announced April 2024.
-
PDB-Struct: A Comprehensive Benchmark for Structure-based Protein Design
Authors:
Chuanrui Wang,
Bozitao Zhong,
Zuobai Zhang,
Narendra Chaudhary,
Sanchit Misra,
Jian Tang
Abstract:
Structure-based protein design has attracted increasing interest, with numerous methods being introduced in recent years. However, a universally accepted method for evaluation has not been established, since the wet-lab validation can be overly time-consuming for the development of new algorithms, and the $\textit{in silico}$ validation with recovery and perplexity metrics is efficient but may not…
▽ More
Structure-based protein design has attracted increasing interest, with numerous methods being introduced in recent years. However, a universally accepted method for evaluation has not been established, since the wet-lab validation can be overly time-consuming for the development of new algorithms, and the $\textit{in silico}$ validation with recovery and perplexity metrics is efficient but may not precisely reflect true foldability. To address this gap, we introduce two novel metrics: refoldability-based metric, which leverages high-accuracy protein structure prediction models as a proxy for wet lab experiments, and stability-based metric, which assesses whether models can assign high likelihoods to experimentally stable proteins. We curate datasets from high-quality CATH protein data, high-throughput $\textit{de novo}$ designed proteins, and mega-scale experimental mutagenesis experiments, and in doing so, present the $\textbf{PDB-Struct}$ benchmark that evaluates both recent and previously uncompared protein design methods. Experimental results indicate that ByProt, ProteinMPNN, and ESM-IF perform exceptionally well on our benchmark, while ESM-Design and AF-Design fall short on the refoldability metric. We also show that while some methods exhibit high sequence recovery, they do not perform as well on our new benchmark. Our proposed benchmark paves the way for a fair and comprehensive evaluation of protein design methods in the future. Code is available at https://github.com/WANG-CR/PDB-Struct.
△ Less
Submitted 29 November, 2023;
originally announced December 2023.
-
Unified Singular Protocol Flow for OAuth (USPFO) Ecosystem
Authors:
Jaimandeep Singh,
Naveen Kumar Chaudhary
Abstract:
OAuth 2.0 is a popular authorization framework that allows third-party clients such as websites and mobile apps to request limited access to a user's account on another application. The specification classifies clients into different types based on their ability to keep client credentials confidential. It also describes different grant types for obtaining access to the protected resources, with th…
▽ More
OAuth 2.0 is a popular authorization framework that allows third-party clients such as websites and mobile apps to request limited access to a user's account on another application. The specification classifies clients into different types based on their ability to keep client credentials confidential. It also describes different grant types for obtaining access to the protected resources, with the authorization code and implicit grants being the most commonly used. Each client type and associated grant type have their unique security and usability considerations. In this paper, we propose a new approach for OAuth ecosystem that combines different client and grant types into a unified singular protocol flow for OAuth (USPFO), which can be used by both confidential and public clients. This approach aims to reduce the vulnerabilities associated with implementing and configuring different client types and grant types. Additionally, it provides built-in protections against known OAuth 2.0 vulnerabilities such as client impersonation, token (or code) thefts and replay attacks through integrity, authenticity, and audience binding. The proposed USPFO is largely compatible with existing Internet Engineering Task Force (IETF) Proposed Standard Request for Comments (RFCs), OAuth 2.0 extensions and active internet drafts.
△ Less
Submitted 2 August, 2023; v1 submitted 29 January, 2023;
originally announced January 2023.
-
Accelerating Barnes-Hut t-SNE Algorithm by Efficient Parallelization on Multi-Core CPUs
Authors:
Narendra Chaudhary,
Alexander Pivovar,
Pavel Yakovlev,
Andrey Gorshkov,
Sanchit Misra
Abstract:
t-SNE remains one of the most popular embedding techniques for visualizing high-dimensional data. Most standard packages of t-SNE, such as scikit-learn, use the Barnes-Hut t-SNE (BH t-SNE) algorithm for large datasets. However, existing CPU implementations of this algorithm are inefficient. In this work, we accelerate the BH t-SNE on CPUs via cache optimizations, SIMD, parallelizing sequential ste…
▽ More
t-SNE remains one of the most popular embedding techniques for visualizing high-dimensional data. Most standard packages of t-SNE, such as scikit-learn, use the Barnes-Hut t-SNE (BH t-SNE) algorithm for large datasets. However, existing CPU implementations of this algorithm are inefficient. In this work, we accelerate the BH t-SNE on CPUs via cache optimizations, SIMD, parallelizing sequential steps, and improving parallelization of multithreaded steps. Our implementation (Acc-t-SNE) is up to 261x and 4x faster than scikit-learn and the state-of-the-art BH t-SNE implementation from daal4py, respectively, on a 32-core Intel(R) Icelake cloud instance.
△ Less
Submitted 22 December, 2022;
originally announced December 2022.
-
Resilient Risk based Adaptive Authentication and Authorization (RAD-AA) Framework
Authors:
Jaimandeep Singh,
Chintan Patel,
Naveen Kumar Chaudhary
Abstract:
In recent cyber attacks, credential theft has emerged as one of the primary vectors of gaining entry into the system. Once attacker(s) have a foothold in the system, they use various techniques including token manipulation to elevate the privileges and access protected resources. This makes authentication and token based authorization a critical component for a secure and resilient cyber system. I…
▽ More
In recent cyber attacks, credential theft has emerged as one of the primary vectors of gaining entry into the system. Once attacker(s) have a foothold in the system, they use various techniques including token manipulation to elevate the privileges and access protected resources. This makes authentication and token based authorization a critical component for a secure and resilient cyber system. In this paper we discuss the design considerations for such a secure and resilient authentication and authorization framework capable of self-adapting based on the risk scores and trust profiles. We compare this design with the existing standards such as OAuth 2.0, OpenID Connect and SAML 2.0. We then study popular threat models such as STRIDE and PASTA and summarize the resilience of the proposed architecture against common and relevant threat vectors. We call this framework as Resilient Risk based Adaptive Authentication and Authorization (RAD-AA). The proposed framework excessively increases the cost for an adversary to launch and sustain any cyber attack and provides much-needed strength to critical infrastructure. We also discuss the machine learning (ML) approach for the adaptive engine to accurately classify transactions and arrive at risk scores.
△ Less
Submitted 29 November, 2022; v1 submitted 4 August, 2022;
originally announced August 2022.
-
Efficient and Generic 1D Dilated Convolution Layer for Deep Learning
Authors:
Narendra Chaudhary,
Sanchit Misra,
Dhiraj Kalamkar,
Alexander Heinecke,
Evangelos Georganas,
Barukh Ziv,
Menachem Adelman,
Bharat Kaul
Abstract:
Convolutional neural networks (CNNs) have found many applications in tasks involving two-dimensional (2D) data, such as image classification and image processing. Therefore, 2D convolution layers have been heavily optimized on CPUs and GPUs. However, in many applications - for example genomics and speech recognition, the data can be one-dimensional (1D). Such applications can benefit from optimize…
▽ More
Convolutional neural networks (CNNs) have found many applications in tasks involving two-dimensional (2D) data, such as image classification and image processing. Therefore, 2D convolution layers have been heavily optimized on CPUs and GPUs. However, in many applications - for example genomics and speech recognition, the data can be one-dimensional (1D). Such applications can benefit from optimized 1D convolution layers. In this work, we introduce our efficient implementation of a generic 1D convolution layer covering a wide range of parameters. It is optimized for x86 CPU architectures, in particular, for architectures containing Intel AVX-512 and AVX-512 BFloat16 instructions. We use the LIBXSMM library's batch-reduce General Matrix Multiplication (BRGEMM) kernel for FP32 and BFloat16 precision. We demonstrate that our implementation can achieve up to 80% efficiency on Intel Xeon Cascade Lake and Cooper Lake CPUs. Additionally, we show the generalization capability of our BRGEMM based approach by achieving high efficiency across a range of parameters. We consistently achieve higher efficiency than the 1D convolution layer with Intel oneDNN library backend for varying input tensor widths, filter widths, number of channels, filters, and dilation parameters. Finally, we demonstrate the performance of our optimized 1D convolution layer by utilizing it in the end-to-end neural network training with real genomics datasets and achieve up to 6.86x speedup over the oneDNN library-based implementation on Cascade Lake CPUs. We also demonstrate the scaling with 16 sockets of Cascade/Cooper Lake CPUs and achieve significant speedup over eight V100 GPUs using a similar power envelop. In the end-to-end training, we get a speedup of 1.41x on Cascade Lake with FP32, 1.57x on Cooper Lake with FP32, and 2.27x on Cooper Lake with BFloat16 over eight V100 GPUs with FP32.
△ Less
Submitted 16 April, 2021;
originally announced April 2021.
-
Tensor Processing Primitives: A Programming Abstraction for Efficiency and Portability in Deep Learning & HPC Workloads
Authors:
Evangelos Georganas,
Dhiraj Kalamkar,
Sasikanth Avancha,
Menachem Adelman,
Deepti Aggarwal,
Cristina Anderson,
Alexander Breuer,
Jeremy Bruestle,
Narendra Chaudhary,
Abhisek Kundu,
Denise Kutnick,
Frank Laub,
Vasimuddin Md,
Sanchit Misra,
Ramanarayan Mohanty,
Hans Pabst,
Brian Retford,
Barukh Ziv,
Alexander Heinecke
Abstract:
During the past decade, novel Deep Learning (DL) algorithms, workloads and hardware have been developed to tackle a wide range of problems. Despite the advances in workload and hardware ecosystems, the programming methodology of DL systems is stagnant. DL workloads leverage either highly-optimized, yet platform-specific and inflexible kernels from DL libraries, or in the case of novel operators, r…
▽ More
During the past decade, novel Deep Learning (DL) algorithms, workloads and hardware have been developed to tackle a wide range of problems. Despite the advances in workload and hardware ecosystems, the programming methodology of DL systems is stagnant. DL workloads leverage either highly-optimized, yet platform-specific and inflexible kernels from DL libraries, or in the case of novel operators, reference implementations are built via DL framework primitives with underwhelming performance. This work introduces the Tensor Processing Primitives (TPP), a programming abstraction striving for efficient, portable implementation of DL workloads with high-productivity. TPPs define a compact, yet versatile set of 2D-tensor operators (or a virtual Tensor ISA), which subsequently can be utilized as building-blocks to construct complex operators on high-dimensional tensors. The TPP specification is platform-agnostic, thus code expressed via TPPs is portable, whereas the TPP implementation is highly-optimized and platform-specific. We demonstrate the efficacy and viability of our approach using standalone kernels and end-to-end DL & HPC workloads expressed entirely via TPPs that outperform state-of-the-art implementations on multiple platforms.
△ Less
Submitted 30 November, 2021; v1 submitted 12 April, 2021;
originally announced April 2021.
-
Magnetic Structure and dielectric properties of antiferromagnetic FeCrO3
Authors:
Rajesh kumar R,
C. Dhanasekhar,
N. Vijay Prakash Chaudhary,
A. Das,
A. Venimadhav
Abstract:
We report the enhancement of Néel temperature of Cr2O3 by replacing 50% of Cr by Fe prepared by sol-gel method. The structural analysis by neutron diffraction has revealed that FeCrO3 belongs to a corundum structure (R-3c space group) with an antiferromagnetic spin structure having collinear spins along a-axis with propagation vector k=0; the high-temperature magnetisation study indicated a Néel t…
▽ More
We report the enhancement of Néel temperature of Cr2O3 by replacing 50% of Cr by Fe prepared by sol-gel method. The structural analysis by neutron diffraction has revealed that FeCrO3 belongs to a corundum structure (R-3c space group) with an antiferromagnetic spin structure having collinear spins along a-axis with propagation vector k=0; the high-temperature magnetisation study indicated a Néel temperature of 560 K. The enhancement in Néel temperature has been attributed to the strong orbital hybridization that leads to change in nearest neighbor bond angle and bond distances. Impedance spectroscopy has revealed conduction mechanism at low temperature is due to the polaron hop** while extrinsic contributions from the Maxwell-Wagner dominant at high temperatures
△ Less
Submitted 25 November, 2019;
originally announced November 2019.
-
Data Preprocessing for Evaluation of Recommendation Models in E-Commerce
Authors:
Namrata Chaudhary,
Drimik Roy Chowdhury
Abstract:
E-commerce businesses employ recommender models to assist in identifying a personalized set of products for each visitor. To accurately assess the recommendations' influence on customer clicks and buys, three target areas -- customer behavior, data collection, user-interface -- will be explored for possible sources of erroneous data. Varied customer behavior misrepresents the recommendations' true…
▽ More
E-commerce businesses employ recommender models to assist in identifying a personalized set of products for each visitor. To accurately assess the recommendations' influence on customer clicks and buys, three target areas -- customer behavior, data collection, user-interface -- will be explored for possible sources of erroneous data. Varied customer behavior misrepresents the recommendations' true influence on a customer due to the presence of B2B interactions and outlier customers. Non-parametric statistical procedures for outlier removal are delineated and other strategies are investigated to account for the effect of a large percentage of new customers or high bounce rates. Subsequently, in data collection we identify probable misleading interactions in the raw data, propose a robust method of tracking unique visitors, and accurately attributing the buy influence for combo products. Lastly, user-interface issues discuss the possible problems caused due to the recommendation widget's positioning on the e-commerce website and the stringent conditions that should be imposed when utilizing data from the product listing page. This collective methodology results in an exact and valid estimation of the customer's interactions influenced by the recommendation model in the context of standard industry metrics, such as Click-through rates, Buy-through rates, and Conversion revenue.
△ Less
Submitted 25 October, 2019;
originally announced November 2019.
-
Deep 3D Convolutional Neural Network for Automated Lung Cancer Diagnosis
Authors:
Sumita Mishra,
Naresh Kumar Chaudhary,
Pallavi Asthana,
Anil Kumar
Abstract:
Computer Aided Diagnosis has emerged as an indispensible technique for validating the opinion of radiologists in CT interpretation. This paper presents a deep 3D Convolutional Neural Network (CNN) architecture for automated CT scan-based lung cancer detection system. It utilizes three dimensional spatial information to learn highly discriminative 3 dimensional features instead of 2D features like…
▽ More
Computer Aided Diagnosis has emerged as an indispensible technique for validating the opinion of radiologists in CT interpretation. This paper presents a deep 3D Convolutional Neural Network (CNN) architecture for automated CT scan-based lung cancer detection system. It utilizes three dimensional spatial information to learn highly discriminative 3 dimensional features instead of 2D features like texture or geometric shape whick need to be generated manually. The proposed deep learning method automatically extracts the 3D features on the basis of spatio-temporal statistics.The developed model is end-to-end and is able to predict malignancy of each voxel for given input scan. Simulation results demonstrate the effectiveness of proposed 3D CNN network for classification of lung nodule in-spite of limited computational capabilities.
△ Less
Submitted 4 May, 2019;
originally announced June 2019.
-
Expanding Click and Buy rates: Exploration of evaluation metrics that measure the impact of personalized recommendation engines on e-commerce platforms
Authors:
Namrata Chaudhary,
Drimik Roy Chowdhury
Abstract:
To identify the most appropriate recommendation model for an e-commerce business, a live evaluation should be performed on the shop** website to measure the influence of personalization in real-time. The aim of this paper is to introduce and justify two new metrics -- CTR NoRepeat and Click & Buy rate -- which stem from the standard metrics, Click-through(CTR) and Buy-through rate(BTR), respecti…
▽ More
To identify the most appropriate recommendation model for an e-commerce business, a live evaluation should be performed on the shop** website to measure the influence of personalization in real-time. The aim of this paper is to introduce and justify two new metrics -- CTR NoRepeat and Click & Buy rate -- which stem from the standard metrics, Click-through(CTR) and Buy-through rate(BTR), respectively. The former variation tackles the issue of overestimation of clicks in the original CTR while the latter accounts for noting purchases of products that have been previously clicked, in order to validate that the buy included in the metric is a result of customer interactions. A significance test for independence of two means is conducted for multiple datasets, between each of the new metrics and its respective parent to determine the novelty and necessity of the variants. The Pearson-correlation coefficient is calculated to assess the strength of the linear relationships and conclude on the predictability factor amongst the aforementioned factors to investigate unknown connections between customer clicks and buys. Additionally, other metrics such as hits per customer, buyers per customer, clicks per customer etc. are introduced that help explain indicators of customer behavior on the e-commerce website in reference.
△ Less
Submitted 20 January, 2019;
originally announced January 2019.
-
Absence of dipolar ordering in Co doped CuO
Authors:
N Vijay Prakash Chaudhary,
J. Krishna Murthy,
A. Venimadhav
Abstract:
Polycrystalline CuO samples with Co do** were prepared by solid state method with flowing oxygen condition and examined their structural and multiferroic properties. Structural studies have confirmed single phase monoclinic crystal structure of all samples, however, in Co doped samples a decrease in volume with an increase in monoclinic distortion is found. For pristine sample, temperature depen…
▽ More
Polycrystalline CuO samples with Co do** were prepared by solid state method with flowing oxygen condition and examined their structural and multiferroic properties. Structural studies have confirmed single phase monoclinic crystal structure of all samples, however, in Co doped samples a decrease in volume with an increase in monoclinic distortion is found. For pristine sample, temperature dependent magnetization has confirmed two antiferromagnetic (AFM) transitions at 213 K and 230 K and frequency independent dielectric peaks at these AFM transitions suggesting the ferroelectric nature. Magnetization of the Co doped samples has showed a marginal increase in ordering temperature of the high-temperature AFM transition and decrease in low temperature AFM ordering temperature. Further, doped samples have shown giant dielectric constant with no signature of ferroelectricity. The x-ray photoelectric spectroscopy study has revealed multiple valance states for both Co and Cu in the doped samples that simultaneously explain the giant dielectric constant and suppression of ferroelectric order.
△ Less
Submitted 16 August, 2016;
originally announced August 2016.
-
Lossless Layout Image Compression Algorithms for Electron-Beam Direct-Write Lithography
Authors:
Narendra Chaudhary,
Yao Luo,
Serap A. Savari,
Roger McCay
Abstract:
Electron-beam direct-write (EBDW) lithography systems must in the future transmit terabits of information per second to be viable for commercial semiconductor manufacturing. Lossless layout image compression algorithms with high decoding throughputs and modest decoding resources are tools to address the data transfer portion of the throughput problem. The earlier lossless layout image compression…
▽ More
Electron-beam direct-write (EBDW) lithography systems must in the future transmit terabits of information per second to be viable for commercial semiconductor manufacturing. Lossless layout image compression algorithms with high decoding throughputs and modest decoding resources are tools to address the data transfer portion of the throughput problem. The earlier lossless layout image compression algorithm Corner2 is designed for binary layout images on raster-scanning systems. We propose variations of Corner2 collectively called Corner2-EPC and Paeth-EPC which apply to electron-beam proximity corrected layout images and offer interesting trade-offs between compression ratios and decoding speeds. Most of our algorithms achieve better overall compression performance than PNG, Block C4 and LineDiffEntropy while having low decoding times and resources.
△ Less
Submitted 18 August, 2015; v1 submitted 24 May, 2015;
originally announced May 2015.
-
Speaker Identification From Youtube Obtained Data
Authors:
Nitesh Kumar Chaudhary
Abstract:
An efficient, and intuitive algorithm is presented for the identification of speakers from a long dataset (like YouTube long discussion, Cocktail party recorded audio or video).The goal of automatic speaker identification is to identify the number of different speakers and prepare a model for that speaker by extraction, characterization and speaker-specific information contained in the speech sign…
▽ More
An efficient, and intuitive algorithm is presented for the identification of speakers from a long dataset (like YouTube long discussion, Cocktail party recorded audio or video).The goal of automatic speaker identification is to identify the number of different speakers and prepare a model for that speaker by extraction, characterization and speaker-specific information contained in the speech signal. It has many diverse application specially in the field of Surveillance, Immigrations at Airport, cyber security, transcription in multi-source of similar sound source, where it is difficult to assign transcription arbitrary. The most commonly speech parametrization used in speaker verification, K-mean, cepstral analysis, is detailed. Gaussian mixture modeling, which is the speaker modeling technique is then explained. Gaussian mixture models (GMM), perhaps the most robust machine learning algorithm has been introduced examine and judge carefully speaker identification in text independent. The application or employment of Gaussian mixture models for monitoring & Analysing speaker identity is encouraged by the familiarity, awareness, or understanding gained through experience that Gaussian spectrum depict the characteristics of speaker's spectral conformational pattern and remarkable ability of GMM to construct capricious densities after that we illustrate 'Expectation maximization' an iterative algorithm which takes some arbitrary value in initial estimation and carry on the iterative process until the convergence of value is observed,so by doing various number of experiments we are able to obtain 79 ~ 82% of identification rate using Vector quantization and 85 ~ 92.6% of identification rate using GMM modeling by Expectation maximization parameter estimation depending on variation of parameter.
△ Less
Submitted 11 November, 2014;
originally announced November 2014.
-
Overview of Optical Interconnect Technology
Authors:
Sumita Mishra,
Naresh K Chaudhary,
Kalyan Singh
Abstract:
Optical interconnect is seen as a potential solution to meet the performance requirements of current and future generation of data processors. Optical interconnects have negligible frequency dependent loss, low cross talk and high band width. Optical interconnects are not much used commercially since optical interconnects technology is incompatible with manufacturing processes and assembly methods…
▽ More
Optical interconnect is seen as a potential solution to meet the performance requirements of current and future generation of data processors. Optical interconnects have negligible frequency dependent loss, low cross talk and high band width. Optical interconnects are not much used commercially since optical interconnects technology is incompatible with manufacturing processes and assembly methods that are currently used in the semiconductor industry. There are many promising optical interconnect technologies and this paper presents a brief analysis of current state of optical interconnect technology.
△ Less
Submitted 16 March, 2013;
originally announced March 2013.
-
Simulation and Optimization of MQW based optical modulator for on chip optical interconnect
Authors:
Sumita Mishra,
Naresh K. Chaudhary,
Kalyan Singh
Abstract:
Optical interconnects are foreseen as a potential solution to improve the performance of data transmission in high speed integrated circuits since electrical interconnects operating at high bit rates have several limitations which creates a bottleneck at the interconnect level. The objective of the work is to model and then simulate the MQWM based optical interconnect transmitter. The power output…
▽ More
Optical interconnects are foreseen as a potential solution to improve the performance of data transmission in high speed integrated circuits since electrical interconnects operating at high bit rates have several limitations which creates a bottleneck at the interconnect level. The objective of the work is to model and then simulate the MQWM based optical interconnect transmitter. The power output of the simulated modulator is then optimized with respect to various parameters namely contrast ratio, insertion loss and bias current. The methodology presented here is suitable for investigation of both analog and digital modulation performance but it primarily deals with digital modulation. We have not included the effect of carrier charge density in multiple quantum well simulation.
△ Less
Submitted 29 September, 2011;
originally announced September 2011.