-
Evaluating Telugu Proficiency in Large Language Models_ A Comparative Analysis of ChatGPT and Gemini
Authors:
Katikela Sreeharsha Kishore,
Rahimanuddin Shaik
Abstract:
The growing prominence of large language models (LLMs) necessitates the exploration of their capabilities beyond English. This research investigates the Telugu language proficiency of ChatGPT and Gemini, two leading LLMs. Through a designed set of 20 questions encompassing greetings, grammar, vocabulary, common phrases, task completion, and situational reasoning, the study delves into their streng…
▽ More
The growing prominence of large language models (LLMs) necessitates the exploration of their capabilities beyond English. This research investigates the Telugu language proficiency of ChatGPT and Gemini, two leading LLMs. Through a designed set of 20 questions encompassing greetings, grammar, vocabulary, common phrases, task completion, and situational reasoning, the study delves into their strengths and weaknesses in handling Telugu. The analysis aims to identify the LLM that demonstrates a deeper understanding of Telugu grammatical structures, possesses a broader vocabulary, and exhibits superior performance in tasks like writing and reasoning. By comparing their ability to comprehend and use everyday Telugu expressions, the research sheds light on their suitability for real-world language interaction. Furthermore, the evaluation of adaptability and reasoning capabilities provides insights into how each LLM leverages Telugu to respond to dynamic situations. This comparative analysis contributes to the ongoing discussion on multilingual capabilities in AI and paves the way for future research in develo** LLMs that can seamlessly integrate with Telugu-speaking communities.
△ Less
Submitted 30 April, 2024;
originally announced April 2024.
-
Waring Problem for Matrices over Finite Fields
Authors:
Krishna Kishore,
Adrian Vasiu,
Sailun Zhan
Abstract:
We prove that for all integers $k \geq 1$, $q\ge (k-1)^4+ 6k$, and $m \geq 1$, every matrix in $ M_m(\mathbb F_q)$ is a sum of two kth powers: $M_m(\mathbb F_q)=\{A^k+B^k|A,B\in M_m(\mathbb F_q)\}$. We further generalize and refine this result in the cases when both $B$ and $C$ can be chosen to be invertible, cyclic, or split semisimple, when $k$ is coprime to $p$, or when $m$ is sufficiently larg…
▽ More
We prove that for all integers $k \geq 1$, $q\ge (k-1)^4+ 6k$, and $m \geq 1$, every matrix in $ M_m(\mathbb F_q)$ is a sum of two kth powers: $M_m(\mathbb F_q)=\{A^k+B^k|A,B\in M_m(\mathbb F_q)\}$. We further generalize and refine this result in the cases when both $B$ and $C$ can be chosen to be invertible, cyclic, or split semisimple, when $k$ is coprime to $p$, or when $m$ is sufficiently large. We also give a criterion for the Waring problem in terms of stabilizers.
△ Less
Submitted 13 March, 2024; v1 submitted 11 June, 2023;
originally announced June 2023.
-
Document Image Binarization in JPEG Compressed Domain using Dual Discriminator Generative Adversarial Networks
Authors:
Bulla Rajesh,
Manav Kamlesh Agrawal,
Milan Bhuva,
Kisalaya Kishore,
Mohammed Javed
Abstract:
Image binarization techniques are being popularly used in enhancement of noisy and/or degraded images catering different Document Image Anlaysis (DIA) applications like word spotting, document retrieval, and OCR. Most of the existing techniques focus on feeding pixel images into the Convolution Neural Networks to accomplish document binarization, which may not produce effective results when workin…
▽ More
Image binarization techniques are being popularly used in enhancement of noisy and/or degraded images catering different Document Image Anlaysis (DIA) applications like word spotting, document retrieval, and OCR. Most of the existing techniques focus on feeding pixel images into the Convolution Neural Networks to accomplish document binarization, which may not produce effective results when working with compressed images that need to be processed without full decompression. Therefore in this research paper, the idea of document image binarization directly using JPEG compressed stream of document images is proposed by employing Dual Discriminator Generative Adversarial Networks (DD-GANs). Here the two discriminator networks - Global and Local work on different image ratios and use focal loss as generator loss. The proposed model has been thoroughly tested with different versions of DIBCO dataset having challenges like holes, erased or smudged ink, dust, and misplaced fibres. The model proved to be highly robust, efficient both in terms of time and space complexities, and also resulted in state-of-the-art performance in JPEG compressed domain.
△ Less
Submitted 13 September, 2022;
originally announced September 2022.
-
Matrix Waring Problem -- II
Authors:
Krishna Kishore,
Anupam Singh
Abstract:
We prove that for all integers $k \geq 1$, there exists a constant $C_k$ depending only on $k$ such that for all $q > C_k$ and for all $n \geq 1$ every matrix in $M_n(\mathbb F_q)$ is a sum of two $k$th powers.
We prove that for all integers $k \geq 1$, there exists a constant $C_k$ depending only on $k$ such that for all $q > C_k$ and for all $n \geq 1$ every matrix in $M_n(\mathbb F_q)$ is a sum of two $k$th powers.
△ Less
Submitted 5 May, 2023; v1 submitted 10 May, 2022;
originally announced May 2022.
-
Matrix Waring Problem
Authors:
Krishna Kishore
Abstract:
We prove that for all integers $k \geq 1$, there exists a constant $C_k$ depending only on $k$, such that for all $q > C_k$, and for $n = 1, 2$ every matrix in $M_n(\mathbb{F}_q)$ is a sum of two $k$th powers and for all $n \geq 3$ every matrix in $M_n(\mathbb{F}_q)$ is a sum of at most three $k$th powers.
We prove that for all integers $k \geq 1$, there exists a constant $C_k$ depending only on $k$, such that for all $q > C_k$, and for $n = 1, 2$ every matrix in $M_n(\mathbb{F}_q)$ is a sum of two $k$th powers and for all $n \geq 3$ every matrix in $M_n(\mathbb{F}_q)$ is a sum of at most three $k$th powers.
△ Less
Submitted 23 November, 2021;
originally announced November 2021.
-
Software-Hardware Co-design for Fast and Scalable Training of Deep Learning Recommendation Models
Authors:
Dheevatsa Mudigere,
Yuchen Hao,
Jianyu Huang,
Zhihao Jia,
Andrew Tulloch,
Srinivas Sridharan,
Xing Liu,
Mustafa Ozdal,
Jade Nie,
Jongsoo Park,
Liang Luo,
Jie Amy Yang,
Leon Gao,
Dmytro Ivchenko,
Aarti Basant,
Yuxi Hu,
Jiyan Yang,
Ehsan K. Ardestani,
Xiaodong Wang,
Rakesh Komuravelli,
Ching-Hsiang Chu,
Serhat Yilmaz,
Huayu Li,
Jiyuan Qian,
Zhuobo Feng
, et al. (28 additional authors not shown)
Abstract:
Deep learning recommendation models (DLRMs) are used across many business-critical services at Facebook and are the single largest AI application in terms of infrastructure demand in its data-centers. In this paper we discuss the SW/HW co-designed solution for high-performance distributed training of large-scale DLRMs. We introduce a high-performance scalable software stack based on PyTorch and pa…
▽ More
Deep learning recommendation models (DLRMs) are used across many business-critical services at Facebook and are the single largest AI application in terms of infrastructure demand in its data-centers. In this paper we discuss the SW/HW co-designed solution for high-performance distributed training of large-scale DLRMs. We introduce a high-performance scalable software stack based on PyTorch and pair it with the new evolution of Zion platform, namely ZionEX. We demonstrate the capability to train very large DLRMs with up to 12 Trillion parameters and show that we can attain 40X speedup in terms of time to solution over previous systems. We achieve this by (i) designing the ZionEX platform with dedicated scale-out network, provisioned with high bandwidth, optimal topology and efficient transport (ii) implementing an optimized PyTorch-based training stack supporting both model and data parallelism (iii) develo** sharding algorithms capable of hierarchical partitioning of the embedding tables along row, column dimensions and load balancing them across multiple workers; (iv) adding high-performance core operators while retaining flexibility to support optimizers with fully deterministic updates (v) leveraging reduced precision communications, multi-level memory hierarchy (HBM+DDR+SSD) and pipelining. Furthermore, we develop and briefly comment on distributed data ingestion and other supporting services that are required for the robust and efficient end-to-end training in production environments.
△ Less
Submitted 26 February, 2023; v1 submitted 11 April, 2021;
originally announced April 2021.
-
Torsion elements of the Nottingham group of order p^2
Authors:
Chun Yin Hui,
Krishna Kishore
Abstract:
We establish an explicit upper bound B(p,l,m), depending on p,l,m, on the number of conjugacy classes of order p^2 torsion elements u of type <l,m> of the Nottingham group defined over the prime field of characteristic p >0. In the cases where l < p, the number of conjugacy classes of type <l,m> coincides with B(p,l,m). Moreover, we give a criterion on when u and u^n are conjugate.
We establish an explicit upper bound B(p,l,m), depending on p,l,m, on the number of conjugacy classes of order p^2 torsion elements u of type <l,m> of the Nottingham group defined over the prime field of characteristic p >0. In the cases where l < p, the number of conjugacy classes of type <l,m> coincides with B(p,l,m). Moreover, we give a criterion on when u and u^n are conjugate.
△ Less
Submitted 26 October, 2018;
originally announced October 2018.
-
Inner cohomology of $GL_n$
Authors:
Krishna Kishore
Abstract:
We give an explicit description of the inner cohomology of an adelic locally symmetric space of a given level structure attached to the general linear group of prime rank $n$, with coefficients in a locally constant sheaf of complex vector spaces. We show that for all prime $n$ the inner cohomology vanishes in all degrees for nonconstant sheaves, otherwise the quotient module of the inner cohomolo…
▽ More
We give an explicit description of the inner cohomology of an adelic locally symmetric space of a given level structure attached to the general linear group of prime rank $n$, with coefficients in a locally constant sheaf of complex vector spaces. We show that for all prime $n$ the inner cohomology vanishes in all degrees for nonconstant sheaves, otherwise the quotient module of the inner cohomology classes that are not cuspidal is trivial in all degrees for primes $n = 2,3$, and for all primes $n \geq 5$ it is trivial in all but finitely many degrees where it has a `simple' description in terms of algebraic Hecke characters.
△ Less
Submitted 21 February, 2018; v1 submitted 20 February, 2018;
originally announced February 2018.
-
Torsion elements of the Nottingham group of order $p^2$ and type $\langle 2, m \rangle$
Authors:
Krishna Kishore
Abstract:
We classify torsion elements of order $p^2$ and type $\langle 2, m \rangle$ in the Nottingham group defined over a prime field of characteristic $p >0$.
We classify torsion elements of order $p^2$ and type $\langle 2, m \rangle$ in the Nottingham group defined over a prime field of characteristic $p >0$.
△ Less
Submitted 17 April, 2018; v1 submitted 25 October, 2017;
originally announced October 2017.
-
Inner Cohomology of the General Linear Group
Authors:
Krishna Kishore
Abstract:
The main theorem is incorrectly stated.
The main theorem is incorrectly stated.
△ Less
Submitted 20 February, 2018; v1 submitted 6 August, 2017;
originally announced August 2017.
-
Representation Variety of Surface Groups
Authors:
Krishna Kishore
Abstract:
We give an exact formula for the dimension of the variety of homomorphisms from $S_g$ to $\mathit{any}$ semisimple real algebraic group, where $S_g$ is a surface group of genus $g \geq 2$.
We give an exact formula for the dimension of the variety of homomorphisms from $S_g$ to $\mathit{any}$ semisimple real algebraic group, where $S_g$ is a surface group of genus $g \geq 2$.
△ Less
Submitted 18 April, 2017; v1 submitted 20 February, 2017;
originally announced February 2017.
-
Representation Variety of Fuchsian Groups in SO(p,q)
Authors:
Krishna Kishore
Abstract:
We estimate the dimension of the variety of homomorphisms from $Γ$ to $ SO(p,q)$ with Zariski dense image, where $Γ$ is a Fuchsian group, and $SO(p,q)$ is the indefinite special orthogonal group with signature $(p,q)$.
We estimate the dimension of the variety of homomorphisms from $Γ$ to $ SO(p,q)$ with Zariski dense image, where $Γ$ is a Fuchsian group, and $SO(p,q)$ is the indefinite special orthogonal group with signature $(p,q)$.
△ Less
Submitted 14 October, 2015; v1 submitted 11 November, 2014;
originally announced November 2014.
-
VHDL Implementation and Verification of ARINC-429 Core
Authors:
M. Kamaraju,
A. V. N. Tilak,
K. Lal Kishore,
K. Baburao
Abstract:
Modern Avionics are controlled by sophisticated mission components in the Aircraft. The control function is implemented via a standard ARINC-429 bus interface. It is a two-wire point-topoint serial data bus for control communications in Avionics. The bus operates 12.5 or 100kb/sec, the implementation is envisaged for one transmits and receive channel respectively. Further the code can be modified…
▽ More
Modern Avionics are controlled by sophisticated mission components in the Aircraft. The control function is implemented via a standard ARINC-429 bus interface. It is a two-wire point-topoint serial data bus for control communications in Avionics. The bus operates 12.5 or 100kb/sec, the implementation is envisaged for one transmits and receive channel respectively. Further the code can be modified for more no of independent Tx and Rx channels. An on chip memory allotment on the FPGA will provide a buffer bank for storing the incoming or outgoing data. For this purpose SRAM based FPGAs are utilized. This flexible ARINC429 solution gives exactly what is needed for real time applications. The IP can be programmed to send an interrupt to the host and also prepare it to process the data. Majority of the hardware function of digital natures are embedded into a single FPGA by saving in terms of PCB board space, power consumption and volume results. This paper deals with the development, implementation, simulation, and verification of ARINC_429 formats. The IP core development is described in VHDL.
△ Less
Submitted 24 November, 2010;
originally announced November 2010.
-
Power optimized programmable embedded controller
Authors:
M. Kamaraju,
K. Lal Kishore,
A. V. N. Tilak
Abstract:
Now a days, power has become a primary consideration in hardware design, and is critical in computer systems especially for portable devices with high performance and more functionality. Clock-gating is the most common technique used for reducing processor's power. In this work clock gating technique is applied to optimize the power of fully programmable Embedded Controller (PEC) employing RISC ar…
▽ More
Now a days, power has become a primary consideration in hardware design, and is critical in computer systems especially for portable devices with high performance and more functionality. Clock-gating is the most common technique used for reducing processor's power. In this work clock gating technique is applied to optimize the power of fully programmable Embedded Controller (PEC) employing RISC architecture. The CPU designed supports i) smart instruction set, ii) I/O port, UART iii) on-chip clocking to provide a range of frequencies , iv) RISC as well as controller concepts. The whole design is captured using VHDL and is implemented on FPGA chip using Xilinx .The architecture and clock gating technique together is found to reduce the power consumption by 33.33% of total power consumed by this chip.
△ Less
Submitted 9 September, 2010;
originally announced September 2010.
-
Probabilistic Semantic Web Mining Using Artificial Neural Analysis
Authors:
T. Krishna Kishore,
T. Sasi Vardhan,
N. Lakshmi Narayana
Abstract:
Most of the web user's requirements are search or navigation time and getting correctly matched result. These constrains can be satisfied with some additional modules attached to the existing search engines and web servers. This paper proposes that powerful architecture for search engines with the title of Probabilistic Semantic Web Mining named from the methods used. With the increase of larger a…
▽ More
Most of the web user's requirements are search or navigation time and getting correctly matched result. These constrains can be satisfied with some additional modules attached to the existing search engines and web servers. This paper proposes that powerful architecture for search engines with the title of Probabilistic Semantic Web Mining named from the methods used. With the increase of larger and larger collection of various data resources on the World Wide Web (WWW), Web Mining has become one of the most important requirements for the web users. Web servers will store various formats of data including text, image, audio, video etc., but servers can not identify the contents of the data. These search techniques can be improved by adding some special techniques including semantic web mining and probabilistic analysis to get more accurate results. Semantic web mining technique can provide meaningful search of data resources by eliminating useless information with mining process. In this technique web servers will maintain Meta information of each and every data resources available in that particular web server. This will help the search engine to retrieve information that is relevant to user given input string. This paper proposing the idea of combing these two techniques Semantic web mining and Probabilistic analysis for efficient and accurate search results of web mining. SPF can be calculated by considering both semantic accuracy and syntactic accuracy of data with the input string. This will be the deciding factor for producing results.
△ Less
Submitted 11 April, 2010;
originally announced April 2010.
-
A GA based Window Selection Methodology to Enhance Window based Multi wavelet transformation and thresholding aided CT image denoising technique
Authors:
Syed Amjad Ali,
Srinivasan Vathsal,
K. Lal kishore
Abstract:
Image denoising is getting more significance, especially in Computed Tomography (CT), which is an important and most common modality in medical imaging. This is mainly due to that the effectiveness of clinical diagnosis using CT image lies on the image quality. The denoising technique for CT images using window-based Multi-wavelet transformation and thresholding shows the effectiveness in denoisin…
▽ More
Image denoising is getting more significance, especially in Computed Tomography (CT), which is an important and most common modality in medical imaging. This is mainly due to that the effectiveness of clinical diagnosis using CT image lies on the image quality. The denoising technique for CT images using window-based Multi-wavelet transformation and thresholding shows the effectiveness in denoising, however, a drawback exists in selecting the closer windows in the process of window-based multi-wavelet transformation and thresholding. Generally, the windows of the duplicate noisy image that are closer to each window of original noisy image are obtained by the checking them sequentially. This leads to the possibility of missing out very closer windows and so enhancement is required in the aforesaid process of the denoising technique. In this paper, we propose a GA-based window selection methodology to include the denoising technique. With the aid of the GA-based window selection methodology, the windows of the duplicate noisy image that are very closer to every window of the original noisy image are extracted in an effective manner. By incorporating the proposed GA-based window selection methodology, the denoising the CT image is performed effectively. Eventually, a comparison is made between the denoising technique with and without the proposed GA-based window selection methodology.
△ Less
Submitted 9 March, 2010;
originally announced March 2010.