-
QUBIQ: Uncertainty Quantification for Biomedical Image Segmentation Challenge
Authors:
Hongwei Bran Li,
Fernando Navarro,
Ivan Ezhov,
Amirhossein Bayat,
Dhritiman Das,
Florian Kofler,
Suprosanna Shit,
Diana Waldmannstetter,
Johannes C. Paetzold,
Xiaobin Hu,
Benedikt Wiestler,
Lucas Zimmer,
Tamaz Amiranashvili,
Chinmay Prabhakar,
Christoph Berger,
Jonas Weidner,
Michelle Alonso-Basant,
Arif Rashid,
Ujjwal Baid,
Wesam Adel,
Deniz Ali,
Bhakti Baheti,
Yingbin Bai,
Ishaan Bhatt,
Sabri Can Cetindag
, et al. (55 additional authors not shown)
Abstract:
Uncertainty in medical image segmentation tasks, especially inter-rater variability, arising from differences in interpretations and annotations by various experts, presents a significant challenge in achieving consistent and reliable image segmentation. This variability not only reflects the inherent complexity and subjective nature of medical image interpretation but also directly impacts the de…
▽ More
Uncertainty in medical image segmentation tasks, especially inter-rater variability, arising from differences in interpretations and annotations by various experts, presents a significant challenge in achieving consistent and reliable image segmentation. This variability not only reflects the inherent complexity and subjective nature of medical image interpretation but also directly impacts the development and evaluation of automated segmentation algorithms. Accurately modeling and quantifying this variability is essential for enhancing the robustness and clinical applicability of these algorithms. We report the set-up and summarize the benchmark results of the Quantification of Uncertainties in Biomedical Image Quantification Challenge (QUBIQ), which was organized in conjunction with International Conferences on Medical Image Computing and Computer-Assisted Intervention (MICCAI) 2020 and 2021. The challenge focuses on the uncertainty quantification of medical image segmentation which considers the omnipresence of inter-rater variability in imaging datasets. The large collection of images with multi-rater annotations features various modalities such as MRI and CT; various organs such as the brain, prostate, kidney, and pancreas; and different image dimensions 2D-vs-3D. A total of 24 teams submitted different solutions to the problem, combining various baseline models, Bayesian neural networks, and ensemble model techniques. The obtained results indicate the importance of the ensemble models, as well as the need for further research to develop efficient 3D methods for uncertainty quantification methods in 3D segmentation tasks.
△ Less
Submitted 24 June, 2024; v1 submitted 19 March, 2024;
originally announced May 2024.
-
Long Short-Term Memory Pattern Recognition in Currency Trading
Authors:
Jai Pal
Abstract:
This study delves into the analysis of financial markets through the lens of Wyckoff Phases, a framework devised by Richard D. Wyckoff in the early 20th century. Focusing on the accumulation pattern within the Wyckoff framework, the research explores the phases of trading range and secondary test, elucidating their significance in understanding market dynamics and identifying potential trading opp…
▽ More
This study delves into the analysis of financial markets through the lens of Wyckoff Phases, a framework devised by Richard D. Wyckoff in the early 20th century. Focusing on the accumulation pattern within the Wyckoff framework, the research explores the phases of trading range and secondary test, elucidating their significance in understanding market dynamics and identifying potential trading opportunities. By dissecting the intricacies of these phases, the study sheds light on the creation of liquidity through market structure, offering insights into how traders can leverage this knowledge to anticipate price movements and make informed decisions. The effective detection and analysis of Wyckoff patterns necessitate robust computational models capable of processing complex market data, with spatial data best analyzed using Convolutional Neural Networks (CNNs) and temporal data through Long Short-Term Memory (LSTM) models. The creation of training data involves the generation of swing points, representing significant market movements, and filler points, introducing noise and enhancing model generalization. Activation functions, such as the sigmoid function, play a crucial role in determining the output behavior of neural network models. The results of the study demonstrate the remarkable efficacy of deep learning models in detecting Wyckoff patterns within financial data, underscoring their potential for enhancing pattern recognition and analysis in financial markets. In conclusion, the study highlights the transformative potential of AI-driven approaches in financial analysis and trading strategies, with the integration of AI technologies sha** the future of trading and investment practices.
△ Less
Submitted 23 February, 2024;
originally announced March 2024.
-
Holographic description for correlation functions
Authors:
Hanse Kim,
Jitendra Pal,
Chanyong Park
Abstract:
We study general correlation functions of various quantum field theories in the holographic setup. Following the holographic proposal, we investigate correlation functions via a geodesic length connecting boundary operators. We show that this holographic description can reproduce the known two- and three-point functions of conformal field theory. Using this holographic method, we further study gen…
▽ More
We study general correlation functions of various quantum field theories in the holographic setup. Following the holographic proposal, we investigate correlation functions via a geodesic length connecting boundary operators. We show that this holographic description can reproduce the known two- and three-point functions of conformal field theory. Using this holographic method, we further study general two-point functions of a two-dimensional thermal CFT and of a scalar field theory living in a dS or AdS space. Due to the nontrivial thermal or curvature effect, the two-point functions in an IR limit show different scaling behaviors from those of the UV CFT. We study such nontrivial IR scaling behaviors by applying the holographic method.
△ Less
Submitted 19 December, 2023;
originally announced December 2023.
-
Decision Tree Psychological Risk Assessment in Currency Trading
Authors:
Jai Pal
Abstract:
This research paper focuses on the integration of Artificial Intelligence (AI) into the currency trading landscape, positing the development of personalized AI models, essentially functioning as intelligent personal assistants tailored to the idiosyncrasies of individual traders. The paper posits that AI models are capable of identifying nuanced patterns within the trader's historical data, facili…
▽ More
This research paper focuses on the integration of Artificial Intelligence (AI) into the currency trading landscape, positing the development of personalized AI models, essentially functioning as intelligent personal assistants tailored to the idiosyncrasies of individual traders. The paper posits that AI models are capable of identifying nuanced patterns within the trader's historical data, facilitating a more accurate and insightful assessment of psychological risk dynamics in currency trading. The PRI is a dynamic metric that experiences fluctuations in response to market conditions that foster psychological fragility among traders. By employing sophisticated techniques, a classifying decision tree is crafted, enabling clearer decision-making boundaries within the tree structure. By incorporating the user's chronological trade entries, the model becomes adept at identifying critical junctures when psychological risks are heightened. The real-time nature of the calculations enhances the model's utility as a proactive tool, offering timely alerts to traders about impending moments of psychological risks. The implications of this research extend beyond the confines of currency trading, reaching into the realms of other industries where the judicious application of personalized modeling emerges as an efficient and strategic approach. This paper positions itself at the intersection of cutting-edge technology and the intricate nuances of human psychology, offering a transformative paradigm for decision making support in dynamic and high-pressure environments.
△ Less
Submitted 1 December, 2023; v1 submitted 26 November, 2023;
originally announced November 2023.
-
Integrability and non-integrability for holographic dual of Matrix model and non-Abelian T-dual of AdS$_5\times$S$^5$
Authors:
Jitendra Pal,
Sourav Roychowdhury
Abstract:
In this paper we study integrability and non-integrability for type-IIA supergravity background dual to deformed plane wave matrix model. From the bulk perspective, we estimate various chaos indicators that clearly shows chaotic string dynamics in the limit of small value of the parameter $L$ present in the theory. On the other hand, the string dynamics exhibits a non-chaotic motion for the large…
▽ More
In this paper we study integrability and non-integrability for type-IIA supergravity background dual to deformed plane wave matrix model. From the bulk perspective, we estimate various chaos indicators that clearly shows chaotic string dynamics in the limit of small value of the parameter $L$ present in the theory. On the other hand, the string dynamics exhibits a non-chaotic motion for the large value of the parameter $L$ and therefore presumably an underlying integrable structure. Our findings reveals that the parameter $L$ in the type-IIA background acts as an interpolation between a non-integrable theory to an integrable theory in dual SCFTs.
△ Less
Submitted 20 May, 2024; v1 submitted 18 October, 2023;
originally announced October 2023.
-
Applying Bayesian Ridge Regression AI Modeling in Virus Severity Prediction
Authors:
Jai Pal,
Bryan Hong
Abstract:
Artificial intelligence (AI) is a powerful tool for resha** healthcare systems. In healthcare, AI is invaluable for its capacity to manage vast amounts of data, which can lead to more accurate and speedy diagnoses, ultimately easing the workload on healthcare professionals. As a result, AI has proven itself to be a power tool across various industries, simplifying complex tasks and pattern recog…
▽ More
Artificial intelligence (AI) is a powerful tool for resha** healthcare systems. In healthcare, AI is invaluable for its capacity to manage vast amounts of data, which can lead to more accurate and speedy diagnoses, ultimately easing the workload on healthcare professionals. As a result, AI has proven itself to be a power tool across various industries, simplifying complex tasks and pattern recognition that would otherwise be overwhelming for humans or traditional computer algorithms. In this paper, we review the strengths and weaknesses of Bayesian Ridge Regression, an AI model that can be used to bring cutting edge virus analysis to healthcare professionals around the world. The model's accuracy assessment revealed promising results, with room for improvement primarily related to data organization. In addition, the severity index serves as a valuable tool to gain a broad overview of patient care needs, aligning with healthcare professionals' preference for broader categorizations.
△ Less
Submitted 4 December, 2023; v1 submitted 14 October, 2023;
originally announced October 2023.
-
$μ$TAS: Design and implementation of Time Aware Shaper on SmartNICs to achieve bounded latency
Authors:
Joydeep Pal,
Deepak Choudhary,
Nithish Krishnabharathi Gnani,
Chandramani Singh,
T. V. Prabhakar
Abstract:
Time-Aware Shaper (TAS) is a time-triggered scheduling mechanism that ensures bounded latency for time-critical Scheduled Traffic (ST) flows. The Linux kernel implementation (a.k.a TAPRIO) has limited capabilities due to varying CPU workloads and thus does not offer tight latency bound for the ST flows. Also, currently only higher cycle times are possible. Other software implementations are limite…
▽ More
Time-Aware Shaper (TAS) is a time-triggered scheduling mechanism that ensures bounded latency for time-critical Scheduled Traffic (ST) flows. The Linux kernel implementation (a.k.a TAPRIO) has limited capabilities due to varying CPU workloads and thus does not offer tight latency bound for the ST flows. Also, currently only higher cycle times are possible. Other software implementations are limited to simulation studies without physical implementation. In this paper, we present $μ$TAS, a MicroC-based hardware implementation of TAS onto a programmable SmartNIC. $μ$TAS takes advantage of the parallel-processing architecture of the SmartNIC to configure the scheduling behaviour of its queues at runtime. To demonstrate the effectiveness of $μ$TAS, we built a Time-Sensitive Networking (TSN) testbed from scratch. This consists of multiple end-hosts capable of generating ST and Best Effort (BE) flows and TSN switches equipped with SmartNICs running $μ$TAS. Time synchronization is maintained between the switches and hosts. Our experiments demonstrate that the ST flows experience a bounded latency of the order of tens of microseconds.
△ Less
Submitted 11 October, 2023;
originally announced October 2023.
-
EdgeP4: A P4-Programmable Edge Intelligent Ethernet Switch for Tactile Cyber-Physical Systems
Authors:
Nithish Krishnabharathi Gnani,
Joydeep Pal,
Deepak Choudhary,
Himanshu Verma,
Soumya Kanta Rana,
Kaushal Mhapsekar,
T. V. Prabhakar,
Chandramani Singh
Abstract:
Tactile Internet based operations, e.g., telesurgery, rely on end-to-end closed loop control for accuracy and corrections. The feedback and control are subject to network latency and loss. We design two edge intelligence algorithms hosted at P4 programmable end switches. These algorithms locally compute and command corrective signals, thereby dispense the feedback signals from traversing the netwo…
▽ More
Tactile Internet based operations, e.g., telesurgery, rely on end-to-end closed loop control for accuracy and corrections. The feedback and control are subject to network latency and loss. We design two edge intelligence algorithms hosted at P4 programmable end switches. These algorithms locally compute and command corrective signals, thereby dispense the feedback signals from traversing the network to the other ends and save on control loop latency and network load. We implement these algorithms entirely on data plane on Netronome Agilio SmartNICs using P4. Our first algorithm, $\textit{pose correction}$, is placed at the edge switch connected to an industrial robot grip** a tool. The round trip between transmitting force sensor array readings to the edge switch and receiving correct tip coordinates at the robot is shown to be less than $100~μs$. The second algorithm, $\textit{tremor suppression}$, is placed at the edge switch connected to the human operator. It suppresses physiological tremors of amplitudes smaller than $100~μm$ which not only improves the application's performance but also reduces the network load up to $99.9\%$. Our solution allows edge intelligence modules to seamlessly switch between the algorithms based on the tasks being executed at the end hosts.
△ Less
Submitted 19 September, 2023;
originally announced September 2023.
-
MATLAB Plasmonic Nanoparticle Virion Counting and Interpretation System in Urban Populations
Authors:
Bryan Hong,
Jai Pal
Abstract:
One of the biggest issues currently plaguing the field of medicine is the lack of an accurate and efficient form of disease diagnosis especially in urban settings such as major cities. For example, the two most commonly utilized test diagnosis systems, the PCR and rapid test, sacrifice either accuracy or speed to achieve the other, and this could slow down epidemiologists working to combat the spr…
▽ More
One of the biggest issues currently plaguing the field of medicine is the lack of an accurate and efficient form of disease diagnosis especially in urban settings such as major cities. For example, the two most commonly utilized test diagnosis systems, the PCR and rapid test, sacrifice either accuracy or speed to achieve the other, and this could slow down epidemiologists working to combat the spread. Another issue currently present is the issue of viral quantification or the counting of virions within a nasal sample. These can provide doctors with crucial information in treating infections; however, the current mediums are underdeveloped and unstandardized. This project's goals were to 1) create an accurate and rapid RSV diagnostic test that could be replicated and utilized efficiently in urban settings and 2) design a viral quantification mechanism that counts the number of virions to provide more information to healthcare workers. This diagnostic test involved a system that pumped RSV-aggregated Au-nanoparticles and unaggregated Au-nanoparticles through a microcapillary, whose cross-section was intersected by two laser beams generating and detecting the nanobubbles. The signals between the unaggregated and aggregated nanobubbles were calibrated, and the number of RSV virions was recorded. The results yielded an accuracy of 99.99% and an average time of 5.2 minutes, validating that this design is both faster and more accurate compared to current tests. When cross-validated with Poisson statistics, the virion counting system counted the number of virions with 98.52% accuracy. To verify the accuracy of our samples, the results were compared to clinical trials of nasal samples, and our diagnostic system predicted accurate diagnostics after statistical analysis. With further testing, this diagnostic method could replace current standards of testing, saving millions of lives every year.
△ Less
Submitted 8 January, 2024; v1 submitted 9 September, 2023;
originally announced September 2023.
-
Integrability and non-integrability for marginal deformations of 4d $\mathcal N = 2$ SCFTs
Authors:
Jitendra Pal,
Sourav Roychowdhury,
Arindam Lala,
Dibakar Roychowdhury
Abstract:
We study integrability and non-integrability for marginal deformations of 4d $\mathcal N =2$ SCFTs. We estimate various chaos indicators for the bulk theory which clearly shows the onset of a chaotic string dynamics in the limit of large deformations. On the other hand, for small values of the deformation parameter, the resulting dynamics exhibits a non-chaotic motion and therefore presumably an u…
▽ More
We study integrability and non-integrability for marginal deformations of 4d $\mathcal N =2$ SCFTs. We estimate various chaos indicators for the bulk theory which clearly shows the onset of a chaotic string dynamics in the limit of large deformations. On the other hand, for small values of the deformation parameter, the resulting dynamics exhibits a non-chaotic motion and therefore presumably an underlying integrable structure. Our analysis reveals that the $γ$-deformation in the type-IIA theory could be interpreted as an interpolation between a class of integrable $\mathcal N =2$ SCFTs and a class of non-integrable $\mathcal N =1$ SCFTs at strong coupling. We also generalise our results in the presence of the flavor branes.
△ Less
Submitted 16 October, 2023; v1 submitted 22 July, 2023;
originally announced July 2023.
-
Normal form for singular Bautin bifurcation in a slow-fast system with Holling type III functional response
Authors:
Tapan Saha,
Pranali Roy Chowdhury,
Pallav Jyoti Pal,
Malay Banerjee
Abstract:
Over the last few decades, complex oscillations of slow-fast systems have been a key area of research. In the theory of slow-fast systems, the location of singular Hopf bifurcation and maximal canard is determined by computing the first Lyapunov coefficient. In particular, the analysis of canards is based on the genericity condition that the first Lyapunov coefficient must be non-zero. This manusc…
▽ More
Over the last few decades, complex oscillations of slow-fast systems have been a key area of research. In the theory of slow-fast systems, the location of singular Hopf bifurcation and maximal canard is determined by computing the first Lyapunov coefficient. In particular, the analysis of canards is based on the genericity condition that the first Lyapunov coefficient must be non-zero. This manuscript aims to further extend the results to the case where the first Lyapunov coefficient vanishes. For that, the analytic expression of the second Lyapunov coefficient and the investigation of the normal form for codimension-2 singular Bautin bifurcation in a predator-prey system is done by explicitly identifying the locally invertible parameter-dependent transformations. A planar slow-fast predator-prey model with Holling type III functional response is considered here, where the prey population growth is affected by the weak Allee effect, and the prey reproduces much faster than the predator. Using geometric singular perturbation theory, normal form theory of slow-fast systems, and blow-up technique, we provide a detailed mathematical investigation of the system to show a variety of rich and complex nonlinear dynamics including but not limited to the existence of canards, relaxation oscillations, canard phenomena, singular Hopf bifurcation, and singular Bautin bifurcation. Additionally, numerical simulations are conducted to support the theoretical findings.
△ Less
Submitted 22 July, 2023;
originally announced July 2023.
-
Unveiling the dynamics of canard cycles and global behaviour in a singularly perturbed predator-prey system with Allee effect in predator
Authors:
Tapan Saha,
Pallav Jyoti Pal
Abstract:
In this article, we have considered a planar slow-fast modified Leslie-Gower predator-prey model with a weak Allee effect in the predator, based on the natural assumption that the prey reproduces far more quickly than the predator. We present a thorough mathematical analysis demonstrating the existence of homoclinic orbits, heteroclinic orbits, singular Hopf bifurcation, canard limit cycles, relax…
▽ More
In this article, we have considered a planar slow-fast modified Leslie-Gower predator-prey model with a weak Allee effect in the predator, based on the natural assumption that the prey reproduces far more quickly than the predator. We present a thorough mathematical analysis demonstrating the existence of homoclinic orbits, heteroclinic orbits, singular Hopf bifurcation, canard limit cycles, relaxation oscillations, the birth of canard explosion by combining the normal form theory of slow-fast systems, Fenichel's theorem and blow-up technique near non-hyperbolic point. We have obtained very rich dynamical phenomena of the model, including the saddle-node, Hopf, transcritical bifurcation, generalized Hopf, cusp point, homoclinic orbit, heteroclinic orbit, and Bogdanov-Takens bifurcations. Moreover, we have investigated the global stability of the unique positive equilibrium, as well as bistability, which shows that the system can display either 'prey extinction', 'stable coexistence', or 'oscillating coexistence' depending on the initial population size and values of the system parameters. The theoretical findings are verified by numerical simulations.
△ Less
Submitted 23 June, 2023;
originally announced June 2023.
-
Wuerstchen: An Efficient Architecture for Large-Scale Text-to-Image Diffusion Models
Authors:
Pablo Pernias,
Dominic Rampas,
Mats L. Richter,
Christopher J. Pal,
Marc Aubreville
Abstract:
We introduce Würstchen, a novel architecture for text-to-image synthesis that combines competitive performance with unprecedented cost-effectiveness for large-scale text-to-image diffusion models. A key contribution of our work is to develop a latent diffusion technique in which we learn a detailed but extremely compact semantic image representation used to guide the diffusion process. This highly…
▽ More
We introduce Würstchen, a novel architecture for text-to-image synthesis that combines competitive performance with unprecedented cost-effectiveness for large-scale text-to-image diffusion models. A key contribution of our work is to develop a latent diffusion technique in which we learn a detailed but extremely compact semantic image representation used to guide the diffusion process. This highly compressed representation of an image provides much more detailed guidance compared to latent representations of language and this significantly reduces the computational requirements to achieve state-of-the-art results. Our approach also improves the quality of text-conditioned image generation based on our user preference study. The training requirements of our approach consists of 24,602 A100-GPU hours - compared to Stable Diffusion 2.1's 200,000 GPU hours. Our approach also requires less training data to achieve these results. Furthermore, our compact latent representations allows us to perform inference over twice as fast, slashing the usual costs and carbon footprint of a state-of-the-art (SOTA) diffusion model significantly, without compromising the end performance. In a broader comparison against SOTA models our approach is substantially more efficient and compares favorably in terms of image quality. We believe that this work motivates more emphasis on the prioritization of both performance and computational accessibility.
△ Less
Submitted 29 September, 2023; v1 submitted 1 June, 2023;
originally announced June 2023.
-
Controllable Image Generation via Collage Representations
Authors:
Arantxa Casanova,
Marlène Careil,
Adriana Romero-Soriano,
Christopher J. Pal,
Jakob Verbeek,
Michal Drozdzal
Abstract:
Recent advances in conditional generative image models have enabled impressive results. On the one hand, text-based conditional models have achieved remarkable generation quality, by leveraging large-scale datasets of image-text pairs. To enable fine-grained controllability, however, text-based models require long prompts, whose details may be ignored by the model. On the other hand, layout-based…
▽ More
Recent advances in conditional generative image models have enabled impressive results. On the one hand, text-based conditional models have achieved remarkable generation quality, by leveraging large-scale datasets of image-text pairs. To enable fine-grained controllability, however, text-based models require long prompts, whose details may be ignored by the model. On the other hand, layout-based conditional models have also witnessed significant advances. These models rely on bounding boxes or segmentation maps for precise spatial conditioning in combination with coarse semantic labels. The semantic labels, however, cannot be used to express detailed appearance characteristics. In this paper, we approach fine-grained scene controllability through image collages which allow a rich visual description of the desired scene as well as the appearance and location of the objects therein, without the need of class nor attribute labels. We introduce "mixing and matching scenes" (M&Ms), an approach that consists of an adversarially trained generative image model which is conditioned on appearance features and spatial positions of the different elements in a collage, and integrates these into a coherent image. We train our model on the OpenImages (OI) dataset and evaluate it on collages derived from OI and MS-COCO datasets. Our experiments on the OI dataset show that M&Ms outperforms baselines in terms of fine-grained scene controllability while being very competitive in terms of image quality and sample diversity. On the MS-COCO dataset, we highlight the generalization ability of our model by outperforming DALL-E in terms of the zero-shot FID metric, despite using two magnitudes fewer parameters and data. Collage based generative models have the potential to advance content creation in an efficient and effective way as they are intuitive to use and yield high quality generations.
△ Less
Submitted 26 April, 2023;
originally announced April 2023.
-
Chaotic string dynamics in Bosonic $η$-deformed $AdS_5 \times T^{ 1,1}$ background
Authors:
Jitendra Pal
Abstract:
We investigate a new class of $η$-deformed $AdS_5 \times T^{1,1}$ backgrounds produced by $r$-matrices that satisfy the modified classical Yang-Baxter equation [Jour. High Ener. Phys. 03 (2022) 094]. We examine the classical phase space of these (semi)classical strings by numerically studying the dynamics of the string sigma models over this deformed background, and we compute several chaos signal…
▽ More
We investigate a new class of $η$-deformed $AdS_5 \times T^{1,1}$ backgrounds produced by $r$-matrices that satisfy the modified classical Yang-Baxter equation [Jour. High Ener. Phys. 03 (2022) 094]. We examine the classical phase space of these (semi)classical strings by numerically studying the dynamics of the string sigma models over this deformed background, and we compute several chaos signals. These involve figuring out the Poincar'e section and computing the Lyapunov exponents. In the (semi)classical limit, we discover evidence that supports a non-integrable phase space dynamics.
△ Less
Submitted 13 September, 2023; v1 submitted 20 April, 2023;
originally announced April 2023.
-
Understanding Journalists' Workflows in News Curation
Authors:
Shubham Atreja,
Shruthi Srinath,
Mohit Jain,
Joyojeet Pal
Abstract:
With the increasing dominance of the internet as a source of news consumption, there has been a rise in the production and popularity of email newsletters compiled by individual journalists. However, there is little research on the processes of aggregation, and how these differ between expert journalists and trained machines. In this paper, we interviewed journalists who curate newsletters from ar…
▽ More
With the increasing dominance of the internet as a source of news consumption, there has been a rise in the production and popularity of email newsletters compiled by individual journalists. However, there is little research on the processes of aggregation, and how these differ between expert journalists and trained machines. In this paper, we interviewed journalists who curate newsletters from around the world. Through an in-depth understanding of journalists' workflows, our findings lay out the role of their prior experience in the value they bring into the curation process, their use of algorithms in finding stories for their newsletter, and their internalization of their readers' interests and the context they are curating for. While identifying the role of human expertise, we highlight the importance of hybrid curation and provide design insights on how technology can support the work of these experts.
△ Less
Submitted 31 March, 2023;
originally announced April 2023.
-
Biomedical image analysis competitions: The state of current participation practice
Authors:
Matthias Eisenmann,
Annika Reinke,
Vivienn Weru,
Minu Dietlinde Tizabi,
Fabian Isensee,
Tim J. Adler,
Patrick Godau,
Veronika Cheplygina,
Michal Kozubek,
Sharib Ali,
Anubha Gupta,
Jan Kybic,
Alison Noble,
Carlos Ortiz de Solórzano,
Samiksha Pachade,
Caroline Petitjean,
Daniel Sage,
Donglai Wei,
Elizabeth Wilden,
Deepak Alapatt,
Vincent Andrearczyk,
Ujjwal Baid,
Spyridon Bakas,
Niranjan Balu,
Sophia Bano
, et al. (331 additional authors not shown)
Abstract:
The number of international benchmarking competitions is steadily increasing in various fields of machine learning (ML) research and practice. So far, however, little is known about the common practice as well as bottlenecks faced by the community in tackling the research questions posed. To shed light on the status quo of algorithm development in the specific field of biomedical imaging analysis,…
▽ More
The number of international benchmarking competitions is steadily increasing in various fields of machine learning (ML) research and practice. So far, however, little is known about the common practice as well as bottlenecks faced by the community in tackling the research questions posed. To shed light on the status quo of algorithm development in the specific field of biomedical imaging analysis, we designed an international survey that was issued to all participants of challenges conducted in conjunction with the IEEE ISBI 2021 and MICCAI 2021 conferences (80 competitions in total). The survey covered participants' expertise and working environments, their chosen strategies, as well as algorithm characteristics. A median of 72% challenge participants took part in the survey. According to our results, knowledge exchange was the primary incentive (70%) for participation, while the reception of prize money played only a minor role (16%). While a median of 80 working hours was spent on method development, a large portion of participants stated that they did not have enough time for method development (32%). 25% perceived the infrastructure to be a bottleneck. Overall, 94% of all solutions were deep learning-based. Of these, 84% were based on standard architectures. 43% of the respondents reported that the data samples (e.g., images) were too large to be processed at once. This was most commonly addressed by patch-based training (69%), downsampling (37%), and solving 3D analysis tasks as a series of 2D tasks. K-fold cross-validation on the training set was performed by only 37% of the participants and only 50% of the participants performed ensembling based on multiple identical models (61%) or heterogeneous models (39%). 48% of the respondents applied postprocessing steps.
△ Less
Submitted 12 September, 2023; v1 submitted 16 December, 2022;
originally announced December 2022.
-
Non-chaotic dynamics for Yang-Baxter deformed $\text{AdS}_{4}\times \text{CP}^{3}$ superstrings
Authors:
Jitendra Pal,
Hemant Rathi,
Arindam Lala,
Dibakar Roychowdhury
Abstract:
We explore a novel class of Yang-Baxter deformed AdS$_{4}$ $\times$ CP$^{3}$ backgrounds [Jour. High Ener. Phys. \textbf{01} (2021) 056] which exhibit a non-chaotic dynamics for (super)strings propagating over it. We explicitly use the \textit{Kovacic's algorithm} in order to establish non-chaotic dynamics of string $ σ$ models over these deformed backgrounds. This analysis is complemented with nu…
▽ More
We explore a novel class of Yang-Baxter deformed AdS$_{4}$ $\times$ CP$^{3}$ backgrounds [Jour. High Ener. Phys. \textbf{01} (2021) 056] which exhibit a non-chaotic dynamics for (super)strings propagating over it. We explicitly use the \textit{Kovacic's algorithm} in order to establish non-chaotic dynamics of string $ σ$ models over these deformed backgrounds. This analysis is complemented with numerical techniques whereby we probe the classical phase space of these (semi)classical strings and calculate various chaos indicators, such as, the Poincaré sections and the Lyapunov exponents. We find compatibility between the two approaches. Nevertheless, our analysis does not ensure integrability; rather, it excludes the possibility of non-integrability for the given string embeddings.
△ Less
Submitted 19 February, 2024; v1 submitted 20 August, 2022;
originally announced August 2022.
-
Closed Ranks: The Discursive Value of Military Support for Indian Politicians on Social Media
Authors:
Agrima Seth,
Soham De,
Arshia Arya,
Steven Wilkinson,
Sushant Singh,
Joyojeet Pal
Abstract:
Influencers play a crucial role in sha** public narratives through information creation and diffusion in the Global South. While public figures from various walks of life and their impact on public discourse have been studied, defence veterans as influencers of the political discourse have been largely overlooked. Veterans matter in the public spehere as a normatively important political lobby.…
▽ More
Influencers play a crucial role in sha** public narratives through information creation and diffusion in the Global South. While public figures from various walks of life and their impact on public discourse have been studied, defence veterans as influencers of the political discourse have been largely overlooked. Veterans matter in the public spehere as a normatively important political lobby. They are also interesting because, unlike active-duty military officers, they are not restricted from taking public sides on politics, so their posts may provide a window into the views of those still in the service. In this work, we systematically analyze the engagement on Twitter of self-described defence-related accounts and politician accounts that post on defence-related issues. We find that self-described defence-related accounts disproportionately engage with the current ruling party in India. We find that politicians promote their closeness to the defence services and nationalist credentials through engagements with defence-related influencers. We briefly consider the institutional implications of these patterns and connections
△ Less
Submitted 8 April, 2022; v1 submitted 6 April, 2022;
originally announced April 2022.
-
On the $\ell$-DLIPs of codes over finite commutative rings
Authors:
Sanjit Bhowmick,
Alexandre Fotue Tabue,
Joydeb Pal
Abstract:
Generalizing the linear complementary duals, the linear complementary pairs and the hull of codes, we introduce the concept of $\ell$-dimension linear intersection pairs ($\ell$-DLIPs) of codes over a finite commutative ring $(R)$, for some positive integer $\ell$. In this paper, we study $\ell$-DLIP of codes over $R$ in a very general setting by a uniform method. Besides, we provide a necessary a…
▽ More
Generalizing the linear complementary duals, the linear complementary pairs and the hull of codes, we introduce the concept of $\ell$-dimension linear intersection pairs ($\ell$-DLIPs) of codes over a finite commutative ring $(R)$, for some positive integer $\ell$. In this paper, we study $\ell$-DLIP of codes over $R$ in a very general setting by a uniform method. Besides, we provide a necessary and sufficient condition for the existence of a non-free (or free) $\ell$-DLIP of codes over a finite commutative Frobenius ring. In addition, we obtain a generator set of the intersection of two constacyclic codes over a finite chain ring, which helps us to get an important characterization of $\ell$-DLIP of constacyclic codes. Finally, the $\ell$-DLIP of constacyclic codes over a finite chain ring are used to construct new entanglement-assisted quantum error correcting (EAQEC) codes.
△ Less
Submitted 21 June, 2023; v1 submitted 2 April, 2022;
originally announced April 2022.
-
Database of Indian Social Media Influencers on Twitter
Authors:
Arshia Arya,
Soham De,
Dibyendu Mishra,
Gazal Shekhawat,
Ankur Sharma,
Anmol Panda,
Faisal Lalani,
Parantak Singh,
Ramaravind Kommiya Mothilal,
Rynaa Grover,
Sachita Nishal,
Saloni Dash,
Shehla Shora,
Syeda Zainab Akbar,
Joyojeet Pal
Abstract:
Databases of highly networked individuals have been indispensable in studying narratives and influence on social media. To support studies on Twitter in India, we present a systematically categorised database of accounts of influence on Twitter in India, identified and annotated through an iterative process of friends, networks, and self-described profile information, verified manually. We built a…
▽ More
Databases of highly networked individuals have been indispensable in studying narratives and influence on social media. To support studies on Twitter in India, we present a systematically categorised database of accounts of influence on Twitter in India, identified and annotated through an iterative process of friends, networks, and self-described profile information, verified manually. We built an initial set of accounts based on the friend network of a seed set of accounts based on real-world renown in various fields, and then snowballed "friends of friends" multiple times, and rank ordered individuals based on the number of in-group connections, and overall followers. We then manually classified identified accounts under the categories of entertainment, sports, business, government, institutions, journalism, civil society accounts that have independent standing outside of social media, as well as a category of "digital first" referring to accounts that derive their primary influence from online activity. Overall, we annotated 11580 unique accounts across all categories. The database is useful studying various questions related to the role of influencers in polarisation, misinformation, extreme speech, political discourse etc.
△ Less
Submitted 5 May, 2022; v1 submitted 17 March, 2022;
originally announced March 2022.
-
SOME ASPECTS of $s λ$-Closed Sets on Separation Axioms And Compactness in GT-spaces
Authors:
Amar Kumar Banerjee,
Jagannath Pal
Abstract:
Here we have investigated some aspects of $sλ$-closed sets on separation axioms including $s T_{2\frac{1}{2}} $ and $s T_{3\frac{1}{2}} $ axioms and on compactness in generalized topological spaces
Here we have investigated some aspects of $sλ$-closed sets on separation axioms including $s T_{2\frac{1}{2}} $ and $s T_{3\frac{1}{2}} $ axioms and on compactness in generalized topological spaces
△ Less
Submitted 18 December, 2021;
originally announced December 2021.
-
$ Ig^*$-closed sets and its certain properties in $ σ$-spaces with respect to an ideal
Authors:
Amar Kumar Banerjee,
Jagannath Pal
Abstract:
Here we have introduced and studied the idea of $ Ig^*$-closed set with respect to an ideal and investigated some of its properties in Alexandroff spaces. We have also introduced $ Ig^*$-$T_0 $ axiom, $ Ig^*$-$T_1$ axiom, $ Ig^*$-$T_ω$ axiom and explored a relation among them
Here we have introduced and studied the idea of $ Ig^*$-closed set with respect to an ideal and investigated some of its properties in Alexandroff spaces. We have also introduced $ Ig^*$-$T_0 $ axiom, $ Ig^*$-$T_1$ axiom, $ Ig^*$-$T_ω$ axiom and explored a relation among them
△ Less
Submitted 20 November, 2021;
originally announced November 2021.
-
Insights Into Incitement: A Computational Perspective on Dangerous Speech on Twitter in India
Authors:
Saloni Dash,
Rynaa Grover,
Gazal Shekhawat,
Sukhnidh Kaur,
Dibyendu Mishra,
Joyojeet Pal
Abstract:
Dangerous speech on social media platforms can be framed as blatantly inflammatory, or be couched in innuendo. It is also centrally tied to who engages it - it can be driven by openly sectarian social media accounts, or through subtle nudges by influential accounts, allowing for complex means of reinforcing vilification of marginalized groups, an increasingly significant problem in the media envir…
▽ More
Dangerous speech on social media platforms can be framed as blatantly inflammatory, or be couched in innuendo. It is also centrally tied to who engages it - it can be driven by openly sectarian social media accounts, or through subtle nudges by influential accounts, allowing for complex means of reinforcing vilification of marginalized groups, an increasingly significant problem in the media environment in the Global South. We identify dangerous speech by influential accounts on Twitter in India around three key events, examining both the language and networks of messaging that condones or actively promotes violence against vulnerable groups. We characterize dangerous speech users by assigning Danger Amplification Belief scores and show that dangerous users are more active on Twitter as compared to other users as well as most influential in the network, in terms of a larger following as well as volume of verified accounts. We find that dangerous users have a more polarized viewership, suggesting that their audience is more susceptible to incitement. Using a mix of network centrality measures and qualitative analysis, we find that most dangerous accounts tend to either be in mass media related occupations or allied with low-ranking, right-leaning politicians, and act as "broadcasters" in the network, where they are best positioned to spearhead the rapid dissemination of dangerous speech across the platform.
△ Less
Submitted 6 November, 2021;
originally announced November 2021.
-
Extremism & Whataboutism: A Case Study on Bangalore Riots
Authors:
Saloni Dash,
Gazal Shekhawat,
Syeda Zainab Akbar,
Joyojeet Pal
Abstract:
A common diversionary tactic used to deflect attention from contested issues is whataboutery which, when used by majoritarian groups to justify their behaviour against marginalised communities, can quickly devolve into extremism. We explore the manifestations of extreme speech in the Indian context, through a case study of violent protests and policing in the city of Bangalore, provoked by a derog…
▽ More
A common diversionary tactic used to deflect attention from contested issues is whataboutery which, when used by majoritarian groups to justify their behaviour against marginalised communities, can quickly devolve into extremism. We explore the manifestations of extreme speech in the Indian context, through a case study of violent protests and policing in the city of Bangalore, provoked by a derogatory Facebook post. Analyses of the dominant narratives on Twitter surrounding the incident reveal that, most of them employ whataboutism to deflect attention from the triggering post and serve as breeding grounds for religion-based extreme speech. We conclude by discussing how our study proposes an alternative lens of viewing extremism in the Global South.
△ Less
Submitted 22 September, 2021;
originally announced September 2021.
-
Sporting the government: Twitter as a window into sportspersons' engagement with causes in India and USA
Authors:
Dibyendu Mishra,
Ronojoy Sen,
Joyojeet Pal
Abstract:
With the ubiquitous reach of social media, influencers are increasingly central to articulation of political agendas on a range of topics. We curate a sample of tweets from the 200 most followed sportspersons in India and the United States respectively since 2019, map their connections with politicians, and visualize their engagements with key topics online. We find significant differences between…
▽ More
With the ubiquitous reach of social media, influencers are increasingly central to articulation of political agendas on a range of topics. We curate a sample of tweets from the 200 most followed sportspersons in India and the United States respectively since 2019, map their connections with politicians, and visualize their engagements with key topics online. We find significant differences between the ways in which Indian and US sportspersons engage with politics online-while leading Indian sportspersons tend to align closely with the ruling party and engage minimally in dissent, American sportspersons engage with a range of political issues and are willing to publicly criticize politicians or policy. Our findings suggest that the ownership and governmental control of sports impact public stances on issues that professional sportspersons are willing to engage in online. It might also be inferred, depending upon the government of the day, that the costs of speaking up against the state and the government in power have different socio-economic costs in the US and India.
△ Less
Submitted 15 September, 2021;
originally announced September 2021.
-
Analytic (non)integrability of Arutyunov-Bassi-Lacroix model
Authors:
Jitendra Pal,
Arnab Mukherjee,
Arindam Lala,
Dibakar Roychowdhury
Abstract:
We use the notion of the gauge/string duality and discuss the Liouvillian (non) integrability criteria for string sigma models in the context of recently proposed Arutyunov-Bassi-Lacroix (ABL) model [JHEP \textbf{03} (2021), 062]. Our analysis complements those previous results due to numerical analysis as well as Lax pair formulation. We consider a winding string ansatz for the deformed torus…
▽ More
We use the notion of the gauge/string duality and discuss the Liouvillian (non) integrability criteria for string sigma models in the context of recently proposed Arutyunov-Bassi-Lacroix (ABL) model [JHEP \textbf{03} (2021), 062]. Our analysis complements those previous results due to numerical analysis as well as Lax pair formulation. We consider a winding string ansatz for the deformed torus $T^{\qty(λ_{1},λ_{2},λ)}_{k}$ which can be interpreted as a system of coupled pendulums. Our analysis reveals the Liouvillian nonintegrablity of the associated sigma model. We also obtain the \emph{generalized} decoupling limit and confirm the analytic integrability for the decoupled sector.
△ Less
Submitted 1 July, 2021; v1 submitted 2 June, 2021;
originally announced June 2021.
-
Divided We Rule: Influencer Polarization on Twitter During Political Crises in India
Authors:
Saloni Dash,
Dibyendu Mishra,
Gazal Shekhawat,
Joyojeet Pal
Abstract:
Influencers are key to the nature and networks of information propagation on social media. Influencers are particularly important in political discourse through their engagement with issues, and may derive their legitimacy either solely or in large part through online operation, or have an offline sphere of expertise such as entertainers, journalists etc. To quantify influencers' political engagem…
▽ More
Influencers are key to the nature and networks of information propagation on social media. Influencers are particularly important in political discourse through their engagement with issues, and may derive their legitimacy either solely or in large part through online operation, or have an offline sphere of expertise such as entertainers, journalists etc. To quantify influencers' political engagement and polarity, we use Google's Universal Sentence Encoder (USE) to encode the tweets of 6k influencers and 26k Indian politicians during political crises in India. We then obtain aggregate vector representations of the influencers based on their tweet embeddings, which alongside retweet graphs help compute their stance and polarity with respect to these political issues. We find that influencers engage with the topics in a partisan manner, with polarized influencers being rewarded with increased retweeting and following. Moreover, we observe that specific groups of influencers are consistently polarized across all events. We conclude by discussing how our study provides insights into the political schisms of present-day India, but also offers a means to study the role of influencers in exacerbating political polarization in other contexts.
△ Less
Submitted 16 September, 2021; v1 submitted 18 May, 2021;
originally announced May 2021.
-
$ (j-i)sg_κ^*$-closed sets and pairwise semi $ t_ω$-axiom in bispaces
Authors:
Jagannath Pal,
Amar Kumar Banerjee
Abstract:
Here we have introduced the ideas of $ (j-i)sg_κ^*$-closed sets and a semi generalized closed set in a bispace; $ i,j=1,2; i\not=j $ and then have studied on pairwise semi $T_0 $-axiom, pairwise semi $T_1 $-axiom and pairwise semi $T_ω$-axiom. We have investigated some of their topological properties and also established a relation among these axioms under some additional conditions.
Here we have introduced the ideas of $ (j-i)sg_κ^*$-closed sets and a semi generalized closed set in a bispace; $ i,j=1,2; i\not=j $ and then have studied on pairwise semi $T_0 $-axiom, pairwise semi $T_1 $-axiom and pairwise semi $T_ω$-axiom. We have investigated some of their topological properties and also established a relation among these axioms under some additional conditions.
△ Less
Submitted 13 February, 2021;
originally announced February 2021.
-
Rihanna versus Bollywood: Twitter Influencers and the Indian Farmers' Protest
Authors:
Dibyendu Mishra,
Syeda Zainab Akbar,
Arshia Arya,
Saloni Dash,
Rynaa Grover,
Joyojeet Pal
Abstract:
A tweet from popular entertainer and businesswoman, Rihanna, bringing attention to farmers' protests around Delhi set off heightened activity on Indian social media. An immediate consequence was the weighing in by Indian politicians, entertainers, media and other influencers on the issue. In this paper, we use data from Twitter and an archive of debunked misinformation stories to understand some o…
▽ More
A tweet from popular entertainer and businesswoman, Rihanna, bringing attention to farmers' protests around Delhi set off heightened activity on Indian social media. An immediate consequence was the weighing in by Indian politicians, entertainers, media and other influencers on the issue. In this paper, we use data from Twitter and an archive of debunked misinformation stories to understand some of the patterns around influencer engagement with a political issue. We found that more followed influencers were less likely to come out in support of the tweet. We also find that the later engagement of major influencers on the side of the government's position shows suggestion's of collusion. Irrespective of their position on the issue, influencers who engaged saw a significant rise in their following after their tweets. While a number of tweets thanked Rihanna for raising awareness on the issue, she was systematically trolled on the grounds of her gender, race, nationality and religion. Finally, we observed how misinformation existing prior to the tweet set up the grounds for alternative narratives that emerged.
△ Less
Submitted 8 February, 2021;
originally announced February 2021.
-
Anatomy of a Rumour: Social media and the suicide of Sushant Singh Rajput
Authors:
Syeda Zainab Akbar,
Ankur Sharma,
Himani Negi,
Anmol Panda,
Joyojeet Pal
Abstract:
The suicide of Indian actor Sushant Singh Rajput in the midst of the COVID-19 lockdown triggered a media frenzy of prime time coverage that lasted several months and became a political hot button issue. Using data from Twitter, YouTube, and an archive of debunked misinformation stories, we found two important patterns. First, that retweet rates on Twitter clearly suggest that commentators benefite…
▽ More
The suicide of Indian actor Sushant Singh Rajput in the midst of the COVID-19 lockdown triggered a media frenzy of prime time coverage that lasted several months and became a political hot button issue. Using data from Twitter, YouTube, and an archive of debunked misinformation stories, we found two important patterns. First, that retweet rates on Twitter clearly suggest that commentators benefited from talking about the case, which got higher engagement than other topics. Second, that politicians, in particular, were instrumental in changing the course of the discourse by referring to the case as 'murder', rather than 'suicide'. In conclusion, we consider the effects of Rajput's outsider status as a small-town implant in the film industry within the broader narrative of systemic injustice, as well as the gendered aspects of mob justice that have taken aim at his former partner in the months since.
△ Less
Submitted 8 October, 2020; v1 submitted 24 September, 2020;
originally announced September 2020.
-
COVID, BLM, and the polarization of US politicians on Twitter
Authors:
Anmol Panda,
Divya Siddarth,
Joyojeet Pal
Abstract:
We mapped the tweets of 520 US Congress members, focusing on analyzing their engagement with two broad topics: first, the COVID-19 pandemic, and second, the recent wave of anti-racist protest. We find that, in discussing COVID-19, Democrats frame the issue in terms of public health, while Republicans are more likely to focus on small businesses and the economy. When looking at the discourse around…
▽ More
We mapped the tweets of 520 US Congress members, focusing on analyzing their engagement with two broad topics: first, the COVID-19 pandemic, and second, the recent wave of anti-racist protest. We find that, in discussing COVID-19, Democrats frame the issue in terms of public health, while Republicans are more likely to focus on small businesses and the economy. When looking at the discourse around anti-Black violence, we find that Democrats are far more likely to name police brutality as a specific concern. In contrast, Republicans not only discuss the issue far less, but also keep their terms more general, as well as criticizing perceived protest violence.
△ Less
Submitted 7 August, 2020;
originally announced August 2020.
-
Indian Political Twitter and Caste Discrimination -- How Representation Does Not Equal Inclusion in Lok Sabha Networks
Authors:
Palashi Vaghela,
Ramaravind Kommiya Mothilal,
Joyojeet Pal
Abstract:
Caste privilege persists in the form of upper caste "networks" in India made up of political, social, and economic relations that tend to actively exclude lower caste members. In this study, we examine this pernicious expression of caste in the Twitter networks of politicians from India's highest legislative body - the Lok Sabha. We find that caste has a significant relationship with the centralit…
▽ More
Caste privilege persists in the form of upper caste "networks" in India made up of political, social, and economic relations that tend to actively exclude lower caste members. In this study, we examine this pernicious expression of caste in the Twitter networks of politicians from India's highest legislative body - the Lok Sabha. We find that caste has a significant relationship with the centrality, connectivity and engagement of an MP in the Lok Sabha Twitter network. The higher the caste of a Member of the Parliament (MP) the more likely they are to be important in the network, to have reciprocal connections with other MPs, and to get retweeted by an upper caste MPs.
△ Less
Submitted 31 July, 2020;
originally announced July 2020.
-
Deceiving computers in Reverse Turing Test through Deep Learning
Authors:
Jimut Bahan Pal
Abstract:
It is increasingly becoming difficult for human beings to work on their day to day life without going through the process of reverse Turing test, where the Computers tests the users to be humans or not. Almost every website and service providers today have the process of checking whether their website is being crawled or not by automated bots which could extract valuable information from their sit…
▽ More
It is increasingly becoming difficult for human beings to work on their day to day life without going through the process of reverse Turing test, where the Computers tests the users to be humans or not. Almost every website and service providers today have the process of checking whether their website is being crawled or not by automated bots which could extract valuable information from their site. In the process the bots are getting more intelligent by the use of Deep Learning techniques to decipher those tests and gain unwanted automated access to data while create nuisance by posting spam. Humans spend a considerable amount of time almost every day when trying to decipher CAPTCHAs. The aim of this investigation is to check whether the use of a subset of commonly used CAPTCHAs, known as the text CAPTCHA is a reliable process for verifying their human customers. We mainly focused on the preprocessing step for every CAPTCHA which converts them in binary intensity and removes the confusion as much as possible and developed various models to correctly label as many CAPTCHAs as possible. We also suggested some ways to improve the process of verifying the humans which makes it easy for humans to solve the existing CAPTCHAs and difficult for bots to do the same.
△ Less
Submitted 1 June, 2020;
originally announced June 2020.
-
Curriculum in Gradient-Based Meta-Reinforcement Learning
Authors:
Bhairav Mehta,
Tristan Deleu,
Sharath Chandra Raparthy,
Chris J. Pal,
Liam Paull
Abstract:
Gradient-based meta-learners such as Model-Agnostic Meta-Learning (MAML) have shown strong few-shot performance in supervised and reinforcement learning settings. However, specifically in the case of meta-reinforcement learning (meta-RL), we can show that gradient-based meta-learners are sensitive to task distributions. With the wrong curriculum, agents suffer the effects of meta-overfitting, shal…
▽ More
Gradient-based meta-learners such as Model-Agnostic Meta-Learning (MAML) have shown strong few-shot performance in supervised and reinforcement learning settings. However, specifically in the case of meta-reinforcement learning (meta-RL), we can show that gradient-based meta-learners are sensitive to task distributions. With the wrong curriculum, agents suffer the effects of meta-overfitting, shallow adaptation, and adaptation instability. In this work, we begin by highlighting intriguing failure cases of gradient-based meta-RL and show that task distributions can wildly affect algorithmic outputs, stability, and performance. To address this problem, we leverage insights from recent literature on domain randomization and propose meta Active Domain Randomization (meta-ADR), which learns a curriculum of tasks for gradient-based meta-RL in a similar as ADR does for sim2real transfer. We show that this approach induces more stable policies on a variety of simulated locomotion and navigation tasks. We assess in- and out-of-distribution generalization and find that the learned task distributions, even in an unstructured task space, greatly improve the adaptation performance of MAML. Finally, we motivate the need for better benchmarking in meta-RL that prioritizes \textit{generalization} over single-task adaption performance.
△ Less
Submitted 18 February, 2020;
originally announced February 2020.
-
Reinforced active learning for image segmentation
Authors:
Arantxa Casanova,
Pedro O. Pinheiro,
Negar Rostamzadeh,
Christopher J. Pal
Abstract:
Learning-based approaches for semantic segmentation have two inherent challenges. First, acquiring pixel-wise labels is expensive and time-consuming. Second, realistic segmentation datasets are highly unbalanced: some categories are much more abundant than others, biasing the performance to the most represented ones. In this paper, we are interested in focusing human labelling effort on a small su…
▽ More
Learning-based approaches for semantic segmentation have two inherent challenges. First, acquiring pixel-wise labels is expensive and time-consuming. Second, realistic segmentation datasets are highly unbalanced: some categories are much more abundant than others, biasing the performance to the most represented ones. In this paper, we are interested in focusing human labelling effort on a small subset of a larger pool of data, minimizing this effort while maximizing performance of a segmentation model on a hold-out set. We present a new active learning strategy for semantic segmentation based on deep reinforcement learning (RL). An agent learns a policy to select a subset of small informative image regions -- opposed to entire images -- to be labeled, from a pool of unlabeled data. The region selection decision is made based on predictions and uncertainties of the segmentation model being trained. Our method proposes a new modification of the deep Q-network (DQN) formulation for active learning, adapting it to the large-scale nature of semantic segmentation problems. We test the proof of concept in CamVid and provide results in the large-scale dataset Cityscapes. On Cityscapes, our deep RL region-based DQN approach requires roughly 30% less additional labeled data than our most competitive baseline to reach the same performance. Moreover, we find that our method asks for more labels of under-represented categories compared to the baselines, improving their performance and hel** to mitigate class imbalance.
△ Less
Submitted 16 February, 2020;
originally announced February 2020.
-
How to cluster nearest unique nodes from different classes using JJCluster in Wisp application?
Authors:
Jimut Bahan Pal
Abstract:
The work of finding the best place according to user preference is a tedious task. It needs manual research and lot of intuitive process to find the best location according to some earlier knowledge about the place. It is mainly about accessing publicly available spatial data, applying a simple algorithm to summarize the data according to given preferences, and visualizing the result on a map. We…
▽ More
The work of finding the best place according to user preference is a tedious task. It needs manual research and lot of intuitive process to find the best location according to some earlier knowledge about the place. It is mainly about accessing publicly available spatial data, applying a simple algorithm to summarize the data according to given preferences, and visualizing the result on a map. We introduced JJCluster to eliminate the rigorous way of researching about a place and visualizing the location in real time. This algorithm successfully finds the heart of a city when used in Wisp application. The main purpose of designing Wisp application is used for finding the perfect location for a trip to unknown place which is nearest to a set of preferences. We also discussed the various optimization algorithms that are pioneer of today's dynamic programming and the need for visualization to find patterns when the data is cluttered. Yet, this general clustering algorithm can be used in other areas where we can explore every possible preference to maximize its utility.
△ Less
Submitted 17 February, 2020; v1 submitted 14 February, 2020;
originally announced February 2020.
-
A Deeper Look into Hybrid Images
Authors:
Jimut Bahan Pal
Abstract:
$Hybrid$ $images$ was first introduced by Olivia et al., that produced static images with two interpretations such that the images changes as a function of viewing distance. Hybrid images are built by studying human processing of multiscale images and are motivated by masking studies in visual perception. The first introduction of hybrid images showed that two images can be blend together with a h…
▽ More
$Hybrid$ $images$ was first introduced by Olivia et al., that produced static images with two interpretations such that the images changes as a function of viewing distance. Hybrid images are built by studying human processing of multiscale images and are motivated by masking studies in visual perception. The first introduction of hybrid images showed that two images can be blend together with a high pass filter and a low pass filter in such a way that when the blended image is viewed from a distance, the high pass filter fades away and the low pass filter becomes prominent. Our main aim here is to study and review the original paper by changing and tweaking certain parameters to see how they affect the quality of the blended image produced. We have used exhaustively different set of images and filters to see how they function and whether this can be used in a real time system or not.
△ Less
Submitted 10 February, 2020; v1 submitted 30 January, 2020;
originally announced January 2020.
-
$sβ_λ$-Closed sets and some low separation axioms in GT-spaces
Authors:
Jagannath Pal,
Amar Kumar Banerjee
Abstract:
Here we have studied the ideas of $ sg_λ,sλ$ and $ sβ_λ$-closed sets and investigated some of their properties in generalized topological spaces. We have also studied some low separation axioms namely $ sλT_\frac{1}{4} $, $ sλT_\frac{3}{8} $, $ sλT_\frac{1}{2} $ axioms and their mutual relations with $ sλT_0 $ and $sλT_1 $ axioms.
Here we have studied the ideas of $ sg_λ,sλ$ and $ sβ_λ$-closed sets and investigated some of their properties in generalized topological spaces. We have also studied some low separation axioms namely $ sλT_\frac{1}{4} $, $ sλT_\frac{3}{8} $, $ sλT_\frac{1}{2} $ axioms and their mutual relations with $ sλT_0 $ and $sλT_1 $ axioms.
△ Less
Submitted 26 November, 2019;
originally announced November 2019.
-
Quality of Control Assessment for Tactile Internet based Cyber-Physical Systems
Authors:
Kurian Polachan,
Joydeep Pal,
Chandramani Singh,
Prabhakar T V
Abstract:
We evolve a methodology and define a metric to evaluate Tactile Internet based Cyber-Physical Systems or Tactile Cyber-Physical Systems (TCPS). Towards this goal, we adopt the step response analysis, a well-known control-theoretic method. The adoption includes replacing the human operator (or master) with a controller with known characteristics and analyzing its response to slave side step disturb…
▽ More
We evolve a methodology and define a metric to evaluate Tactile Internet based Cyber-Physical Systems or Tactile Cyber-Physical Systems (TCPS). Towards this goal, we adopt the step response analysis, a well-known control-theoretic method. The adoption includes replacing the human operator (or master) with a controller with known characteristics and analyzing its response to slave side step disturbances. The resulting step response curves demonstrate that the \textit{Quality of Control} (QoC) metric is sensitive to control loop instabilities and serves as a good indicator of cybersickness experienced by human operators. We demonstrate the efficacy of the proposed methodology and metric through experiments on a TCPS testbed. The experiments include assessing the suitability of several access technologies, intercontinental links, network topologies, network traffic conditions and testbed configurations. Further, we validate our claim of using QoC to predict and quantify cybersickness through experiments on a teleoperation setup built using Mininet and VREP.
△ Less
Submitted 30 March, 2020; v1 submitted 19 October, 2019;
originally announced October 2019.
-
Learning Sparse Mixture of Experts for Visual Question Answering
Authors:
Vardaan Pahuja,
Jie Fu,
Christopher J. Pal
Abstract:
There has been a rapid progress in the task of Visual Question Answering with improved model architectures. Unfortunately, these models are usually computationally intensive due to their sheer size which poses a serious challenge for deployment. We aim to tackle this issue for the specific task of Visual Question Answering (VQA). A Convolutional Neural Network (CNN) is an integral part of the visu…
▽ More
There has been a rapid progress in the task of Visual Question Answering with improved model architectures. Unfortunately, these models are usually computationally intensive due to their sheer size which poses a serious challenge for deployment. We aim to tackle this issue for the specific task of Visual Question Answering (VQA). A Convolutional Neural Network (CNN) is an integral part of the visual processing pipeline of a VQA model (assuming the CNN is trained along with entire VQA model). In this project, we propose an efficient and modular neural architecture for the VQA task with focus on the CNN module. Our experiments demonstrate that a sparsely activated CNN based VQA model achieves comparable performance to a standard CNN based VQA model architecture.
△ Less
Submitted 19 September, 2019;
originally announced September 2019.
-
Structure Learning for Neural Module Networks
Authors:
Vardaan Pahuja,
Jie Fu,
Sarath Chandar,
Christopher J. Pal
Abstract:
Neural Module Networks, originally proposed for the task of visual question answering, are a class of neural network architectures that involve human-specified neural modules, each designed for a specific form of reasoning. In current formulations of such networks only the parameters of the neural modules and/or the order of their execution is learned. In this work, we further expand this approach…
▽ More
Neural Module Networks, originally proposed for the task of visual question answering, are a class of neural network architectures that involve human-specified neural modules, each designed for a specific form of reasoning. In current formulations of such networks only the parameters of the neural modules and/or the order of their execution is learned. In this work, we further expand this approach and also learn the underlying internal structure of modules in terms of the ordering and combination of simple and elementary arithmetic operators. Our results show that one is indeed able to simultaneously learn both internal module structure and module sequencing without extra supervisory signals for module execution sequencing. With this approach, we report performance comparable to models using hand-designed modules.
△ Less
Submitted 27 May, 2019;
originally announced May 2019.
-
Active Domain Randomization
Authors:
Bhairav Mehta,
Manfred Diaz,
Florian Golemo,
Christopher J. Pal,
Liam Paull
Abstract:
Domain randomization is a popular technique for improving domain transfer, often used in a zero-shot setting when the target domain is unknown or cannot easily be used for training. In this work, we empirically examine the effects of domain randomization on agent generalization. Our experiments show that domain randomization may lead to suboptimal, high-variance policies, which we attribute to the…
▽ More
Domain randomization is a popular technique for improving domain transfer, often used in a zero-shot setting when the target domain is unknown or cannot easily be used for training. In this work, we empirically examine the effects of domain randomization on agent generalization. Our experiments show that domain randomization may lead to suboptimal, high-variance policies, which we attribute to the uniform sampling of environment parameters. We propose Active Domain Randomization, a novel algorithm that learns a parameter sampling strategy. Our method looks for the most informative environment variations within the given randomization ranges by leveraging the discrepancies of policy rollouts in randomized and reference environment instances. We find that training more frequently on these instances leads to better overall agent generalization. Our experiments across various physics-based simulated and real-robot tasks show that this enhancement leads to more robust, consistent policies.
△ Less
Submitted 10 July, 2019; v1 submitted 9 April, 2019;
originally announced April 2019.
-
Finding and Visualizing Weaknesses of Deep Reinforcement Learning Agents
Authors:
Christian Rupprecht,
Cyril Ibrahim,
Christopher J. Pal
Abstract:
As deep reinforcement learning driven by visual perception becomes more widely used there is a growing need to better understand and probe the learned agents. Understanding the decision making process and its relationship to visual inputs can be very valuable to identify problems in learned behavior. However, this topic has been relatively under-explored in the research community. In this work we…
▽ More
As deep reinforcement learning driven by visual perception becomes more widely used there is a growing need to better understand and probe the learned agents. Understanding the decision making process and its relationship to visual inputs can be very valuable to identify problems in learned behavior. However, this topic has been relatively under-explored in the research community. In this work we present a method for synthesizing visual inputs of interest for a trained agent. Such inputs or states could be situations in which specific actions are necessary. Further, critical states in which a very high or a very low reward can be achieved are often interesting to understand the situational awareness of the system as they can correspond to risky states. To this end, we learn a generative model over the state space of the environment and use its latent space to optimize a target function for the state of interest. In our experiments we show that this method can generate insights for a variety of environments and reinforcement learning methods. We explore results in the standard Atari benchmark games as well as in an autonomous driving simulator. Based on the efficiency with which we have been able to identify behavioural weaknesses with this technique, we believe this general approach could serve as an important tool for AI safety applications.
△ Less
Submitted 2 April, 2019;
originally announced April 2019.
-
S-Matrix approach to Compton scattering at the tree level in a strong magnetic field
Authors:
Jitendra Pal,
Binoy Krishna Patra
Abstract:
We have studied the Compton scattering ($γe^- \longrightarrow γe^-$) at the tree level in a homogeneous background of strong magnetic field ($|eB| \gg { m }^{ 2 },~\text{m is the mass of electron}$) through the S-matrix approach. For that purpose, using the Schwinger propagator for the electron, we have first calculated the square of the S-matrix element in the Landau gauge by summing over the fin…
▽ More
We have studied the Compton scattering ($γe^- \longrightarrow γe^-$) at the tree level in a homogeneous background of strong magnetic field ($|eB| \gg { m }^{ 2 },~\text{m is the mass of electron}$) through the S-matrix approach. For that purpose, using the Schwinger propagator for the electron, we have first calculated the square of the S-matrix element in the Landau gauge by summing over the final states of electron and photon and averaging over the initial states of the same. In the strong magnetic field, only the lowest Landau level for electron is considered. Finally we have computed the crosssection for Compton scattering as a function of initial photon energy for the different strengths of strong magnetic fields, where we have found that the crosssection in vacuum gets decreased due to the presence of strong magnetic field. However, for a fixed initial photon energy, the crosssection increases linearly with the magnetic field.
△ Less
Submitted 24 October, 2018;
originally announced October 2018.
-
New separation axioms in generalized bitopological spaces
Authors:
Amar Kumar Banerjee,
Jagannath Pal
Abstract:
Here we have studied on the ideas of $g_{μ_i}$ and $λ_{μ_i}$-closed sets with respect to ${μ_j}(i,j=1,2,i\not=j)$ and pairwise $ λ$-closed sets in a generalized bitopological space $ (X,μ_1, μ_2) $. We have also investigated the properties on some new separation axioms namely pairwise $ T_\frac{1}{4}$, pairwise $T_\frac{3}{8}$, pairwise $ T_\frac{5}{8} $ and have established their mutual relations…
▽ More
Here we have studied on the ideas of $g_{μ_i}$ and $λ_{μ_i}$-closed sets with respect to ${μ_j}(i,j=1,2,i\not=j)$ and pairwise $ λ$-closed sets in a generalized bitopological space $ (X,μ_1, μ_2) $. We have also investigated the properties on some new separation axioms namely pairwise $ T_\frac{1}{4}$, pairwise $T_\frac{3}{8}$, pairwise $ T_\frac{5}{8} $ and have established their mutual relations with pairwise $ T_0 $, pairwise $ T_\frac{1}{2} $ and pairwise $ T_1 $. We have also shown that under certain conditions these axioms are equivalent.
△ Less
Submitted 12 October, 2018;
originally announced October 2018.
-
Learning General Purpose Distributed Sentence Representations via Large Scale Multi-task Learning
Authors:
Sandeep Subramanian,
Adam Trischler,
Yoshua Bengio,
Christopher J Pal
Abstract:
A lot of the recent success in natural language processing (NLP) has been driven by distributed vector representations of words trained on large amounts of text in an unsupervised manner. These representations are typically used as general purpose features for words across a range of NLP problems. However, extending this success to learning representations of sequences of words, such as sentences,…
▽ More
A lot of the recent success in natural language processing (NLP) has been driven by distributed vector representations of words trained on large amounts of text in an unsupervised manner. These representations are typically used as general purpose features for words across a range of NLP problems. However, extending this success to learning representations of sequences of words, such as sentences, remains an open problem. Recent work has explored unsupervised as well as supervised learning techniques with different training objectives to learn general purpose fixed-length sentence representations. In this work, we present a simple, effective multi-task learning framework for sentence representations that combines the inductive biases of diverse training objectives in a single model. We train this model on several data sources with multiple training objectives on over 100 million sentences. Extensive experiments demonstrate that sharing a single recurrent sentence encoder across weakly related tasks leads to consistent improvements over previous methods. We present substantial improvements in the context of transfer learning and low-resource settings using our learned general-purpose representations.
△ Less
Submitted 30 March, 2018;
originally announced April 2018.
-
On decoding procedures of intertwining codes
Authors:
Shyambhu Mukherjee,
Joydeb Pal,
Satya Bagchi
Abstract:
One of the main weakness of the family of centralizer codes is that its length is always $n^2$. Thus we have taken a new matrix equation code called intertwining code. Specialty of this code is the length of it, which is of the form $nk$. We establish two decoding methods which can be fitted to intertwining codes as well as for any linear codes. We also show an inclusion of linear codes into a spe…
▽ More
One of the main weakness of the family of centralizer codes is that its length is always $n^2$. Thus we have taken a new matrix equation code called intertwining code. Specialty of this code is the length of it, which is of the form $nk$. We establish two decoding methods which can be fitted to intertwining codes as well as for any linear codes. We also show an inclusion of linear codes into a special class of intertwining codes.
△ Less
Submitted 6 January, 2018;
originally announced January 2018.
-
Semi Lamda*-Closed Sets and New Separation Axioms in Alexandroff Spaces
Authors:
Amar Kumar Banerjee,
Jagannath Pal
Abstract:
Here we have studied the idea of semi Lamda*-closed sets and investigate some of their properties in spaces considered by A. D. Alexandroff [1]. We have introduced some new separation axioms namely semi-Tw/4, , semi-T3w/8, semi-T5w/8, and their inter-relation with semi-T0 and semi-T1. We have shown that under certain conditions these axioms are equivalent.
Here we have studied the idea of semi Lamda*-closed sets and investigate some of their properties in spaces considered by A. D. Alexandroff [1]. We have introduced some new separation axioms namely semi-Tw/4, , semi-T3w/8, semi-T5w/8, and their inter-relation with semi-T0 and semi-T1. We have shown that under certain conditions these axioms are equivalent.
△ Less
Submitted 25 September, 2017;
originally announced September 2017.
-
Voltage-Dependent Differential Conductance (dI/dV) Imaging of a Polymer:Fullerene Bulk-Heterojunction
Authors:
Goutam Paul,
Biswajit Kundu,
Amlan J. Pal
Abstract:
With scanning tunneling spectroscopy (STS), we probed differential conductance (dI/dV) images of P3HT:PCBM bulk-heterojunctions (BHJs). Since the materials are seen energetically in dI/dV images, the imaging process provides opportunities to view the nano-domains of the components in the BHJ. The images were recorded at different voltages to bring out the interface region between the two materials…
▽ More
With scanning tunneling spectroscopy (STS), we probed differential conductance (dI/dV) images of P3HT:PCBM bulk-heterojunctions (BHJs). Since the materials are seen energetically in dI/dV images, the imaging process provides opportunities to view the nano-domains of the components in the BHJ. The images were recorded at different voltages to bring out the interface region between the two materials as well. The density of states (DOS) spectra of pristine materials provided location of energy levels of the polymer and the fullerene in forming energy diagram with a type-II alignment from the view-point of charge carriers. DOS spectra recorded in the P3HT:PCBM heterojunction in addition yielded energies that deviated from those of the components indicating bending of energy levels at the interface region.
△ Less
Submitted 8 September, 2017;
originally announced September 2017.