-
FACTS About Building Retrieval Augmented Generation-based Chatbots
Authors:
Rama Akkiraju,
Anbang Xu,
Deepak Bora,
Tan Yu,
Lu An,
Vishal Seth,
Aaditya Shukla,
Pritam Gundecha,
Hridhay Mehta,
Ashwin Jha,
Prithvi Raj,
Abhinav Balasubramanian,
Murali Maram,
Guru Muthusamy,
Shivakesh Reddy Annepally,
Sidney Knowles,
Min Du,
Nick Burnett,
Sean Javiya,
Ashok Marannan,
Mamta Kumari,
Surbhi Jha,
Ethan Dereszenski,
Anupam Chakraborty,
Subhash Ranjan
, et al. (13 additional authors not shown)
Abstract:
Enterprise chatbots, powered by generative AI, are emerging as key applications to enhance employee productivity. Retrieval Augmented Generation (RAG), Large Language Models (LLMs), and orchestration frameworks like Langchain and Llamaindex are crucial for building these chatbots. However, creating effective enterprise chatbots is challenging and requires meticulous RAG pipeline engineering. This…
▽ More
Enterprise chatbots, powered by generative AI, are emerging as key applications to enhance employee productivity. Retrieval Augmented Generation (RAG), Large Language Models (LLMs), and orchestration frameworks like Langchain and Llamaindex are crucial for building these chatbots. However, creating effective enterprise chatbots is challenging and requires meticulous RAG pipeline engineering. This includes fine-tuning embeddings and LLMs, extracting documents from vector databases, rephrasing queries, reranking results, designing prompts, honoring document access controls, providing concise responses, including references, safeguarding personal information, and building orchestration agents. We present a framework for building RAG-based chatbots based on our experience with three NVIDIA chatbots: for IT/HR benefits, financial earnings, and general content. Our contributions are three-fold: introducing the FACTS framework (Freshness, Architectures, Cost, Testing, Security), presenting fifteen RAG pipeline control points, and providing empirical results on accuracy-latency tradeoffs between large and small LLMs. To the best of our knowledge, this is the first paper of its kind that provides a holistic view of the factors as well as solutions for building secure enterprise-grade chatbots."
△ Less
Submitted 10 July, 2024;
originally announced July 2024.
-
TextAge: A Curated and Diverse Text Dataset for Age Classification
Authors:
Shravan Cheekati,
Mridul Gupta,
Vibha Raghu,
Pranav Raj
Abstract:
Age-related language patterns play a crucial role in understanding linguistic differences and develo** age-appropriate communication strategies. However, the lack of comprehensive and diverse datasets has hindered the progress of research in this area. To address this issue, we present TextAge, a curated text dataset that maps sentences to the age and age group of the producer, as well as an und…
▽ More
Age-related language patterns play a crucial role in understanding linguistic differences and develo** age-appropriate communication strategies. However, the lack of comprehensive and diverse datasets has hindered the progress of research in this area. To address this issue, we present TextAge, a curated text dataset that maps sentences to the age and age group of the producer, as well as an underage (under 13) label. TextAge covers a wide range of ages and includes both spoken and written data from various sources such as CHILDES, Meta, Poki Poems-by-kids, JUSThink, and the TV show "Survivor." The dataset undergoes extensive cleaning and preprocessing to ensure data quality and consistency. We demonstrate the utility of TextAge through two applications: Underage Detection and Generational Classification. For Underage Detection, we train a Naive Bayes classifier, fine-tuned RoBERTa, and XLNet models to differentiate between language patterns of minors and young-adults and over. For Generational Classification, the models classify language patterns into different age groups (kids, teens, twenties, etc.). The models excel at classifying the "kids" group but struggle with older age groups, particularly "fifties," "sixties," and "seventies," likely due to limited data samples and less pronounced linguistic differences. TextAge offers a valuable resource for studying age-related language patterns and develo** age-sensitive language models. The dataset's diverse composition and the promising results of the classification tasks highlight its potential for various applications, such as content moderation, targeted advertising, and age-appropriate communication. Future work aims to expand the dataset further and explore advanced modeling techniques to improve performance on older age groups.
△ Less
Submitted 2 May, 2024;
originally announced June 2024.
-
Can LLMs Compute with Reasons?
Authors:
Harshit Sandilya,
Peehu Raj,
Jainit Sushil Bafna,
Srija Mukhopadhyay,
Shivansh Sharma,
Ellwil Sharma,
Arastu Sharma,
Neeta Trivedi,
Manish Shrivastava,
Rajesh Kumar
Abstract:
Large language models (LLMs) often struggle with complex mathematical tasks, prone to "hallucinating" incorrect answers due to their reliance on statistical patterns. This limitation is further amplified in average Small LangSLMs with limited context and training data. To address this challenge, we propose an "Inductive Learning" approach utilizing a distributed network of SLMs. This network lever…
▽ More
Large language models (LLMs) often struggle with complex mathematical tasks, prone to "hallucinating" incorrect answers due to their reliance on statistical patterns. This limitation is further amplified in average Small LangSLMs with limited context and training data. To address this challenge, we propose an "Inductive Learning" approach utilizing a distributed network of SLMs. This network leverages error-based learning and hint incorporation to refine the reasoning capabilities of SLMs. Our goal is to provide a framework that empowers SLMs to approach the level of logic-based applications achieved by high-parameter models, potentially benefiting any language model. Ultimately, this novel concept paves the way for bridging the logical gap between humans and LLMs across various fields.
△ Less
Submitted 19 February, 2024;
originally announced February 2024.
-
Bin-picking of novel objects through category-agnostic-segmentation: RGB matters
Authors:
Prem Raj,
Sachin Bhadang,
Gaurav Chaudhary,
Laxmidhar Behera,
Tushar Sandhan
Abstract:
This paper addresses category-agnostic instance segmentation for robotic manipulation, focusing on segmenting objects independent of their class to enable versatile applications like bin-picking in dynamic environments. Existing methods often lack generalizability and object-specific information, leading to grasp failures. We present a novel approach leveraging object-centric instance segmentation…
▽ More
This paper addresses category-agnostic instance segmentation for robotic manipulation, focusing on segmenting objects independent of their class to enable versatile applications like bin-picking in dynamic environments. Existing methods often lack generalizability and object-specific information, leading to grasp failures. We present a novel approach leveraging object-centric instance segmentation and simulation-based training for effective transfer to real-world scenarios. Notably, our strategy overcomes challenges posed by noisy depth sensors, enhancing the reliability of learning. Our solution accommodates transparent and semi-transparent objects which are historically difficult for depth-based gras** methods. Contributions include domain randomization for successful transfer, our collected dataset for warehouse applications, and an integrated framework for efficient bin-picking. Our trained instance segmentation model achieves state-of-the-art performance over WISDOM public benchmark [1] and also over the custom-created dataset. In a real-world challenging bin-picking setup our bin-picking framework method achieves 98% accuracy for opaque objects and 97% accuracy for non-opaque objects, outperforming the state-of-the-art baselines with a greater margin.
△ Less
Submitted 27 December, 2023;
originally announced December 2023.
-
Domain-Independent Disperse and Pick method for Robotic Gras**
Authors:
Prem Raj,
Aniruddha Singhal,
Vipul Sanap,
L. Behera,
Rajesh Sinha
Abstract:
Picking unseen objects from clutter is a difficult problem because of the variability in objects (shape, size, and material) and occlusion due to clutter. As a result, it becomes difficult for gras** methods to segment the objects properly and they fail to singulate the object to be picked. This may result in grasp failure or picking of multiple objects together in a single attempt. A push-to-mo…
▽ More
Picking unseen objects from clutter is a difficult problem because of the variability in objects (shape, size, and material) and occlusion due to clutter. As a result, it becomes difficult for gras** methods to segment the objects properly and they fail to singulate the object to be picked. This may result in grasp failure or picking of multiple objects together in a single attempt. A push-to-move action by the robot will be beneficial to disperse the objects in the workspace and thus assist the gras** and vision algorithm. We propose a disperse and pick method for domain-independent robotic gras** in a highly cluttered heap of objects. The novel contribution of our framework is the introduction of a heuristic clutter removal method that does not require deep learning and can work on unseen objects. At each iteration of the algorithm, the robot either performs a push-to-move action or a grasp action based on the estimated clutter profile. For grasp planning, we present an improved and adaptive version of a recent domain-independent gras** method. The efficacy of the integrated system is demonstrated in simulation as well as in the real-world.
△ Less
Submitted 19 December, 2023;
originally announced December 2023.
-
Student debt and behavioral bias: a trillion dollar problem
Authors:
Praful Raj
Abstract:
This literature review elucidates the implications of behavioral biases, particularly those stemming from overconfidence and framing, on the intertemporal choices made by students on their underline demand preferences for student loans. A secondary objective is to understand the potential utility of social media to assist students and young borrowers with the debt repayment process and management…
▽ More
This literature review elucidates the implications of behavioral biases, particularly those stemming from overconfidence and framing, on the intertemporal choices made by students on their underline demand preferences for student loans. A secondary objective is to understand the potential utility of social media to assist students and young borrowers with the debt repayment process and management of their loan tenures. A close examination of the literature reveals a substantial influence of these behavioral and cognitive principles on the intertemporal choices made by students towards debt repayments. This affects not only the magnitude of loans they acquire but also the anchoring of the terms of loan conditions associated with repayment. Furthermore, I establish that harnessing social media as the potential to cultivate financial literacy and enhanced understanding of loan terms to expedite the process of debt redemption. This review could serve as a valuable repository for students, scholars, and policymakers alike, in order to expound on the cognitive biases that students and consumers often face when applying and entering into loan contract.
△ Less
Submitted 3 October, 2023;
originally announced October 2023.
-
SPLAL: Similarity-based pseudo-labeling with alignment loss for semi-supervised medical image classification
Authors:
Md Junaid Mahmood,
Pranaw Raj,
Divyansh Agarwal,
Suruchi Kumari,
Pravendra Singh
Abstract:
Medical image classification is a challenging task due to the scarcity of labeled samples and class imbalance caused by the high variance in disease prevalence. Semi-supervised learning (SSL) methods can mitigate these challenges by leveraging both labeled and unlabeled data. However, SSL methods for medical image classification need to address two key challenges: (1) estimating reliable pseudo-la…
▽ More
Medical image classification is a challenging task due to the scarcity of labeled samples and class imbalance caused by the high variance in disease prevalence. Semi-supervised learning (SSL) methods can mitigate these challenges by leveraging both labeled and unlabeled data. However, SSL methods for medical image classification need to address two key challenges: (1) estimating reliable pseudo-labels for the images in the unlabeled dataset and (2) reducing biases caused by class imbalance. In this paper, we propose a novel SSL approach, SPLAL, that effectively addresses these challenges. SPLAL leverages class prototypes and a weighted combination of classifiers to predict reliable pseudo-labels over a subset of unlabeled images. Additionally, we introduce alignment loss to mitigate model biases toward majority classes. To evaluate the performance of our proposed approach, we conduct experiments on two publicly available medical image classification benchmark datasets: the skin lesion classification (ISIC 2018) and the blood cell classification dataset (BCCD). The experimental results empirically demonstrate that our approach outperforms several state-of-the-art SSL methods over various evaluation metrics. Specifically, our proposed approach achieves a significant improvement over the state-of-the-art approach on the ISIC 2018 dataset in both Accuracy and F1 score, with relative margins of 2.24\% and 11.40\%, respectively. Finally, we conduct extensive ablation experiments to examine the contribution of different components of our approach, validating its effectiveness.
△ Less
Submitted 10 July, 2023;
originally announced July 2023.
-
sar reduction techniques for wearable application
Authors:
Prithvi Raj,
Ravi Prakash Dwivedi
Abstract:
The biocompatible, noninvasive, lightweight, compact size and low manufacturing cost of the wearable antenna has attracted the researchers to work more in this field to bring the use of wearable antennas to the mainstream wearable devices industry. In recent years there has been great growth in the field of wearable electronics due to their unmatched functionalities and use cases, with the increas…
▽ More
The biocompatible, noninvasive, lightweight, compact size and low manufacturing cost of the wearable antenna has attracted the researchers to work more in this field to bring the use of wearable antennas to the mainstream wearable devices industry. In recent years there has been great growth in the field of wearable electronics due to their unmatched functionalities and use cases, with the increased use of wearables there comes the concern about the safety in the usage of the antenna which directly points towards the SAR value of the particular antenna in use. This paper examines a wide range of antenna based on their SAR value and the techniques such as EBG, AMC, use of metamaterials, used to reduce the SAR for safe usage
△ Less
Submitted 16 April, 2023;
originally announced April 2023.
-
Computation of Trusted Short Weierstrass Elliptic Curves for Cryptography
Authors:
Kunal Abhishek,
E. George Dharma Prakash Raj
Abstract:
Short Weierstrass's elliptic curves with underlying hard Elliptic Curve Discrete Logarithm Problems was widely used in Cryptographic applications. This paper introduces a new security notation 'trusted security' for computation methods of elliptic curves for cryptography. Three additional "trusted security acceptance criteria" is proposed to be met by the elliptic curves aimed for cryptography. Fu…
▽ More
Short Weierstrass's elliptic curves with underlying hard Elliptic Curve Discrete Logarithm Problems was widely used in Cryptographic applications. This paper introduces a new security notation 'trusted security' for computation methods of elliptic curves for cryptography. Three additional "trusted security acceptance criteria" is proposed to be met by the elliptic curves aimed for cryptography. Further, two cryptographically secure elliptic curves over 256 bit and 384 bit prime fields are demonstrated which are secure from ECDLP, ECC as well as trust perspectives. The proposed elliptic curves are successfully subjected to thorough security analysis and performance evaluation with respect to key generation and signing/verification and hence, proven for their cryptographic suitability and great feasibility for acceptance by the community.
△ Less
Submitted 15 April, 2022;
originally announced August 2022.
-
Evaluation of Computational Approaches of Short Weierstrass Elliptic Curves for Cryptography
Authors:
Kunal Abhishek,
E. George Dharma Prakash Raj
Abstract:
The survey presents the evolution of Short Weierstrass elliptic curves after their introduction in cryptography. Subsequently, this evolution resulted in the establishment of present elliptic curve computational standards. We discuss the chronology of attacks on Elliptic Curve Discrete Logarithm Problem and investigate their countermeasures to highlight the evolved selection criteria of cryptograp…
▽ More
The survey presents the evolution of Short Weierstrass elliptic curves after their introduction in cryptography. Subsequently, this evolution resulted in the establishment of present elliptic curve computational standards. We discuss the chronology of attacks on Elliptic Curve Discrete Logarithm Problem and investigate their countermeasures to highlight the evolved selection criteria of cryptographically safe elliptic curves. Further, two popular deterministic and random approaches for selection of Short Weierstrass elliptic curve for cryptography are evaluated from computational, security and trust perspectives and a trend in existent computational standards is demonstrated. Finally, standard and non-standard elliptic curves are analysed to add a new insight into their usability. There is no such survey conducted in past to the best of our knowledge.
△ Less
Submitted 15 April, 2022;
originally announced August 2022.
-
Experiences with the Introduction of AI-based Tools for Moderation Automation of Voice-based Participatory Media Forums
Authors:
Aman Khullar,
Paramita Panjal,
Rachit Pandey,
Abhishek Burnwal,
Prashit Raj,
Ankit Akash Jha,
Priyadarshi Hitesh,
R Jayanth Reddy,
Himanshu,
Aaditeshwar Seth
Abstract:
Voice-based discussion forums where users can record audio messages which are then published for other users to listen and comment, are often moderated to ensure that the published audios are of good quality, relevant, and adhere to editorial guidelines of the forum. There is room for the introduction of AI-based tools in the moderation process, such as to identify and filter out blank or noisy au…
▽ More
Voice-based discussion forums where users can record audio messages which are then published for other users to listen and comment, are often moderated to ensure that the published audios are of good quality, relevant, and adhere to editorial guidelines of the forum. There is room for the introduction of AI-based tools in the moderation process, such as to identify and filter out blank or noisy audios, use speech recognition to transcribe the voice messages in text, and use natural language processing techniques to extract relevant metadata from the audio transcripts. We design such tools and deploy them within a social enterprise working in India that runs several voice-based discussion forums. We present our findings in terms of the time and cost-savings made through the introduction of these tools, and describe the feedback of the moderators towards the acceptability of AI-based automation in their workflow. Our work forms a case-study in the use of AI for automation of several routine tasks, and can be especially relevant for other researchers and practitioners involved with the use of voice-based technologies in develo** regions of the world.
△ Less
Submitted 9 August, 2021;
originally announced August 2021.
-
SRIB-LEAP submission to Far-field Multi-Channel Speech Enhancement Challenge for Video Conferencing
Authors:
R G Prithvi Raj,
Rohit Kumar,
M K Jayesh,
Anurenjan Purushothaman,
Sriram Ganapathy,
M A Basha Shaik
Abstract:
This paper presents the details of the SRIB-LEAP submission to the ConferencingSpeech challenge 2021. The challenge involved the task of multi-channel speech enhancement to improve the quality of far field speech from microphone arrays in a video conferencing room. We propose a two stage method involving a beamformer followed by single channel enhancement. For the beamformer, we incorporated self-…
▽ More
This paper presents the details of the SRIB-LEAP submission to the ConferencingSpeech challenge 2021. The challenge involved the task of multi-channel speech enhancement to improve the quality of far field speech from microphone arrays in a video conferencing room. We propose a two stage method involving a beamformer followed by single channel enhancement. For the beamformer, we incorporated self-attention mechanism as inter-channel processing layer in the filter-and-sum network (FaSNet), an end-to-end time-domain beamforming system. The single channel speech enhancement is done in log spectral domain using convolution neural network (CNN)-long short term memory (LSTM) based architecture. We achieved improvements in objective quality metrics - perceptual evaluation of speech quality (PESQ) of 0.5 on the noisy data. On subjective quality evaluation, the proposed approach improved the mean opinion score (MOS) by an absolute measure of 0.9 over the noisy audio.
△ Less
Submitted 24 June, 2021;
originally announced June 2021.
-
Label-free Raman spectroscopy and machine learning enables sensitive evaluation of differential response to immunotherapy
Authors:
Santosh Kumar Paidi,
Joel Rodriguez Troncoso,
Piyush Raj,
Paola Monterroso Diaz,
David E. Lee,
Narasimhan Rajaram,
Ishan Barman
Abstract:
Cancer immunotherapy provides durable clinical benefit in only a small fraction of patients, particularly due to a lack of reliable biomarkers for accurate prediction of treatment outcomes and evaluation of response. Here, we demonstrate the first application of label-free Raman spectroscopy for elucidating biochemical changes induced by immunotherapy in the tumor microenvironment. We used CT26 mu…
▽ More
Cancer immunotherapy provides durable clinical benefit in only a small fraction of patients, particularly due to a lack of reliable biomarkers for accurate prediction of treatment outcomes and evaluation of response. Here, we demonstrate the first application of label-free Raman spectroscopy for elucidating biochemical changes induced by immunotherapy in the tumor microenvironment. We used CT26 murine colorectal cancer cells to grow tumor xenografts and subjected them to treatment with anti-CTLA-4 and anti-PD-L1 antibodies. Multivariate curve resolution - alternating least squares (MCR-ALS) decomposition of Raman spectral dataset obtained from the treated and control tumors revealed subtle differences in lipid, nucleic acid, and collagen content due to therapy. Our supervised classification analysis using support vector machines and random forests provided excellent prediction accuracies for both immune checkpoint inhibitors and delineated important spectral markers specific to each therapy, consistent with their differential mechanisms of action. Our findings pave the way for in vivo studies of response to immunotherapy in clinical patients using label-free Raman spectroscopy and machine learning.
△ Less
Submitted 10 November, 2020;
originally announced November 2020.
-
A Review of 5G Front-End Systems Package Integration
Authors:
Atom O. Watanabe,
Muhammad Ali,
Sk Yeahia Been Sayeed,
Rao R. Tummala,
P. Markondeya Raj
Abstract:
Increasing data rates, spectrum efficiency and energy efficiency have been driving major advances in the design and hardware integration of RF communication networks. In order to meet the data rate and efficiency metrics, 5G networks have emerged as a follow-on to 4G, and projected to have 100X higher wireless date rates and 100X lower latency than those with current 4G networks. Major challenges…
▽ More
Increasing data rates, spectrum efficiency and energy efficiency have been driving major advances in the design and hardware integration of RF communication networks. In order to meet the data rate and efficiency metrics, 5G networks have emerged as a follow-on to 4G, and projected to have 100X higher wireless date rates and 100X lower latency than those with current 4G networks. Major challenges arise in the packaging of radio-frequency front-end modules because of the stringent low signal-loss requirements in the millimeter-wave frequency bands, and precision-impedance designs with smaller footprints and thickness. Heterogeneous integration in 3D ultra-thin packages with higher component densities and performance than with the existing 2D packages is needed to realize such 5G systems. This paper reviews the key building blocks of 5G systems and the underlying advances in packaging technologies to realize them.
△ Less
Submitted 15 September, 2020;
originally announced September 2020.
-
Learning to Switch CNNs with Model Agnostic Meta Learning for Fine Precision Visual Servoing
Authors:
Prem Raj,
Vinay P. Namboodiri,
L. Behera
Abstract:
Convolutional Neural Networks (CNNs) have been successfully applied for relative camera pose estimation from labeled image-pair data, without requiring any hand-engineered features, camera intrinsic parameters or depth information. The trained CNN can be utilized for performing pose based visual servo control (PBVS). One of the ways to improve the quality of visual servo output is to improve the a…
▽ More
Convolutional Neural Networks (CNNs) have been successfully applied for relative camera pose estimation from labeled image-pair data, without requiring any hand-engineered features, camera intrinsic parameters or depth information. The trained CNN can be utilized for performing pose based visual servo control (PBVS). One of the ways to improve the quality of visual servo output is to improve the accuracy of the CNN for estimating the relative pose estimation. With a given state-of-the-art CNN for relative pose regression, how can we achieve an improved performance for visual servo control? In this paper, we explore switching of CNNs to improve the precision of visual servo control. The idea of switching a CNN is due to the fact that the dataset for training a relative camera pose regressor for visual servo control must contain variations in relative pose ranging from a very small scale to eventually a larger scale. We found that, training two different instances of the CNN, one for large-scale-displacements (LSD) and another for small-scale-displacements (SSD) and switching them during the visual servo execution yields better results than training a single CNN with the combined LSD+SSD data. However, it causes extra storage overhead and switching decision is taken by a manually set threshold which may not be optimal for all the scenes. To eliminate these drawbacks, we propose an efficient switching strategy based on model agnostic meta learning (MAML) algorithm. In this, a single model is trained to learn parameters which are simultaneously good for multiple tasks, namely a binary classification for switching decision, a 6DOF pose regression for LSD data and also a 6DOF pose regression for SSD data. The proposed approach performs far better than the naive approach, while storage and run-time overheads are almost negligible.
△ Less
Submitted 9 July, 2020;
originally announced July 2020.
-
Identification of Indian Languages using Ghost-VLAD pooling
Authors:
Krishna D N,
Ankita Patil,
M. S. P Raj,
Sai Prasad H S,
Prabhu Aashish Garapati
Abstract:
In this work, we propose a new pooling strategy for language identification by considering Indian languages. The idea is to obtain utterance level features for any variable length audio for robust language recognition. We use the GhostVLAD approach to generate an utterance level feature vector for any variable length input audio by aggregating the local frame level features across time. The genera…
▽ More
In this work, we propose a new pooling strategy for language identification by considering Indian languages. The idea is to obtain utterance level features for any variable length audio for robust language recognition. We use the GhostVLAD approach to generate an utterance level feature vector for any variable length input audio by aggregating the local frame level features across time. The generated feature vector is shown to have very good language discriminative features and helps in getting state of the art results for language identification task. We conduct our experiments on 635Hrs of audio data for 7 Indian languages. Our method outperforms the previous state of the art x-vector [11] method by an absolute improvement of 1.88% in F1-score and achieves 98.43% F1-score on the held-out test data. We compare our system with various pooling approaches and show that GhostVLAD is the best pooling approach for this task. We also provide visualization of the utterance level embeddings generated using Ghost-VLAD pooling and show that this method creates embeddings which has very good language discriminative features.
△ Less
Submitted 5 February, 2020;
originally announced February 2020.
-
Bonding in light-induced vortices: benzene in a high-frequency circular polarized laser
Authors:
Prashant Raj,
Mishu Paul,
Mythreyi R.,
Balanarayan Pananghat
Abstract:
The electronic structure of benzene in the presence of a high-intensity high-frequency circularly polarized laser supports a middle-of-the-ring electron localization. Here, the laser polarization coincides with the ring plane of benzene. The high-frequency oscillating electric field creates circular currents centered at each atom with a circle radius equal to the maximum field amplitude of the las…
▽ More
The electronic structure of benzene in the presence of a high-intensity high-frequency circularly polarized laser supports a middle-of-the-ring electron localization. Here, the laser polarization coincides with the ring plane of benzene. The high-frequency oscillating electric field creates circular currents centered at each atom with a circle radius equal to the maximum field amplitude of the laser. All six carbons have six such rings. For a maximum field amplitude of 1.42 Å, which is the carbon-carbon bond distance, all six dynamic current circles intersect to create a deep vortex in the middle, which supports a bound state of a pair of electrons. Such states for benzene can be realized in experiments using a circularly polarized XUV-laser in a range of intensities 10^16-10^17 W/cm^2 and frequencies 16 eV to 22 eV. Electronic dynamics calculations predict a minimal ionization of benzene when the rise-time of the laser pulse is sudden, indicating a possible experimental realization of these states characterized by a large cut-off in the harmonic generation spectra. This stable electronic structure of the light-dressed benzene is doubly-aromatic due to an extra aromaticity from a D6h symmetric circular distortion of theσ-framework while the π-electrons, with low density in the ring-plane,are least affected.
△ Less
Submitted 16 November, 2019;
originally announced November 2019.
-
An Extensive Technique to Detect and Analyze Melanoma: A Challenge at the International Symposium on Biomedical Imaging (ISBI) 2017
Authors:
G Wiselin Jiji,
P Johnson Durai Raj
Abstract:
An automated method to detect and analyze the melanoma is presented to improve diagnosis which will leads to the exact treatment. Image processing techniques such as segmentation, feature descriptors and classification models are involved in this method. In the First phase the lesion region is segmented using CIELAB Color space Based Segmentation. Then feature descriptors such as shape, color and…
▽ More
An automated method to detect and analyze the melanoma is presented to improve diagnosis which will leads to the exact treatment. Image processing techniques such as segmentation, feature descriptors and classification models are involved in this method. In the First phase the lesion region is segmented using CIELAB Color space Based Segmentation. Then feature descriptors such as shape, color and texture are extracted. Finally, in the third phase lesion region is classified as melanoma, seborrheic keratosis or nevus using multi class O-A SVM model. Experiment with ISIC 2017 Archive skin image database has been done and analyzed the results.
△ Less
Submitted 28 February, 2017;
originally announced February 2017.
-
A Novel Gaussian Based Similarity Measure for Clustering Customer Transactions Using Transaction Sequence Vector
Authors:
M. S. B. Phridvi Raj,
Vangipuram Radhakrishna,
C. V. Guru Rao
Abstract:
Clustering Transactions in sequence, temporal and time series databases is achieving an important attention from the database researchers and software industry. Significant research is carried out towards defining and validating the suitability of new similarity measures for sequence, temporal, time series databases which can accurately and efficiently find the similarity between user transactions…
▽ More
Clustering Transactions in sequence, temporal and time series databases is achieving an important attention from the database researchers and software industry. Significant research is carried out towards defining and validating the suitability of new similarity measures for sequence, temporal, time series databases which can accurately and efficiently find the similarity between user transactions in the given database to predict the user behavior. The distribution of items present in the transactions contributes to a great extent in finding the degree of similarity between them. This forms the key idea of the proposed similarity measure. The main objective of the research is to first design the efficient similarity measure which essentially considers the distribution of the items in the item set over the entire transaction data set and also considers the commonality of items present in the transactions, which is the major drawback in the Jaccard, Cosine, Euclidean similarity measures. We then carry out the analysis for worst case, the average case and best case situations. The Similarity measure designed is Gaussian based and preserves the properties of Gaussian function. The proposed similarity measure may be used to both cluster and classify the user transactions and predict the user behaviors.
△ Less
Submitted 18 April, 2016;
originally announced April 2016.
-
ACO-ESSVHOA - Ant Colony Optimization based Multi-Criteria Decision Making for Efficient Signal Selection in Mobile Vertical Handoff
Authors:
A. Bhuvaneswari,
E. George Dharma Prakash Raj,
V. Sinthu Janita Prakash
Abstract:
The process of Vertical handoff has become one of the major components of today's wireless environment due to the availability of the vast variety of signals. The decision for a handoff should be performed catering to the needs of the current transmission that is being carried out. Our paper describes a modified Ant Colony Optimization based handoff mechanism, that considers multiple criteria in i…
▽ More
The process of Vertical handoff has become one of the major components of today's wireless environment due to the availability of the vast variety of signals. The decision for a handoff should be performed catering to the needs of the current transmission that is being carried out. Our paper describes a modified Ant Colony Optimization based handoff mechanism, that considers multiple criteria in its decision making process rather than a single parameter (pheromone intensity). In general, ACO considers the pheromone intensity and the evaporation rates as the parameters for selecting a route. In this paper, we describe a mechanism that determines the evaporation rates of each path connected to the source using various criteria, which in turn reflects on the pheromone levels present in the path and hence the probability of selecting that route. Experiments show that our process exhibits better convergence rates, hence better usability.
△ Less
Submitted 7 May, 2014;
originally announced May 2014.
-
Architecture of an Ontology-Based Domain-Specific Natural Language Question Answering System
Authors:
Athira P. M.,
Sreeja M.,
P. C. Reghu Raj
Abstract:
Question answering (QA) system aims at retrieving precise information from a large collection of documents against a query. This paper describes the architecture of a Natural Language Question Answering (NLQA) system for a specific domain based on the ontological information, a step towards semantic web question answering. The proposed architecture defines four basic modules suitable for enhancing…
▽ More
Question answering (QA) system aims at retrieving precise information from a large collection of documents against a query. This paper describes the architecture of a Natural Language Question Answering (NLQA) system for a specific domain based on the ontological information, a step towards semantic web question answering. The proposed architecture defines four basic modules suitable for enhancing current QA capabilities with the ability of processing complex questions. The first module was the question processing, which analyses and classifies the question and also reformulates the user query. The second module allows the process of retrieving the relevant documents. The next module processes the retrieved documents, and the last module performs the extraction and generation of a response. Natural language processing techniques are used for processing the question and documents and also for answer extraction. Ontology and domain knowledge are used for reformulating queries and identifying the relations. The aim of the system is to generate short and specific answer to the question that is asked in the natural language in a specific domain. We have achieved 94 % accuracy of natural language question answering in our implementation.
△ Less
Submitted 13 November, 2013;
originally announced November 2013.
-
A Novel Cluster Validation Approach on Pso-Pac Mechanism in Ad Hoc Network
Authors:
S. Thirumurugan,
E. George Dharma Prakash Raj
Abstract:
The ad hoc network places a vital role in contemporary days communication scenario. This network performance gets up while the clustering phenomenon has been incorporated. The cluster formation using the vital parameters is incredible on deciding the efficiency level of the clustered ad hoc networks. The PSO-PAC mechanism forms clusters based on swarm intelligence by considering energy as crucial…
▽ More
The ad hoc network places a vital role in contemporary days communication scenario. This network performance gets up while the clustering phenomenon has been incorporated. The cluster formation using the vital parameters is incredible on deciding the efficiency level of the clustered ad hoc networks. The PSO-PAC mechanism forms clusters based on swarm intelligence by considering energy as crucial parameter. This optimized cluster helps to suits the applications where the energy parameter plays a key role. The clusters formed by this mechanism may not ascertain the compactness of the clusters. Thus, this paper proposes D-PAC as an index based validation mechanism to be handled on clusters formed using PSO-PAC. The cluster formation and validation mechanism have been implemented using OMNET++ simulator.
△ Less
Submitted 7 March, 2013;
originally announced April 2013.
-
An Extended Weighted Partitioning Around Cluster Head Mechanism for Ad Hoc Network
Authors:
S. Thirumurugan,
E. George Dharma Prakash Raj
Abstract:
The wireless network places vital role in the present day communication scenario. The ad hoc nature of wireless communication adds flavour to suit various real world applications. This improves the performance of the network tremendously while the clustering mechanism gets added to the ad hoc network. It has been found out that the existing WCA lacks in forming efficient clusters. Thus, this work…
▽ More
The wireless network places vital role in the present day communication scenario. The ad hoc nature of wireless communication adds flavour to suit various real world applications. This improves the performance of the network tremendously while the clustering mechanism gets added to the ad hoc network. It has been found out that the existing WCA lacks in forming efficient clusters. Thus, this work proposes an Extended weighted partitioning around cluster head mechanism by considering W-PAC as a base to form clusters. The cluster members are configured with IPv6 address. This IPv6 clusters formed through W-PAC will be taken further for validation to determine the perfectness of clusters. The cluster formation and maintenance have been implemented in C++ as a programming language. The cluster validation has been carried out using OMNET++ simulator.
△ Less
Submitted 12 January, 2013;
originally announced January 2013.
-
Analysis, Modification, and Implementation (AMI) of Scheduling Algorithm for the IEEE 802.116e (Mobile WiMAX)
Authors:
C. Ravichandiran,
C. Pethuru Raj,
V. Vaidhyanathan
Abstract:
Mobile WiMAX (Worldwide Interoperability for Microwave Access) is being touted as the most promising and potential broadband wireless technology. And the popularity rate has been surging to newer heights as the knowledge-backed service era unfolds steadily. Especially Mobile WiMAX is being projected as a real and strategic boon for develo** counties such as India due to its wireless coverage acr…
▽ More
Mobile WiMAX (Worldwide Interoperability for Microwave Access) is being touted as the most promising and potential broadband wireless technology. And the popularity rate has been surging to newer heights as the knowledge-backed service era unfolds steadily. Especially Mobile WiMAX is being projected as a real and strategic boon for develo** counties such as India due to its wireless coverage acreage is phenomenally high. Mobile WiMAX has spurred tremendous interest from operators seeking to deploy high-performance yet cost-effective broadband wireless networks. The IEEE 802.16e standard based Mobile WiMAX system will be investigated for the purpose of Quality of Service provisioning. As a technical challenge, radio resource management will be primarily considered and main is the costly spectrum and the increasingly more demanding applications with ever growing number of subscribers. It is necessary to provide Quality of Service (QoS) guaranteed with different characteristics. As a possible solution the scheduling algorithms will be taken into main consideration and the present well known algorithms will be described. In this paper, we have highlighted the following critical issues for Mobile WiMAX technologies. This paper specifically discussed about the below mentioned in detail. - QoS Requirements For IEEE 802.16 Service Classes, Achieving efficient radio resource management. - Deficit Round Robin (DRR) Scheduling algorithm. - Modified Deficit Round Robin (MDRR) scheduling algorithm's attributes, properties and architecture. System Model And Scenarios Using OPNET Modeler Software. - Simulation Limitations And Constraints.
△ Less
Submitted 7 March, 2010;
originally announced March 2010.
-
Dpraodv: A Dyanamic Learning System Against Blackhole Attack in Aodv Based Manet
Authors:
Payal N. Raj,
Prashant B. Swadas
Abstract:
Security is an essential requirement in mobile ad hoc networks to provide protected communication between mobile nodes. Due to unique characteristics of MANETS, it creates a number of consequential challenges to its security design. To overcome the challenges, there is a need to build a multifence security solution that achieves both broad protection and desirable network performance. MANETs are…
▽ More
Security is an essential requirement in mobile ad hoc networks to provide protected communication between mobile nodes. Due to unique characteristics of MANETS, it creates a number of consequential challenges to its security design. To overcome the challenges, there is a need to build a multifence security solution that achieves both broad protection and desirable network performance. MANETs are vulnerable to various attacks, blackhole, is one of the possible attacks. Black hole is a type of routing attack where a malicious node advertise itself as having the shortest path to all nodes in the environment by sending fake route reply. By doing this, the malicious node can deprive the traffic from the source node. It can be used as a denial-of-service attack where it can drop the packets later. In this paper, we proposed a DPRAODV (Detection, Prevention and Reactive AODV) to prevent security threats of blackhole by notifying other nodes in the network of the incident. The simulation results in ns2 (ver- 2.33) demonstrate that our protocol not only prevents blackhole attack but consequently improves the overall performance of (normal) AODV in presence of black hole attack.
△ Less
Submitted 12 September, 2009;
originally announced September 2009.
-
High Pressure X-Ray Diffraction Study of UMn2Ge2
Authors:
Vasudeva Siruguri,
S. K. Paranjpe,
P. Raj,
A. Sathyamoorthy,
Jean Paul Itie,
Alain Polian
Abstract:
Uranium manganese germanide, UMn2Ge2, crystallizes in body-centered tetragonal ThCr2Si2 structure with space group I4/mmm, a = 3.993A and c = 10.809A under ambient conditions. Energy dispersive X-ray diffraction was used to study the compression behaviour of UMn2Ge2 in a diamond anvil cell. The sample was studied up to static pressure of 26 GPa and a reversible structural phase transition was ob…
▽ More
Uranium manganese germanide, UMn2Ge2, crystallizes in body-centered tetragonal ThCr2Si2 structure with space group I4/mmm, a = 3.993A and c = 10.809A under ambient conditions. Energy dispersive X-ray diffraction was used to study the compression behaviour of UMn2Ge2 in a diamond anvil cell. The sample was studied up to static pressure of 26 GPa and a reversible structural phase transition was observed at a pressure of ~ 16.1 GPa. Unit cell parameters were determined up to 12.4 GPa and the calculated cell volumes were found to be well reproduced by a Murnaghan equation of state with K0 = 73.5 GPa and K' = 11.4. The structure of the high pressure phase above 16.0 GPa is quite complicated with very broad lines and could not be unambiguously determined with the available instrument resolution.
△ Less
Submitted 29 July, 2004;
originally announced July 2004.
-
Magnetization studies on superconducting MgB$_2$ - lower and upper critical fields and critical current density
Authors:
Amish G. Joshi,
C. G. S. Pillai,
P. Raj,
S. K. Malik
Abstract:
Magnetization studies have been carried out on superconducting MgB$_2$ (T$_c$=37K) in the temperature range of 2-50K and in magnetic field up to 5 Tesla. From these measurements, values of the lower critical field H$_c1$(0), upper critical field H$_c2$(0) at zero K are estimated to be ~300 Oe and ~12.5 Tesla, respectively, which yield a value of ~26 for the Ginzburg-Landau parameter, k. Magnetiz…
▽ More
Magnetization studies have been carried out on superconducting MgB$_2$ (T$_c$=37K) in the temperature range of 2-50K and in magnetic field up to 5 Tesla. From these measurements, values of the lower critical field H$_c1$(0), upper critical field H$_c2$(0) at zero K are estimated to be ~300 Oe and ~12.5 Tesla, respectively, which yield a value of ~26 for the Ginzburg-Landau parameter, k. Magnetization hysteresis loops have been obtained at various temperatures from which the magnetization critical current density is estimated using Bean's critical state model.
△ Less
Submitted 14 March, 2001;
originally announced March 2001.
-
Inelastic Neutron scattering in CeSi_{2-x}Ga_x ferromagnetic Kondo lattice compounds
Authors:
K. R. Priolkar,
Mala N. Rao,
R. B. Prabhu,
P. R. Sarode,
S. K. Paranjpe,
P. Raj,
A. Sathyamoorthy
Abstract:
Inelastic neutron scattering investigation on ferromagnetic Kondo lattice compounds belonging to CeSi_{2-x}Ga_{x}, x = 0.7, 1.0 and 1.3, system is reported. The thermal evolution of the quasielastic response shows that the Kondo interactions dominate over the RKKY interactions with increase in Ga concentration from 0.7 to 1.3. This is related to the increase in k-f hybridization with increasing…
▽ More
Inelastic neutron scattering investigation on ferromagnetic Kondo lattice compounds belonging to CeSi_{2-x}Ga_{x}, x = 0.7, 1.0 and 1.3, system is reported. The thermal evolution of the quasielastic response shows that the Kondo interactions dominate over the RKKY interactions with increase in Ga concentration from 0.7 to 1.3. This is related to the increase in k-f hybridization with increasing Ga concentration. The high energy response indicates the ground state to be split by crystal field in all three compounds. Using the experimental results we have calculated the crystal field parameters in all three compounds studied here.
△ Less
Submitted 22 April, 1997; v1 submitted 20 April, 1997;
originally announced April 1997.