-
quTARANG: A python GPE solver to study turbulence in quantum systems
Authors:
Shawan Kumar Jha,
Sachin Singh Rawat,
Mahendra Kumar Verma,
Pankaj Kumar Mishra
Abstract:
quTARANG is a Python-based general-purpose Gross-Pitaevskii Equation (GPE) solver. It can solve GPE in 1D, 2D and 3D and has the ability to run on both CPU and GPU. It has been developed to study turbulence in quantum systems, specifically in atomic Bose-Einstein condensates, and can be used to study different quantities, such as the varied spectra associated with quantum turbulence.
quTARANG is a Python-based general-purpose Gross-Pitaevskii Equation (GPE) solver. It can solve GPE in 1D, 2D and 3D and has the ability to run on both CPU and GPU. It has been developed to study turbulence in quantum systems, specifically in atomic Bose-Einstein condensates, and can be used to study different quantities, such as the varied spectra associated with quantum turbulence.
△ Less
Submitted 25 January, 2023; v1 submitted 19 January, 2023;
originally announced January 2023.
-
Review of Methods for Handling Class-Imbalanced in Classification Problems
Authors:
Satyendra Singh Rawat,
Amit Kumar Mishra
Abstract:
Learning classifiers using skewed or imbalanced datasets can occasionally lead to classification issues; this is a serious issue. In some cases, one class contains the majority of examples while the other, which is frequently the more important class, is nevertheless represented by a smaller proportion of examples. Using this kind of data could make many carefully designed machine-learning systems…
▽ More
Learning classifiers using skewed or imbalanced datasets can occasionally lead to classification issues; this is a serious issue. In some cases, one class contains the majority of examples while the other, which is frequently the more important class, is nevertheless represented by a smaller proportion of examples. Using this kind of data could make many carefully designed machine-learning systems ineffective. High training fidelity was a term used to describe biases vs. all other instances of the class. The best approach to all possible remedies to this issue is typically to gain from the minority class. The article examines the most widely used methods for addressing the problem of learning with a class imbalance, including data-level, algorithm-level, hybrid, cost-sensitive learning, and deep learning, etc. including their advantages and limitations. The efficiency and performance of the classifier are assessed using a myriad of evaluation metrics.
△ Less
Submitted 10 November, 2022;
originally announced November 2022.
-
Improving circuit miniaturization and its efficiency using Rough Set Theory
Authors:
Sarvesh SS Rawat,
Dheeraj Dilip Mor,
Anugrah Kumar,
Sanjiban Shekar Roy,
Rohit kumar
Abstract:
High-speed, accuracy, meticulousness and quick response are notion of the vital necessities for modern digital world. An efficient electronic circuit unswervingly affects the maneuver of the whole system. Different tools are required to unravel different types of engineering tribulations. Improving the efficiency, accuracy and low power consumption in an electronic circuit is always been a bottle…
▽ More
High-speed, accuracy, meticulousness and quick response are notion of the vital necessities for modern digital world. An efficient electronic circuit unswervingly affects the maneuver of the whole system. Different tools are required to unravel different types of engineering tribulations. Improving the efficiency, accuracy and low power consumption in an electronic circuit is always been a bottle neck problem. So the need of circuit miniaturization is always there. It saves a lot of time and power that is wasted in switching of gates, the wiring-crises is reduced, cross-sectional area of chip is reduced, the number of transistors that can implemented in chip is multiplied many folds. Therefore to trounce with this problem we have proposed an Artificial intelligence (AI) based approach that make use of Rough Set Theory for its implementation. Theory of rough set has been proposed by Z Pawlak in the year 1982. Rough set theory is a new mathematical tool which deals with uncertainty and vagueness. Decisions can be generated using rough set theory by reducing the unwanted and superfluous data. We have condensed the number of gates without upsetting the productivity of the given circuit. This paper proposes an approach with the help of rough set theory which basically lessens the number of gates in the circuit, based on decision rules.
△ Less
Submitted 10 December, 2013;
originally announced December 2013.
-
Phishing Detection by determining reliability factor using rough set theory
Authors:
Anugrah Kumar,
Sanjiban Shekar Roy,
Sarvesh SS Rawat,
Sanklan Saxena
Abstract:
Phishing is a common online weapon, used against users, by Phishers for acquiring a confidential information through deception. Since the inception of internet, nearly everything, ranging from money transaction to sharing information, is done online in most parts of the world. This has also given rise to malicious activities such as Phishing. Detecting Phishing is an intricate process due to compl…
▽ More
Phishing is a common online weapon, used against users, by Phishers for acquiring a confidential information through deception. Since the inception of internet, nearly everything, ranging from money transaction to sharing information, is done online in most parts of the world. This has also given rise to malicious activities such as Phishing. Detecting Phishing is an intricate process due to complexity, ambiguity and copious amount of possibilities of factors responsible for phishing . Rough sets can be a powerful tool, when working on such kind of Applications containing vague or imprecise data. This paper proposes an approach towards Phishing Detection Using Rough Set Theory. The Thirteen basic factors, directly responsible towards Phishing, are grouped into four Strata. Reliability Factor is determined on the basis of the outcome of these strata, using Rough Set Theory . Reliability Factor determines the possibility of a suspected site to be Valid or Fake. Using Rough set Theory most and the least influential factors towards Phishing are also determined.
△ Less
Submitted 10 December, 2013;
originally announced December 2013.
-
Discovering potential user browsing behaviors using custom-built apriori algorithm
Authors:
Sandeep Singh Rawat,
Lakshmi Rajamani
Abstract:
Most of the organizations put information on the web because they want it to be seen by the world. Their goal is to have visitors come to the site, feel comfortable and stay a while and try to know completely about the running organization. As educational system increasingly requires data mining, the opportunity arises to mine the resulting large amounts of student information for hidden useful in…
▽ More
Most of the organizations put information on the web because they want it to be seen by the world. Their goal is to have visitors come to the site, feel comfortable and stay a while and try to know completely about the running organization. As educational system increasingly requires data mining, the opportunity arises to mine the resulting large amounts of student information for hidden useful information (patterns like rule, clustering, and classification, etc). The education domain offers ground for many interesting and challenging data mining applications like astronomy, chemistry, engineering, climate studies, geology, oceanography, ecology, physics, biology, health sciences and computer science. Collecting the interesting patterns using the required interestingness measures, which help us in discovering the sophisticated patterns that are ultimately used for develo** the site. We study the application of data mining to educational log data collected from Guru Nanak Institute of Technology, Ibrahimpatnam, India. We have proposed a custom-built apriori algorithm to find the effective pattern analysis. Finally, analyzing web logs for usage and access trends can not only provide important information to web site developers and administrators, but also help in creating adaptive web sites.
△ Less
Submitted 2 September, 2010;
originally announced September 2010.